cyber security Crossword Puzzles

Piggyccinos 2022-10-04

Piggyccinos crossword puzzle
Across
  1. Clean out the channel
  2. Bae of Bengal
  3. Asian-pigmentation-fusion = profit
  4. land of the pop culture E-mau5
  5. home is where the heart is
  6. Big brother Tae
Down
  1. What a broken clock that's all talk needs
  2. Cyber-venomous
  3. King of Persia-h
  4. Turk administration
  5. Banana profiling
  6. Teacup piggyccino
  7. Beatle greeting, circa '68

13 Clues: Bae of BengalCyber-venomousBig brother TaeKing of Persia-hBanana profilingTeacup piggyccinoTurk administrationClean out the channelBeatle greeting, circa '68home is where the heart island of the pop culture E-mau5Asian-pigmentation-fusion = profitWhat a broken clock that's all talk needs

Piggyccinos 2022-10-04

Piggyccinos crossword puzzle
Across
  1. Teacup piggyccino
  2. Land of the pop culture E-mau5
  3. Home is where the heart is
  4. Banana profiling
  5. What a broken clock that's all talk needs
  6. Cyber-venomous
  7. King of Persia-h
Down
  1. Asian-pigmentation-fusion = profit
  2. Big brother Tae
  3. Turk administration
  4. Beatle greeting, circa '68
  5. Bae of Bengal
  6. Clean out the channel

13 Clues: Bae of BengalCyber-venomousBig brother TaeBanana profilingKing of Persia-hTeacup piggyccinoTurk administrationClean out the channelBeatle greeting, circa '68Home is where the heart isLand of the pop culture E-mau5Asian-pigmentation-fusion = profitWhat a broken clock that's all talk needs

Securities 2023-01-03

Securities crossword puzzle
Across
  1. If secured, debt securities may be contractually prioritized over other unsecured, subordinated debt in the case of a ___
  2. Debt securities can be secured from ___
  3. Equity securities often do pay out ___
  4. Publicly traded securities are listed on stock ___
  5. A security can represent ___ in a corporation in the form of stock
  6. shareholders can sell their securities to other investors for cash and/or ___
Down
  1. tradable financial assets used to raise capital in public and private markets and hold some type of monetary value
  2. The Securities Act of 1933 is the first federal legislation to regulate the U.S. ___
  3. type of security which combines aspects of debt and equity
  4. a type of financial contract whose price is determined by the value of some underlying asset, such as a stock, bond, or commodity
  5. type of security that are essentially loans repaid with periodic payments
  6. regulates public sales of securities
  7. type of security which provides ownership rights to holders
  8. In the secondary market, securities are simply transferred as ___ from one investor to another
  9. issuers can seek security listings and attract investors by ensuring a liquid and regulated market in which to ___

15 Clues: regulates public sales of securitiesEquity securities often do pay out ___Debt securities can be secured from ___Publicly traded securities are listed on stock ___type of security which combines aspects of debt and equitytype of security which provides ownership rights to holdersA security can represent ___ in a corporation in the form of stock...

Data Protection 2022-02-08

Data Protection crossword puzzle
Across
  1. If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
  2. In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
  3. Domestic individuals and entities storing data in the PRC may not provide such data to foreign( )or enforcement agencies without Chinese regulator’s prior approval.
  4. The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
  5. Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
  6. In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
  7. The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
  8. Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
Down
  1. “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
  2. It defines “personal information” as any information recorded in digital or other forms that relate to identified or identifiable natural persons, excluding( )information.
  3. The Personal Information Protection Law also sets out a series of penalties for( ).
  4. Under the Provisions on Administration of Automotive Data Security in August 2021, “important data” in automotive industry includes data on traffic and( )flow.
  5. If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
  6. “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.
  7. Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
  8. A stricter( )is expected in managing and processing “national core data”.
  9. Multinational corporations’ ( )with a foreign court request or order for documents might put them in violation of the PRC law, which would result in penalties.
  10. Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
  11. In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
  12. Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.

20 Clues: A stricter( )is expected in managing and processing “national core data”.The Personal Information Protection Law also sets out a series of penalties for( ).Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines....

AWS Cloud Practitioner Exam Security 2022-06-08

AWS Cloud Practitioner Exam Security crossword puzzle
Across
  1. Provides data security ?? using encryption keys and provides access control for encryption, decryption, and re-encryption
  2. Payment Card Industry Data Security Standard (acronym)
  3. The ? created, managed, and used by users are termed as ? and support cryptographic operations
  4. service that prevents secret credentials from being hardcoded in the source code
  5. service that offers security aspects to protect the environment using industry-standard best practices.
  6. Security Hub collects findings or ? from multiple AWS accounts.
  7. certificates are signed by a ?? and contain the server’s name, the validity period, the public key, the signature algorithm, and more
  8. user directory type that provides sign-up and sign-in for the application using Amazon Cognito User Pools
  9. CIS
Down
  1. service that allows a user to protect AWS applications by storing, renewing, and deploying public and private SSL/TLS X.509 certificates
  2. global service that creates, stores, and manages encryption keys
  3. enables multiple ways to use Microsoft Active Directory (AD) with other AWS services
  4. facilitates tracking of changes in Secrets Manager
  5. Ensures ?? encryption of the secret between AWS and the system to retrieve the secret
  6. Charges are applied only for the current ?, not for all ? in which Security Hub is enabled.
  7. Allows ? of master keys once a year using previous versions of keys
  8. Secrets Manager integrates for auditing

17 Clues: CISSecrets Manager integrates for auditingfacilitates tracking of changes in Secrets ManagerPayment Card Industry Data Security Standard (acronym)Security Hub collects findings or ? from multiple AWS accounts.global service that creates, stores, and manages encryption keysAllows ? of master keys once a year using previous versions of keys...

AWS Cloud Practitioner Exam Security 2022-06-08

AWS Cloud Practitioner Exam Security crossword puzzle
Across
  1. global service that creates, stores, and manages encryption keys
  2. Provides data security ?? using encryption keys and provides access control for encryption, decryption, and re-encryption
  3. facilitates tracking of changes in Secrets Manager
  4. enables multiple ways to use Microsoft Active Directory (AD) with other AWS services
  5. service that offers security aspects to protect the environment using industry-standard best practices.
  6. service that allows a user to protect AWS applications by storing, renewing, and deploying public and private SSL/TLS X.509 certificates
  7. Ensures ?? encryption of the secret between AWS and the system to retrieve the secret
  8. Secrets Manager integrates for auditing
Down
  1. service that prevents secret credentials from being hardcoded in the source code
  2. Payment Card Industry Data Security Standard (acronym)
  3. CIS
  4. Charges are applied only for the current ?, not for all ? in which Security Hub is enabled.
  5. user directory type that provides sign-up and sign-in for the application using Amazon Cognito User Pools
  6. certificates are signed by a ?? and contain the server’s name, the validity period, the public key, the signature algorithm, and more
  7. Security Hub collects findings or ? from multiple AWS accounts.
  8. The ? created, managed, and used by users are termed as ? and support cryptographic operations
  9. Allows ? of master keys once a year using previous versions of keys

17 Clues: CISSecrets Manager integrates for auditingfacilitates tracking of changes in Secrets ManagerPayment Card Industry Data Security Standard (acronym)Security Hub collects findings or ? from multiple AWS accounts.global service that creates, stores, and manages encryption keysAllows ? of master keys once a year using previous versions of keys...

CYBERSAFETY 2024-05-02

CYBERSAFETY crossword puzzle
Across
  1. What is Cybersecurity?
  2. What is your best weapon?
  3. Who can do untold damage to you because of the internet
  4. What is the second part of CIA
  5. You must only share confidential data when
  6. What is the first part of CIA
Down
  1. What does Malware try to make you download
  2. What is now as important as real security
  3. What type of scam involves around playing with emotions to push people into a sense of urgency and fear leaving them more susceptible to being tricked
  4. what is the third part of CIA
  5. What security option fights off viruses from your computer
  6. You must only share confidential data with
  7. What is good to have as it notifies you of any sign-ins
  8. What security option makes a barrier between you and danger
  9. What security option hides your data
  10. What are the 3 principles of cybersecurity

16 Clues: What is Cybersecurity?What is your best weapon?what is the third part of CIAWhat is the first part of CIAWhat is the second part of CIAWhat security option hides your dataWhat is now as important as real securityWhat does Malware try to make you downloadYou must only share confidential data withYou must only share confidential data when...

Government Acronyms 2024-10-23

Government Acronyms crossword puzzle
Across
  1. health, education, welfare
  2. Fannie Mae
  3. environmental protection agency
  4. Freddie Mae
  5. federal deposit insurance corporation
  6. federal communication commission
  7. housing urban development
  8. American Track
  9. Food drug administration
  10. United States department of agriculture
  11. national institute of standards and tech
  12. National Aeronautics and Space Administration
  13. Health human sources
  14. bill of rights
  15. Bridge investment program
  16. Transportation security administration
  17. Department of homeland security
Down
  1. Federal emergency management agency
  2. national oreanic atmospheric administration
  3. securities and exchange
  4. federal bureau of investigation
  5. department of defense
  6. Central Intelligence Agency
  7. federal aviation administration
  8. United States of America
  9. Record of decision
  10. department of transportation
  11. social security administration
  12. attorney general
  13. Veteren Assistance
  14. National institutes of health
  15. Secret service
  16. Supreme Court of the United States
  17. Small business association
  18. Department of justice

35 Clues: Fannie MaeFreddie MaeAmerican TrackSecret servicebill of rightsattorney generalRecord of decisionVeteren AssistanceHealth human sourcesdepartment of defenseDepartment of justicesecurities and exchangeUnited States of AmericaFood drug administrationhousing urban developmentBridge investment programhealth, education, welfareSmall business association...

SFS 2 Vocab 2/3 2023-09-26

SFS 2 Vocab 2/3 crossword puzzle
Across
  1. Do the letters flow or are they erratic and shaky?
  2. fiber created from natural materials or by chemical processes, a man-made fiber
  3. Check for pressure on the downward and upward strokes.
  4. the writing tilt to the left or right, or is it straight up and down
  5. handwriting is difficult to disguise and forge
Down
  1. Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
  2. Similar to fingerprints, every person's handwriting is unique
  3. Compare how capital letters are joined to lowercase letters
  4. Specially trained person who scientifically analyzes handwriting and other features in a document.
  5. the overall height, width, and size of the letters
  6. the examination and comparison of questioned documents with known material
  7. making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
  8. a computer or computer system intended to mimic likely targets of cyber attacks
  9. Good tool for including or excluding persons when determining a match
  10. Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
  11. also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  12. about the amount that is written in illegitimate checks every
  13. (aka. Baseline characteristics) Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?

18 Clues: handwriting is difficult to disguise and forgeDo the letters flow or are they erratic and shaky?the overall height, width, and size of the lettersCheck for pressure on the downward and upward strokes.Compare how capital letters are joined to lowercase lettersSimilar to fingerprints, every person's handwriting is unique...

Cybersecurity Crossword Puzzle 2025-09-21

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
  2. The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
  3. A malicious program that can self-replicate and attach itself to other files.
  4. A symbol, typically '=', used in programming to assign a value to a variable.
  5. The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
  6. A value or variable that is passed to a function or method when it is called.
  7. A software that generates revenue by automatically displaying online advertisements.
  8. To verify the identity of a user or system.
Down
  1. A program or set of rules that protects a network by controlling incoming and outgoing traffic.
  2. An additional component or feature that can be added to a software program.
  3. A software program used to prevent, detect, and remove malware.
  4. CONTROL - A security process that controls and manages who is authorized to access certain resources.
  5. A malicious program that is designed to damage or gain unauthorized access to a computer system.
  6. The act of sending fraudulent emails in order to trick people into revealing personal information.
  7. The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
  8. POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
  9. A character encoding standard used to represent text in computers.
  10. A protocol used to translate IP addresses into MAC addresses.
  11. A collection of IP-to-MAC address mappings used to speed up network communication.

