cyber security Crossword Puzzles
Piggyccinos 2022-10-04
13 Clues: Bae of Bengal • Cyber-venomous • Big brother Tae • King of Persia-h • Banana profiling • Teacup piggyccino • Turk administration • Clean out the channel • Beatle greeting, circa '68 • home is where the heart is • land of the pop culture E-mau5 • Asian-pigmentation-fusion = profit • What a broken clock that's all talk needs
Piggyccinos 2022-10-04
13 Clues: Bae of Bengal • Cyber-venomous • Big brother Tae • Banana profiling • King of Persia-h • Teacup piggyccino • Turk administration • Clean out the channel • Beatle greeting, circa '68 • Home is where the heart is • Land of the pop culture E-mau5 • Asian-pigmentation-fusion = profit • What a broken clock that's all talk needs
Securities 2023-01-03
Across
- If secured, debt securities may be contractually prioritized over other unsecured, subordinated debt in the case of a ___
- Debt securities can be secured from ___
- Equity securities often do pay out ___
- Publicly traded securities are listed on stock ___
- A security can represent ___ in a corporation in the form of stock
- shareholders can sell their securities to other investors for cash and/or ___
Down
- tradable financial assets used to raise capital in public and private markets and hold some type of monetary value
- The Securities Act of 1933 is the first federal legislation to regulate the U.S. ___
- type of security which combines aspects of debt and equity
- a type of financial contract whose price is determined by the value of some underlying asset, such as a stock, bond, or commodity
- type of security that are essentially loans repaid with periodic payments
- regulates public sales of securities
- type of security which provides ownership rights to holders
- In the secondary market, securities are simply transferred as ___ from one investor to another
- issuers can seek security listings and attract investors by ensuring a liquid and regulated market in which to ___
15 Clues: regulates public sales of securities • Equity securities often do pay out ___ • Debt securities can be secured from ___ • Publicly traded securities are listed on stock ___ • type of security which combines aspects of debt and equity • type of security which provides ownership rights to holders • A security can represent ___ in a corporation in the form of stock • ...
Data Protection 2022-02-08
Across
- If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
- In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
- Domestic individuals and entities storing data in the PRC may not provide such data to foreign( )or enforcement agencies without Chinese regulator’s prior approval.
- The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
- Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
- In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
- The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
- Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
Down
- “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
- It defines “personal information” as any information recorded in digital or other forms that relate to identified or identifiable natural persons, excluding( )information.
- The Personal Information Protection Law also sets out a series of penalties for( ).
- Under the Provisions on Administration of Automotive Data Security in August 2021, “important data” in automotive industry includes data on traffic and( )flow.
- If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
- “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.
- Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
- A stricter( )is expected in managing and processing “national core data”.
- Multinational corporations’ ( )with a foreign court request or order for documents might put them in violation of the PRC law, which would result in penalties.
- Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
- In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
- Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.
20 Clues: A stricter( )is expected in managing and processing “national core data”. • The Personal Information Protection Law also sets out a series of penalties for( ). • Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines. • ...
AWS Cloud Practitioner Exam Security 2022-06-08
Across
- Provides data security ?? using encryption keys and provides access control for encryption, decryption, and re-encryption
- Payment Card Industry Data Security Standard (acronym)
- The ? created, managed, and used by users are termed as ? and support cryptographic operations
- service that prevents secret credentials from being hardcoded in the source code
- service that offers security aspects to protect the environment using industry-standard best practices.
- Security Hub collects findings or ? from multiple AWS accounts.
- certificates are signed by a ?? and contain the server’s name, the validity period, the public key, the signature algorithm, and more
- user directory type that provides sign-up and sign-in for the application using Amazon Cognito User Pools
- CIS
Down
- service that allows a user to protect AWS applications by storing, renewing, and deploying public and private SSL/TLS X.509 certificates
- global service that creates, stores, and manages encryption keys
- enables multiple ways to use Microsoft Active Directory (AD) with other AWS services
- facilitates tracking of changes in Secrets Manager
- Ensures ?? encryption of the secret between AWS and the system to retrieve the secret
- Charges are applied only for the current ?, not for all ? in which Security Hub is enabled.
- Allows ? of master keys once a year using previous versions of keys
- Secrets Manager integrates for auditing
17 Clues: CIS • Secrets Manager integrates for auditing • facilitates tracking of changes in Secrets Manager • Payment Card Industry Data Security Standard (acronym) • Security Hub collects findings or ? from multiple AWS accounts. • global service that creates, stores, and manages encryption keys • Allows ? of master keys once a year using previous versions of keys • ...
AWS Cloud Practitioner Exam Security 2022-06-08
Across
- global service that creates, stores, and manages encryption keys
- Provides data security ?? using encryption keys and provides access control for encryption, decryption, and re-encryption
- facilitates tracking of changes in Secrets Manager
- enables multiple ways to use Microsoft Active Directory (AD) with other AWS services
- service that offers security aspects to protect the environment using industry-standard best practices.
- service that allows a user to protect AWS applications by storing, renewing, and deploying public and private SSL/TLS X.509 certificates
- Ensures ?? encryption of the secret between AWS and the system to retrieve the secret
- Secrets Manager integrates for auditing
Down
- service that prevents secret credentials from being hardcoded in the source code
- Payment Card Industry Data Security Standard (acronym)
- CIS
- Charges are applied only for the current ?, not for all ? in which Security Hub is enabled.
- user directory type that provides sign-up and sign-in for the application using Amazon Cognito User Pools
- certificates are signed by a ?? and contain the server’s name, the validity period, the public key, the signature algorithm, and more
- Security Hub collects findings or ? from multiple AWS accounts.
- The ? created, managed, and used by users are termed as ? and support cryptographic operations
- Allows ? of master keys once a year using previous versions of keys
17 Clues: CIS • Secrets Manager integrates for auditing • facilitates tracking of changes in Secrets Manager • Payment Card Industry Data Security Standard (acronym) • Security Hub collects findings or ? from multiple AWS accounts. • global service that creates, stores, and manages encryption keys • Allows ? of master keys once a year using previous versions of keys • ...
CYBERSAFETY 2024-05-02
Across
- What is Cybersecurity?
- What is your best weapon?
- Who can do untold damage to you because of the internet
- What is the second part of CIA
- You must only share confidential data when
- What is the first part of CIA
Down
- What does Malware try to make you download
- What is now as important as real security
- What type of scam involves around playing with emotions to push people into a sense of urgency and fear leaving them more susceptible to being tricked
- what is the third part of CIA
- What security option fights off viruses from your computer
- You must only share confidential data with
- What is good to have as it notifies you of any sign-ins
- What security option makes a barrier between you and danger
- What security option hides your data
- What are the 3 principles of cybersecurity
16 Clues: What is Cybersecurity? • What is your best weapon? • what is the third part of CIA • What is the first part of CIA • What is the second part of CIA • What security option hides your data • What is now as important as real security • What does Malware try to make you download • You must only share confidential data with • You must only share confidential data when • ...
Government Acronyms 2024-10-23
Across
- health, education, welfare
- Fannie Mae
- environmental protection agency
- Freddie Mae
- federal deposit insurance corporation
- federal communication commission
- housing urban development
- American Track
- Food drug administration
- United States department of agriculture
- national institute of standards and tech
- National Aeronautics and Space Administration
- Health human sources
- bill of rights
- Bridge investment program
- Transportation security administration
- Department of homeland security
Down
- Federal emergency management agency
- national oreanic atmospheric administration
- securities and exchange
- federal bureau of investigation
- department of defense
- Central Intelligence Agency
- federal aviation administration
- United States of America
- Record of decision
- department of transportation
- social security administration
- attorney general
- Veteren Assistance
- National institutes of health
- Secret service
- Supreme Court of the United States
- Small business association
- Department of justice
35 Clues: Fannie Mae • Freddie Mae • American Track • Secret service • bill of rights • attorney general • Record of decision • Veteren Assistance • Health human sources • department of defense • Department of justice • securities and exchange • United States of America • Food drug administration • housing urban development • Bridge investment program • health, education, welfare • Small business association • ...
SFS 2 Vocab 2/3 2023-09-26
Across
- Do the letters flow or are they erratic and shaky?
- fiber created from natural materials or by chemical processes, a man-made fiber
- Check for pressure on the downward and upward strokes.
- the writing tilt to the left or right, or is it straight up and down
- handwriting is difficult to disguise and forge
Down
- Any signature, handwriting, typewriting, or other written mark whose source or authenticity is in dispute of uncertain
- Similar to fingerprints, every person's handwriting is unique
- Compare how capital letters are joined to lowercase letters
- Specially trained person who scientifically analyzes handwriting and other features in a document.
- the overall height, width, and size of the letters
- the examination and comparison of questioned documents with known material
- making, altering, or falsifying a person's signature or any other aspect of a document with the intent to deceive another
- a computer or computer system intended to mimic likely targets of cyber attacks
- Good tool for including or excluding persons when determining a match
- Examine the average amount of area between words and letter formation. Are the letters and margins the same/similar? Are the letters equally spaced or crowded?
- also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
- about the amount that is written in illegitimate checks every
- (aka. Baseline characteristics) Does the writing tend to follow a straight line, move downward, or move upward? Is it above or below the line?
18 Clues: handwriting is difficult to disguise and forge • Do the letters flow or are they erratic and shaky? • the overall height, width, and size of the letters • Check for pressure on the downward and upward strokes. • Compare how capital letters are joined to lowercase letters • Similar to fingerprints, every person's handwriting is unique • ...
Cybersecurity Crossword Puzzle 2025-09-21
Across
- A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
- The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
- A malicious program that can self-replicate and attach itself to other files.
- A symbol, typically '=', used in programming to assign a value to a variable.
- The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
- A value or variable that is passed to a function or method when it is called.
- A software that generates revenue by automatically displaying online advertisements.
- To verify the identity of a user or system.
Down
- A program or set of rules that protects a network by controlling incoming and outgoing traffic.
- An additional component or feature that can be added to a software program.
- A software program used to prevent, detect, and remove malware.
- CONTROL - A security process that controls and manages who is authorized to access certain resources.
- A malicious program that is designed to damage or gain unauthorized access to a computer system.
- The act of sending fraudulent emails in order to trick people into revealing personal information.
- The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
- POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
- A character encoding standard used to represent text in computers.
- A protocol used to translate IP addresses into MAC addresses.
- A collection of IP-to-MAC address mappings used to speed up network communication.
19 Clues: To verify the identity of a user or system. • A protocol used to translate IP addresses into MAC addresses. • A software program used to prevent, detect, and remove malware. • A character encoding standard used to represent text in computers. • An additional component or feature that can be added to a software program. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Rhysider 44.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
CYBER LAW (CIA-1) 2021-08-31
Across
- the conversion of analogue data (esp. in later use images, video, and text) into digital form.
- Sending of unsolicited bulk and commercial messages over the internet is
- India's first cyber police station.
- Practise of passing off another author work or ideas as ones own.
- refers to exploring the appropriate, ethical behaviour related to the online environment and digital media platform.
