cyber security Crossword Puzzles
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
AIRPORT CODES 2018-10-29
Across
- WELLINGTON AIRPORT CODES
- THE THING YOU GET AFTER CHECK IN
- AUCKLAND AIRPORT CODE
- DUNEDIN AIRPORT
- AUSTRALIAN AIRLINES
- SINGAPORE AIRPORT NAME
- TAURANGA AIRPORT CODES
- SHOPPING FACILITY INSIDE THE AIRPORT
- BAGGAGE TO BE CARRIED INSIDE THE CABIN
- AVIATION SECURITY SERVICE
- CHRISTCHURCH AIRPORT CODES
Down
- INTERNATIONAL ID
- LIVERPOOL AIRPORT NAME
- PILOT'S ROOM
- THE AREA BEFORE DEPARTING PASSENGERS PASS THROUGH SECURITY
- SYDNEY AIRPORT CODE
- COUNTRY WITH THE BUSIEST AIRPORT
- NUMBER OF RUNWAY IN AUCKLAND AIRPORT
- PASSENGER'S BELONGING
- AIR TRAFFIC CONTROL
20 Clues: PILOT'S ROOM • DUNEDIN AIRPORT • INTERNATIONAL ID • SYDNEY AIRPORT CODE • AUSTRALIAN AIRLINES • AIR TRAFFIC CONTROL • AUCKLAND AIRPORT CODE • PASSENGER'S BELONGING • LIVERPOOL AIRPORT NAME • SINGAPORE AIRPORT NAME • TAURANGA AIRPORT CODES • WELLINGTON AIRPORT CODES • AVIATION SECURITY SERVICE • CHRISTCHURCH AIRPORT CODES • THE THING YOU GET AFTER CHECK IN • COUNTRY WITH THE BUSIEST AIRPORT • ...
Security Forces 2025-07-15
Across
- Non-lethal weapon used for close-quarters
- Emergency vehicle response mode.
- Used to restrain suspects.
- An individual actively engaged in killing or attempting to kill.
- Senior SF leader in charge of unit security operations.
Down
- Worn headgear that identifies SF personnel.
- Latin motto meaning “Strong” representing SF spirit.
- Daily pre-duty briefing for Security Forces.
- Elite SF team specializing in aircraft security.
- Someone attempting to unlawfully drive through a base checkpoint.
- Storage location for weapons and gear.
- Random security practices designed to deter threats (acronym).
12 Clues: Used to restrain suspects. • Emergency vehicle response mode. • Storage location for weapons and gear. • Non-lethal weapon used for close-quarters • Worn headgear that identifies SF personnel. • Daily pre-duty briefing for Security Forces. • Elite SF team specializing in aircraft security. • Latin motto meaning “Strong” representing SF spirit. • ...
AI Assistant for Observability 2024-03-01
Across
- How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
- The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
- What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
- This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)
4 Clues: This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution) • What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution) • How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution) • ...
Cisco 5 2024-09-19
Across
- Cisco's integrated security solution that provides visibility and control across the entire attack continuum
- Cisco's product for secure network connectivity, including remote access
- Cisco's solution for detecting and responding to advanced threats
- Cisco's security management platform that provides insights and automation to efficiently manage security policies and devices
Down
- Cisco's platform for security policy management and orchestration
- Cisco's secure internet gateway in the cloud that provides the first line of defense against threats
- Cisco's product that provides secure access to the network for any user, from any device, at any time, in any location
- Cisco's enterprise firewall product line
- Cisco's security framework designed to provide end-to-end network visibility and segmentation
- Cisco's email security appliance that blocks phishing, spoofing, and malware emails
- Cisco's cloud-based platform that provides advanced malware protection
11 Clues: Cisco's enterprise firewall product line • Cisco's platform for security policy management and orchestration • Cisco's solution for detecting and responding to advanced threats • Cisco's cloud-based platform that provides advanced malware protection • Cisco's product for secure network connectivity, including remote access • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
SDG Goal 16: Peace, Justice and Strong Institutions 2024-11-24
Across
- Process of resolving disputes without violence
- Fair treatment under the law
- Freedom from fear and want
- The opposite of corruption
- A serious crime, usually with violence involved
- Absence of conflict
- International organisation promoting peace and security
Down
- Systems that provide safety and security to citizens
- Government where everyone has a say
- Fundamental freedoms that all people should have
- Taking responsibility for your actions
- Use of power for private gain
- Treating everyone equally, regardless of background
- Working together towards a common goal
14 Clues: Absence of conflict • Freedom from fear and want • The opposite of corruption • Fair treatment under the law • Use of power for private gain • Government where everyone has a say • Taking responsibility for your actions • Working together towards a common goal • Process of resolving disputes without violence • A serious crime, usually with violence involved • ...
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security is designed to protect ____ and tablets.
- Trend Micro Mobile Security helps protect against ____ attacks. These attacks are deceptive attempts by attackers to trick victims into revealing sensitive information like passwords or financial data by masquerading as a trusted entity.