19 Clues: To verify the identity of a user or system.A protocol used to translate IP addresses into MAC addresses.A software program used to prevent, detect, and remove malware.A character encoding standard used to represent text in computers.An additional component or feature that can be added to a software program....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. uicydata;104.18.12.126
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits.
  3. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. Powerful intercepting proxy and web vulnerability scanner.
  3. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  4. Shadowy cyber collective widely known because of its work since 02.2022.
  5. Rhysider 44.
  6. A remote code execution flaw in Nginx web server.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

CYBER LAW (CIA-1) 2021-08-31

CYBER LAW (CIA-1) crossword puzzle
Across
  1. the conversion of analogue data (esp. in later use images, video, and text) into digital form.
  2. Sending of unsolicited bulk and commercial messages over the internet is
  3. India's first cyber police station.
  4. Practise of passing off another author work or ideas as ones own.
  5. refers to exploring the appropriate, ethical behaviour related to the online environment and digital media platform.
  6. cyber offence in which frauds are committed by inviting people to invest money and sharing financial information
Down
  1. The science of sending secret cypher and decoding
  2. A person who sends, generates, store or transmit any electronic messages
  3. Software designed to disrupt, damage, or gain unauthorised access to computer system
  4. The Altering of data so that it is not usable unless the changes are undone is

10 Clues: India's first cyber police station.The science of sending secret cypher and decodingPractise of passing off another author work or ideas as ones own.A person who sends, generates, store or transmit any electronic messagesSending of unsolicited bulk and commercial messages over the internet is...

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

Fall 2023-11-07

Fall crossword puzzle
Across
  1. ship used to arrive at Plymouth Colony
  2. symbol of fruitful abundance
  3. November 11th is the day to honor
  4. season of the
  5. Colorful Leaves
  6. the Monday after Thanksgiving
Down
  1. - peoples heritage month
  2. spice
  3. -,-, the 5th of November
  4. no - November

10 Clues: spiceseason of theno - NovemberColorful Leaves- peoples heritage month-,-, the 5th of Novembersymbol of fruitful abundancethe Monday after ThanksgivingNovember 11th is the day to honorship used to arrive at Plymouth Colony

Bullying and Conflict 2024-03-10

Bullying and Conflict crossword puzzle
Across
  1. Online harassment
  2. Two sided
  3. In public
  4. Alone with someone else
Down
  1. On purpose
  2. Fighting and hitting
  3. Hurting and being mean to someone
  4. Making fun of looks and skin tone
  5. over and over again
  6. Private

10 Clues: PrivateTwo sidedIn publicOn purposeOnline harassmentover and over againFighting and hittingAlone with someone elseHurting and being mean to someoneMaking fun of looks and skin tone

Asean 2023-08-15

Asean crossword puzzle
Across
  1. ASEAN's security includes...Security which. means security overseas and at the boarders of the seas.
  2. ASEAN's flags colors are red, blue, white, and...
  3. ASEAN's values are respect, security and...
  4. also one of ASEAN's main purpose is to accelerate.... growth
  5. When theres a problem betweeen ASEAN countries they should...
  6. Obviously, each ASEAN country has their own.... that they are interested about
  7. one of the founders of ASEAN coming from Indonesia is Adam...
  8. what month was ASEAN formed?
  9. in which country was ASEAN formed?
Down
  1. what country's shape in ASEAN is fragmented
  2. what country's shape in ASEAN is elongated
  3. ASEAN's motto is "One Vision, One Identity and One....
  4. what country's shape in ASEAN is compacted?
  5. one of the ASEAN cooperation that effects money and recources is...
  6. even after further negotiation the problem hasnt resolved the countries should go to indternational...
  7. ASEAN's purpose is to acheive Peace and....

16 Clues: what month was ASEAN formed?in which country was ASEAN formed?what country's shape in ASEAN is elongatedwhat country's shape in ASEAN is fragmentedASEAN's values are respect, security and...what country's shape in ASEAN is compacted?ASEAN's purpose is to acheive Peace and....ASEAN's flags colors are red, blue, white, and......

SCUK Data Protection Day 2019 Crossword Quiz 2019-02-12

SCUK Data Protection Day 2019 Crossword Quiz crossword puzzle
Across
  1. The month in which GDPR was adopted in the UK in 2018 (3)
  2. Secure way for transferring data (4)
  3. __ Grounds are needed to process personal data (6)
  4. True or False: GDPR will no longer apply in the UK after Brexit (5)
  5. Government regulator upholding information rights (11, 12)
  6. Special category of personal data (9)
  7. Penalty of 4% of global __ (8)
  8. Required from data subject for legal processing (7)
  9. Controller, Organisation or individual in charge of how data is processed (4, 10)
  10. Subject __ Request (6)
  11. The ‘R’ in GDPR (10)
  12. __ to rectification (5)
Down
  1. The Data Protection __ 2018 (3)
  2. Where should you go to report a data breach at SCUK? (7, 3)
  3. Collecting, using, sharing or storing personal data (10)
  4. Type of cyber-attack (8)
  5. What does GDPR regulate? (4, 10)
  6. The right to be __ (9)
  7. Acronym for organisational role that reports internally and externally at the highest level on Data Protection matters (3)
  8. Owner of personal data (4, 7)
  9. __ phishing is a type of social engineering cyber-attack (5)
  10. Everyone’s responsibility to do when a suspected data protection incident has occurred (6)
  11. Privacy __ Assessment (6)
  12. The ‘G’ in GDPR (7)
  13. Does GDPR apply to charities? (3)
  14. Category of sensitive personal data (6)
  15. Acronym of the office regulating Data Protection compliance in the UK (3)

27 Clues: The ‘G’ in GDPR (7)The ‘R’ in GDPR (10)The right to be __ (9)Subject __ Request (6)__ to rectification (5)Type of cyber-attack (8)Privacy __ Assessment (6)Owner of personal data (4, 7)Penalty of 4% of global __ (8)The Data Protection __ 2018 (3)What does GDPR regulate? (4, 10)Does GDPR apply to charities? (3)Secure way for transferring data (4)...

Procrastination 2014-01-23

Procrastination crossword puzzle
Across
  1. British Defeat, 2013
  2. Rage, Anger
  3. ANU Theatre Society
  4. Director upset over script leak
  5. Who pays their debts
  6. Increased payment for journalists, island
  7. Newest victim of Cyber Warfare
Down
  1. The White Ewe
  2. George Bernard Shaw's Famous Play
  3. Julie Bishop does not approve of treason
  4. Newest dating app
  5. 1991 US Invasion
  6. Adaptation of Austen's Emma
  7. Mother-in-law of the Leader of the Opposition
  8. Kurdish Genocide, Iraq

15 Clues: Rage, AngerThe White Ewe1991 US InvasionNewest dating appANU Theatre SocietyBritish Defeat, 2013Who pays their debtsKurdish Genocide, IraqAdaptation of Austen's EmmaNewest victim of Cyber WarfareDirector upset over script leakGeorge Bernard Shaw's Famous PlayJulie Bishop does not approve of treasonIncreased payment for journalists, island...

Types of risks. 2024-07-15

Types of risks. crossword puzzle
Across
  1. - Risk from deceitful acts.
  2. - Risks from regulatory breaches.
  3. - Risk from natural events.
  4. - Risks from failed processes.
  5. - Risk from price fluctuations.
  6. - Risk affecting the entire market.
  7. - Risks from poor business decisions.
Down
  1. - Risk of defaulted loans.
  2. - Risk of damaged public image.
  3. - Risk from currency fluctuations.
  4. - Risks from lawsuits.
  5. - Risk of insufficient cash.
  6. - Risk from rate changes.
  7. - Risks from government actions.
  8. - Risks from digital attacks

15 Clues: - Risks from lawsuits.- Risk from rate changes.- Risk of defaulted loans.- Risk from deceitful acts.- Risk from natural events.- Risk of insufficient cash.- Risks from digital attacks- Risks from failed processes.- Risk of damaged public image.- Risk from price fluctuations.- Risks from government actions.- Risks from regulatory breaches....

111 2022-02-09

111 crossword puzzle
Across
  1. Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
  2. The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
  3. Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
  4. The Personal Information Protection Law also sets out a series of penalties for( ).
  5. The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
  6. Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
  7. “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.
  8. A stricter( )is expected in managing and processing “national core data”.
  9. “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
Down
  1. Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
  2. If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
  3. In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
  4. If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
  5. Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.
  6. Under the Provisions on Administration of Automotive Data Security in August 2021, “important data” in automotive industry includes data on traffic and( )flow.
  7. In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
  8. It defines “personal information” as any information recorded in digital or other forms that relate to identified or identifiable natural persons, excluding( )information.
  9. In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
  10. Domestic individuals and entities storing data in the PRC may not provide such data to foreign( )or enforcement agencies without Chinese regulator’s prior approval.
  11. Multinational corporations’ ( )with a foreign court request or order for documents might put them in violation of the PRC law, which would result in penalties.

20 Clues: A stricter( )is expected in managing and processing “national core data”.The Personal Information Protection Law also sets out a series of penalties for( ).Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines....

CODE PINK 2020-07-18

CODE PINK crossword puzzle
Across
  1. always (look around) the area
  2. areas that are important to move quickly to and cover during a Code Pink
  3. a person might be considered suspicious if they are carrying an oversized what
  4. when the child is found, you should do what until security arrives
  5. everyone should stay in the where until the Code Pink is cleared
  6. provide security with a what of the child and suspect
  7. during a Code Pink it is important to collect as many what as possible
  8. parents need a matching one of these to transport pediatric patients
  9. color badge needed to transport pediatric patients
  10. who should stay with the caregiver notifieid or security
  11. what is it called if there is a suspected abduction of a pediatric patient
Down
  1. loitering by unit doors, asking a lot of unnecessary questions about the hospital layout and certain units, and a person "just wanting to see the babies," are all examples of what kind of behavior
  2. important to notify security of the what of the dissapearence
  3. if you see a suspicious person do not to do what
  4. children should not be what during a code pink
  5. we should stop and do what to anyone with an infant
  6. who do you need to call immediately if there is a suspected abduction
  7. waiting for someone else to open the unit doors and then following them in

18 Clues: always (look around) the areachildren should not be what during a code pinkif you see a suspicious person do not to do whatcolor badge needed to transport pediatric patientswe should stop and do what to anyone with an infantprovide security with a what of the child and suspectwho should stay with the caregiver notifieid or security...

Cybersecurity Puzzle 2025-09-26

Cybersecurity Puzzle crossword puzzle
Across
  1. Incidents where confidential information is stolen, leaked, or disclosed are known as what?
  2. A strong culture equals strong _____.
  3. This security feature requires at least two forms of authentication.
  4. The concept of human firewalls is built on this critical aspect of security.
  5. Attackers using manipulative techniques to scam people is known as what?
  6. Organizational ____ are designed to keep people, data, and devices safe.
  7. What is one of the leading causes of security incidents?
Down
  1. This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
  2. What is the top attack method for cybercriminals?
  3. This type of malware encrypts data to prevent access to valuable resources.
  4. The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
  5. In recent years, attackers have embraced the convenience of these.
  6. While online threats get the most attention in the world of security, these threats pose just as much risk.
  7. People are the last line of ____.
  8. It is imperative to ensure accounts are protected with these.
  9. If you encounter a phishing attack, what should you do immediately?

16 Clues: People are the last line of ____.A strong culture equals strong _____.What is the top attack method for cybercriminals?What is one of the leading causes of security incidents?It is imperative to ensure accounts are protected with these.In recent years, attackers have embraced the convenience of these....

What Did You Learn Today? 2017-05-03

What Did You Learn Today? crossword puzzle
Across
  1. Which Tier data center would have least downtime?(4,1)
  2. Which redundancy is applied most commonly for a Tier 4 data center?(1,1,1,1)
  3. Abbreviation of EMC ESSM(3,6,7,6)
  4. Which Tier data center has no built-in redundancy?(4,1)
  5. What redundancy is available in Tier-3 data center?(1,1,1)
  6. Using what technic NAND Flash storages can do READ and WRITE operations simultaneously?(3,9)
  7. / What are the different types of NAND flash?(3,3,3)
  8. In Vmware, type-1 hypervisors are referred as ______.(4,5)
Down
  1. Abbreviation of UCS in CISCO UCS(7,9,6)
  2. The VT in IVT in Cisco IVT(12,7)
  3. “Formulate User Access Policy and implement the same" - is one of the key feature to workstation security. Name the Security Layer to which it belongs?(4,10)
  4. The I in IVT in Cisco IVT(12)
  5. Fill in the missing word in "BDM"- Business Continuity and D______ Management(8)
  6. Who first manufactured 3D NAND flash products?(7)
  7. Fill in the missing word in File System, Files and _______-the best practice that suggests "Scan your server for viruses, rootkits, backdoors and local exploits"(11)
  8. How many disciplines of Security is Structured in a 4 layered Security Model?(Clue:Write in words)(7)
  9. Protection Which is Security Layer which protects the PCs from within and outside the corporate Network is?(4,10)
  10. How much of data can be deleted at a time from a flash storage?(5,2,4)
  11. In MLC NAND type how many bits of data can be written to a cell?(3,4)

19 Clues: The I in IVT in Cisco IVT(12)The VT in IVT in Cisco IVT(12,7)Abbreviation of EMC ESSM(3,6,7,6)Abbreviation of UCS in CISCO UCS(7,9,6)Who first manufactured 3D NAND flash products?(7)/ What are the different types of NAND flash?(3,3,3)Which Tier data center would have least downtime?(4,1)Which Tier data center has no built-in redundancy?(4,1)...