- cyber offence in which frauds are committed by inviting people to invest money and sharing financial information
Down
- The science of sending secret cypher and decoding
- A person who sends, generates, store or transmit any electronic messages
- Software designed to disrupt, damage, or gain unauthorised access to computer system
- The Altering of data so that it is not usable unless the changes are undone is
10 Clues: India's first cyber police station. • The science of sending secret cypher and decoding • Practise of passing off another author work or ideas as ones own. • A person who sends, generates, store or transmit any electronic messages • Sending of unsolicited bulk and commercial messages over the internet is • ...
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
Fall 2023-11-07
10 Clues: spice • season of the • no - November • Colorful Leaves • - peoples heritage month • -,-, the 5th of November • symbol of fruitful abundance • the Monday after Thanksgiving • November 11th is the day to honor • ship used to arrive at Plymouth Colony
Bullying and Conflict 2024-03-10
10 Clues: Private • Two sided • In public • On purpose • Online harassment • over and over again • Fighting and hitting • Alone with someone else • Hurting and being mean to someone • Making fun of looks and skin tone
Asean 2023-08-15
Across
- ASEAN's security includes...Security which. means security overseas and at the boarders of the seas.
- ASEAN's flags colors are red, blue, white, and...
- ASEAN's values are respect, security and...
- also one of ASEAN's main purpose is to accelerate.... growth
- When theres a problem betweeen ASEAN countries they should...
- Obviously, each ASEAN country has their own.... that they are interested about
- one of the founders of ASEAN coming from Indonesia is Adam...
- what month was ASEAN formed?
- in which country was ASEAN formed?
Down
- what country's shape in ASEAN is fragmented
- what country's shape in ASEAN is elongated
- ASEAN's motto is "One Vision, One Identity and One....
- what country's shape in ASEAN is compacted?
- one of the ASEAN cooperation that effects money and recources is...
- even after further negotiation the problem hasnt resolved the countries should go to indternational...
- ASEAN's purpose is to acheive Peace and....
16 Clues: what month was ASEAN formed? • in which country was ASEAN formed? • what country's shape in ASEAN is elongated • what country's shape in ASEAN is fragmented • ASEAN's values are respect, security and... • what country's shape in ASEAN is compacted? • ASEAN's purpose is to acheive Peace and.... • ASEAN's flags colors are red, blue, white, and... • ...
SCUK Data Protection Day 2019 Crossword Quiz 2019-02-12
Across
- The month in which GDPR was adopted in the UK in 2018 (3)
- Secure way for transferring data (4)
- __ Grounds are needed to process personal data (6)
- True or False: GDPR will no longer apply in the UK after Brexit (5)
- Government regulator upholding information rights (11, 12)
- Special category of personal data (9)
- Penalty of 4% of global __ (8)
- Required from data subject for legal processing (7)
- Controller, Organisation or individual in charge of how data is processed (4, 10)
- Subject __ Request (6)
- The ‘R’ in GDPR (10)
- __ to rectification (5)
Down
- The Data Protection __ 2018 (3)
- Where should you go to report a data breach at SCUK? (7, 3)
- Collecting, using, sharing or storing personal data (10)
- Type of cyber-attack (8)
- What does GDPR regulate? (4, 10)
- The right to be __ (9)
- Acronym for organisational role that reports internally and externally at the highest level on Data Protection matters (3)
- Owner of personal data (4, 7)
- __ phishing is a type of social engineering cyber-attack (5)
- Everyone’s responsibility to do when a suspected data protection incident has occurred (6)
- Privacy __ Assessment (6)
- The ‘G’ in GDPR (7)
- Does GDPR apply to charities? (3)
- Category of sensitive personal data (6)
- Acronym of the office regulating Data Protection compliance in the UK (3)
27 Clues: The ‘G’ in GDPR (7) • The ‘R’ in GDPR (10) • The right to be __ (9) • Subject __ Request (6) • __ to rectification (5) • Type of cyber-attack (8) • Privacy __ Assessment (6) • Owner of personal data (4, 7) • Penalty of 4% of global __ (8) • The Data Protection __ 2018 (3) • What does GDPR regulate? (4, 10) • Does GDPR apply to charities? (3) • Secure way for transferring data (4) • ...
Procrastination 2014-01-23
Across
- British Defeat, 2013
- Rage, Anger
- ANU Theatre Society
- Director upset over script leak
- Who pays their debts
- Increased payment for journalists, island
- Newest victim of Cyber Warfare
Down
- The White Ewe
- George Bernard Shaw's Famous Play
- Julie Bishop does not approve of treason
- Newest dating app
- 1991 US Invasion
- Adaptation of Austen's Emma
- Mother-in-law of the Leader of the Opposition
- Kurdish Genocide, Iraq
15 Clues: Rage, Anger • The White Ewe • 1991 US Invasion • Newest dating app • ANU Theatre Society • British Defeat, 2013 • Who pays their debts • Kurdish Genocide, Iraq • Adaptation of Austen's Emma • Newest victim of Cyber Warfare • Director upset over script leak • George Bernard Shaw's Famous Play • Julie Bishop does not approve of treason • Increased payment for journalists, island • ...
Types of risks. 2024-07-15
Across
- - Risk from deceitful acts.
- - Risks from regulatory breaches.
- - Risk from natural events.
- - Risks from failed processes.
- - Risk from price fluctuations.
- - Risk affecting the entire market.
- - Risks from poor business decisions.
Down
- - Risk of defaulted loans.
- - Risk of damaged public image.
- - Risk from currency fluctuations.
- - Risks from lawsuits.
- - Risk of insufficient cash.
- - Risk from rate changes.
- - Risks from government actions.
- - Risks from digital attacks
15 Clues: - Risks from lawsuits. • - Risk from rate changes. • - Risk of defaulted loans. • - Risk from deceitful acts. • - Risk from natural events. • - Risk of insufficient cash. • - Risks from digital attacks • - Risks from failed processes. • - Risk of damaged public image. • - Risk from price fluctuations. • - Risks from government actions. • - Risks from regulatory breaches. • ...
111 2022-02-09
Across
- Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
- The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
- Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
- The Personal Information Protection Law also sets out a series of penalties for( ).
- The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
- Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
- “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.
- A stricter( )is expected in managing and processing “national core data”.
- “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
Down
- Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
- If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
- In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
- If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
- Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.
- Under the Provisions on Administration of Automotive Data Security in August 2021, “important data” in automotive industry includes data on traffic and( )flow.
- In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
- It defines “personal information” as any information recorded in digital or other forms that relate to identified or identifiable natural persons, excluding( )information.
- In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
- Domestic individuals and entities storing data in the PRC may not provide such data to foreign( )or enforcement agencies without Chinese regulator’s prior approval.
- Multinational corporations’ ( )with a foreign court request or order for documents might put them in violation of the PRC law, which would result in penalties.
20 Clues: A stricter( )is expected in managing and processing “national core data”. • The Personal Information Protection Law also sets out a series of penalties for( ). • Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines. • ...
CODE PINK 2020-07-18
Across
- always (look around) the area
- areas that are important to move quickly to and cover during a Code Pink
- a person might be considered suspicious if they are carrying an oversized what
- when the child is found, you should do what until security arrives
- everyone should stay in the where until the Code Pink is cleared
- provide security with a what of the child and suspect
- during a Code Pink it is important to collect as many what as possible
- parents need a matching one of these to transport pediatric patients
- color badge needed to transport pediatric patients
- who should stay with the caregiver notifieid or security
- what is it called if there is a suspected abduction of a pediatric patient
Down
- loitering by unit doors, asking a lot of unnecessary questions about the hospital layout and certain units, and a person "just wanting to see the babies," are all examples of what kind of behavior
- important to notify security of the what of the dissapearence
- if you see a suspicious person do not to do what
- children should not be what during a code pink
- we should stop and do what to anyone with an infant
- who do you need to call immediately if there is a suspected abduction
- waiting for someone else to open the unit doors and then following them in
18 Clues: always (look around) the area • children should not be what during a code pink • if you see a suspicious person do not to do what • color badge needed to transport pediatric patients • we should stop and do what to anyone with an infant • provide security with a what of the child and suspect • who should stay with the caregiver notifieid or security • ...
Cybersecurity Puzzle 2025-09-26
Across
- Incidents where confidential information is stolen, leaked, or disclosed are known as what?
- A strong culture equals strong _____.
- This security feature requires at least two forms of authentication.
- The concept of human firewalls is built on this critical aspect of security.
- Attackers using manipulative techniques to scam people is known as what?
- Organizational ____ are designed to keep people, data, and devices safe.
- What is one of the leading causes of security incidents?
Down
- This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
- What is the top attack method for cybercriminals?
- This type of malware encrypts data to prevent access to valuable resources.
- The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
- In recent years, attackers have embraced the convenience of these.
- While online threats get the most attention in the world of security, these threats pose just as much risk.
- People are the last line of ____.
- It is imperative to ensure accounts are protected with these.
- If you encounter a phishing attack, what should you do immediately?
16 Clues: People are the last line of ____. • A strong culture equals strong _____. • What is the top attack method for cybercriminals? • What is one of the leading causes of security incidents? • It is imperative to ensure accounts are protected with these. • In recent years, attackers have embraced the convenience of these. • ...
What Did You Learn Today? 2017-05-03
Across
- Which Tier data center would have least downtime?(4,1)
- Which redundancy is applied most commonly for a Tier 4 data center?(1,1,1,1)
- Abbreviation of EMC ESSM(3,6,7,6)
- Which Tier data center has no built-in redundancy?(4,1)
- What redundancy is available in Tier-3 data center?(1,1,1)
- Using what technic NAND Flash storages can do READ and WRITE operations simultaneously?(3,9)
- / What are the different types of NAND flash?(3,3,3)
- In Vmware, type-1 hypervisors are referred as ______.(4,5)
Down
- Abbreviation of UCS in CISCO UCS(7,9,6)
- The VT in IVT in Cisco IVT(12,7)
- “Formulate User Access Policy and implement the same" - is one of the key feature to workstation security. Name the Security Layer to which it belongs?(4,10)
- The I in IVT in Cisco IVT(12)
- Fill in the missing word in "BDM"- Business Continuity and D______ Management(8)
- Who first manufactured 3D NAND flash products?(7)
- Fill in the missing word in File System, Files and _______-the best practice that suggests "Scan your server for viruses, rootkits, backdoors and local exploits"(11)
- How many disciplines of Security is Structured in a 4 layered Security Model?(Clue:Write in words)(7)
- Protection Which is Security Layer which protects the PCs from within and outside the corporate Network is?(4,10)
- How much of data can be deleted at a time from a flash storage?(5,2,4)
- In MLC NAND type how many bits of data can be written to a cell?(3,4)
19 Clues: The I in IVT in Cisco IVT(12) • The VT in IVT in Cisco IVT(12,7) • Abbreviation of EMC ESSM(3,6,7,6) • Abbreviation of UCS in CISCO UCS(7,9,6) • Who first manufactured 3D NAND flash products?(7) • / What are the different types of NAND flash?(3,3,3) • Which Tier data center would have least downtime?(4,1) • Which Tier data center has no built-in redundancy?(4,1) • ...