- Trend Micro Mobile Security protects devices running this Google mobile OS
- Trend Micro Mobile Security is a ____ security solution
- Trend Micro Mobile Security offers ____ browsing protection
Down
- Trend Micro Mobile Security supports this Apple mobile OS
- Trend Micro Mobile Security scans for ____ on mobile devices. (Starts with m)
- Trend Micro Mobile Security helps safeguard user's ____ on mobile devices. (Starts with p)
- Trend Micro Mobile Security has features such as ____ tools. These tools help locate, lock or wipe lost/stolen devices to prevent unauthorized access. (Starts with a)
9 Clues: Trend Micro Mobile Security is a ____ security solution • Trend Micro Mobile Security supports this Apple mobile OS • Trend Micro Mobile Security offers ____ browsing protection • Trend Micro Mobile Security is designed to protect ____ and tablets. • Trend Micro Mobile Security protects devices running this Google mobile OS • ...
Security Crossword 2024-05-19
Across
- a secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-fi
- Should be constructed of uppercase, lowercase letters, numbers, and special characters
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Fraudulent phone calls or voice message purporting to be from reputable companies in order to trick individuals into revealing personnel information
- A type of malware that can collect and transit private user information without the user's knowledge or consent
- The "A" in the CIA triad that ensures authorized users have access
Down
- faking the sending address of a transmission to gain unauthorized access to a secure system
- A type of media manipulation, where bad actors alter an image or video to create a false perception of reality
- A sequence of words or text used to control access to a computer, similar to a password
- A flaw or weakness in a computer system that could be exploited to violate the system's security
- by scanning files and detecting suspicious activity, these programs help protect against cyber attacks that could result in data breaches or stolen information
- Unauthorized access to a network, information systems, or application
12 Clues: The "A" in the CIA triad that ensures authorized users have access • Unauthorized access to a network, information systems, or application • Should be constructed of uppercase, lowercase letters, numbers, and special characters • A sequence of words or text used to control access to a computer, similar to a password • ...
DEX+: Across & Down to Delivery Greatness! 2025-08-19
Across
- Accountable to deliver various products and services to Business within agreed Service Level / Statement of Work under his/her portfolio.
- Accountable for the pre-execution process, i.e. ensuring all service requests are managed promptly from Gate 0 to Gate D.
- One of the common artifacts/deliverables in the Close Delivery process
- The objective of this process is to release the deployed solution to end user upon obtaining Go-Live approval.
- Manage project resources according to the scope, budget and project schedule.
- An official governing working group responsible for reviewing, assessing, discussing project issues and challenges.
- Lead the program throughout the program life cycle and ensure objectives of program are achieved.
Down
- The objective of this process is to plan and manage activities for obtaining Change Advisory Committee (CAC) approval to release solution to production environment
- Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.
- Accountable to project delivery under his/her portfolio and to endorse closure of projects under his/her portfolio.
- The objective of this process is to pre-identify endorser and approver and develop workplan to prepare for the development of solution proposal.
- Accountable to ensure Cyber Security Business Impact and Legal and Regulatory Assessments (CS BIA & LRA) are performed and updated annually.
12 Clues: One of the common artifacts/deliverables in the Close Delivery process • Manage project resources according to the scope, budget and project schedule. • Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user. • Lead the program throughout the program life cycle and ensure objectives of program are achieved. • ...
HANDS OFF!! 2025-04-05
13 Clues: VA • NEH • DEI • Parks • Public Ed • Soft Power • ret security • Elder Health • Int'l Students • health security • Do good volunteers • Farm and nutrition • Preschool for the poor
AI Assistant for Observability 2024-03-02
Across
- How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)
- The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
- What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
- This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)
4 Clues: This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution) • What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution) • How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution) • ...
cyber1 2024-03-29
Across
- Science of secure communication.
- Converting data into code.
- Code-breaking secret or tool.
- Related to encryption, secrecy.
- Method for encrypting text.
Down
- Deceptive information stealing tactic.
- Unauthorized computer system intruder.
- Related to computers, internet.
- Artificially generated realistic video (2 words).
- Malicious software spreading infection.
- Malicious software, harmful intent.
- Breaking cryptographic codes, systems.
12 Clues: Converting data into code. • Method for encrypting text. • Code-breaking secret or tool. • Related to computers, internet. • Related to encryption, secrecy. • Science of secure communication. • Malicious software, harmful intent. • Deceptive information stealing tactic. • Unauthorized computer system intruder. • Breaking cryptographic codes, systems. • ...
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Pan-Domain Operations Crosswords 2021-03-09
Across
- learning associated with AI
- _____, contest, confront, combat
- integration beyond whole-of-government
- domain of zeros and ones
- major division within the military environment
Down
- domain governed by orbital mechanics
- domain of narratives
- under the threshold zone
- speed of operational ______
- matrix of _____
- type of spine
11 Clues: type of spine • matrix of _____ • domain of narratives • under the threshold zone • domain of zeros and ones • learning associated with AI • speed of operational ______ • _____, contest, confront, combat • domain governed by orbital mechanics • integration beyond whole-of-government • major division within the military environment
Cyberspace Article 2024-11-09
8 Clues: AI • Cyber Cognitive • Hispanic Author • Operators of AI • Representing Knowledge • University AI was founded • Prejudice that may impact AI • Working alongside Technology
cyber 2023-06-20
Across
- : Réglementation européenne sur la protection de données personnelles.
- : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès.
- : Technique utilisant principalement la messagerie électronique, et usurpant l'identité d'un organisme dans le but de tromper l'utilisateur et obtenir des informations sensibles.
- : Acte de malveillance envers des systèmes informatiques, pouvant être classé en 4 catégories : la cybercriminalité, la déstabilisation, l’espionnage, le sabotage.
Down
- : Message électronique non sollicité, à but publicitaire.
- : Logiciel malveillant utiliser par les cybercriminels permettant de bloquer l'accès aux données, par chiffrement, en échange d'une somme d'argent.
- de passe : Permet l’identification et la sécurisation de la connexion de l’utilisateur à un système informatique ou une application.
7 Clues: : Message électronique non sollicité, à but publicitaire. • : Réglementation européenne sur la protection de données personnelles. • : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès. • ...
Server 2023-10-30
Across
- Servera nosaukums?
- Servera drošība? Security
- Servera pārlāde?
- Servera datu kopijas?
- Servera atbilde klientam?
- Servera kļūdu žurnāls?
- Servera pārvaldības rīki?
- Servera kapacitāte?
- Servera tīkla adrese?
- Servera datu drošība?
- Servera veiktspēja?
- Servera uzticamība?
- Servera izmitināšana?
- Servera izslēgšana?
- Servera nodrošināšana?
- Servera datu krātuve?
- Servera izglītība?
Down
- Servera atrašanās vieta?
- Servera saskarne?
- Servera atrašanās vieta?
- Servera resursi?
- Servera konfigurācija?
- Servera uzstādīšana?
- Servera izslēgšanas komanda?
- Servera izturība?
- Servera resursu sadale?
- Servera operētājsistēma?
- Servera atjaunināšana?
- Servera pārvaldība?
- Servera pilnveide?
30 Clues: Servera resursi? • Servera pārlāde? • Servera saskarne? • Servera izturība? • Servera nosaukums? • Servera pilnveide? • Servera izglītība? • Servera uzstādīšana? • Servera kapacitāte? • Servera veiktspēja? • Servera pārvaldība? • Servera uzticamība? • Servera izslēgšana? • Servera konfigurācija? • Servera datu kopijas? • Servera tīkla adrese? • Servera datu drošība? • ...
Cybersecurity Terms 2024-07-13
Across
- Secure online service
- AKA UI Redress attack
- Have to pay
- Gain access to sensitive infromation
- Method of scrambling data
- Attempts to steal personal data
- Appears harmless
- Bring your device
- Prevent unauthorized access
Down
- Protect, prevent, remove
- Harmful software designed to damage
- Online harassment
- Protect data during encryption process
- Security in cloud infrastructure
- Interment protocol address
- Network of compromised computers
- A security feature
- Media manipulation
- Type of malware
- Can be particularly dangerous
20 Clues: Have to pay • Type of malware • Appears harmless • Online harassment • Bring your device • A security feature • Media manipulation • Secure online service • AKA UI Redress attack • Protect, prevent, remove • Method of scrambling data • Interment protocol address • Prevent unauthorized access • Can be particularly dangerous • Attempts to steal personal data • Security in cloud infrastructure • ...
Sigma Crossword 2016-11-28
Across
- Name the industry leading mindmapping Software
- Quest's industry leading database tool
- Traditionally hung above the fireplace
- Which Flexera product is the only solution for a unified application readiness process for Windows, Mac and Mobile
- Which vendors solutions include Business Security, CloudCare and Managed Workplace
- Data erasure management software
- Whose products run on the Orion platform
- Santa's helpers
- Songs sung at Christmas
- Who is the leading supplier of innovative mobile security products that are Government certified?
Down
- 2015's CRN Specialist Distributor of the year
- Santa's chosen method of transportation
- Company creating dynamic screencapture Software
- Who are Sigma the official EMEA based distributor f or (5,8)
- Charles Dickens' Christmas loathing character
- Simplify the security of an Active Directory with this Quest product
- A sparkly Christmas decoration
- Who is the red nosed reindeer?
- A striped Christmas treat
- A famous snowman
20 Clues: Santa's helpers • A famous snowman • Songs sung at Christmas • A striped Christmas treat • A sparkly Christmas decoration • Who is the red nosed reindeer? • Data erasure management software • Quest's industry leading database tool • Traditionally hung above the fireplace • Santa's chosen method of transportation • Whose products run on the Orion platform • ...
Session 1, Foundations (Day One) 2024-04-26
Across
- Deliver as _.
- _Integration is the single point of accountability for Natl Security missions delivery.
- People + Process = _
- Last name of new Project Integration Group director
- Last name of Sec of Energy
- Triple Constraint + _, the center triangle.
- Three types of projects: Expense, Capital and _.