Security Crossword 2015-06-23

Security Crossword crossword puzzle
Across
  1. in case of fire, the employees do this
  2. need to raise the floor in the computer room?
  3. who approves the fire panel going offline
  4. the cleanest place at seagate
  5. work permit what is needed prior to soldering
  6. the warmest test lab
  7. when the city sirens sound, it's because of this
  8. the scc watches these
Down
  1. "Mr. Brown will not be in today"
  2. an emergency? call us
  3. if a vendor does not have a valid bi, they are...
  4. and report security does this
  5. the contract janitorial service

13 Clues: the warmest test laban emergency? call usthe scc watches thesethe cleanest place at seagateand report security does thisthe contract janitorial service"Mr. Brown will not be in today"in case of fire, the employees do thiswho approves the fire panel going offlineneed to raise the floor in the computer room?...

Branch Security 2021-12-21

Branch Security crossword puzzle
Across
  1. How many days is a new member's check hold
  2. More than 1 person in the vault at a time
  3. How is your security & passwords protected
  4. Phone response with no active robbery
  5. How much bait money in each drawer
  6. How many working cameras in the branch?
Down
  1. Emergency evacuation meeting place
  2. Who we contact in case of lost swiper
  3. When we change the bait money
  4. Where the height markers are located
  5. How many alarm buttons are there
  6. Phone response during a robbery
  7. Robbery folder color

13 Clues: Robbery folder colorWhen we change the bait moneyPhone response during a robberyHow many alarm buttons are thereEmergency evacuation meeting placeHow much bait money in each drawerWhere the height markers are locatedWho we contact in case of lost swiperPhone response with no active robberyHow many working cameras in the branch?...

Internet Security 2019-06-06

Internet Security crossword puzzle
Across
  1. A generic term for malware where the program attaches itself to another file in order to infect a computer
  2. A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
  3. A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
  4. Hardware or software for protecting against unauthorised access to a network
  5. A trusted organisation that provides digital certificates and signatures
  6. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
  7. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
Down
  1. A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
  2. Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
  3. Where a public and private key are used to encrypt and decrypt data
  4. Where the sender and receiver both use the same key to encrypt and decrypt data
  5. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
  6. Malware that is hidden within another file on your computer

13 Clues: Malware that is hidden within another file on your computerWhere a public and private key are used to encrypt and decrypt dataA trusted organisation that provides digital certificates and signaturesHardware or software for protecting against unauthorised access to a network...

Private Security 2023-04-21

Private Security crossword puzzle
Across
  1. additions to the constitution
  2. security professionals who work to protect retail settings from theft
  3. community members selected to determine guilt in a court case
  4. private companies that provide armed security services
  5. security proffesionals who conduct investigation and find facts and analyze personal, financial, and legal matters
  6. undertaking investigation by private persons
  7. work done to establishfinantial facts
Down
  1. working to recover digital or other computer information
  2. being tried a second time for the same crime
  3. training designed to keep the security officer up to date
  4. (WMD) bombs and other weapons designed to cause maximum loss of life
  5. monitoring
  6. individuals contracted by the military to act as soldiers

13 Clues: monitoringadditions to the constitutionwork done to establishfinantial factsbeing tried a second time for the same crimeundertaking investigation by private personsprivate companies that provide armed security servicesworking to recover digital or other computer informationtraining designed to keep the security officer up to date...

Information Security 2023-08-28

Information Security crossword puzzle
Across
  1. procedure used to determine user privileges or access levels to the system
  2. state of being complete or uncorrupted
  3. gap or weakness which undermines an organization’s security efforts
  4. network of computers and devices managed as a unit with the same procedures and rules
  5. information or data which can be accessed when needed
  6. how information is protected
  7. calculated assessment of potential threats to an organization’s security
Down
  1. intent of doing harm
  2. making sure a person is who they say they are
  3. requirement of being private or secret
  4. rights an individual or organization has over information and how it is used
  5. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  6. macros which have been programmed to carry out malicious intent

13 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areinformation or data which can be accessed when neededmacros which have been programmed to carry out malicious intent...

information security 2023-08-28

information security crossword puzzle
Across
  1. procedure used to determine user privileges or access levels to the system
  2. state of being complete or uncorrupted
  3. gap or weakness which undermines an organization’s security efforts
  4. network of computers and devices managed as a unit with the same procedures and rules
  5. information or data which can be accessed when needed
  6. how information is protected
  7. calculated assessment of potential threats to an organization’s security
Down
  1. intent of doing harm
  2. making sure a person is who they say they are
  3. requirement of being private or secret
  4. rights an individual or organization has over information and how it is used
  5. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  6. macros which have been programmed to carry out malicious intent

13 Clues: intent of doing harmhow information is protectedstate of being complete or uncorruptedrequirement of being private or secretmaking sure a person is who they say they areinformation or data which can be accessed when neededmacros which have been programmed to carry out malicious intent...

Information Security 2023-08-28

Information Security crossword puzzle
Across
  1. rights an individual or organization has over information and how it is used
  2. calculated assessment of potential threats to an organization’s security
  3. procedure used to determine user privileges or access levels to the system
  4. gap or weakness which undermines an organization’s security efforts
  5. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  6. intent of doing harm
  7. requirement of being private or secret
Down
  1. how information is protected
  2. information or data which can be accessed when needed
  3. macros which have been programmed to carry out malicious intent
  4. making sure a person is who they say they are
  5. network of computers and devices managed as a unit with the same procedures and rules
  6. state of being complete or uncorrupted

13 Clues: intent of doing harmhow information is protectedrequirement of being private or secretstate of being complete or uncorruptedmaking sure a person is who they say they areinformation or data which can be accessed when neededmacros which have been programmed to carry out malicious intent...

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. agricultural process of growing food
  2. condition where a person does not have enough food to meet their daily energy needs
  3. required to provide for a growing population
  4. process of distributing food to those in need
  5. lack of food due to natural or human-made causes
  6. growing a variety of plants and animals in the same area to increase food security
  7. global organization working to end hunger and improve food security
  8. The act of preserving food through refrigeration or drying
Down
  1. basic dietary need and a vital component of food security
  2. having reliable access to a sufficient quantity of affordable, nutritious food
  3. process of distributing food to those in need
  4. food type without synthetic chemicals
  5. key pillars of food security
  6. Using waste to help crops grow

14 Clues: key pillars of food securityUsing waste to help crops growagricultural process of growing foodfood type without synthetic chemicalsrequired to provide for a growing populationprocess of distributing food to those in needprocess of distributing food to those in needlack of food due to natural or human-made causes...

Water Security 2025-05-23

Water Security crossword puzzle
Across
  1. the weather conditions prevailing in an area in general or over a long period.
  2. A international organization
  3. a biological community of interacting organisms and their physical environment.
  4. solutions to managing water insecurity
  5. the state of being scarce or in short supply; shortage.
  6. the presence of harmful substances within the environment
  7. the state of being extremely poor.
Down
  1. the governing body of a nation, state, or community.
  2. Two words. An organization that helps manage water security
  3. t] : the process of keeping places free from dirt, infection, disease, etc.
  4. the ability to be maintained at a certain rate or level.
  5. the state of being open to danger or threat; lack of protection.
  6. an organized body of people with a particular purpose

13 Clues: A international organizationthe state of being extremely poor.solutions to managing water insecuritythe governing body of a nation, state, or community.an organized body of people with a particular purposethe state of being scarce or in short supply; shortage.the ability to be maintained at a certain rate or level....

Security 2022-01-24

Security crossword puzzle
Across
  1. a device making a loud noise that gives warning of a fire.
  2. a length of thick strong cord made by twisting together strands of hemp.
  3. a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
  1. a covering for the hand worn for protection against cold or dirt.
  2. directions, detailed information about how something should be done.
  3. a hard or padded protective hat.
  4. a covering for all or part of the face to protect against air pollutants.
  5. a strip to fasten in a car.

8 Clues: a strip to fasten in a car.a hard or padded protective hat.a device making a loud noise that gives warning of a fire.a covering for the hand worn for protection against cold or dirt.directions, detailed information about how something should be done.a length of thick strong cord made by twisting together strands of hemp....

Security 2016-03-14

Security crossword puzzle
Across
  1. Theft, especially in a world where so many business people use smartphones to carry out their day to day jobs.
  2. Any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.
  3. When a virus disguises itself as another program to gain access to a computer
Down
  1. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. Someone who seeks and exploits weaknesses in a computer system or computer network.
  3. Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details
  4. Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
  5. A standalone malware computer program that replicates itself in order to spread to other computers.

8 Clues: When a virus disguises itself as another program to gain access to a computerSomeone who seeks and exploits weaknesses in a computer system or computer network.A standalone malware computer program that replicates itself in order to spread to other computers....

Security 2025-10-13

Security crossword puzzle
Across
  1. What section is Duty of a CSO who denies entry
  2. What could you get for excellent service in the Ministry
  3. what Section is Power to use reasonable force
  4. What does S stand for in phonetic Alphabet
Down
  1. What does F Stand for in phonetic Alphabet
  2. Tactical communications framework
  3. What radio code is 10-3
  4. Good morning in Maori

8 Clues: Good morning in MaoriWhat radio code is 10-3Tactical communications frameworkWhat does F Stand for in phonetic AlphabetWhat does S stand for in phonetic Alphabetwhat Section is Power to use reasonable forceWhat section is Duty of a CSO who denies entryWhat could you get for excellent service in the Ministry

security crossword 2021-08-31

security crossword crossword puzzle
Across
  1. Big metal ships
  2. In the skys
  3. Keeping shops safe
  4. I can see you
  5. Boss of the Prison
Down
  1. Locks you up behind bars
  2. On the seas
  3. Five O
  4. Immigration
  5. Best in the world
  6. To chase thief's when on the run
  7. Secret service
  8. He has a weapon

13 Clues: Five OOn the seasImmigrationIn the skysI can see youSecret serviceBig metal shipsHe has a weaponBest in the worldKeeping shops safeBoss of the PrisonLocks you up behind barsTo chase thief's when on the run

Security Crossword 2013-02-28

Security Crossword crossword puzzle
Across
  1. table which holds relationship between parent and child role
  2. a function call or a program call
  3. Founded by 5 IBMers in 1972
  4. doorway to SAP system
  5. a template to derive roles/ with * for org elements
  6. This mode pull the auth changes of SU24 to roles/ ____ Mode of generation
  7. Cross System Responsibility can be defined by ____ role
  8. Transaction to read the Audit logs
Down
  1. permission to perform an action/provide right access to user
  2. User type for communication within same system
  3. TSTC is _____ independent table/ SM01
  4. Authorization check can be traced
  5. transaction to compare two users/roles

13 Clues: doorway to SAP systemFounded by 5 IBMers in 1972a function call or a program callAuthorization check can be tracedTransaction to read the Audit logsTSTC is _____ independent table/ SM01transaction to compare two users/rolesUser type for communication within same systema template to derive roles/ with * for org elements...

INTERNET SECURITY 2024-02-12

INTERNET SECURITY crossword puzzle
Across
  1. Εικόνα σώματος & κοινωνικά δίκτυα
  2. Κακόβουλο λογισμικό
  3. Διαδικτυακός εκφοβισμός
  4. Κωδικοί πρόσβασης
  5. Στοχευμένες διαφημίσεις
  6. Πειρατεία λογισμικού
  7. Διαδικτυακή φήμη
Down
  1. Άγνωστοι στο διαδίκτυο
  2. Ψευδείς ειδήσεις
  3. Παιχνίδια στο διαδίκτυο
  4. Ηλεκτρονικές απάτες
  5. Προστασία προσωπικών δεδομένων
  6. Εθισμός στο διαδίκτυο

13 Clues: Ψευδείς ειδήσειςΔιαδικτυακή φήμηΚωδικοί πρόσβασηςΚακόβουλο λογισμικόΗλεκτρονικές απάτεςΠειρατεία λογισμικούΕθισμός στο διαδίκτυοΆγνωστοι στο διαδίκτυοΔιαδικτυακός εκφοβισμόςΠαιχνίδια στο διαδίκτυοΣτοχευμένες διαφημίσειςΠροστασία προσωπικών δεδομένωνΕικόνα σώματος & κοινωνικά δίκτυα

Email Security 2024-07-15

Email Security crossword puzzle
Across
  1. Email's bossy rulemaker
  2. Secret code for your messages
  3. Targeting the "big fish" with emails
  4. Baiting users to reveal sensitive info
  5. Email's digital fingerprint
  6. Email sender's fancy passport
  7. Pretending to be someone else via email
Down
  1. Email's safe playpen
  2. Computer bugs causing trouble
  3. Collecting email addresses for spamming purposes
  4. Protects secrets from escaping
  5. Assuming an employee's identity to trick others via email
  6. Email's "bouncer" when it visits the club

13 Clues: Email's safe playpenEmail's bossy rulemakerEmail's digital fingerprintComputer bugs causing troubleSecret code for your messagesEmail sender's fancy passportProtects secrets from escapingTargeting the "big fish" with emailsBaiting users to reveal sensitive infoPretending to be someone else via emailEmail's "bouncer" when it visits the club...