Security Crossword 2015-06-23
Across
- in case of fire, the employees do this
- need to raise the floor in the computer room?
- who approves the fire panel going offline
- the cleanest place at seagate
- work permit what is needed prior to soldering
- the warmest test lab
- when the city sirens sound, it's because of this
- the scc watches these
Down
- "Mr. Brown will not be in today"
- an emergency? call us
- if a vendor does not have a valid bi, they are...
- and report security does this
- the contract janitorial service
13 Clues: the warmest test lab • an emergency? call us • the scc watches these • the cleanest place at seagate • and report security does this • the contract janitorial service • "Mr. Brown will not be in today" • in case of fire, the employees do this • who approves the fire panel going offline • need to raise the floor in the computer room? • ...
Branch Security 2021-12-21
Across
- How many days is a new member's check hold
- More than 1 person in the vault at a time
- How is your security & passwords protected
- Phone response with no active robbery
- How much bait money in each drawer
- How many working cameras in the branch?
Down
- Emergency evacuation meeting place
- Who we contact in case of lost swiper
- When we change the bait money
- Where the height markers are located
- How many alarm buttons are there
- Phone response during a robbery
- Robbery folder color
13 Clues: Robbery folder color • When we change the bait money • Phone response during a robbery • How many alarm buttons are there • Emergency evacuation meeting place • How much bait money in each drawer • Where the height markers are located • Who we contact in case of lost swiper • Phone response with no active robbery • How many working cameras in the branch? • ...
Internet Security 2019-06-06
Across
- A generic term for malware where the program attaches itself to another file in order to infect a computer
- A method of ensuring that an encrypted message is from a trusted source as they have a unique encrypted signature verified by a Certification Authority
- A code used to encrypt/decrypt data that is only known by one user by is mathematically linked to a corresponding public key
- Hardware or software for protecting against unauthorised access to a network
- A trusted organisation that provides digital certificates and signatures
- A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority
- A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules
Down
- A technique for examining the contents of packets on a network and rejecting hem if they do not form part of a recognised communication
- Malware or a type of virus that replicates itself and spreads around a computer system. It does not need to be attached to another file in order to infect a computer
- Where a public and private key are used to encrypt and decrypt data
- Where the sender and receiver both use the same key to encrypt and decrypt data
- A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key
- Malware that is hidden within another file on your computer
13 Clues: Malware that is hidden within another file on your computer • Where a public and private key are used to encrypt and decrypt data • A trusted organisation that provides digital certificates and signatures • Hardware or software for protecting against unauthorised access to a network • ...
Private Security 2023-04-21
Across
- additions to the constitution
- security professionals who work to protect retail settings from theft
- community members selected to determine guilt in a court case
- private companies that provide armed security services
- security proffesionals who conduct investigation and find facts and analyze personal, financial, and legal matters
- undertaking investigation by private persons
- work done to establishfinantial facts
Down
- working to recover digital or other computer information
- being tried a second time for the same crime
- training designed to keep the security officer up to date
- (WMD) bombs and other weapons designed to cause maximum loss of life
- monitoring
- individuals contracted by the military to act as soldiers
13 Clues: monitoring • additions to the constitution • work done to establishfinantial facts • being tried a second time for the same crime • undertaking investigation by private persons • private companies that provide armed security services • working to recover digital or other computer information • training designed to keep the security officer up to date • ...
Information Security 2023-08-28
Across
- procedure used to determine user privileges or access levels to the system
- state of being complete or uncorrupted
- gap or weakness which undermines an organization’s security efforts
- network of computers and devices managed as a unit with the same procedures and rules
- information or data which can be accessed when needed
- how information is protected
- calculated assessment of potential threats to an organization’s security
Down
- intent of doing harm
- making sure a person is who they say they are
- requirement of being private or secret
- rights an individual or organization has over information and how it is used
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- macros which have been programmed to carry out malicious intent
13 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
information security 2023-08-28
Across
- procedure used to determine user privileges or access levels to the system
- state of being complete or uncorrupted
- gap or weakness which undermines an organization’s security efforts
- network of computers and devices managed as a unit with the same procedures and rules
- information or data which can be accessed when needed
- how information is protected
- calculated assessment of potential threats to an organization’s security
Down
- intent of doing harm
- making sure a person is who they say they are
- requirement of being private or secret
- rights an individual or organization has over information and how it is used
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- macros which have been programmed to carry out malicious intent
13 Clues: intent of doing harm • how information is protected • state of being complete or uncorrupted • requirement of being private or secret • making sure a person is who they say they are • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
Information Security 2023-08-28
Across
- rights an individual or organization has over information and how it is used
- calculated assessment of potential threats to an organization’s security
- procedure used to determine user privileges or access levels to the system
- gap or weakness which undermines an organization’s security efforts
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- intent of doing harm
- requirement of being private or secret
Down
- how information is protected
- information or data which can be accessed when needed
- macros which have been programmed to carry out malicious intent
- making sure a person is who they say they are
- network of computers and devices managed as a unit with the same procedures and rules
- state of being complete or uncorrupted
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • information or data which can be accessed when needed • macros which have been programmed to carry out malicious intent • ...
Food Security 2024-11-28
Across
- agricultural process of growing food
- condition where a person does not have enough food to meet their daily energy needs
- required to provide for a growing population
- process of distributing food to those in need
- lack of food due to natural or human-made causes
- growing a variety of plants and animals in the same area to increase food security
- global organization working to end hunger and improve food security
- The act of preserving food through refrigeration or drying
Down
- basic dietary need and a vital component of food security
- having reliable access to a sufficient quantity of affordable, nutritious food
- process of distributing food to those in need
- food type without synthetic chemicals
- key pillars of food security
- Using waste to help crops grow
14 Clues: key pillars of food security • Using waste to help crops grow • agricultural process of growing food • food type without synthetic chemicals • required to provide for a growing population • process of distributing food to those in need • process of distributing food to those in need • lack of food due to natural or human-made causes • ...
Water Security 2025-05-23
Across
- the weather conditions prevailing in an area in general or over a long period.
- A international organization
- a biological community of interacting organisms and their physical environment.
- solutions to managing water insecurity
- the state of being scarce or in short supply; shortage.
- the presence of harmful substances within the environment
- the state of being extremely poor.
Down
- the governing body of a nation, state, or community.
- Two words. An organization that helps manage water security
- t] : the process of keeping places free from dirt, infection, disease, etc.
- the ability to be maintained at a certain rate or level.
- the state of being open to danger or threat; lack of protection.
- an organized body of people with a particular purpose
13 Clues: A international organization • the state of being extremely poor. • solutions to managing water insecurity • the governing body of a nation, state, or community. • an organized body of people with a particular purpose • the state of being scarce or in short supply; shortage. • the ability to be maintained at a certain rate or level. • ...
Security 2022-01-24
Across
- a device making a loud noise that gives warning of a fire.
- a length of thick strong cord made by twisting together strands of hemp.
- a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
- a covering for the hand worn for protection against cold or dirt.
- directions, detailed information about how something should be done.
- a hard or padded protective hat.
- a covering for all or part of the face to protect against air pollutants.
- a strip to fasten in a car.
8 Clues: a strip to fasten in a car. • a hard or padded protective hat. • a device making a loud noise that gives warning of a fire. • a covering for the hand worn for protection against cold or dirt. • directions, detailed information about how something should be done. • a length of thick strong cord made by twisting together strands of hemp. • ...
Security 2016-03-14
Across
- Theft, especially in a world where so many business people use smartphones to carry out their day to day jobs.
- Any technology, such as tracking software, that aids in gathering information about a person or organization without their knowledge.
- When a virus disguises itself as another program to gain access to a computer
Down
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Someone who seeks and exploits weaknesses in a computer system or computer network.
- Is the attempt to acquire sensitive information such as usernames, passwords, and credit card details
- Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- A standalone malware computer program that replicates itself in order to spread to other computers.
8 Clues: When a virus disguises itself as another program to gain access to a computer • Someone who seeks and exploits weaknesses in a computer system or computer network. • A standalone malware computer program that replicates itself in order to spread to other computers. • ...
Security 2025-10-13
Across
- What section is Duty of a CSO who denies entry
- What could you get for excellent service in the Ministry
- what Section is Power to use reasonable force
- What does S stand for in phonetic Alphabet
Down
- What does F Stand for in phonetic Alphabet
- Tactical communications framework
- What radio code is 10-3
- Good morning in Maori
8 Clues: Good morning in Maori • What radio code is 10-3 • Tactical communications framework • What does F Stand for in phonetic Alphabet • What does S stand for in phonetic Alphabet • what Section is Power to use reasonable force • What section is Duty of a CSO who denies entry • What could you get for excellent service in the Ministry
security crossword 2021-08-31
13 Clues: Five O • On the seas • Immigration • In the skys • I can see you • Secret service • Big metal ships • He has a weapon • Best in the world • Keeping shops safe • Boss of the Prison • Locks you up behind bars • To chase thief's when on the run
Security Crossword 2013-02-28
Across
- table which holds relationship between parent and child role
- a function call or a program call
- Founded by 5 IBMers in 1972
- doorway to SAP system
- a template to derive roles/ with * for org elements
- This mode pull the auth changes of SU24 to roles/ ____ Mode of generation
- Cross System Responsibility can be defined by ____ role
- Transaction to read the Audit logs
Down
- permission to perform an action/provide right access to user
- User type for communication within same system
- TSTC is _____ independent table/ SM01
- Authorization check can be traced
- transaction to compare two users/roles
13 Clues: doorway to SAP system • Founded by 5 IBMers in 1972 • a function call or a program call • Authorization check can be traced • Transaction to read the Audit logs • TSTC is _____ independent table/ SM01 • transaction to compare two users/roles • User type for communication within same system • a template to derive roles/ with * for org elements • ...
INTERNET SECURITY 2024-02-12
13 Clues: Ψευδείς ειδήσεις • Διαδικτυακή φήμη • Κωδικοί πρόσβασης • Κακόβουλο λογισμικό • Ηλεκτρονικές απάτες • Πειρατεία λογισμικού • Εθισμός στο διαδίκτυο • Άγνωστοι στο διαδίκτυο • Διαδικτυακός εκφοβισμός • Παιχνίδια στο διαδίκτυο • Στοχευμένες διαφημίσεις • Προστασία προσωπικών δεδομένων • Εικόνα σώματος & κοινωνικά δίκτυα
Email Security 2024-07-15
Across
- Email's bossy rulemaker
- Secret code for your messages
- Targeting the "big fish" with emails
- Baiting users to reveal sensitive info
- Email's digital fingerprint
- Email sender's fancy passport
- Pretending to be someone else via email
Down
- Email's safe playpen
- Computer bugs causing trouble
- Collecting email addresses for spamming purposes
- Protects secrets from escaping
- Assuming an employee's identity to trick others via email
- Email's "bouncer" when it visits the club
13 Clues: Email's safe playpen • Email's bossy rulemaker • Email's digital fingerprint • Computer bugs causing trouble • Secret code for your messages • Email sender's fancy passport • Protects secrets from escaping • Targeting the "big fish" with emails • Baiting users to reveal sensitive info • Pretending to be someone else via email • Email's "bouncer" when it visits the club • ...