- An effort with defined start and end points
- Acronym of Lawrence Livermore Nat
- Last name of Under Sec of Nuclear Security
Down
- _, Time and Cost are the triple constraints.
- Name of project management training: _ Project Management
- EVM or Earned Value _.
- Managing and _ (M&O)contractors
- Acronym for Contracting Officer Representative
- Acronym of Los Alamos Nat Lab
- Name of plant located in Amarillo, Texas
- Acronym for Other Project Cost
- Frequency of CNS program planning cycle
- Acronym for Consolidated Nuclear Security
- Acronym for earned value management system
- Last name of Infrastructure portfolio manager
22 Clues: Deliver as _. • People + Process = _ • EVM or Earned Value _. • Last name of Sec of Energy • Acronym of Los Alamos Nat Lab • Acronym for Other Project Cost • Managing and _ (M&O)contractors • Acronym of Lawrence Livermore Nat • Frequency of CNS program planning cycle • Name of plant located in Amarillo, Texas • Acronym for Consolidated Nuclear Security • ...
Cybersecurity Crossword Puzzle 2025-03-14
Across
- Network of hijacked computers
- Manipulating people for access
- Physically isolates a system
- Vulnerability with no fix yet
- Isolates programs for security
- Adds extra login security
- Impersonates a trusted source
- Blocks unauthorized network access
- Fixes security vulnerabilities
- Self-replicates across networks
- Steals active user session
- Takes advantage of a weakness
- Disguised malware for attacks
- Malicious software harming devices
- Tricks users into clicking links
Down
- Hidden entry for unauthorized access
- Secretly monitors user activity
- Secures internet connection
- Tries all password combinations
- Converts data into fixed string
- Unwanted or junk emails
- Attacks databases with queries
- Records keystrokes for theft
- Displays unwanted advertisements
- Encrypts files for payment
- Overwhelms a server with traffic
- Secures data using codes
- Fraudulent attempt to steal data
- Hidden part of the internet
- Hides malware in a system
30 Clues: Unwanted or junk emails • Secures data using codes • Adds extra login security • Hides malware in a system • Encrypts files for payment • Steals active user session • Secures internet connection • Hidden part of the internet • Physically isolates a system • Records keystrokes for theft • Network of hijacked computers • Vulnerability with no fix yet • Impersonates a trusted source • ...
CTF-CW-9 2025-11-17
Across
- Native risk without any safety measures
- Time attackers spend undetected
- Raising a problem to higher-level personnel
- Mathematical technique adding statistical noise to protect individual privacy
- Trust service criteria audit report
- Abbreviation for Confidentiality, Integrity, and Availability
- Rules for managing and protecting data
- Correctly identified security threat
- Red team�s go-to platform for offensive security at Tekion.
- Critical information for encryption and decryption
Down
- Ensuring maximum privacy protection without user action required
- Creating multiple simulated systems on one machine
- Anti-phishing and brand protection platform adopted by Tekion.
- Real-time monitoring tool at Tekion.
- Ethical approach to artificial intelligence development and deployment
- Anything of value owned or used
- The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
- (Duplicate) Procedures for automated or manual response actions
- Gathering data from publicly available sources
- Again, technology for preventing leaks
20 Clues: Time attackers spend undetected • Anything of value owned or used • Trust service criteria audit report • Real-time monitoring tool at Tekion. • Correctly identified security threat • Rules for managing and protecting data • Again, technology for preventing leaks • Native risk without any safety measures • Raising a problem to higher-level personnel • ...
QBE 2020-04-01
Across
- Head of BA
- QBE's platform to process payments
- Principle of Insurance
- QBE CEO
- Diverse Hashtag
- London based Insurer
- P&C Product
- #together
- SME Team
- E-Trade Platform
- Insured vehicles must be logged on
- Offshore Office
- QBE Headquarters
Down
- Fleet Product
- Minibus Product
- Employee Assistance
- A vehicle which is off the road must be declared
- Data Protection
- Complaints are logged on
- QBE’s E-Trade Platform
- Large broker for Minibus
- Minibus has been trading for how many years
- Annual Staff Survey
- Partner Charity
- Large broker for Minibus
- Newest SME Product
26 Clues: QBE CEO • SME Team • #together • Head of BA • P&C Product • Fleet Product • Minibus Product • Data Protection • Diverse Hashtag • Partner Charity • Offshore Office • E-Trade Platform • QBE Headquarters • Newest SME Product • Employee Assistance • Annual Staff Survey • London based Insurer • Principle of Insurance • QBE’s E-Trade Platform • Complaints are logged on • Large broker for Minibus • ...
Cyber Safety - Blake Biddell 2016-05-26
Across
- downloadable fun
- cable needed to power a device
- appropriate level of content
- protect yourself online
- protect your online identity
- used to get online
- someone who helps at home
- site to gain information on the web
- to not be online
- person who helps at school
Down
- people online who aren't nice
- one of Apples products
- someone who looks after you
- provides power
- random information sometimes not wanted
- uses Electricity
- makes your computer sick
- scams games that aren't safe
- fun to play with
- to make a computer screen smaller
20 Clues: provides power • downloadable fun • uses Electricity • fun to play with • to not be online • used to get online • one of Apples products • protect yourself online • makes your computer sick • someone who helps at home • person who helps at school • someone who looks after you • appropriate level of content • scams games that aren't safe • protect your online identity • ...