Data Security 2025-12-07

Data Security crossword puzzle
Across
  1. Deleting data so it cannot be recovered easily.
  2. Physically destroying storage devices.
  3. A secret word to log in.
  4. Software that removes malware.
  5. Uses fingerprints or face scans to identify users.
  6. Data backed-up away from the main building.
Down
  1. Used to enter a PIN.
  2. Checking user identity.
  3. Uses two ways to log in.
  4. Rules about what users can access.
  5. Blocks unsafe network traffic.
  6. Scrambling data to keep it secret.
  7. Uses radio waves to read data from a card.

13 Clues: Used to enter a PIN.Checking user identity.Uses two ways to log in.A secret word to log in.Blocks unsafe network traffic.Software that removes malware.Rules about what users can access.Scrambling data to keep it secret.Physically destroying storage devices.Uses radio waves to read data from a card.Data backed-up away from the main building....

Year 12 Cybersecurity 2023-08-16

Year 12 Cybersecurity crossword puzzle
Across
  1. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
  2. An individual who simulates cyberattacks to evaluate the security of a system.
  3. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
  4. Measures taken to protect physical assets and facilities from unauthorized access or harm.
  5. The accuracy and reliability of data, protected from unauthorized alteration.
  6. A hacker who engages in malicious activities for personal gain or to cause harm.
  7. Mistakes made by individuals that can lead to security breaches.
  8. Creating multiple security layers to prevent unauthorized access at different levels.
  9. Covert agents who gather information on behalf of a government or organization.
  10. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
  1. Ensuring that sensitive information is accessible only to authorized individuals.
  2. The ability to identify and recognize cybersecurity threats and incidents.
  3. Making sure that data is accessible when needed, without unauthorized disruptions.
  4. Individuals with advanced computer skills who manipulate software or systems for various purposes.
  5. Covert activities aimed at gathering confidential information from competitors or enemies.
  6. Individuals who engage in illegal activities on the internet for financial gain.
  7. People within an organization who have access to sensitive information and can pose security risks.
  8. Implementing measures to discourage potential attackers from targeting a system or organization.
  9. Introducing obstacles and barriers to slow down attackers' progress.
  10. The process of restoring systems and data after a cybersecurity breach or incident.
  11. Taking swift actions to address and mitigate cybersecurity incidents.

21 Clues: Mistakes made by individuals that can lead to security breaches.Introducing obstacles and barriers to slow down attackers' progress.Taking swift actions to address and mitigate cybersecurity incidents.The ability to identify and recognize cybersecurity threats and incidents....

M3 2024-11-04

M3 crossword puzzle
Across
  1. Physical or virtual barrier that controls network traffic
  2. Process of verifying a user's identity
  3. Security weakness in a system
  4. A malicious program that replicates itself and spreads to other computers
  5. Required information to solve a problem
  6. Process of gathering necessary information about a problem
  7. Unwanted bulk messages
  8. Steps taken to prevent attacks
  9. Testing a solution's effectiveness
  10. Device for accessing computer networks
Down
  1. Community-wide computer network
  2. Malicious software
  3. To find and fix problems
  4. Physical components of a computer system
  5. Final step in problem-solving process
  6. The practice of protecting systems, networks, and programs from digital attacks
  7. Make data unreadable to unauthorized users
  8. A type of social engineering attack using fake emails
  9. Tools used to detect and remove malware
  10. Security copy of data
  11. A common first step in problem-solving

21 Clues: Malicious softwareSecurity copy of dataUnwanted bulk messagesTo find and fix problemsSecurity weakness in a systemSteps taken to prevent attacksCommunity-wide computer networkTesting a solution's effectivenessFinal step in problem-solving processProcess of verifying a user's identityA common first step in problem-solving...

Government Acronyms 2024-10-23

Government Acronyms crossword puzzle
Across
  1. health, education, welfare
  2. Fannie Mae
  3. environmental protection agency
  4. Freddie Mae
  5. federal deposit insurance corporation
  6. federal communication commission
  7. housing urban development
  8. American Track
  9. Food drug administration
  10. United States department of agriculture
  11. national institute of standards and tech
  12. National Aeronautics and Space Administration
  13. Health human sources
  14. bill of rights
  15. Bridge investment program
  16. Transportation security administration
  17. Department of homeland security
Down
  1. Federal emergency management agency
  2. national oreanic atmospheric administration
  3. securities and exchange
  4. federal bureau of investigation
  5. department of defense
  6. Central Intelligence Agency
  7. federal aviation administration
  8. United States of America
  9. Record of decision
  10. department of transportation
  11. social security administration
  12. attorney general
  13. Veteren Assistance
  14. National institutes of health
  15. Secret service
  16. Supreme Court of the United States
  17. Small business association
  18. Department of justice

35 Clues: Fannie MaeFreddie MaeAmerican TrackSecret servicebill of rightsattorney generalRecord of decisionVeteren AssistanceHealth human sourcesdepartment of defenseDepartment of justicesecurities and exchangeUnited States of AmericaFood drug administrationhousing urban developmentBridge investment programhealth, education, welfareSmall business association...

Unit 7 2024-10-24

Unit 7 crossword puzzle
Across
  1. housing and urban development
  2. health education and welfare
  3. United States postal services
  4. department of energy or education
  5. airporT security
  6. food and drug administration
  7. national aeronautics and space administration
  8. DOL
  9. justice department
  10. federal deposit insurance corporation
Down
  1. DOD
  2. health and human services
  3. homeland security
  4. United States department of agriculture
  5. veterans affairs
  6. institute of health
  7. department of transportation
  8. Federal emergency management agency
  9. Internal Revenue Service
  10. Central Intelligence Agency

20 Clues: DODDOLairporT securityveterans affairshomeland securityjustice departmentinstitute of healthInternal Revenue Servicehealth and human servicesCentral Intelligence Agencyhealth education and welfarefood and drug administrationdepartment of transportationhousing and urban developmentUnited States postal servicesdepartment of energy or education...

tipos de delitos 2 2023-11-03

tipos de delitos 2 crossword puzzle
Across
  1. fraude de tarjeta de crédito (____-card-fraud)
  2. extorsión
  3. falsificación
  4. acoso
  5. violencia doméstica (domestic-____)
Down
  1. tráfico de drogas (drug-____)
  2. delito de odio
  3. acoso cibernético (____ bullying)
  4. posesión de drogas (drug-____)

9 Clues: acosoextorsiónfalsificacióndelito de odiotráfico de drogas (drug-____)posesión de drogas (drug-____)acoso cibernético (____ bullying)violencia doméstica (domestic-____)fraude de tarjeta de crédito (____-card-fraud)

Computer Puzzle game 2025-05-27

Computer Puzzle game crossword puzzle
Across
  1. misusing personal information
  2. grooming online child abuse
  3. hoaxing or misleading
  4. illegal entry into computer
  5. deliberate manner of harassing
  6. frau illegal method to get money
  7. number consists of 8 digits
  8. disrupt normal function of computer
Down
  1. code only understand by computer
  2. process to protect network
  3. act of sen misleading email
  4. blocking unauthorised access
  5. criminal activity using internet
  6. adding binary numbers
  7. protect computer from virus

15 Clues: adding binary numbershoaxing or misleadingprocess to protect networkact of sen misleading emailgrooming online child abuseillegal entry into computerprotect computer from virusnumber consists of 8 digitsblocking unauthorised accessmisusing personal informationdeliberate manner of harassingcode only understand by computer...

U4 M35 The Social Security Program 2023-03-14

U4 M35 The Social Security Program crossword puzzle
Across
  1. is a United States federal payroll(or employment) contribution directed towards both employees and employers to fund Social Security and Medicare
  2. Medicare Part D deals with ____ drug plans.
  3. President ______ signed the Social Security Act in 1935.
  4. The program works by using taxes paid into a trust fund to provide benefits to people who are eligible.
  5. is a tax withheld from an employee's salary by an employer who pays it to the government on their behalf.
  6. is the national health insurance program for people over the age of 65.
Down
  1. are things that produces good or helpful results or effects or that promotes well-being
  2. Medicare Part B deals with ____ insurance.
  3. Payment of monthly Social Security benefits began in _______ 1940.
  4. Social Security is not the only program that is designed to assist _______ citizens
  5. Medicare Part A deals with ____ insurance.
  6. Title II is what we know now as Social Security. In the original legislation, benefits were to be paid only to the _________ worker when he or she retired at age 65.
  7. The Social Security Act includes two major provisions: 1. Title I provides funds to support state _________ programs.

13 Clues: Medicare Part B deals with ____ insurance.Medicare Part A deals with ____ insurance.Medicare Part D deals with ____ drug plans.President ______ signed the Social Security Act in 1935.Payment of monthly Social Security benefits began in _______ 1940.is the national health insurance program for people over the age of 65....

Threads 2023-03-31

Threads crossword puzzle
Across
  1. The organization behind India's first quantum-computing based telecom network link (4)
  2. A British computer built in the late 1940s that was used to break German codes during World War II (8)
  3. A type of attack that involves flooding a network with traffic to make it unavailable (4, 6)
  4. A type of wireless technology used for short-range communications (9)
  5. A type of AI that specializes in image processing and classification (3)
  6. A type of network topology in which all devices are connected to a central hub (4)
  7. A cryptocurrency exchange that was recently bankrupted due to lack of liquidity (3)
  8. This spice is now the name of an official Ubuntu Flavor (8)
  9. A type of storage device that uses flash memory (3)
  10. The CEO of YouTube who had recently stepped down (5, 8)
Down
  1. A type of security system that requires users to provide two forms of identification (3, 6, 14)
  2. An input device used to control the movement of a cursor (5)
  3. The newest rival to Twitch in live streaming, promising creator-friendly policies like a 95% revenue split (4)
  4. A type of machine learning that uses neural networks with multiple layers (4, 8)
  5. A type of cyber attack that involves tricking someone into revealing sensitive information (8)
  6. An app that notifies its users simultaneously everyday at a different time to capture and share a photo in 2 Minutes (6)
  7. The first commercially available computer, built in the US in the 1950s (6)
  8. It allows users to interact with electronic devices through graphical icons and audio indicators (3)
  9. An AI model that generates images from natural language descriptions, recently releasing its improved fifth version (10)
  10. It is often used to format the presentation of a web document (3)

20 Clues: A type of storage device that uses flash memory (3)The CEO of YouTube who had recently stepped down (5, 8)This spice is now the name of an official Ubuntu Flavor (8)An input device used to control the movement of a cursor (5)It is often used to format the presentation of a web document (3)...

FITCVOCABBRM 2013-05-15

FITCVOCABBRM crossword puzzle
Across
  1. sign that you would use for your shop.
  2. what you are talking about.
  3. A couple of words that gets people attention so they come to your store.
  4. Safety: Is when you have security for people trying to hack you.
  5. it says how many bars you have on your internet.
  6. the address of a cite.
  7. it is when you take someones idea.
  8. the brain.
  9. Engine: it is a website on the internet.
  10. device: a phone a ipad a movie player.
  11. the fifth biggest download.
  12. is the things you sell in your store or online.
  13. Is the internet your using.
  14. it is a commercial on the television.
  15. wifi stands for wireless Fidelity and it helps you go on the internet.
  16. The 4th biggest download.
  17. the word paper or the power point paper.
  18. the second biggest download.
Down
  1. port: where you plug in your headphones.
  2. Board: the heart of a computer.
  3. a watch with the hands.
  4. The third biggest download.
  5. It is when you are near someone and you hook up phones.
  6. a little folder you can save stuff in.
  7. them work at your place.
  8. They are a lot of folders.
  9. is an app that you can download games, tools and more.
  10. it is when people are looking for jobs and you are looking and maybe
  11. a hand object that you use to scroll.
  12. is usually in the store telling everything about the store.
  13. program like a power point but it is on the internet and you put facts
  14. sound in your headphones the music is audio.
  15. is the 6th biggest download.
  16. it is some type of electronic.
  17. it is the smallest download.