Data Security 2025-12-07
Across
- Deleting data so it cannot be recovered easily.
- Physically destroying storage devices.
- A secret word to log in.
- Software that removes malware.
- Uses fingerprints or face scans to identify users.
- Data backed-up away from the main building.
Down
- Used to enter a PIN.
- Checking user identity.
- Uses two ways to log in.
- Rules about what users can access.
- Blocks unsafe network traffic.
- Scrambling data to keep it secret.
- Uses radio waves to read data from a card.
13 Clues: Used to enter a PIN. • Checking user identity. • Uses two ways to log in. • A secret word to log in. • Blocks unsafe network traffic. • Software that removes malware. • Rules about what users can access. • Scrambling data to keep it secret. • Physically destroying storage devices. • Uses radio waves to read data from a card. • Data backed-up away from the main building. • ...
Year 12 Cybersecurity 2023-08-16
Across
- A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- An individual who simulates cyberattacks to evaluate the security of a system.
- A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- Measures taken to protect physical assets and facilities from unauthorized access or harm.
- The accuracy and reliability of data, protected from unauthorized alteration.
- A hacker who engages in malicious activities for personal gain or to cause harm.
- Mistakes made by individuals that can lead to security breaches.
- Creating multiple security layers to prevent unauthorized access at different levels.
- Covert agents who gather information on behalf of a government or organization.
- An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- Ensuring that sensitive information is accessible only to authorized individuals.
- The ability to identify and recognize cybersecurity threats and incidents.
- Making sure that data is accessible when needed, without unauthorized disruptions.
- Individuals with advanced computer skills who manipulate software or systems for various purposes.
- Covert activities aimed at gathering confidential information from competitors or enemies.
- Individuals who engage in illegal activities on the internet for financial gain.
- People within an organization who have access to sensitive information and can pose security risks.
- Implementing measures to discourage potential attackers from targeting a system or organization.
- Introducing obstacles and barriers to slow down attackers' progress.
- The process of restoring systems and data after a cybersecurity breach or incident.
- Taking swift actions to address and mitigate cybersecurity incidents.
21 Clues: Mistakes made by individuals that can lead to security breaches. • Introducing obstacles and barriers to slow down attackers' progress. • Taking swift actions to address and mitigate cybersecurity incidents. • The ability to identify and recognize cybersecurity threats and incidents. • ...
M3 2024-11-04
Across
- Physical or virtual barrier that controls network traffic
- Process of verifying a user's identity
- Security weakness in a system
- A malicious program that replicates itself and spreads to other computers
- Required information to solve a problem
- Process of gathering necessary information about a problem
- Unwanted bulk messages
- Steps taken to prevent attacks
- Testing a solution's effectiveness
- Device for accessing computer networks
Down
- Community-wide computer network
- Malicious software
- To find and fix problems
- Physical components of a computer system
- Final step in problem-solving process
- The practice of protecting systems, networks, and programs from digital attacks
- Make data unreadable to unauthorized users
- A type of social engineering attack using fake emails
- Tools used to detect and remove malware
- Security copy of data
- A common first step in problem-solving
21 Clues: Malicious software • Security copy of data • Unwanted bulk messages • To find and fix problems • Security weakness in a system • Steps taken to prevent attacks • Community-wide computer network • Testing a solution's effectiveness • Final step in problem-solving process • Process of verifying a user's identity • A common first step in problem-solving • ...
Government Acronyms 2024-10-23
Across
- health, education, welfare
- Fannie Mae
- environmental protection agency
- Freddie Mae
- federal deposit insurance corporation
- federal communication commission
- housing urban development
- American Track
- Food drug administration
- United States department of agriculture
- national institute of standards and tech
- National Aeronautics and Space Administration
- Health human sources
- bill of rights
- Bridge investment program
- Transportation security administration
- Department of homeland security
Down
- Federal emergency management agency
- national oreanic atmospheric administration
- securities and exchange
- federal bureau of investigation
- department of defense
- Central Intelligence Agency
- federal aviation administration
- United States of America
- Record of decision
- department of transportation
- social security administration
- attorney general
- Veteren Assistance
- National institutes of health
- Secret service
- Supreme Court of the United States
- Small business association
- Department of justice
35 Clues: Fannie Mae • Freddie Mae • American Track • Secret service • bill of rights • attorney general • Record of decision • Veteren Assistance • Health human sources • department of defense • Department of justice • securities and exchange • United States of America • Food drug administration • housing urban development • Bridge investment program • health, education, welfare • Small business association • ...
Unit 7 2024-10-24
Across
- housing and urban development
- health education and welfare
- United States postal services
- department of energy or education
- airporT security
- food and drug administration
- national aeronautics and space administration
- DOL
- justice department
- federal deposit insurance corporation
Down
- DOD
- health and human services
- homeland security
- United States department of agriculture
- veterans affairs
- institute of health
- department of transportation
- Federal emergency management agency
- Internal Revenue Service
- Central Intelligence Agency
20 Clues: DOD • DOL • airporT security • veterans affairs • homeland security • justice department • institute of health • Internal Revenue Service • health and human services • Central Intelligence Agency • health education and welfare • food and drug administration • department of transportation • housing and urban development • United States postal services • department of energy or education • ...
tipos de delitos 2 2023-11-03
9 Clues: acoso • extorsión • falsificación • delito de odio • tráfico de drogas (drug-____) • posesión de drogas (drug-____) • acoso cibernético (____ bullying) • violencia doméstica (domestic-____) • fraude de tarjeta de crédito (____-card-fraud)
Computer Puzzle game 2025-05-27
Across
- misusing personal information
- grooming online child abuse
- hoaxing or misleading
- illegal entry into computer
- deliberate manner of harassing
- frau illegal method to get money
- number consists of 8 digits
- disrupt normal function of computer
Down
- code only understand by computer
- process to protect network
- act of sen misleading email
- blocking unauthorised access
- criminal activity using internet
- adding binary numbers
- protect computer from virus
15 Clues: adding binary numbers • hoaxing or misleading • process to protect network • act of sen misleading email • grooming online child abuse • illegal entry into computer • protect computer from virus • number consists of 8 digits • blocking unauthorised access • misusing personal information • deliberate manner of harassing • code only understand by computer • ...
U4 M35 The Social Security Program 2023-03-14
Across
- is a United States federal payroll(or employment) contribution directed towards both employees and employers to fund Social Security and Medicare
- Medicare Part D deals with ____ drug plans.
- President ______ signed the Social Security Act in 1935.
- The program works by using taxes paid into a trust fund to provide benefits to people who are eligible.
- is a tax withheld from an employee's salary by an employer who pays it to the government on their behalf.
- is the national health insurance program for people over the age of 65.
Down
- are things that produces good or helpful results or effects or that promotes well-being
- Medicare Part B deals with ____ insurance.
- Payment of monthly Social Security benefits began in _______ 1940.
- Social Security is not the only program that is designed to assist _______ citizens
- Medicare Part A deals with ____ insurance.
- Title II is what we know now as Social Security. In the original legislation, benefits were to be paid only to the _________ worker when he or she retired at age 65.
- The Social Security Act includes two major provisions: 1. Title I provides funds to support state _________ programs.
13 Clues: Medicare Part B deals with ____ insurance. • Medicare Part A deals with ____ insurance. • Medicare Part D deals with ____ drug plans. • President ______ signed the Social Security Act in 1935. • Payment of monthly Social Security benefits began in _______ 1940. • is the national health insurance program for people over the age of 65. • ...
Threads 2023-03-31
Across
- The organization behind India's first quantum-computing based telecom network link (4)
- A British computer built in the late 1940s that was used to break German codes during World War II (8)
- A type of attack that involves flooding a network with traffic to make it unavailable (4, 6)
- A type of wireless technology used for short-range communications (9)
- A type of AI that specializes in image processing and classification (3)
- A type of network topology in which all devices are connected to a central hub (4)
- A cryptocurrency exchange that was recently bankrupted due to lack of liquidity (3)
- This spice is now the name of an official Ubuntu Flavor (8)
- A type of storage device that uses flash memory (3)
- The CEO of YouTube who had recently stepped down (5, 8)
Down
- A type of security system that requires users to provide two forms of identification (3, 6, 14)
- An input device used to control the movement of a cursor (5)
- The newest rival to Twitch in live streaming, promising creator-friendly policies like a 95% revenue split (4)
- A type of machine learning that uses neural networks with multiple layers (4, 8)
- A type of cyber attack that involves tricking someone into revealing sensitive information (8)
- An app that notifies its users simultaneously everyday at a different time to capture and share a photo in 2 Minutes (6)
- The first commercially available computer, built in the US in the 1950s (6)
- It allows users to interact with electronic devices through graphical icons and audio indicators (3)
- An AI model that generates images from natural language descriptions, recently releasing its improved fifth version (10)
- It is often used to format the presentation of a web document (3)
20 Clues: A type of storage device that uses flash memory (3) • The CEO of YouTube who had recently stepped down (5, 8) • This spice is now the name of an official Ubuntu Flavor (8) • An input device used to control the movement of a cursor (5) • It is often used to format the presentation of a web document (3) • ...
FITCVOCABBRM 2013-05-15
Across
- sign that you would use for your shop.
- what you are talking about.
- A couple of words that gets people attention so they come to your store.
- Safety: Is when you have security for people trying to hack you.
- it says how many bars you have on your internet.
- the address of a cite.
- it is when you take someones idea.
- the brain.
- Engine: it is a website on the internet.
- device: a phone a ipad a movie player.
- the fifth biggest download.
- is the things you sell in your store or online.
- Is the internet your using.
- it is a commercial on the television.
- wifi stands for wireless Fidelity and it helps you go on the internet.
- The 4th biggest download.
- the word paper or the power point paper.
- the second biggest download.
Down
- port: where you plug in your headphones.
- Board: the heart of a computer.
- a watch with the hands.
- The third biggest download.
- It is when you are near someone and you hook up phones.
- a little folder you can save stuff in.
- them work at your place.
- They are a lot of folders.
- is an app that you can download games, tools and more.
- it is when people are looking for jobs and you are looking and maybe
- a hand object that you use to scroll.
- is usually in the store telling everything about the store.
- program like a power point but it is on the internet and you put facts
- sound in your headphones the music is audio.
- is the 6th biggest download.
- it is some type of electronic.
- it is the smallest download.
35 Clues: the brain. • the address of a cite. • a watch with the hands. • them work at your place. • The 4th biggest download. • They are a lot of folders. • what you are talking about. • The third biggest download. • the fifth biggest download. • Is the internet your using. • is the 6th biggest download. • the second biggest download. • it is the smallest download. • ...
Cybersecurity 2026-03-06
Across
- A prolonged, targeted attack where intruders gain access to a network and remain undetected.
- Requiring more than one method to verify a user's identity.
- A network of hijacked computers used to launch attacks like DDoS.
- A security system that monitors and controls incoming and outgoing network traffic.