Crossword 2 2024-06-07
Across
- _ut (c or k?)
- _am (j or g?)
- _ber (c or s?)
- _ki (c or s?)
- _ un (j or g?)
- _ _ ide (j or g?) and what else?
- _olly (j or g?)
- _iraffe (j or g?)
- _ensus (c or s?)
- _angaroo (c or k?)
Down
- _ummer (c or s?)
- _ivil (c or s?)
- _ _ ilty (j or g?) and what else?
- _elebrate (c or s?)
- _ym (j or g?)
- _leeping (c or s?)
- _itrus (c or s?)
- _andy (c or k?)
- _ _ ess (j or g?) and what else?
- _otton (c or k?)
20 Clues: _ut (c or k?) • _am (j or g?) • _ki (c or s?) • _ym (j or g?) • _ber (c or s?) • _ un (j or g?) • _ivil (c or s?) • _olly (j or g?) • _andy (c or k?) • _ummer (c or s?) • _itrus (c or s?) • _ensus (c or s?) • _otton (c or k?) • _iraffe (j or g?) • _leeping (c or s?) • _angaroo (c or k?) • _elebrate (c or s?) • _ _ ide (j or g?) and what else? • _ _ ess (j or g?) and what else? • ...
Westhill Crossword 2024-03-10
Across
- Teachers are wearing this in protest
- Helpful Study Resource
- Westhills past participle
- Superintendent
- The 300s and 400s are in the _____ building
- You apply to college when you are a ______
- ________ Playmakers
- _____ and purple
- Mr. Alswanger and Mr. Cooney
- Alternative to the SAT
Down
- Upperclassmen illness
- Part of a class curriculum
- The Cyber Rams
- Nickname for the head janitor at Westhill
- Northernmost section of the school building
- Popular college for Westhill graduates
- Learned in math class
- Westhill’s favorite gym rat
- We write what you are reading
- Created in 1916
20 Clues: The Cyber Rams • Superintendent • Created in 1916 • _____ and purple • ________ Playmakers • Upperclassmen illness • Learned in math class • Helpful Study Resource • Alternative to the SAT • Westhills past participle • Part of a class curriculum • Westhill’s favorite gym rat • Mr. Alswanger and Mr. Cooney • We write what you are reading • Teachers are wearing this in protest • ...
Masalah Sosial 2025-10-01
Across
- Cyber crime?
- Bentuk diskriminasi berbasis genjer disebut?
- Apa yang di maksud kesenjangan sosial?
- Apa dampak urbanisasi berlebihan?
- Penyebaran budaya asing tanpa filter disebut?
- Teori anonim dikemukakan oleh?
- White collar crime artinya?
- Contoh masalah sosial modern?
- Penyalahgunaan anak untuk bekerja disebut?
- Diskriminasi berbasis orientasi seksual?
- Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
- Kemiskinan relatif dibandingkan dengan?
Down
- Eufemisme untuk pengemis?
- Kesenjangan akses antara kota dan desa disebut?
- Apa penyebab utama kemiskinan?
- Kemiskinan absolut diukur dari?
- Apa dampak utama pengangguran?
- Contoh masalah sosial di bidang pendidikan?
- Pengangguran musiman contohnya?
- Apa penyebab kriminalitas?
20 Clues: Cyber crime? • Eufemisme untuk pengemis? • Apa penyebab kriminalitas? • White collar crime artinya? • Contoh masalah sosial modern? • Apa penyebab utama kemiskinan? • Apa dampak utama pengangguran? • Teori anonim dikemukakan oleh? • Kemiskinan absolut diukur dari? • Pengangguran musiman contohnya? • Apa dampak urbanisasi berlebihan? • Apa yang di maksud kesenjangan sosial? • ...
Masalah Sosial 2025-10-01
Across
- Cyber crime?
- Bentuk diskriminasi berbasis genjer disebut?
- Apa yang di maksud kesenjangan sosial?
- Apa dampak urbanisasi berlebihan?
- Penyebaran budaya asing tanpa filter disebut?
- Teori anonim dikemukakan oleh?
- White collar crime artinya?
- Contoh masalah sosial modern?
- Penyalahgunaan anak untuk bekerja disebut?
- Diskriminasi berbasis orientasi seksual?
- Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
- Kemiskinan relatif dibandingkan dengan?
Down
- Eufemisme untuk pengemis?
- Kesenjangan akses antara kota dan desa disebut?
- Apa penyebab utama kemiskinan?
- Kemiskinan absolut diukur dari?
- Apa dampak utama pengangguran?
- Contoh masalah sosial di bidang pendidikan?
- Pengangguran musiman contohnya?
- Apa penyebab kriminalitas?