35 Clues: the brain.the address of a cite.a watch with the hands.them work at your place.The 4th biggest download.They are a lot of folders.what you are talking about.The third biggest download.the fifth biggest download.Is the internet your using.is the 6th biggest download.the second biggest download.it is the smallest download....

Cybersecurity 2026-03-06

Cybersecurity crossword puzzle
Across
  1. A prolonged, targeted attack where intruders gain access to a network and remain undetected.
  2. Requiring more than one method to verify a user's identity.
  3. A network of hijacked computers used to launch attacks like DDoS.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. Any device connected to a network, such as laptops, phones, or servers.
  6. Software designed to disrupt, damage, or gain unauthorized access.
  7. Disguising a communication from an unknown source as being from a known, trusted source.
  8. Authorized simulated attacks on a system to evaluate its security.
  9. The process of verifying the identity of a user or system.
  10. The process of acquiring, testing, and installing code changes (patches) to fix vulnerabilities.
Down
  1. The unauthorized release or access of sensitive information.
  2. Using fraudulent emails or websites to trick users into revealing sensitive data.
  3. Routine practices to maintain system health and security.
  4. A method of guessing passwords or encryption keys through massive trial-and-error.
  5. A secure, encrypted connection between a user and a private network.
  6. Manipulating people into performing actions or divulging confidential information.
  7. Overwhelming a system with traffic to make it unavailable.
  8. Converting data into a coded form to prevent unauthorized access.
  9. Tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
  10. confidentiality, integrity, availability
  11. A security framework based on the philosophy "never trust, always verify"
  12. Malware that encrypts files and demands payment for the decryption key.
  13. Evidence on a network or operating system that indicates a security breach.

23 Clues: confidentiality, integrity, availabilityRoutine practices to maintain system health and security.Overwhelming a system with traffic to make it unavailable.The process of verifying the identity of a user or system.Requiring more than one method to verify a user's identity.The unauthorized release or access of sensitive information....

Helloto 2025-11-19

Helloto crossword puzzle
Across
  1. – Strategically important town occupied one day after the Tehran Communique was signed.
  2. – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
  3. – OSCE mediation format created to negotiate a settlement of the Nagorno-Karabakh conflict.
  4. – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
  5. – Failed Soviet reform whose collapse helped ignite the Nagorno-Karabakh conflict.
  6. – UN Security Council resolution adopted after the occupation of Zangilan and Horadiz.
  7. – 1996 OSCE meeting where principles affirming Azerbaijan’s territorial integrity were adopted despite Armenia’s veto attempt.
  8. – UN Security Council resolution adopted after the occupation of Aghdam.
Down
  1. – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
  2. – Agreement brokered by Iran on 7 May 1992 that failed when Shusha was occupied the next day.
  3. – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
  4. – Azerbaijani town where a massacre of civilians took place during the conflict.
  5. – 2006 Vienna document whose principles later formed the basis of the Madrid Principles.
  6. – Principle invoked by Armenia to justify claims over Nagorno-Karabakh.
  7. – Negotiation track where Azerbaijani and Armenian foreign ministers met repeatedly from 2003–2004 onward.
  8. – 1994 document that established the ceasefire from 12 May 1994.
  9. – 1994 OSCE meeting where Minsk Group co-chairmanship and peacekeeping options were discussed.
  10. – UN Security Council resolution of October 1993 mentioning Nagorno-Karabakh as part of Azerbaijan.
  11. – First UN Security Council resolution demanding withdrawal from Kalbajar.
  12. – Main legal principle emphasized by Azerbaijan in negotiations over Nagorno-Karabakh.

20 Clues: – 1994 document that established the ceasefire from 12 May 1994.– Principle invoked by Armenia to justify claims over Nagorno-Karabakh.– UN Security Council resolution adopted after the occupation of Aghdam.– First UN Security Council resolution demanding withdrawal from Kalbajar....

Protective Security Crossword 2013-05-07

Protective Security Crossword crossword puzzle
Across
  1. The catalogue of endorsed security devices
  2. Where you can share classified information by mistake if you are not careful
  3. Generally delivered by web sites or emails
  4. What we manage
  5. That thing you break by downloading movies without paying.
  6. That pirated software you downloaded last night.
  7. Easily tarnished by lax security
  8. What we do not want
  9. A good place to keep money or information
  10. Acronym for the spy inside
  11. Mandatory requirement
Down
  1. Instrument that governs protective security
  2. Tinned meat or unwanted email
  3. Unwanted attention from the Internet
  4. Someone who impersonates a tasty biscuit you dip in Salsa
  5. A person who pulls apart code
  6. Someone who wishes to remain unknown
  7. A hunting technique using an email bait
  8. A horse with a secret

19 Clues: What we manageWhat we do not wantA horse with a secretMandatory requirementAcronym for the spy insideTinned meat or unwanted emailA person who pulls apart codeEasily tarnished by lax securityUnwanted attention from the InternetSomeone who wishes to remain unknownA hunting technique using an email baitA good place to keep money or information...

Trading Options 2024-08-29

Trading Options crossword puzzle
Across
  1. Transaction where investor pays premium
  2. An option that gives the holder the right to buy an asset at a specified price
  3. Strike + Premium or Strike - Premium depending on the strategy and price of an underlying stock where an option will neither realize a profit or loss
  4. Strategy where investor buys 100 shares of a security and simultaneously writes a call
  5. When the seller of an option contract must fulfill their obligation (at any time) to buy or sell the underling to the long holder of the option contract at the strike price
  6. To simultaneously close an option contract and open another contract with the same underlying security, but at a different strike price or expiration date
  7. When the underlying security is below the strike price for a call or above the strike price for a put
  8. An option that gives the holder the right to sell an asset at a specified price
  9. Phenomenon where time value decreases as the expiration date draws near
  10. Strategy where an investor writes a put and cash, or equivalent is set aside in case of assignment (strike price x 100)
Down
  1. A statistical measure of the dispersion of returns for a given security
  2. The date on which an option contract becomes void
  3. The price paid for an option contract
  4. An opening transaction that results in a short option position
  5. The use of borrowed capital to increase the potential return of an investment
  6. The predetermined price at which an option can be exercised
  7. For the long strategy, volatility is the name of the game. Composed of a long call and long put on the same underlying security with the same strike price and expiration date
  8. Transaction where investor receives premium
  9. When the underlying security is above the strike price for a call or below the strike price for a put

19 Clues: The price paid for an option contractTransaction where investor pays premiumTransaction where investor receives premiumThe date on which an option contract becomes voidThe predetermined price at which an option can be exercisedAn opening transaction that results in a short option position...

Digital Citizenship 2021-12-08

Digital Citizenship crossword puzzle
Across
  1. to keep myself safe online, I should always make my profile ______
  2. When we are online we should always be thinks about the _____ of ourselves and others.
  3. One way to get a cyber-bully to stop is to _____ them which doesn't allow them to see your profile anymore.
  4. the trail of data you create when you go online.
  5. when I see cyber bullying I show _____ for the bully and the bullied, because you never know what someone else is going through
Down
  1. Your _______ should never have your real name in it.
  2. bullying online
  3. you should never share your ______ information online.
  4. when online I make sure to create a strong _____ with letters numbers and symbols
  5. set of proper guidelines we should follow online
  6. If someone is being unkind on a game you're playing, you can ______ them to the game moderator

11 Clues: bullying onlineset of proper guidelines we should follow onlinethe trail of data you create when you go online.Your _______ should never have your real name in it.you should never share your ______ information online.to keep myself safe online, I should always make my profile ______...

Seminar 2 Crossword 2013-07-09

Seminar 2 Crossword crossword puzzle
Across
  1. Confidentiality; Integrity; Availability
  2. The breaking into of telephone systems
  3. The appropiate word for intruding into a system without permission
  4. A person, usually an employee, that deliberately breaks into a system to assess security deficiencies
  5. Used to describe any areas of a system that is open to a possible attack
  6. The process of reviewing firewall logs, records, and procedures
  7. A text file on a computer that a browser creates and stores on the hard drive
  8. Seeks to compromise a DNS server so that users are redirected to malicious websites
  9. Generic term for software that has a malicious purpose
  10. Slang term used in movies and in the news to describe any person who breaks into a computer system
  11. Software that literally spies on what you do on a computer
Down
  1. A barrier between a network and the outside world
  2. The most basic security activity that determines if credentials are authorized for access
  3. A technique for breaching a systems's security by exploiting human nature rather than technology
  4. Locating wireless networks to gain access to a system
  5. This type of detection system works to detect attempts to circumvent security measures
  6. A security approach in which not only is the perimeter secured, but also individual systems within the network are secured
  7. Appears to be benign software but secretly downloads a virus to the computer from within
  8. Designed to prevent legitimate access to a system
  9. A device that hides the internal network's IP addresses and presents a single IP address (it's own) to the outside world

20 Clues: The breaking into of telephone systemsConfidentiality; Integrity; AvailabilityA barrier between a network and the outside worldDesigned to prevent legitimate access to a systemLocating wireless networks to gain access to a systemGeneric term for software that has a malicious purposeSoftware that literally spies on what you do on a computer...

Airport Safety & Security 2025-07-12

Airport Safety & Security crossword puzzle
Across
  1. Monitoring for suspicious activity
  2. Area where passengers board the aircraft
  3. Permission from air traffic control to proceed
  4. Paved area for aircraft movement
  5. Where aircraft are parked, loaded, and refueled
  6. Safety instructions given to crew
  7. Path for aircraft to move between runway and gate
  8. The passenger area of an airport
  9. Where passengers are dropped off or picked up outside the terminal
  10. Restricted area past security and customs
  11. Public area of the airport before security
  12. To exit the aircraft
Down
  1. Items passengers check in or carry on
  2. Emergency medical help
  3. Emergency removal of passengers from aircraft
  4. Team or measures ensuring safety in airports
  5. Device used in passenger screening
  6. Surface where planes take off and land
  7. Badge|Required for employees to access secure zones
  8. Unlawful seizure of an aircraft

20 Clues: To exit the aircraftEmergency medical helpUnlawful seizure of an aircraftPaved area for aircraft movementThe passenger area of an airportSafety instructions given to crewMonitoring for suspicious activityDevice used in passenger screeningItems passengers check in or carry onSurface where planes take off and land...

Networking + Cyber Ethics 2025-05-30

Networking + Cyber Ethics crossword puzzle
Across
  1. Unwanted email
  2. Device that connects networks
  3. Crime involving computers
  4. Someone who breaks into networks
  5. Secret code for access
  6. Keeps your device safe
  7. Short for Internet Protocol
  8. Tells the computer where to send data
  9. Connecting two or more computers
Down
  1. Device used to connect to the internet
  2. Data protection rules you must follow
  3. Large network of networks
  4. Safe online behavior
  5. A set of connected computers
  6. You must not copy others' work
  7. Type of network at home
  8. Fake website to steal info
  9. File spreader with viruses

18 Clues: Unwanted emailSafe online behaviorSecret code for accessKeeps your device safeType of network at homeCrime involving computersLarge network of networksFake website to steal infoFile spreader with virusesShort for Internet ProtocolA set of connected computersDevice that connects networksYou must not copy others' workSomeone who breaks into networks...