- Any device connected to a network, such as laptops, phones, or servers.
- Software designed to disrupt, damage, or gain unauthorized access.
- Disguising a communication from an unknown source as being from a known, trusted source.
- Authorized simulated attacks on a system to evaluate its security.
- The process of verifying the identity of a user or system.
- The process of acquiring, testing, and installing code changes (patches) to fix vulnerabilities.
Down
- The unauthorized release or access of sensitive information.
- Using fraudulent emails or websites to trick users into revealing sensitive data.
- Routine practices to maintain system health and security.
- A method of guessing passwords or encryption keys through massive trial-and-error.
- A secure, encrypted connection between a user and a private network.
- Manipulating people into performing actions or divulging confidential information.
- Overwhelming a system with traffic to make it unavailable.
- Converting data into a coded form to prevent unauthorized access.
- Tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
- confidentiality, integrity, availability
- A security framework based on the philosophy "never trust, always verify"
- Malware that encrypts files and demands payment for the decryption key.
- Evidence on a network or operating system that indicates a security breach.
23 Clues: confidentiality, integrity, availability • Routine practices to maintain system health and security. • Overwhelming a system with traffic to make it unavailable. • The process of verifying the identity of a user or system. • Requiring more than one method to verify a user's identity. • The unauthorized release or access of sensitive information. • ...
Helloto 2025-11-19
Across
- – Strategically important town occupied one day after the Tehran Communique was signed.
- – 2005 Council of Europe document condemning the occupation of one member state’s territory by another.
- – OSCE mediation format created to negotiate a settlement of the Nagorno-Karabakh conflict.
- – Azerbaijani district whose occupation led to UN Security Council Resolution 822 in 1993.
- – Failed Soviet reform whose collapse helped ignite the Nagorno-Karabakh conflict.
- – UN Security Council resolution adopted after the occupation of Zangilan and Horadiz.
- – 1996 OSCE meeting where principles affirming Azerbaijan’s territorial integrity were adopted despite Armenia’s veto attempt.
- – UN Security Council resolution adopted after the occupation of Aghdam.
Down
- – 2007–2009 basic principles including liberation of territories, interim status and a future vote on Nagorno-Karabakh.
- – Agreement brokered by Iran on 7 May 1992 that failed when Shusha was occupied the next day.
- – Autonomous region that became the main subject of the Armenia–Azerbaijan conflict.
- – Azerbaijani town where a massacre of civilians took place during the conflict.
- – 2006 Vienna document whose principles later formed the basis of the Madrid Principles.
- – Principle invoked by Armenia to justify claims over Nagorno-Karabakh.
- – Negotiation track where Azerbaijani and Armenian foreign ministers met repeatedly from 2003–2004 onward.
- – 1994 document that established the ceasefire from 12 May 1994.
- – 1994 OSCE meeting where Minsk Group co-chairmanship and peacekeeping options were discussed.
- – UN Security Council resolution of October 1993 mentioning Nagorno-Karabakh as part of Azerbaijan.
- – First UN Security Council resolution demanding withdrawal from Kalbajar.
- – Main legal principle emphasized by Azerbaijan in negotiations over Nagorno-Karabakh.
20 Clues: – 1994 document that established the ceasefire from 12 May 1994. • – Principle invoked by Armenia to justify claims over Nagorno-Karabakh. • – UN Security Council resolution adopted after the occupation of Aghdam. • – First UN Security Council resolution demanding withdrawal from Kalbajar. • ...
Protective Security Crossword 2013-05-07
Across
- The catalogue of endorsed security devices
- Where you can share classified information by mistake if you are not careful
- Generally delivered by web sites or emails
- What we manage
- That thing you break by downloading movies without paying.
- That pirated software you downloaded last night.
- Easily tarnished by lax security
- What we do not want
- A good place to keep money or information
- Acronym for the spy inside
- Mandatory requirement
Down
- Instrument that governs protective security
- Tinned meat or unwanted email
- Unwanted attention from the Internet
- Someone who impersonates a tasty biscuit you dip in Salsa
- A person who pulls apart code
- Someone who wishes to remain unknown
- A hunting technique using an email bait
- A horse with a secret
19 Clues: What we manage • What we do not want • A horse with a secret • Mandatory requirement • Acronym for the spy inside • Tinned meat or unwanted email • A person who pulls apart code • Easily tarnished by lax security • Unwanted attention from the Internet • Someone who wishes to remain unknown • A hunting technique using an email bait • A good place to keep money or information • ...
Trading Options 2024-08-29
Across
- Transaction where investor pays premium
- An option that gives the holder the right to buy an asset at a specified price
- Strike + Premium or Strike - Premium depending on the strategy and price of an underlying stock where an option will neither realize a profit or loss
- Strategy where investor buys 100 shares of a security and simultaneously writes a call
- When the seller of an option contract must fulfill their obligation (at any time) to buy or sell the underling to the long holder of the option contract at the strike price
- To simultaneously close an option contract and open another contract with the same underlying security, but at a different strike price or expiration date
- When the underlying security is below the strike price for a call or above the strike price for a put
- An option that gives the holder the right to sell an asset at a specified price
- Phenomenon where time value decreases as the expiration date draws near
- Strategy where an investor writes a put and cash, or equivalent is set aside in case of assignment (strike price x 100)
Down
- A statistical measure of the dispersion of returns for a given security
- The date on which an option contract becomes void
- The price paid for an option contract
- An opening transaction that results in a short option position
- The use of borrowed capital to increase the potential return of an investment
- The predetermined price at which an option can be exercised
- For the long strategy, volatility is the name of the game. Composed of a long call and long put on the same underlying security with the same strike price and expiration date
- Transaction where investor receives premium
- When the underlying security is above the strike price for a call or below the strike price for a put
19 Clues: The price paid for an option contract • Transaction where investor pays premium • Transaction where investor receives premium • The date on which an option contract becomes void • The predetermined price at which an option can be exercised • An opening transaction that results in a short option position • ...
Digital Citizenship 2021-12-08
Across
- to keep myself safe online, I should always make my profile ______
- When we are online we should always be thinks about the _____ of ourselves and others.
- One way to get a cyber-bully to stop is to _____ them which doesn't allow them to see your profile anymore.
- the trail of data you create when you go online.
- when I see cyber bullying I show _____ for the bully and the bullied, because you never know what someone else is going through
Down
- Your _______ should never have your real name in it.
- bullying online
- you should never share your ______ information online.
- when online I make sure to create a strong _____ with letters numbers and symbols
- set of proper guidelines we should follow online
- If someone is being unkind on a game you're playing, you can ______ them to the game moderator
11 Clues: bullying online • set of proper guidelines we should follow online • the trail of data you create when you go online. • Your _______ should never have your real name in it. • you should never share your ______ information online. • to keep myself safe online, I should always make my profile ______ • ...
Seminar 2 Crossword 2013-07-09
Across
- Confidentiality; Integrity; Availability
- The breaking into of telephone systems
- The appropiate word for intruding into a system without permission
- A person, usually an employee, that deliberately breaks into a system to assess security deficiencies
- Used to describe any areas of a system that is open to a possible attack
- The process of reviewing firewall logs, records, and procedures
- A text file on a computer that a browser creates and stores on the hard drive
- Seeks to compromise a DNS server so that users are redirected to malicious websites
- Generic term for software that has a malicious purpose
- Slang term used in movies and in the news to describe any person who breaks into a computer system
- Software that literally spies on what you do on a computer
Down
- A barrier between a network and the outside world
- The most basic security activity that determines if credentials are authorized for access
- A technique for breaching a systems's security by exploiting human nature rather than technology
- Locating wireless networks to gain access to a system
- This type of detection system works to detect attempts to circumvent security measures
- A security approach in which not only is the perimeter secured, but also individual systems within the network are secured
- Appears to be benign software but secretly downloads a virus to the computer from within
- Designed to prevent legitimate access to a system
- A device that hides the internal network's IP addresses and presents a single IP address (it's own) to the outside world
20 Clues: The breaking into of telephone systems • Confidentiality; Integrity; Availability • A barrier between a network and the outside world • Designed to prevent legitimate access to a system • Locating wireless networks to gain access to a system • Generic term for software that has a malicious purpose • Software that literally spies on what you do on a computer • ...
Airport Safety & Security 2025-07-12
Across
- Monitoring for suspicious activity
- Area where passengers board the aircraft
- Permission from air traffic control to proceed
- Paved area for aircraft movement
- Where aircraft are parked, loaded, and refueled
- Safety instructions given to crew
- Path for aircraft to move between runway and gate
- The passenger area of an airport
- Where passengers are dropped off or picked up outside the terminal
- Restricted area past security and customs
- Public area of the airport before security
- To exit the aircraft
Down
- Items passengers check in or carry on
- Emergency medical help
- Emergency removal of passengers from aircraft
- Team or measures ensuring safety in airports
- Device used in passenger screening
- Surface where planes take off and land
- Badge|Required for employees to access secure zones
- Unlawful seizure of an aircraft
20 Clues: To exit the aircraft • Emergency medical help • Unlawful seizure of an aircraft • Paved area for aircraft movement • The passenger area of an airport • Safety instructions given to crew • Monitoring for suspicious activity • Device used in passenger screening • Items passengers check in or carry on • Surface where planes take off and land • ...
Networking + Cyber Ethics 2025-05-30
Across
- Unwanted email
- Device that connects networks
- Crime involving computers
- Someone who breaks into networks
- Secret code for access
- Keeps your device safe
- Short for Internet Protocol
- Tells the computer where to send data
- Connecting two or more computers
Down
- Device used to connect to the internet
- Data protection rules you must follow
- Large network of networks
- Safe online behavior
- A set of connected computers
- You must not copy others' work
- Type of network at home
- Fake website to steal info
- File spreader with viruses
18 Clues: Unwanted email • Safe online behavior • Secret code for access • Keeps your device safe • Type of network at home • Crime involving computers • Large network of networks • Fake website to steal info • File spreader with viruses • Short for Internet Protocol • A set of connected computers • Device that connects networks • You must not copy others' work • Someone who breaks into networks • ...
Digital Citizenship :D 2025-07-16
11 Clues: Online • Chatgpt • Digital • Worldwide • To uplift others • Something we all use • Inhabitant of a place • Meeting new people online • what the internet is made of • An annoying person who tricks you • This can protect you from scams and cyber attacks (I think)
Presley's Dictionary 2023-11-27
Across
- a video camera connected to a computer.
- a network security device that monitors incoming and outgoing network traffic
- a wireless connection that connects you to the internet through radio waves
- something that typically has a touch screen and internet access.
- it can hold and transfer data
- the responsibility use of the technology you use
- information that is easy to access which can include management
- a high-capacity, self-contained storage device.
- when you tell the readers that your source came with another writer
- it is made to sit on a table or desk.
- a electronic device with a screen which puts out pixels
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection
- transmits data and connects different networks together
Down
- Somewhere that you can store pictures and files.
- it manages a computers memory, software and hardware.ci
- a type of online fraud where a cyber criminal designs a fake online identy to exposit the victims idenity
- a peripheral device that enables a user to input text into a computer or any other electronic machinery.