20 Clues: Cyber crime? • Eufemisme untuk pengemis? • Apa penyebab kriminalitas? • White collar crime artinya? • Contoh masalah sosial modern? • Apa penyebab utama kemiskinan? • Apa dampak utama pengangguran? • Teori anonim dikemukakan oleh? • Kemiskinan absolut diukur dari? • Pengangguran musiman contohnya? • Apa dampak urbanisasi berlebihan? • Apa yang di maksud kesenjangan sosial? • ...
Security Cross Word 2025-10-14
Across
- Virtual private connection over public networks
- Restricting distribution based on sensitivity
- Detects, blocks, and responds on endpoints (abbr.)
- Legal framework protecting personal information
- Network barrier enforcing traffic rules
- Targeted, well-researched phishing attack
- Manipulating people to bypass security
- Program that demands payment to restore data
- Authentication standard for phishing resistance
- Application for generating/storing credentials
- Principle: assume breach and verify explicitly
Down
- Backups that enable restoration after attacks
- Small software flaw exploited by attackers
- Process of reporting an event to Security
- Transforming data to unreadable form
- Attack where criminals pose as executives
- Practice of updating systems to fix flaws
- Limiting access to only what’s needed
- Protects data in transit on untrusted networks
- Malicious software
- Deceptive emails designed to steal information
- Policy prohibiting unapproved tools
- Security model emphasizing continuous verification
- Second factor for identity verification
- Preventing unauthorized data exfiltration (abbr.)
25 Clues: Malicious software • Policy prohibiting unapproved tools • Transforming data to unreadable form • Manipulating people to bypass security • Limiting access to only what‚Äôs needed • Network barrier enforcing traffic rules • Second factor for identity verification • Process of reporting an event to Security • Attack where criminals pose as executives • ...
CTF-CW-9 2025-11-17
Across
- Native risk without any safety measures
- Time attackers spend undetected
- Raising a problem to higher-level personnel
- Mathematical technique adding statistical noise to protect individual privacy
- Trust service criteria audit report
- Abbreviation for Confidentiality, Integrity, and Availability
- Rules for managing and protecting data
- Correctly identified security threat
- Red team�s go-to platform for offensive security at Tekion.
- Critical information for encryption and decryption
Down
- Ensuring maximum privacy protection without user action required
- Creating multiple simulated systems on one machine
- Anti-phishing and brand protection platform adopted by Tekion.
- Real-time monitoring tool at Tekion.
- Ethical approach to artificial intelligence development and deployment
- Anything of value owned or used
- The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
- (Duplicate) Procedures for automated or manual response actions
- Gathering data from publicly available sources
- Again, technology for preventing leaks
20 Clues: Time attackers spend undetected • Anything of value owned or used • Trust service criteria audit report • Real-time monitoring tool at Tekion. • Correctly identified security threat • Rules for managing and protecting data • Again, technology for preventing leaks • Native risk without any safety measures • Raising a problem to higher-level personnel • ...
CTF-CW-10 2025-11-17
Across
- The practice of hiding meaning in messages
- Service at Tekion for simplifying software requests.
- Sprint and issue management dashboard at Tekion.
- Requirement to delete data when no longer needed for its purpose
- GDPR requirement to gather least amount of data needed
- Keeping personal or sensitive information safe
- Establishing true user identity
- International standard for Privacy Information Management Systems
- (Triplicate) Adversary methods description
Down
- (Duplicate) Handling threats as a team
- (Duplicate) Plan for handling security disasters
- United Kingdom's post-Brexit data protection regulation
- (Duplicate) Host-level monitoring security tool
- Ensuring data hasn�t been changed or tampered
- Person in charge of independent checks
- Test run or legal proceeding
- More than password needed to get in (again
- Choosing how to handle each identified threat
- Measure to prevent unwanted events
- Cloud-based security layer used by Tekion to protect its websites from online attacks.
20 Clues: Test run or legal proceeding • Establishing true user identity • Measure to prevent unwanted events • (Duplicate) Handling threats as a team • Person in charge of independent checks • The practice of hiding meaning in messages • More than password needed to get in (again • (Triplicate) Adversary methods description • Ensuring data hasn�t been changed or tampered • ...
Sample Quiz 1 2023-10-12
Across
- Compliance also includes satisfying _____ requirements.
- I am aware that breach of any policy requirement can result in _____ action.
- Security _____ of an organization are identified by conducting a risk assessment.
- Employee _____ is a mandatory requirement before an employee is employed.
Down
- Apart from any incident, I am also responsible for reporting any ______ which I may identify in any of the security controls.
- "Need to Know" is the _____ of granting access.
- The first point in Information Security Policy statement refers to ____ security.
- Senior management team is responsible for _______ the implementation of security controls.
- ______ usage policy specifies do’s and don’ts for online activities using company infrastructure.
- My company can ____ all my communications initiated from the company provided or owned electronic device.
- Information Security should become a part of the ____ of the organization.