Digital Citizenship :D 2025-07-16

Digital Citizenship :D crossword puzzle
Across
  1. Online
  2. what the internet is made of
  3. Something we all use
  4. Inhabitant of a place
  5. To uplift others
Down
  1. Worldwide
  2. Meeting new people online
  3. An annoying person who tricks you
  4. Chatgpt
  5. Digital
  6. This can protect you from scams and cyber attacks (I think)

11 Clues: OnlineChatgptDigitalWorldwideTo uplift othersSomething we all useInhabitant of a placeMeeting new people onlinewhat the internet is made ofAn annoying person who tricks youThis can protect you from scams and cyber attacks (I think)

Presley's Dictionary 2023-11-27

Presley's Dictionary crossword puzzle
Across
  1. a video camera connected to a computer.
  2. a network security device that monitors incoming and outgoing network traffic
  3. a wireless connection that connects you to the internet through radio waves
  4. something that typically has a touch screen and internet access.
  5. it can hold and transfer data
  6. the responsibility use of the technology you use
  7. information that is easy to access which can include management
  8. a high-capacity, self-contained storage device.
  9. when you tell the readers that your source came with another writer
  10. it is made to sit on a table or desk.
  11. a electronic device with a screen which puts out pixels
  12. It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection
  13. transmits data and connects different networks together
Down
  1. Somewhere that you can store pictures and files.
  2. it manages a computers memory, software and hardware.ci
  3. a type of online fraud where a cyber criminal designs a fake online identy to exposit the victims idenity
  4. a peripheral device that enables a user to input text into a computer or any other electronic machinery.
  5. global network of billions of computers and other electronic devices
  6. a sequence of characters or encoded information identifying when a certain event occurred
  7. a web centric computer that runs through google.
  8. A computer that is suitable for use while travelling.
  9. It brings you to a certain website or page, the address.
  10. text files with small pieces of data like a username and password
  11. an application for accessing websites and the Internet.
  12. is a common interface that enables communication between devices

25 Clues: it can hold and transfer datait is made to sit on a table or desk.a video camera connected to a computer.a high-capacity, self-contained storage device.Somewhere that you can store pictures and files.the responsibility use of the technology you usea web centric computer that runs through google.A computer that is suitable for use while travelling....

Marleigh's Dictionary 2023-11-27

Marleigh's Dictionary crossword puzzle
Across
  1. When you tell readers where your sources came from
  2. A video camera that is connected to a computer
  3. A Personal computer usually located on a desk or table
  4. the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
  5. An application for accessing websites on the internet
  6. A type of online fraud where a cyber criminal designs a fake online indenty
  7. connects peripheral devices
  8. The responsibility of use of the technology you use and own to communication with society.
  9. An electronic device used for storing and processing data
  10. An electronic device with a screen which puts out pixels to show a display.
  11. It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
  12. Device used to input text into a computer
  13. A network security device that monitors network traffic
  14. A place where you can store pictures and files
  15. Opposite of saftware
  16. A unit used to show the amount of storage you have
Down
  1. Interconnected computing devices that can exchange data and share resources with each other.
  2. It manages the computer's memory and processes, as well as all of its software and hardware.
  3. Opposite of hardware
  4. text files with small pieces of data
  5. A program that searches for and identifies items in a database
  6. High capacity self contained storage device
  7. Mobile phone that performs many functions
  8. Global network of billions of computers and other devices
  9. Wireless conection that connects you to the internet

25 Clues: Opposite of hardwareOpposite of saftwareconnects peripheral devicestext files with small pieces of dataMobile phone that performs many functionsDevice used to input text into a computerHigh capacity self contained storage deviceA video camera that is connected to a computerA place where you can store pictures and files...

Chapter 11-12 2023-01-06

Chapter 11-12 crossword puzzle
Across
  1. ensuring that every individual has an equal opportunity to make the most of their lives and talents
  2. body of law that outlines rules on settling disputes between individuals
  3. Pierre Trudeau added this to the constitution in 1982
  4. a sentence or a part of a sentence that you serve in the community
  5. the single unified source of expert advice guidance services and support on cyber security for Canadians
  6. jurisdiction embraces both the civil law of the province of Quebec and the common law of the other nine provinces and three territories
  7. British Columbia's superior trial court
  8. law established by an act of the legislature that is signed by the executive
  9. local law
  10. a federal law that includes definitions of most of the criminal offences that the Parliament of Canada has enacted
Down
  1. a combination of common law and civil law
  2. to deal with all criminal matters except murder committed by adults and certain other, very serious offences, such as treason
  3. protect the public by holding youth accountable, by preventing crime and by rehabilitating and reintegrating youth in the community
  4. regulates and supervises broadcasting and telecommunications in the public interest
  5. outlined the rights and freedoms everyone is entitled to
  6. a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority
  7. principle under which all persons, institutions, and entities are accountable to laws that are
  8. gives parliaments in Canada the power to override certain portions of the charter for five-year terms when passing legislation
  9. restoring someone to health or normal life through training and therapy
  10. the highest court in the province

20 Clues: local lawthe highest court in the provinceBritish Columbia's superior trial courta combination of common law and civil lawPierre Trudeau added this to the constitution in 1982outlined the rights and freedoms everyone is entitled toa sentence or a part of a sentence that you serve in the community...

WMC 2023-09-20

WMC crossword puzzle
Across
  1. A system used to verify that a user is human and not a computer bot.
  2. A saved copy of data used to restore in case of data loss.
  3. Software designed to infiltrate or damage computer systems.
  4. Small piece of data stored on a user's computer by the web browser while browsing a website.
  5. Not a digital bird, but someone overly paranoid about online security!
  6. A less-than-proficient hacker, maybe more of a couch potato.
  7. Secure connection between your device and the internet.
  8. Software designed to identify and stop malicious software.
  9. A collection of software and tools to make phishing campaigns easier for attackers.
  10. A network of private computers infected with malicious software and controlled as a group.
  11. Malicious entities or individuals who conduct harmful cyber operations.
  12. Malicious software that records every keystroke to secretly gather personal information.
  13. Targeted phishing attempts directed at specific individuals or companies.
Down
  1. A secret combination, often alphanumeric, used for authentication.
  2. Unsolicited and irrelevant messages sent over the internet.
  3. Confirming the truth of an attribute of a single piece of data or an entity.
  4. A trap set to detect, deflect, or counteract unauthorized use of information systems.
  5. Voice-based phishing where attackers use phone calls to deceive victims.
  6. Phishing attacks that are executed via SMS.
  7. A deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.
  8. Process of converting information to code to prevent unauthorized access.
  9. AI-generated fake content, often video, that looks convincingly real.
  10. An authentication method that requires two separate pieces of evidence.
  11. Imitating a trustworthy source in an attempt to deceive.
  12. An encrypted online environment not indexed by traditional search engines.

25 Clues: Phishing attacks that are executed via SMS.Secure connection between your device and the internet.Imitating a trustworthy source in an attempt to deceive.A saved copy of data used to restore in case of data loss.Software designed to identify and stop malicious software.Unsolicited and irrelevant messages sent over the internet....

RU ITEC411 Crime 2025-11-23

RU ITEC411 Crime crossword puzzle
Across
  1. someone who uses technical skills to explore, access, or break into computer systems
  2. fake emails that try to fool you into clicking links or sharing login information
  3. scrambling data so only someone with the right key can read it
  4. malicious code that attaches to programs and spreads when those programs run
  5. tricking people into giving up passwords or sensitive information
  6. a security professional who uses hacking skills to test and improve defenses
  7. an attack that floods a site or server with traffic so real users can’t reach it
  8. any harmful software designed to damage systems, steal data, or cause problems
  9. using hacking skills to make a political point or support a cause
  10. a self-spreading program that moves across computers on its own and can clog networks
  11. written statements that falsely harm someone’s reputation
Down
  1. the main U.S. law that makes unauthorized computer access a crime
  2. when someone steals personal information to pretend to be someone else
  3. redirecting a user to a fake website even when they typed the real one
  4. text message scams that ask for personal or financial information
  5. a malicious hacker who breaks into systems for theft, disruption, or profit
  6. a group of infected computers secretly controlled by an attacker
  7. investigating digital evidence to figure out what happened in a cyber incident
  8. getting into a computer system without permission, usually by finding weaknesses to exploit
  9. identification using physical traits like fingerprints, face, or iris patterns
  10. technology that figures out a user’s real-world location based on Internet data
  11. phone calls pretending to be from a real company to steal account details

22 Clues: written statements that falsely harm someone’s reputationscrambling data so only someone with the right key can read ita group of infected computers secretly controlled by an attackerthe main U.S. law that makes unauthorized computer access a crimetext message scams that ask for personal or financial information...

Internet of Things Crossword 2022-11-30

Internet of Things Crossword crossword puzzle
Across
  1. Characteristic of IOT that helps growth.
  2. This Cloud provider has 40% (the highest) market share in IOT.
  3. Connected devices exchanging data with each other.
  4. Device used to collect measurements.
  5. Smart*Something* that coordinates energy use and distribution.
  6. Language that can be used for IOT analytics.
  7. By 2027, the global IOT market will grow to $1.4 *Something*
  8. This type of computing uses the device to perform processing and analytics.
  9. An industry that uses IOT.
  10. Secure protocol for connecting to IOT devices.
  11. Is made up of IOT devices that manage utilities, energy, traffic, water and waste management (Two words, 5 letters - 4 letters).
  12. This protocol has 128 bits in its address.
  13. The most common cyber attack using IOT devices.
  14. A very small, single user area network.
  15. The network the IOT relies on.
  16. Top connectivity protocol for IOT devices.
Down
  1. The amount of data generated by 2025 will be 73 *Something*Bytes?
  2. IOT devices and sensors connect to a centralised hub.
  3. IIOT.
  4. This multinode network structure connect dynamically through multiple routers. Provides redundancy and failover.
  5. Small tags that use radio frequencies to transfer data on the internet.
  6. The IOT device that performs calculations.
  7. Where an IOT device might connect to.
  8. Devices such as smart watches, fitness bands, smart glasses.
  9. Very large dataset (Two words, 3 letters - 4 letters).
  10. One of the biggest challenges in IOT.
  11. Internet Protocol suite used across the internet (3 letters / 2 letters).
  12. The "OS" that is the most popular for IOT.
  13. In 2027, it is predicted that there will be 41 *Something* IOT devices.
  14. A small device, with a sensor, that can do some processing and is connected to the internet.

30 Clues: IIOT.An industry that uses IOT.The network the IOT relies on.Device used to collect measurements.Where an IOT device might connect to.One of the biggest challenges in IOT.A very small, single user area network.Characteristic of IOT that helps growth.The IOT device that performs calculations.This protocol has 128 bits in its address....

Cyber Bullying 2021-04-26

Cyber Bullying crossword puzzle
Across
  1. defines cyber bullying as a form of bullying through digital technology
  2. 3words support line for kids phone number 1800 55 1800
Down
  1. Trisha Prabhu designed this app to prevent cyber bullying
  2. bullying online is easier because then they can remain _____
  3. 1 in 5 _____ young people have reported being cyber bullying

5 Clues: 3words support line for kids phone number 1800 55 1800Trisha Prabhu designed this app to prevent cyber bullyingbullying online is easier because then they can remain _____1 in 5 _____ young people have reported being cyber bullyingdefines cyber bullying as a form of bullying through digital technology

Crossword 2023-05-24

Crossword crossword puzzle
Across
  1. The practice of using multiple authentication factors to verify identity.
  2. The device that emits a loud sound when smoke or fire is detected.
  3. Security measure that verifies the integrity and authenticity of a message
  4. which type of fire is classified in E class fire _____________
  5. A set of instructions or guidelines that outline the organization's security policies and procedures.
  6. Security breach caused by tricking someone into revealing sensitive information
Down
  1. Technique used to verify the identity of a user
  2. Employees should never share their _______ with others or write them down in easily accessible locations
  3. The intentional and unauthorized accessing, use, or disclosure of information.
  4. Frisking check will be carried out by ________ security guard for all team members while going shift out.
  5. Physical barriers to restrict access to a secure area
  6. The practice of reviewing and analyzing system logs to identify potential security issues is called
  7. The process of encoding data to prevent unauthorized access.
  8. Unauthorized copying or distribution of copyrighted material

14 Clues: Technique used to verify the identity of a userPhysical barriers to restrict access to a secure areaThe process of encoding data to prevent unauthorized access.Unauthorized copying or distribution of copyrighted materialwhich type of fire is classified in E class fire _____________The device that emits a loud sound when smoke or fire is detected....

Protective Security Crossword 2013-05-07

Protective Security Crossword crossword puzzle
Across
  1. The catalogue of endorsed security devices
  2. Where you can share classified information by mistake if you are not careful
  3. Generally delivered by web sites or emails
  4. What we manage
  5. That thing you break by downloading movies without paying.
  6. That pirated software you downloaded last night.
  7. Easily tarnished by lax security
  8. What we do not want
  9. A good place to keep money or information
  10. Acronym for the spy inside
  11. Mandatory requirement
Down
  1. Instrument that governs protective security
  2. Tinned meat or unwanted email
  3. Unwanted attention from the Internet
  4. Someone who impersonates a tasty biscuit you dip in Salsa
  5. A person who pulls apart code
  6. Someone who wishes to remain unknown
  7. A hunting technique using an email bait
  8. A horse with a secret

19 Clues: What we manageWhat we do not wantA horse with a secretMandatory requirementAcronym for the spy insideTinned meat or unwanted emailA person who pulls apart codeEasily tarnished by lax securityUnwanted attention from the InternetSomeone who wishes to remain unknownA hunting technique using an email baitA good place to keep money or information...