- global network of billions of computers and other electronic devices
- a sequence of characters or encoded information identifying when a certain event occurred
- a web centric computer that runs through google.
- A computer that is suitable for use while travelling.
- It brings you to a certain website or page, the address.
- text files with small pieces of data like a username and password
- an application for accessing websites and the Internet.
- is a common interface that enables communication between devices
25 Clues: it can hold and transfer data • it is made to sit on a table or desk. • a video camera connected to a computer. • a high-capacity, self-contained storage device. • Somewhere that you can store pictures and files. • the responsibility use of the technology you use • a web centric computer that runs through google. • A computer that is suitable for use while travelling. • ...
Marleigh's Dictionary 2023-11-27
Across
- When you tell readers where your sources came from
- A video camera that is connected to a computer
- A Personal computer usually located on a desk or table
- the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
- An application for accessing websites on the internet
- A type of online fraud where a cyber criminal designs a fake online indenty
- connects peripheral devices
- The responsibility of use of the technology you use and own to communication with society.
- An electronic device used for storing and processing data
- An electronic device with a screen which puts out pixels to show a display.
- It takes the signals that come from your Internet Service Provider, or ISP, and translates them into an Internet connection for your WiFi router to broadcast.
- Device used to input text into a computer
- A network security device that monitors network traffic
- A place where you can store pictures and files
- Opposite of saftware
- A unit used to show the amount of storage you have
Down
- Interconnected computing devices that can exchange data and share resources with each other.
- It manages the computer's memory and processes, as well as all of its software and hardware.
- Opposite of hardware
- text files with small pieces of data
- A program that searches for and identifies items in a database
- High capacity self contained storage device
- Mobile phone that performs many functions
- Global network of billions of computers and other devices
- Wireless conection that connects you to the internet
25 Clues: Opposite of hardware • Opposite of saftware • connects peripheral devices • text files with small pieces of data • Mobile phone that performs many functions • Device used to input text into a computer • High capacity self contained storage device • A video camera that is connected to a computer • A place where you can store pictures and files • ...
Chapter 11-12 2023-01-06
Across
- ensuring that every individual has an equal opportunity to make the most of their lives and talents
- body of law that outlines rules on settling disputes between individuals
- Pierre Trudeau added this to the constitution in 1982
- a sentence or a part of a sentence that you serve in the community
- the single unified source of expert advice guidance services and support on cyber security for Canadians
- jurisdiction embraces both the civil law of the province of Quebec and the common law of the other nine provinces and three territories
- British Columbia's superior trial court
- law established by an act of the legislature that is signed by the executive
- local law
- a federal law that includes definitions of most of the criminal offences that the Parliament of Canada has enacted
Down
- a combination of common law and civil law
- to deal with all criminal matters except murder committed by adults and certain other, very serious offences, such as treason
- protect the public by holding youth accountable, by preventing crime and by rehabilitating and reintegrating youth in the community
- regulates and supervises broadcasting and telecommunications in the public interest
- outlined the rights and freedoms everyone is entitled to
- a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority
- principle under which all persons, institutions, and entities are accountable to laws that are
- gives parliaments in Canada the power to override certain portions of the charter for five-year terms when passing legislation
- restoring someone to health or normal life through training and therapy
- the highest court in the province
20 Clues: local law • the highest court in the province • British Columbia's superior trial court • a combination of common law and civil law • Pierre Trudeau added this to the constitution in 1982 • outlined the rights and freedoms everyone is entitled to • a sentence or a part of a sentence that you serve in the community • ...
WMC 2023-09-20
Across
- A system used to verify that a user is human and not a computer bot.
- A saved copy of data used to restore in case of data loss.
- Software designed to infiltrate or damage computer systems.
- Small piece of data stored on a user's computer by the web browser while browsing a website.
- Not a digital bird, but someone overly paranoid about online security!
- A less-than-proficient hacker, maybe more of a couch potato.
- Secure connection between your device and the internet.
- Software designed to identify and stop malicious software.
- A collection of software and tools to make phishing campaigns easier for attackers.
- A network of private computers infected with malicious software and controlled as a group.
- Malicious entities or individuals who conduct harmful cyber operations.
- Malicious software that records every keystroke to secretly gather personal information.
- Targeted phishing attempts directed at specific individuals or companies.
Down
- A secret combination, often alphanumeric, used for authentication.
- Unsolicited and irrelevant messages sent over the internet.
- Confirming the truth of an attribute of a single piece of data or an entity.
- A trap set to detect, deflect, or counteract unauthorized use of information systems.
- Voice-based phishing where attackers use phone calls to deceive victims.
- Phishing attacks that are executed via SMS.
- A deceptive attempt to obtain sensitive information by masquerading as a trustworthy entity.
- Process of converting information to code to prevent unauthorized access.
- AI-generated fake content, often video, that looks convincingly real.
- An authentication method that requires two separate pieces of evidence.
- Imitating a trustworthy source in an attempt to deceive.
- An encrypted online environment not indexed by traditional search engines.
25 Clues: Phishing attacks that are executed via SMS. • Secure connection between your device and the internet. • Imitating a trustworthy source in an attempt to deceive. • A saved copy of data used to restore in case of data loss. • Software designed to identify and stop malicious software. • Unsolicited and irrelevant messages sent over the internet. • ...
RU ITEC411 Crime 2025-11-23
Across
- someone who uses technical skills to explore, access, or break into computer systems
- fake emails that try to fool you into clicking links or sharing login information
- scrambling data so only someone with the right key can read it
- malicious code that attaches to programs and spreads when those programs run
- tricking people into giving up passwords or sensitive information
- a security professional who uses hacking skills to test and improve defenses
- an attack that floods a site or server with traffic so real users can’t reach it
- any harmful software designed to damage systems, steal data, or cause problems
- using hacking skills to make a political point or support a cause
- a self-spreading program that moves across computers on its own and can clog networks
- written statements that falsely harm someone’s reputation
Down
- the main U.S. law that makes unauthorized computer access a crime
- when someone steals personal information to pretend to be someone else
- redirecting a user to a fake website even when they typed the real one
- text message scams that ask for personal or financial information
- a malicious hacker who breaks into systems for theft, disruption, or profit
- a group of infected computers secretly controlled by an attacker
- investigating digital evidence to figure out what happened in a cyber incident
- getting into a computer system without permission, usually by finding weaknesses to exploit
- identification using physical traits like fingerprints, face, or iris patterns
- technology that figures out a user’s real-world location based on Internet data
- phone calls pretending to be from a real company to steal account details
22 Clues: written statements that falsely harm someone’s reputation • scrambling data so only someone with the right key can read it • a group of infected computers secretly controlled by an attacker • the main U.S. law that makes unauthorized computer access a crime • text message scams that ask for personal or financial information • ...
Internet of Things Crossword 2022-11-30
Across
- Characteristic of IOT that helps growth.
- This Cloud provider has 40% (the highest) market share in IOT.
- Connected devices exchanging data with each other.
- Device used to collect measurements.
- Smart*Something* that coordinates energy use and distribution.
- Language that can be used for IOT analytics.
- By 2027, the global IOT market will grow to $1.4 *Something*
- This type of computing uses the device to perform processing and analytics.
- An industry that uses IOT.
- Secure protocol for connecting to IOT devices.
- Is made up of IOT devices that manage utilities, energy, traffic, water and waste management (Two words, 5 letters - 4 letters).
- This protocol has 128 bits in its address.
- The most common cyber attack using IOT devices.
- A very small, single user area network.
- The network the IOT relies on.
- Top connectivity protocol for IOT devices.
Down
- The amount of data generated by 2025 will be 73 *Something*Bytes?
- IOT devices and sensors connect to a centralised hub.
- IIOT.
- This multinode network structure connect dynamically through multiple routers. Provides redundancy and failover.
- Small tags that use radio frequencies to transfer data on the internet.
- The IOT device that performs calculations.
- Where an IOT device might connect to.
- Devices such as smart watches, fitness bands, smart glasses.
- Very large dataset (Two words, 3 letters - 4 letters).
- One of the biggest challenges in IOT.
- Internet Protocol suite used across the internet (3 letters / 2 letters).
- The "OS" that is the most popular for IOT.
- In 2027, it is predicted that there will be 41 *Something* IOT devices.
- A small device, with a sensor, that can do some processing and is connected to the internet.
30 Clues: IIOT. • An industry that uses IOT. • The network the IOT relies on. • Device used to collect measurements. • Where an IOT device might connect to. • One of the biggest challenges in IOT. • A very small, single user area network. • Characteristic of IOT that helps growth. • The IOT device that performs calculations. • This protocol has 128 bits in its address. • ...
Cyber Bullying 2021-04-26
Across
- defines cyber bullying as a form of bullying through digital technology
- 3words support line for kids phone number 1800 55 1800
Down
- Trisha Prabhu designed this app to prevent cyber bullying
- bullying online is easier because then they can remain _____
- 1 in 5 _____ young people have reported being cyber bullying
5 Clues: 3words support line for kids phone number 1800 55 1800 • Trisha Prabhu designed this app to prevent cyber bullying • bullying online is easier because then they can remain _____ • 1 in 5 _____ young people have reported being cyber bullying • defines cyber bullying as a form of bullying through digital technology
Crossword 2023-05-24
Across
- The practice of using multiple authentication factors to verify identity.
- The device that emits a loud sound when smoke or fire is detected.
- Security measure that verifies the integrity and authenticity of a message
- which type of fire is classified in E class fire _____________
- A set of instructions or guidelines that outline the organization's security policies and procedures.
- Security breach caused by tricking someone into revealing sensitive information
Down
- Technique used to verify the identity of a user
- Employees should never share their _______ with others or write them down in easily accessible locations
- The intentional and unauthorized accessing, use, or disclosure of information.
- Frisking check will be carried out by ________ security guard for all team members while going shift out.
- Physical barriers to restrict access to a secure area
- The practice of reviewing and analyzing system logs to identify potential security issues is called
- The process of encoding data to prevent unauthorized access.
- Unauthorized copying or distribution of copyrighted material
14 Clues: Technique used to verify the identity of a user • Physical barriers to restrict access to a secure area • The process of encoding data to prevent unauthorized access. • Unauthorized copying or distribution of copyrighted material • which type of fire is classified in E class fire _____________ • The device that emits a loud sound when smoke or fire is detected. • ...
Protective Security Crossword 2013-05-07
Across
- The catalogue of endorsed security devices
- Where you can share classified information by mistake if you are not careful
- Generally delivered by web sites or emails
- What we manage
- That thing you break by downloading movies without paying.
- That pirated software you downloaded last night.
- Easily tarnished by lax security
- What we do not want
- A good place to keep money or information
- Acronym for the spy inside
- Mandatory requirement
Down
- Instrument that governs protective security
- Tinned meat or unwanted email
- Unwanted attention from the Internet
- Someone who impersonates a tasty biscuit you dip in Salsa
- A person who pulls apart code
- Someone who wishes to remain unknown
- A hunting technique using an email bait
- A horse with a secret
19 Clues: What we manage • What we do not want • A horse with a secret • Mandatory requirement • Acronym for the spy inside • Tinned meat or unwanted email • A person who pulls apart code • Easily tarnished by lax security • Unwanted attention from the Internet • Someone who wishes to remain unknown • A hunting technique using an email bait • A good place to keep money or information • ...