11 Clues: "Need to Know" is the _____ of granting access. • Compliance also includes satisfying _____ requirements. • Employee _____ is a mandatory requirement before an employee is employed. • Information Security should become a part of the ____ of the organization. • I am aware that breach of any policy requirement can result in _____ action. • ...
computer crimes 2024-11-08
Across
- SOFTWARE Internet based software or programs that are used to disrupt a network
- SOLICITING AND ABUSE Type of cyber crime wherein criminals solicit minors via chat rooms
- VANDALISM Damaging or destroying data rather than stealing
- HORSES malicious program that appears to be friendly, they are not technically viruses.
- Act by the criminal who floods the bandwidth of the victim’s network.
- refers to any crime that involves a computer/ mobile and a network
- type of virus hides on the user’s disk and waits for a specific event to occur before running.
- a program whose purpose is to duplicate itself.
- The least common cybercrime
Down
- This category of cybercrime involves one individual distributing malicious or illegal information online.
- VIRUSES these viruses take up residence in the computer’s memory, making then hard to detect
- VIRUS Type of virus make changes to a disk’s file system
- Means an illegal intrusion into a computer system and/or network
- HAT HACKERS hackers between the good and the bad guys
- STALKING A kind of online harrassment wherein the victim is subjected to a barrage of online messages and emails.
- DISSEMINATION- Malicious software that attches itself to other software.
- PIRACY Theft of software through the illegal copying of genuine products.
- TERRORISM Defined as an act of terrorism committed through the use of cyberspace
- VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT
- HAT HACKERS can be seen as the “good guys”
20 Clues: The least common cybercrime • HAT HACKERS can be seen as the “good guys” • a program whose purpose is to duplicate itself. • HAT HACKERS hackers between the good and the bad guys • VIRUS Type of virus make changes to a disk’s file system • VANDALISM Damaging or destroying data rather than stealing • VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT • ...
Cybersecurity 2025-03-10
Across
- Fake emails to steal info
- Locks files for money
- Fixes security issue
- Shows unwanted ads
- horse Fake safe program
- Hides online activity
- force Guessing passwords
- Floods a website
- Extra password step
- Blocks bad connections
Down
- Hides info
- New security problem
- Looks safe but is bad
- Group of hacked computers
- Secret way in
- Records what you type
- Hides bad software
- Bad software
- Watches what you do
- engineering Tricks people
20 Clues: Hides info • Bad software • Secret way in • Floods a website • Hides bad software • Shows unwanted ads • Watches what you do • Extra password step • New security problem • Fixes security issue • Looks safe but is bad • Locks files for money • Records what you type • Hides online activity • Blocks bad connections • horse Fake safe program • Fake emails to steal info • Group of hacked computers • ...
Cyber Security 2022-03-10
Personell in tourism 2024-03-21
Across
- Flies aircraft.
- Provides medical care.
- Oversees operations.
- Teaches specific skills.
- Ensures safety and security.
- Provides amusement or enjoyment.
- Serves food and drinks.
- Manages office tasks.
- Maintains cleanliness.
- Books travel arrangements.
Down
- Organizes events or activities.
- Supervises swimming areas.
- Offers therapeutic services.
- Leads tours.
- Mixes and serves beverages.
- Prepares and cooks food.
- A person who buys goods or services.
- Cleans rooms and areas.
- Greets and assists guests.
- Helps with guest requests.
- Operates vehicles.
21 Clues: Leads tours. • Flies aircraft. • Operates vehicles. • Oversees operations. • Manages office tasks. • Provides medical care. • Maintains cleanliness. • Cleans rooms and areas. • Serves food and drinks. • Prepares and cooks food. • Teaches specific skills. • Supervises swimming areas. • Greets and assists guests. • Helps with guest requests. • Books travel arrangements. • ...
Investment Crossword 2025-03-25
Across
- investors use a ____ time period, with no specific plan in time
- The "p" In IPO stands for _____
- you contribute, the state, and your ____ contributes to your pension plan
- one way investors can make money from stocks
- at age ___, you can collect full social security benefits
- thousand-Five-Hundred the max amount of money to contribute in a 401k is- __,___
- Bull market stock prices are __
- A pension is managed by your,
- 1.45% for this tax
- the opposite of traders
- a ____ symbol is used to represent a company
- Roth IRA contributions are made _____ tax
- Social Security was created by which president
Down
- What retirement income source is funded by the government?
- there are ____ sources of retirement incomes
- bear market stock prices are ____
- Higher risk often means ______ Return
- in year____ social security was created
- You can withdrawal funds for your IRA & Roth IRA with no ________ at age 59.5 Seventy-three RMDs must start at age ____
- The total maximum contribution for IRA combined per year is ______
- 401K contributions are taken out of your paycheck _____ Taxes.
- plan what plan is managed by your employer
- social security and medicare together are called _____ Tax
- what kind of gains increase in value when you sell an asset for more than you bought it
- traders use a _____ time frame
25 Clues: 1.45% for this tax • the opposite of traders • A pension is managed by your, • The "p" In IPO stands for _____ • Bull market stock prices are __ • traders use a _____ time frame • bear market stock prices are ____ • Higher risk often means ______ Return • in year____ social security was created • Roth IRA contributions are made _____ tax • ...