Security check 2024-06-27

Security check crossword puzzle
Across
  1. last ... - ostatnie wezwanie
  2. przejść (dalej)
  3. ... up - pospieszyć się
  4. ... on - założyć (na siebie)
  5. tacka (przy taśmie)
  6. wsiąść (na pokład)
Down
  1. płyn
  2. ... check - kontrola osobista
  3. zgłaszać
  4. ... free - bezcłowy
  5. ... out - wyjąć (z plecaka)
  6. ... around - obrócić się
  7. ... the flight - przegapić lot

13 Clues: płynzgłaszaćprzejść (dalej)wsiąść (na pokład)... free - bezcłowytacka (przy taśmie)... up - pospieszyć się... around - obrócić się... out - wyjąć (z plecaka)last ... - ostatnie wezwanie... on - założyć (na siebie)... check - kontrola osobista... the flight - przegapić lot

Information Security 2023-08-28

Information Security crossword puzzle
Across
  1. intent of doing harm
  2. requirement of being private or secret
  3. procedure to determine user privileges or access to programs
  4. info or data which can be accessed when needed
  5. gap or weakness which undermines an organization's security
Down
  1. network of computers and devices managed as a unit with procedures and rules
  2. how information is protected
  3. short for "malicious software" and covers threats such as viruses, worms, Trojan horse, ransom ware,and the numerous other programs used by hackers to gain or access or damage computer programs
  4. macros which have been coded with malicious intent
  5. calculated assessment of potential threats to an organizations security
  6. making sure a person is who they say they are
  7. state of being complete or uncorrupted
  8. rights an individual or organization has over info and how it is used

13 Clues: intent of doing harmhow information is protectedrequirement of being private or secretstate of being complete or uncorruptedmaking sure a person is who they say they areinfo or data which can be accessed when neededmacros which have been coded with malicious intentgap or weakness which undermines an organization's security...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Large marsupial
  2. We eat this animal from the sea or rivers
  3. Has a trunk
  4. Pollinator that plays a critical role in food production
  5. This animal helps carry things and gives wool
Down
  1. Poultry raised for eggs
  2. Small animal raised
  3. Man's best friend
  4. This animal helps people on farms and can be ridden
  5. Animal raised for wool
  6. Likes to chase mice
  7. This animal gives milk and is important in the desert
  8. Flying mammal

13 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendSmall animal raisedLikes to chase miceAnimal raised for woolPoultry raised for eggsWe eat this animal from the sea or riversThis animal helps carry things and gives woolThis animal helps people on farms and can be riddenThis animal gives milk and is important in the desert...

Data Security 2025-01-20

Data Security crossword puzzle
Across
  1. Maintaining the accuracy and completeness of data.
  2. An unauthorized access or exposure of sensitive data.
  3. Ensuring that information is accessible only to those authorized to have access.
  4. Adhering to data protection regulations.
  5. A copy of data stored separately to protect against data loss.
  6. A weakness that can be exploited.
Down
  1. The process of converting information into a secure format to prevent unauthorized access.
  2. The technique of obscuring specific data within a database to protect sensitive information.
  3. A network security system that monitors and controls incoming and outgoing network traffic.
  4. Verifying the identity of a user or system before granting access.
  5. An event that compromises data security.
  6. Data Loss Prevention, strategies to prevent data breaches.
  7. The potential for loss or damage.

13 Clues: A weakness that can be exploited.The potential for loss or damage.An event that compromises data security.Adhering to data protection regulations.Maintaining the accuracy and completeness of data.An unauthorized access or exposure of sensitive data.Data Loss Prevention, strategies to prevent data breaches....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A is a kitchen device that can ensure food is cooked to a proper temperature
  2. What temperature does poultry need to reach to be food safe?
  3. Leftovers should be put in the refrigerator or freezer within
  4. Four steps to help you tackle bacteria.
  5. It is recommended to wash hands with warm water and soap for seconds
Down
  1. Simplify cooking with frozen foods by following these for optimal safety and quality
  2. What is not a food safety step when preparing raw meat or poultry?
  3. While everyone is at risk of ayoung children and elderly people have a higher risk
  4. Only food that contains flour when it is fully cooked.
  5. What foodborne pathogen is often linked to raw eggs?
  6. To avoid cross contamination, keep raw meat from produce
  7. Start out with hands, surfaces and utensils before cooking.
  8. The refrigerator is the best place to perishables.

13 Clues: Four steps to help you tackle bacteria.The refrigerator is the best place to perishables.What foodborne pathogen is often linked to raw eggs?Only food that contains flour when it is fully cooked.To avoid cross contamination, keep raw meat from produceStart out with hands, surfaces and utensils before cooking....

Food security 2024-11-28

Food security crossword puzzle
Across
  1. - Energy-rich molecules, often sweet and starchy
  2. - Amount of agricultural produce harvested per unit of land area
  3. - Plants cultivated for food, especially on a large scale
  4. - Extended period of water scarcity affecting crop yields
  5. - Essential vitamins and minerals required in small amounts
  6. - Lack of proper nutrients
  7. - Long-term maintenance of food production without depleting resources
Down
  1. - Relating to the handling and storage of crops after collection
  2. - Artificial application of water to land for growing crops
  3. - Removal and destruction of a forest or stand of trees from land that is then converted to non-forest use
  4. - Unwanted intruders spoiling kitchen cleanliness
  5. - Essential building block for body tissues
  6. - Variety of plant and animal life in a particular habitat

13 Clues: - Lack of proper nutrients- Essential building block for body tissues- Energy-rich molecules, often sweet and starchy- Unwanted intruders spoiling kitchen cleanliness- Plants cultivated for food, especially on a large scale- Extended period of water scarcity affecting crop yields- Variety of plant and animal life in a particular habitat...

Security Terminology 2025-09-08

Security Terminology crossword puzzle
Across
  1. direct and deliberate observation of people and/or property
  2. device triggered by a person and designed to alert others (authorities) in emergency situations
  3. device which announces an alarm via sound, light or other means
  4. armor-plated truck with strong locks and doors which is operated by armed personnel and used to transport currency and other valuables
  5. equipped with a firearm
  6. pre-recorded message to be used in case of an emergency
Down
  1. test performed under conditions as close to as possible to real-world conditions
  2. device which, when triggered, alerts security personnel and/or police of disturbance without the knowledge of the intruder or criminal
  3. inquiry into the history, behaviors and character of an individual
  4. program which detects and removes computer viruses
  5. risk remaining after measures are taken to reduce or eliminate risk
  6. any property, tangible or intangible, which is owned by an individual or company and can be assigned a monetary value
  7. system of sensors, controls and annunciators arranged to detect and report an intrusion or other emergency

13 Clues: equipped with a firearmprogram which detects and removes computer virusespre-recorded message to be used in case of an emergencydirect and deliberate observation of people and/or propertydevice which announces an alarm via sound, light or other meansinquiry into the history, behaviors and character of an individual...

Application Security 2025-09-03

Application Security crossword puzzle
Across
  1. Injection attack that tricks a database.
  2. Secret string used for login.
  3. Verifying who is accessing the system.
  4. Confidence that users have in an application.
  5. Scrambling data so it can’t be read if stolen.
  6. Writing software instructions for a computer.
  7. Tool that scans code before deployment.
  8. Blocks attacks on applications.
Down
  1. Checking user input for safety.
  2. Improves or secures software.
  3. List of the top 10 application risks.
  4. Decides what a user can do.
  5. A small software fix.

13 Clues: A small software fix.Decides what a user can do.Improves or secures software.Secret string used for login.Checking user input for safety.Blocks attacks on applications.List of the top 10 application risks.Verifying who is accessing the system.Tool that scans code before deployment.Injection attack that tricks a database....

Security igcse 2025-10-07

Security igcse crossword puzzle
Across
  1. uses a private key and a public key
  2. when the computer asks users if they are sure they want to carry out instructions
  3. a type of software which may track user behavior to display targeted ads based on their interests
  4. one method for avoiding acccidental data loss
  5. an attack on a server designed to deny service coming from multiple computers
Down
  1. sits between the main server and the internet and protects the main server from attacks
  2. programs that collect personal or sensitive data then send them to another device
  3. when an authentic-looking message or email tries to trick you into sending sensitive data
  4. malicious software which tricks you into visiting false websites and giving sensitive data
  5. a program that disguises itself as another programs, when run it deletes and corrupts files
  6. a security technology that monitors a computer’s incoming and outgoing traffic
  7. programs that replicate themselves over and over and fill the computer storage
  8. self-replicating software which can delete and corrupt files

13 Clues: uses a private key and a public keyone method for avoiding acccidental data lossself-replicating software which can delete and corrupt filesan attack on a server designed to deny service coming from multiple computersa security technology that monitors a computer’s incoming and outgoing traffic...

riley k ict quiz 2026-03-25

riley k ict quiz crossword puzzle
Across
  1. how many people are in a collaboration
  2. circle in a data flow diagram
  3. whats protecting businesses from people copying them
Down
  1. first thing to do after a cyber attack
  2. the thing protecting rainbow six siege from cheaters
  3. fourth thing to do after a cyber attack

6 Clues: circle in a data flow diagramfirst thing to do after a cyber attackhow many people are in a collaborationfourth thing to do after a cyber attackthe thing protecting rainbow six siege from cheaterswhats protecting businesses from people copying them

Security 2022-02-24

Security crossword puzzle
Across
  1. a secret code used to gain access
  2. when something that is usually protected, is no longer secure
  3. it protects your computer from attacks via email of the Internet
  4. a system to allow you to watch what is happening in other parts of the building
Down
  1. actions taken to deter people like hackers or
  2. without the right to look at or use something, i.g. personal information, on the computer
  3. it allows you to see inside bags
  4. stealing people's personal information and using it

8 Clues: it allows you to see inside bagsa secret code used to gain accessactions taken to deter people like hackers orstealing people's personal information and using itwhen something that is usually protected, is no longer secureit protects your computer from attacks via email of the Internet...

Security 2022-01-25

Security crossword puzzle
Across
  1. a device making a loud noise that gives warning of a fire.
  2. a length of thick strong cord made by twisting together strands of hemp.
  3. a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
  1. a covering for the hand worn for protection against cold or dirt.
  2. directions, detailed information about how something should be done.
  3. a hard or padded protective hat.
  4. a covering for all or part of the face to protect against air pollutants.
  5. a strip to fasten in a car.

8 Clues: a strip to fasten in a car.a hard or padded protective hat.a device making a loud noise that gives warning of a fire.a covering for the hand worn for protection against cold or dirt.directions, detailed information about how something should be done.a length of thick strong cord made by twisting together strands of hemp....

Security 2024-08-24

Security crossword puzzle
Across
  1. something that is used to helps prevent an electronic from a virus
  2. some form of security that is mostly used for extra security for an app sometimes using another app to confirm it is you
  3. something usually used to defend yourself
Down
  1. something that sometimes has a three digit code that holds secures chains and heavy duty things
  2. something used to see past and live footage of any break in to protect your home
  3. usually a four digit code that protects phones
  4. something that is meant to protect your electronic from hackers
  5. something used to prevent people from accessing whatever has a password

8 Clues: something usually used to defend yourselfusually a four digit code that protects phonessomething that is meant to protect your electronic from hackerssomething that is used to helps prevent an electronic from a virussomething used to prevent people from accessing whatever has a password...