Security check 2024-06-27
13 Clues: płyn • zgłaszać • przejść (dalej) • wsiąść (na pokład) • ... free - bezcłowy • tacka (przy taśmie) • ... up - pospieszyć się • ... around - obrócić się • ... out - wyjąć (z plecaka) • last ... - ostatnie wezwanie • ... on - założyć (na siebie) • ... check - kontrola osobista • ... the flight - przegapić lot
Information Security 2023-08-28
Across
- intent of doing harm
- requirement of being private or secret
- procedure to determine user privileges or access to programs
- info or data which can be accessed when needed
- gap or weakness which undermines an organization's security
Down
- network of computers and devices managed as a unit with procedures and rules
- how information is protected
- short for "malicious software" and covers threats such as viruses, worms, Trojan horse, ransom ware,and the numerous other programs used by hackers to gain or access or damage computer programs
- macros which have been coded with malicious intent
- calculated assessment of potential threats to an organizations security
- making sure a person is who they say they are
- state of being complete or uncorrupted
- rights an individual or organization has over info and how it is used
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • state of being complete or uncorrupted • making sure a person is who they say they are • info or data which can be accessed when needed • macros which have been coded with malicious intent • gap or weakness which undermines an organization's security • ...
Food security 2024-12-17
Across
- Large marsupial
- We eat this animal from the sea or rivers
- Has a trunk
- Pollinator that plays a critical role in food production
- This animal helps carry things and gives wool
Down
- Poultry raised for eggs
- Small animal raised
- Man's best friend
- This animal helps people on farms and can be ridden
- Animal raised for wool
- Likes to chase mice
- This animal gives milk and is important in the desert
- Flying mammal
13 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Small animal raised • Likes to chase mice • Animal raised for wool • Poultry raised for eggs • We eat this animal from the sea or rivers • This animal helps carry things and gives wool • This animal helps people on farms and can be ridden • This animal gives milk and is important in the desert • ...
Data Security 2025-01-20
Across
- Maintaining the accuracy and completeness of data.
- An unauthorized access or exposure of sensitive data.
- Ensuring that information is accessible only to those authorized to have access.
- Adhering to data protection regulations.
- A copy of data stored separately to protect against data loss.
- A weakness that can be exploited.
Down
- The process of converting information into a secure format to prevent unauthorized access.
- The technique of obscuring specific data within a database to protect sensitive information.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Verifying the identity of a user or system before granting access.
- An event that compromises data security.
- Data Loss Prevention, strategies to prevent data breaches.
- The potential for loss or damage.
13 Clues: A weakness that can be exploited. • The potential for loss or damage. • An event that compromises data security. • Adhering to data protection regulations. • Maintaining the accuracy and completeness of data. • An unauthorized access or exposure of sensitive data. • Data Loss Prevention, strategies to prevent data breaches. • ...
Food Security 2024-10-17
Across
- A is a kitchen device that can ensure food is cooked to a proper temperature
- What temperature does poultry need to reach to be food safe?
- Leftovers should be put in the refrigerator or freezer within
- Four steps to help you tackle bacteria.
- It is recommended to wash hands with warm water and soap for seconds
Down
- Simplify cooking with frozen foods by following these for optimal safety and quality
- What is not a food safety step when preparing raw meat or poultry?
- While everyone is at risk of ayoung children and elderly people have a higher risk
- Only food that contains flour when it is fully cooked.
- What foodborne pathogen is often linked to raw eggs?
- To avoid cross contamination, keep raw meat from produce
- Start out with hands, surfaces and utensils before cooking.
- The refrigerator is the best place to perishables.
13 Clues: Four steps to help you tackle bacteria. • The refrigerator is the best place to perishables. • What foodborne pathogen is often linked to raw eggs? • Only food that contains flour when it is fully cooked. • To avoid cross contamination, keep raw meat from produce • Start out with hands, surfaces and utensils before cooking. • ...
Food security 2024-11-28
Across
- - Energy-rich molecules, often sweet and starchy
- - Amount of agricultural produce harvested per unit of land area
- - Plants cultivated for food, especially on a large scale
- - Extended period of water scarcity affecting crop yields
- - Essential vitamins and minerals required in small amounts
- - Lack of proper nutrients
- - Long-term maintenance of food production without depleting resources
Down
- - Relating to the handling and storage of crops after collection
- - Artificial application of water to land for growing crops
- - Removal and destruction of a forest or stand of trees from land that is then converted to non-forest use
- - Unwanted intruders spoiling kitchen cleanliness
- - Essential building block for body tissues
- - Variety of plant and animal life in a particular habitat
13 Clues: - Lack of proper nutrients • - Essential building block for body tissues • - Energy-rich molecules, often sweet and starchy • - Unwanted intruders spoiling kitchen cleanliness • - Plants cultivated for food, especially on a large scale • - Extended period of water scarcity affecting crop yields • - Variety of plant and animal life in a particular habitat • ...
Security Terminology 2025-09-08
Across
- direct and deliberate observation of people and/or property
- device triggered by a person and designed to alert others (authorities) in emergency situations
- device which announces an alarm via sound, light or other means
- armor-plated truck with strong locks and doors which is operated by armed personnel and used to transport currency and other valuables
- equipped with a firearm
- pre-recorded message to be used in case of an emergency
Down
- test performed under conditions as close to as possible to real-world conditions
- device which, when triggered, alerts security personnel and/or police of disturbance without the knowledge of the intruder or criminal
- inquiry into the history, behaviors and character of an individual
- program which detects and removes computer viruses
- risk remaining after measures are taken to reduce or eliminate risk
- any property, tangible or intangible, which is owned by an individual or company and can be assigned a monetary value
- system of sensors, controls and annunciators arranged to detect and report an intrusion or other emergency
13 Clues: equipped with a firearm • program which detects and removes computer viruses • pre-recorded message to be used in case of an emergency • direct and deliberate observation of people and/or property • device which announces an alarm via sound, light or other means • inquiry into the history, behaviors and character of an individual • ...
Application Security 2025-09-03
Across
- Injection attack that tricks a database.
- Secret string used for login.
- Verifying who is accessing the system.
- Confidence that users have in an application.
- Scrambling data so it can’t be read if stolen.
- Writing software instructions for a computer.
- Tool that scans code before deployment.
- Blocks attacks on applications.
Down
- Checking user input for safety.
- Improves or secures software.
- List of the top 10 application risks.
- Decides what a user can do.
- A small software fix.
13 Clues: A small software fix. • Decides what a user can do. • Improves or secures software. • Secret string used for login. • Checking user input for safety. • Blocks attacks on applications. • List of the top 10 application risks. • Verifying who is accessing the system. • Tool that scans code before deployment. • Injection attack that tricks a database. • ...
Security igcse 2025-10-07
Across
- uses a private key and a public key
- when the computer asks users if they are sure they want to carry out instructions
- a type of software which may track user behavior to display targeted ads based on their interests
- one method for avoiding acccidental data loss
- an attack on a server designed to deny service coming from multiple computers
Down
- sits between the main server and the internet and protects the main server from attacks
- programs that collect personal or sensitive data then send them to another device
- when an authentic-looking message or email tries to trick you into sending sensitive data
- malicious software which tricks you into visiting false websites and giving sensitive data
- a program that disguises itself as another programs, when run it deletes and corrupts files
- a security technology that monitors a computer’s incoming and outgoing traffic
- programs that replicate themselves over and over and fill the computer storage
- self-replicating software which can delete and corrupt files
13 Clues: uses a private key and a public key • one method for avoiding acccidental data loss • self-replicating software which can delete and corrupt files • an attack on a server designed to deny service coming from multiple computers • a security technology that monitors a computer’s incoming and outgoing traffic • ...
riley k ict quiz 2026-03-25
6 Clues: circle in a data flow diagram • first thing to do after a cyber attack • how many people are in a collaboration • fourth thing to do after a cyber attack • the thing protecting rainbow six siege from cheaters • whats protecting businesses from people copying them
Security 2022-02-24
Across
- a secret code used to gain access
- when something that is usually protected, is no longer secure
- it protects your computer from attacks via email of the Internet
- a system to allow you to watch what is happening in other parts of the building
Down
- actions taken to deter people like hackers or
- without the right to look at or use something, i.g. personal information, on the computer
- it allows you to see inside bags
- stealing people's personal information and using it
8 Clues: it allows you to see inside bags • a secret code used to gain access • actions taken to deter people like hackers or • stealing people's personal information and using it • when something that is usually protected, is no longer secure • it protects your computer from attacks via email of the Internet • ...
Security 2022-01-25
Across
- a device making a loud noise that gives warning of a fire.
- a length of thick strong cord made by twisting together strands of hemp.
- a lamp with a transparent case protecting the electric bulb, and a handle by which it may be carried.
Down
- a covering for the hand worn for protection against cold or dirt.
- directions, detailed information about how something should be done.
- a hard or padded protective hat.
- a covering for all or part of the face to protect against air pollutants.
- a strip to fasten in a car.
8 Clues: a strip to fasten in a car. • a hard or padded protective hat. • a device making a loud noise that gives warning of a fire. • a covering for the hand worn for protection against cold or dirt. • directions, detailed information about how something should be done. • a length of thick strong cord made by twisting together strands of hemp. • ...
Security 2024-08-24
Across
- something that is used to helps prevent an electronic from a virus
- some form of security that is mostly used for extra security for an app sometimes using another app to confirm it is you
- something usually used to defend yourself
Down
- something that sometimes has a three digit code that holds secures chains and heavy duty things
- something used to see past and live footage of any break in to protect your home
- usually a four digit code that protects phones
- something that is meant to protect your electronic from hackers
- something used to prevent people from accessing whatever has a password
8 Clues: something usually used to defend yourself • usually a four digit code that protects phones • something that is meant to protect your electronic from hackers • something that is used to helps prevent an electronic from a virus • something used to prevent people from accessing whatever has a password • ...
Security 2026-01-30
Across
- Staying online even during failures
- Math that protects data and messages
- Rewards and penalties that shape behavior
- Minimum agreement needed to act
- Returns earned for honest participation
Down
- Backup validators ready to step in
- Financial rules that discourage attacks
- Tokens locked to secure the network
8 Clues: Minimum agreement needed to act • Backup validators ready to step in • Staying online even during failures • Tokens locked to secure the network • Math that protects data and messages • Financial rules that discourage attacks • Returns earned for honest participation • Rewards and penalties that shape behavior
GOLD LOANS 2020-01-08
15 Clues: Expert • Valuable • Register • Jewellery • Bullion gold • Security type • Precious metal • Specially minted • single repayment • Used to test purity • Additional security • Variant of gold loan • Gold with Cadmium alloy • Method of testing purity • Unit for measuring purity and weight of gold
TKeefer Network devices 2023-01-03
Across
- hardcodedbymanufacturerofnic
- improve security
- connecttointernet
- builds up IDS traffic
- access to wireless devices
- recievedataononeportandsendofftootherports
- way to power devices with no power available
- like legacy but have embedded microchips
- formfactorfornic
- provides an endpoint
Down
- usedtorepairweaksignals
- protects stuff from unwanted access
- divideLANsintosegmants
- connectswirelessconnections
- used to collect incoming cables
- connects devices to the network
- all in one security
- monitor traffic
- no longer supported, still in operation
19 Clues: monitor traffic • improve security • formfactorfornic • connecttointernet • all in one security • provides an endpoint • builds up IDS traffic • divideLANsintosegmants • usedtorepairweaksignals • access to wireless devices • connectswirelessconnections • hardcodedbymanufacturerofnic • used to collect incoming cables • connects devices to the network • protects stuff from unwanted access • ...
Cisco Security & Duo Security In-depth 2020-07-31
Across
- This Cisco product analyzes network traffic?
- Cisco's 1st line of security in the cloud?
- What kind of protection does Cisco AMP provide?
- A type of trust strategy that Duo uses?
- Competitor of Cisco's Duo User Authentication?
- What does Cisco's ESA/CES protect?
- Competitor of Cisco's Fore Power?
- Industry-leading threat and malware protection?
Down
- A type of second source validation?
- Cisco Firepower is a next generation?
- Competitor of Cisco's Email Security?
- Duo uses how many levels of authentication?
- Competitor of Cisco's Duo Access Management?
- A type of access Duo provides for a distributed workforce?
- Competitor of Cisco's Stealthwatch?
- Competitor of Cisco's Umbrella?
- Competitor of Cisco's AMP?
17 Clues: Competitor of Cisco's AMP? • Competitor of Cisco's Umbrella? • Competitor of Cisco's Fore Power? • What does Cisco's ESA/CES protect? • A type of second source validation? • Competitor of Cisco's Stealthwatch? • Cisco Firepower is a next generation? • Competitor of Cisco's Email Security? • A type of trust strategy that Duo uses? • Cisco's 1st line of security in the cloud? • ...
bullying 2022-10-20
9 Clues: hurting • being mean • saying mean • spreading rumors • excluding people • sending mean messages • repeatedly being mean • saying you will be mean • making you do things you don't want to
Network Security 2013-08-27
Across
- typical exploit used with bad programming
- type of vulnerability typically used by attackers
- how antivirus software detects viruses
- A ______ attack is a technique where every single combination is tested
- Intrusion ______ Systems are considered passive systems
- MD5 is a ______
Down
- self replicating malware on execution
- ______ testing is a test carried out by sec professionals to check a system
- computer system designed to trap attackers and spam
- number one reconnaissance tool used
- monitoring only does not ______ an attacker
- Using a proxy could be considered to be a man-in-the-______ attack
- malware disguised as a useful application
13 Clues: MD5 is a ______ • number one reconnaissance tool used • self replicating malware on execution • how antivirus software detects viruses • typical exploit used with bad programming • malware disguised as a useful application • monitoring only does not ______ an attacker • type of vulnerability typically used by attackers • computer system designed to trap attackers and spam • ...
I.T. Security 2014-04-13
Across
- Programs designed to gain access to a computer without the user´s authorization.
- A program that appears to be useful but in reality it damages the system.
- Showing desire to cause harm.
- Software that replaces the user´s search engine.
- A failure in security.
- Softare that send information about the use of the system.
- A program that limits the data that can pass through a network and protects the user´s machine from damage or infection.
- A program that automatically downloads advertisements to your computer
Down
- Software used for scanning and removing viruses from your computer.
- Malicious programs that copy themselves into other programs and cause system problems.
- A string of characters used for authenticating a user on a computer system.
- The coding of information so that it can only be decoded and read by someone who has the correct decoding key.
- A person who can gain unauthorized access to other computers.
13 Clues: A failure in security. • Showing desire to cause harm. • Software that replaces the user´s search engine. • Softare that send information about the use of the system. • A person who can gain unauthorized access to other computers. • Software used for scanning and removing viruses from your computer. • ...
Security Systems 2016-05-24
Across
- protection from harm
- protected and not in danger
- to stop something from happening
- unwanted junk mail
- something that may cause damage
- software that tries to prevent problems
- to ruin something
- an operating system
Down
- an electronic message
- an electronic device that stores and processes data
- program that protects your computer from harm
- program designed to destroy your computer
- someone who breaks into computer systems
13 Clues: to ruin something • unwanted junk mail • an operating system • protection from harm • an electronic message • protected and not in danger • something that may cause damage • to stop something from happening • software that tries to prevent problems • someone who breaks into computer systems • program designed to destroy your computer • program that protects your computer from harm • ...
Security Guides 2023-09-21
Across
- First suggested response method directed by the Department of Homeland Security in the case of an active shooter
- How often is an annual audit of credit union keys completed?
- How often is the burglary alarms tested?
- The wrongful use of force, intimidation, or authority to obtain money, property or other benefits
- Who does LMCU use for currency transportation?
- What is more important to the credit union than the safety and security of its employees?
- What must be documented each day when opened?
Down
- What radio do we listen to for weather alerts and warnings?
- Person responsible for the issue and retrieval of all keys
- How often does the security department review the CCTV systems?
- How many days are video images stored for?
- Must be verified within 24 hours of receipt
- The signal used to indicate that the building is safe to enter
13 Clues: How often is the burglary alarms tested? • How many days are video images stored for? • Must be verified within 24 hours of receipt • What must be documented each day when opened? • Who does LMCU use for currency transportation? • Person responsible for the issue and retrieval of all keys • What radio do we listen to for weather alerts and warnings? • ...
SECURITY MEETING 2024-06-10
Across
- PROHIBITED WITHOUT APPROVAL
- PROGRAM TO REPORT THREATS AGAINST THE BANK
- 3 POTENTIAL COURSES OF ACTION
- EMPLOYEES RESPONSIBLE FOR SIGNING
- NUMBER OF COURSES OF ACTIONS
Down
- IN MOST CASES USES A FIREARM
- DO NOT ATTEMPT TO MOVE
- REVIEWED ANNUALLY AND REVISED
- COMPLY WITH REGULATIONS OF
- REPORT FILED
- DEPARTMENT TO ENGAGE WITH EMERGENCY RESPONDERS
- MUST USE ACTIVE SHOOTER MEDIA STATEMENT
- MONTHLY TRAINING
13 Clues: REPORT FILED • MONTHLY TRAINING • DO NOT ATTEMPT TO MOVE • COMPLY WITH REGULATIONS OF • PROHIBITED WITHOUT APPROVAL • IN MOST CASES USES A FIREARM • NUMBER OF COURSES OF ACTIONS • REVIEWED ANNUALLY AND REVISED • 3 POTENTIAL COURSES OF ACTION • EMPLOYEES RESPONSIBLE FOR SIGNING • MUST USE ACTIVE SHOOTER MEDIA STATEMENT • PROGRAM TO REPORT THREATS AGAINST THE BANK • ...
Security Puzzle 2024-09-10
Across
- Virus yang menyamar sebagai perangkat lunak yang sah atau berguna, namun memiliki niat jahat.
- Protokol keamanan yang digunakan untuk memastikan komunikasi yang aman melalui internet.
- Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah.
- Protokol untuk mengamankan transfer file di jaringan komputer
- Pengujian terhadap sistem untuk menemukan celah atau kelemahan dalam sistem keamanan disebut testing.
- Serangan yang berusaha membuat layanan tidak dapat diakses oleh pengguna.
- Serangan dengan cara menebak-nebak password sampai berhasil.
- Proses verifikasi identitas pengguna disebut authentification.
Down
- Penggunaan firewall bertujuan untuk memfilter dan mengontrol data.
- Sebuah program yang dapat menggandakan diri dan menyebar ke komputer lain tanpa izin.
- Istilah untuk menggambarkan pencurian identitas online untuk tujuan yang merugikan.
- Proses untuk mengubah data menjadi bentuk yang tidak dapat dibaca tanpa kunci khusus.
- Istilah untuk menggambarkan akses yang tidak sah ke sistem atau jaringan komputer.
13 Clues: Serangan dengan cara menebak-nebak password sampai berhasil. • Protokol untuk mengamankan transfer file di jaringan komputer • Proses verifikasi identitas pengguna disebut authentification. • Penggunaan firewall bertujuan untuk memfilter dan mengontrol data. • Teknik yang digunakan untuk memalsukan alamat IP agar terlihat sah. • ...
Resource Security 2025-06-19
Across
- Build up of water behind a dam.
- Barrier built across a river to create a reservoir.
- lack of enough safe and nutritious food to remain healthy & active.
- Inability of a population to safeguard sustainable access to adequate quantities of acceptable quality water.
- Extracting too much water from a ground source.
- Expensive and energy intensive process to turn salt water into fresh water.
- Underground water store in permeable rock.
Down
- when more water is withdrawn than a region can sustainably support.
- ability of a country to produce the resources it needs, without relying on other countries.
- Lack of proper nutrition.
- Supply of water to crops.
- Severe and prolonged shortage of food.
- - Relating to money and jobs.
13 Clues: Lack of proper nutrition. • Supply of water to crops. • - Relating to money and jobs. • Build up of water behind a dam. • Severe and prolonged shortage of food. • Underground water store in permeable rock. • Extracting too much water from a ground source. • Barrier built across a river to create a reservoir. • ...
Security igcse 2025-10-07
Across
- uses a private key and a public key
- when the computer asks users if they are sure they want to carry out instructions
- a type of software which may track user behavior to display targeted ads based on their interests
- one method for avoiding acccidental data loss
- an attack on a server designed to deny service coming from multiple computers
Down
- sits between the main server and the internet and protects the main server from attacks
- programs that collect personal or sensitive data then send them to another device
- when an authentic-looking message or email tries to trick you into sending sensitive data
- malicious software which tricks you into visiting false websites and giving sensitive data
- a program that disguises itself as another programs, when run it deletes and corrupts files
- a security technology that monitors a computer’s incoming and outgoing traffic
- programs that replicate themselves over and over and fill the computer storage
- self-replicating software which can delete and corrupt files
13 Clues: uses a private key and a public key • one method for avoiding acccidental data loss • self-replicating software which can delete and corrupt files • an attack on a server designed to deny service coming from multiple computers • a security technology that monitors a computer’s incoming and outgoing traffic • ...
Sociology of deviant behaviour 2023-10-19
Across
- division of labour
- a behaviour stray from accepted norms
- a public order crime
- home a place for temporarily observing juvenile delinquents
- slaves committing suicide
- another word for anomie
Down
- dry state
- suicide due to lack of integration
- means become goals
- cyber crime
- Prohibitipon of alcohol in Rajasthan
- Mahila Anathalaya
12 Clues: dry state • cyber crime • Mahila Anathalaya • means become goals • division of labour • a public order crime • another word for anomie • slaves committing suicide • suicide due to lack of integration • Prohibitipon of alcohol in Rajasthan • a behaviour stray from accepted norms • home a place for temporarily observing juvenile delinquents