Security 2026-01-30

Security crossword puzzle
Across
  1. Staying online even during failures
  2. Math that protects data and messages
  3. Rewards and penalties that shape behavior
  4. Minimum agreement needed to act
  5. Returns earned for honest participation
Down
  1. Backup validators ready to step in
  2. Financial rules that discourage attacks
  3. Tokens locked to secure the network

8 Clues: Minimum agreement needed to actBackup validators ready to step inStaying online even during failuresTokens locked to secure the networkMath that protects data and messagesFinancial rules that discourage attacksReturns earned for honest participationRewards and penalties that shape behavior

GOLD LOANS 2020-01-08

GOLD LOANS crossword puzzle
Across
  1. Precious metal
  2. Valuable
  3. Used to test purity
  4. Specially minted
  5. Register
  6. single repayment
  7. Jewellery
Down
  1. Expert
  2. Variant of gold loan
  3. Method of testing purity
  4. Unit for measuring purity and weight of gold
  5. Additional security
  6. Bullion gold
  7. Security type
  8. Gold with Cadmium alloy

15 Clues: ExpertValuableRegisterJewelleryBullion goldSecurity typePrecious metalSpecially mintedsingle repaymentUsed to test purityAdditional securityVariant of gold loanGold with Cadmium alloyMethod of testing purityUnit for measuring purity and weight of gold

TKeefer Network devices 2023-01-03

TKeefer Network devices crossword puzzle
Across
  1. hardcodedbymanufacturerofnic
  2. improve security
  3. connecttointernet
  4. builds up IDS traffic
  5. access to wireless devices
  6. recievedataononeportandsendofftootherports
  7. way to power devices with no power available
  8. like legacy but have embedded microchips
  9. formfactorfornic
  10. provides an endpoint
Down
  1. usedtorepairweaksignals
  2. protects stuff from unwanted access
  3. divideLANsintosegmants
  4. connectswirelessconnections
  5. used to collect incoming cables
  6. connects devices to the network
  7. all in one security
  8. monitor traffic
  9. no longer supported, still in operation

19 Clues: monitor trafficimprove securityformfactorfornicconnecttointernetall in one securityprovides an endpointbuilds up IDS trafficdivideLANsintosegmantsusedtorepairweaksignalsaccess to wireless devicesconnectswirelessconnectionshardcodedbymanufacturerofnicused to collect incoming cablesconnects devices to the networkprotects stuff from unwanted access...

Cisco Security & Duo Security In-depth 2020-07-31

Cisco Security & Duo Security In-depth crossword puzzle
Across
  1. This Cisco product analyzes network traffic?
  2. Cisco's 1st line of security in the cloud?
  3. What kind of protection does Cisco AMP provide?
  4. A type of trust strategy that Duo uses?
  5. Competitor of Cisco's Duo User Authentication?
  6. What does Cisco's ESA/CES protect?
  7. Competitor of Cisco's Fore Power?
  8. Industry-leading threat and malware protection?
Down
  1. A type of second source validation?
  2. Cisco Firepower is a next generation?
  3. Competitor of Cisco's Email Security?
  4. Duo uses how many levels of authentication?
  5. Competitor of Cisco's Duo Access Management?
  6. A type of access Duo provides for a distributed workforce?
  7. Competitor of Cisco's Stealthwatch?
  8. Competitor of Cisco's Umbrella?
  9. Competitor of Cisco's AMP?

17 Clues: Competitor of Cisco's AMP?Competitor of Cisco's Umbrella?Competitor of Cisco's Fore Power?What does Cisco's ESA/CES protect?A type of second source validation?Competitor of Cisco's Stealthwatch?Cisco Firepower is a next generation?Competitor of Cisco's Email Security?A type of trust strategy that Duo uses?Cisco's 1st line of security in the cloud?...

bullying 2022-10-20

bullying crossword puzzle
Across
  1. hurting
  2. being mean
  3. excluding people
  4. repeatedly being mean
Down
  1. spreading rumors
  2. saying you will be mean
  3. saying mean
  4. making you do things you don't want to
  5. sending mean messages

9 Clues: hurtingbeing meansaying meanspreading rumorsexcluding peoplesending mean messagesrepeatedly being meansaying you will be meanmaking you do things you don't want to

Network Security 2013-08-27

Network Security crossword puzzle
Across
  1. typical exploit used with bad programming
  2. type of vulnerability typically used by attackers
  3. how antivirus software detects viruses
  4. A ______ attack is a technique where every single combination is tested
  5. Intrusion ______ Systems are considered passive systems
  6. MD5 is a ______
Down
  1. self replicating malware on execution
  2. ______ testing is a test carried out by sec professionals to check a system
  3. computer system designed to trap attackers and spam
  4. number one reconnaissance tool used
  5. monitoring only does not ______ an attacker
  6. Using a proxy could be considered to be a man-in-the-______ attack
  7. malware disguised as a useful application

13 Clues: MD5 is a ______number one reconnaissance tool usedself replicating malware on executionhow antivirus software detects virusestypical exploit used with bad programmingmalware disguised as a useful applicationmonitoring only does not ______ an attackertype of vulnerability typically used by attackerscomputer system designed to trap attackers and spam...

I.T. Security 2014-04-13

I.T. Security crossword puzzle
Across
  1. Programs designed to gain access to a computer without the user´s authorization.
  2. A program that appears to be useful but in reality it damages the system.
  3. Showing desire to cause harm.
  4. Software that replaces the user´s search engine.
  5. A failure in security.
  6. Softare that send information about the use of the system.
  7. A program that limits the data that can pass through a network and protects the user´s machine from damage or infection.
  8. A program that automatically downloads advertisements to your computer
Down
  1. Software used for scanning and removing viruses from your computer.
  2. Malicious programs that copy themselves into other programs and cause system problems.
  3. A string of characters used for authenticating a user on a computer system.
  4. The coding of information so that it can only be decoded and read by someone who has the correct decoding key.
  5. A person who can gain unauthorized access to other computers.

13 Clues: A failure in security.Showing desire to cause harm.Software that replaces the user´s search engine.Softare that send information about the use of the system.A person who can gain unauthorized access to other computers.Software used for scanning and removing viruses from your computer....

Security Systems 2016-05-24

Security Systems crossword puzzle
Across
  1. protection from harm
  2. protected and not in danger
  3. to stop something from happening
  4. unwanted junk mail
  5. something that may cause damage
  6. software that tries to prevent problems
  7. to ruin something
  8. an operating system
Down
  1. an electronic message
  2. an electronic device that stores and processes data
  3. program that protects your computer from harm
  4. program designed to destroy your computer
  5. someone who breaks into computer systems

13 Clues: to ruin somethingunwanted junk mailan operating systemprotection from harman electronic messageprotected and not in dangersomething that may cause damageto stop something from happeningsoftware that tries to prevent problemssomeone who breaks into computer systemsprogram designed to destroy your computerprogram that protects your computer from harm...

Security Guides 2023-09-21

Security Guides crossword puzzle
Across
  1. First suggested response method directed by the Department of Homeland Security in the case of an active shooter
  2. How often is an annual audit of credit union keys completed?
  3. How often is the burglary alarms tested?
  4. The wrongful use of force, intimidation, or authority to obtain money, property or other benefits
  5. Who does LMCU use for currency transportation?
  6. What is more important to the credit union than the safety and security of its employees?
  7. What must be documented each day when opened?
Down
  1. What radio do we listen to for weather alerts and warnings?
  2. Person responsible for the issue and retrieval of all keys
  3. How often does the security department review the CCTV systems?
  4. How many days are video images stored for?
  5. Must be verified within 24 hours of receipt
  6. The signal used to indicate that the building is safe to enter

13 Clues: How often is the burglary alarms tested?How many days are video images stored for?Must be verified within 24 hours of receiptWhat must be documented each day when opened?Who does LMCU use for currency transportation?Person responsible for the issue and retrieval of all keysWhat radio do we listen to for weather alerts and warnings?...

SECURITY MEETING 2024-06-10

SECURITY MEETING crossword puzzle
Across
  1. PROHIBITED WITHOUT APPROVAL
  2. PROGRAM TO REPORT THREATS AGAINST THE BANK
  3. 3 POTENTIAL COURSES OF ACTION
  4. EMPLOYEES RESPONSIBLE FOR SIGNING
  5. NUMBER OF COURSES OF ACTIONS
Down
  1. IN MOST CASES USES A FIREARM
  2. DO NOT ATTEMPT TO MOVE
  3. REVIEWED ANNUALLY AND REVISED
  4. COMPLY WITH REGULATIONS OF
  5. REPORT FILED
  6. DEPARTMENT TO ENGAGE WITH EMERGENCY RESPONDERS
  7. MUST USE ACTIVE SHOOTER MEDIA STATEMENT
  8. MONTHLY TRAINING

13 Clues: REPORT FILEDMONTHLY TRAININGDO NOT ATTEMPT TO MOVECOMPLY WITH REGULATIONS OFPROHIBITED WITHOUT APPROVALIN MOST CASES USES A FIREARMNUMBER OF COURSES OF ACTIONSREVIEWED ANNUALLY AND REVISED3 POTENTIAL COURSES OF ACTIONEMPLOYEES RESPONSIBLE FOR SIGNINGMUST USE ACTIVE SHOOTER MEDIA STATEMENTPROGRAM TO REPORT THREATS AGAINST THE BANK...

Security Puzzle 2024-09-10

Security Puzzle crossword puzzle
Across
  1. Virus yang menyamar sebagai perangkat lunak yang sah atau berguna, namun memiliki niat jahat.
  2. Protokol keamanan yang digunakan untuk memastikan komunikasi yang aman melalui internet.
  3. Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah.
  4. Protokol untuk mengamankan transfer file di jaringan komputer
  5. Pengujian terhadap sistem untuk menemukan celah atau kelemahan dalam sistem keamanan disebut testing.
  6. Serangan yang berusaha membuat layanan tidak dapat diakses oleh pengguna.
  7. Serangan dengan cara menebak-nebak password sampai berhasil.
  8. Proses verifikasi identitas pengguna disebut authentification.
Down
  1. Penggunaan firewall bertujuan untuk memfilter dan mengontrol data.
  2. Sebuah program yang dapat menggandakan diri dan menyebar ke komputer lain tanpa izin.
  3. Istilah untuk menggambarkan pencurian identitas online untuk tujuan yang merugikan.
  4. Proses untuk mengubah data menjadi bentuk yang tidak dapat dibaca tanpa kunci khusus.
  5. Istilah untuk menggambarkan akses yang tidak sah ke sistem atau jaringan komputer.

13 Clues: Serangan dengan cara menebak-nebak password sampai berhasil.Protokol untuk mengamankan transfer file di jaringan komputerProses verifikasi identitas pengguna disebut authentification.Penggunaan firewall bertujuan untuk memfilter dan mengontrol data.Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah....

Resource Security 2025-06-19

Resource Security crossword puzzle
Across
  1. Build up of water behind a dam.
  2. Barrier built across a river to create a reservoir.
  3. lack of enough safe and nutritious food to remain healthy & active.
  4. Inability of a population to safeguard sustainable access to adequate quantities of acceptable quality water.
  5. Extracting too much water from a ground source.
  6. Expensive and energy intensive process to turn salt water into fresh water.
  7. Underground water store in permeable rock.
Down
  1. when more water is withdrawn than a region can sustainably support.
  2. ability of a country to produce the resources it needs, without relying on other countries.
  3. Lack of proper nutrition.
  4. Supply of water to crops.
  5. Severe and prolonged shortage of food.
  6. - Relating to money and jobs.

13 Clues: Lack of proper nutrition.Supply of water to crops.- Relating to money and jobs.Build up of water behind a dam.Severe and prolonged shortage of food.Underground water store in permeable rock.Extracting too much water from a ground source.Barrier built across a river to create a reservoir....

Security igcse 2025-10-07

Security igcse crossword puzzle
Across
  1. uses a private key and a public key
  2. when the computer asks users if they are sure they want to carry out instructions
  3. a type of software which may track user behavior to display targeted ads based on their interests
  4. one method for avoiding acccidental data loss
  5. an attack on a server designed to deny service coming from multiple computers
Down
  1. sits between the main server and the internet and protects the main server from attacks
  2. programs that collect personal or sensitive data then send them to another device
  3. when an authentic-looking message or email tries to trick you into sending sensitive data
  4. malicious software which tricks you into visiting false websites and giving sensitive data
  5. a program that disguises itself as another programs, when run it deletes and corrupts files
  6. a security technology that monitors a computer’s incoming and outgoing traffic
  7. programs that replicate themselves over and over and fill the computer storage
  8. self-replicating software which can delete and corrupt files

13 Clues: uses a private key and a public keyone method for avoiding acccidental data lossself-replicating software which can delete and corrupt filesan attack on a server designed to deny service coming from multiple computersa security technology that monitors a computer’s incoming and outgoing traffic...

Sociology of deviant behaviour 2023-10-19

Sociology of deviant behaviour crossword puzzle
Across
  1. division of labour
  2. a behaviour stray from accepted norms
  3. a public order crime
  4. home a place for temporarily observing juvenile delinquents
  5. slaves committing suicide
  6. another word for anomie
Down
  1. dry state
  2. suicide due to lack of integration
  3. means become goals
  4. cyber crime
  5. Prohibitipon of alcohol in Rajasthan
  6. Mahila Anathalaya

12 Clues: dry statecyber crimeMahila Anathalayameans become goalsdivision of laboura public order crimeanother word for anomieslaves committing suicidesuicide due to lack of integrationProhibitipon of alcohol in Rajasthana behaviour stray from accepted normshome a place for temporarily observing juvenile delinquents