November 2023-11-22
9 Clues: Funny feast • Bring more! • It's giving • ICAC Conference #1s • It's a fruit, actually. • Chronically online Monday. • Brought Thanksgiving back. • The preferred holiday meal. • American organization; big part of our community
Annu's world! 2023-02-23
Across
- Mr Lomas' kannada advice "Dont do .."
- Cake + fruits + juice + sweets + ..
- Not a smash
- Tortoise's coat
- That 834 am activity
- 30 min of this time means 60 min .. He he he
Down
- Colorful bday gift
- Hindustani Gaga
- Avidin's processor
- My favorite brand err fruit
- old school cyber people
- "Not at 530 am please!"
- is always his policy
13 Clues: Not a smash • Hindustani Gaga • Tortoise's coat • Colorful bday gift • Avidin's processor • That 834 am activity • is always his policy • old school cyber people • "Not at 530 am please!" • My favorite brand err fruit • Cake + fruits + juice + sweets + .. • Mr Lomas' kannada advice "Dont do .." • 30 min of this time means 60 min .. He he he
Internet 2024-10-15
Across
- krađa identiteta, krađa lozinki ili lažno predstavljanje
- Slanje agresivnih poruka
- programi koji mogu ugroziti računalo
- Društvena mreža
- TCP-IP
- Slijed koraka u programiranju
Down
- online nasilje
- prevara koja korisnika navodi na otkrivanje korisničkog imena i lozinke
- nasilan upad 'prijatelja' na društvenim mrežama na nečije profile
- socijalna izolacija osobe
- Umjetna inteligencija
- Globalna računalna mreža
- Društvena mreža
- e-klevetanje
14 Clues: TCP-IP • e-klevetanje • Društvena mreža • Društvena mreža • online nasilje • Umjetna inteligencija • Globalna računalna mreža • Slanje agresivnih poruka • socijalna izolacija osobe • Slijed koraka u programiranju • programi koji mogu ugroziti računalo • krađa identiteta, krađa lozinki ili lažno predstavljanje • nasilan upad 'prijatelja' na društvenim mrežama na nečije profile • ...
Team-3 2023-03-31
Across
- Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
- Document for capturing all the contractual security requirements
Down
- Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
3 Clues: Document for capturing all the contractual security requirements • Maximum tolerable time that a computer/application can be down after a failure/disaster occurs • Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions
TIK 2023-08-23
Across
- jaringan yang terdiri dari komputer client dan server
- untuk mengakses berita di seluruh dunia
- jaringan yang mencakup dunia
- jaringan yang meliputi satu kota
- jaringan yang hanya mencakup wilayah kecil
Down
- Internet untuk militer
- Komputer yang menerima data dari server
- Penyakit yang ada di internet
- Pencurian Nomor kartu kredit
- dilarang oleh agama
- Nama awal internet
- terputusnya jaringan internet
- tempat awal pengembangan jaringan
- bentuk dokumen di Internet
- format file gambar
- kejahatan cyber
16 Clues: kejahatan cyber • Nama awal internet • format file gambar • dilarang oleh agama • Internet untuk militer • bentuk dokumen di Internet • Pencurian Nomor kartu kredit • jaringan yang mencakup dunia • Penyakit yang ada di internet • terputusnya jaringan internet • jaringan yang meliputi satu kota • tempat awal pengembangan jaringan • Komputer yang menerima data dari server • ...
HACKTIVISM 2024-10-17
Across
- Of one’s own free will, without being forced
- Leaker, revealer
- To engage in a struggle or defense against opposition
- Done carelessly, without regard for consequences
- In a way that seeks to undermine
- To take action or stand firm against something or someone
Down
- To rise in opposition
- To challenge or dispute something
- In a bold, fearless manner
- Snitch, source
- Campaigner, advocate
- Speak in favor of, advertise something
- Intentionally
- Cyber activist
- Hacker
- Demonstrator
16 Clues: Hacker • Demonstrator • Intentionally • Snitch, source • Cyber activist • Leaker, revealer • Campaigner, advocate • To rise in opposition • In a bold, fearless manner • In a way that seeks to undermine • To challenge or dispute something • Speak in favor of, advertise something • Of one’s own free will, without being forced • Done carelessly, without regard for consequences • ...
15 Exectutive Departments 2016-09-20
Across
- / represents the united states in court
- / grants patents and registers trademarks
- / provides military forces and protects the nations security
- / inspects food
- affairs / oversees military cemeteries
- / produces coins and bills
- / operates job training programs
- / enforces fair housing laws
- / negotiates agreements with foreign countries
Down
- / helps native Americans manage their affairs
- security / in charge of border and transportation security
- / administers federal aid to schools
- / promotes production of renewable energy, fossil fuels, and nuclear energy
- / administers programs to promote and regulate highways, mass transit, railroads, waterways, air travel, and oil & gas pipelines
- services / funds health care research programs
15 Clues: / inspects food • / produces coins and bills • / enforces fair housing laws • / operates job training programs • / administers federal aid to schools • affairs / oversees military cemeteries • / represents the united states in court • / grants patents and registers trademarks • / helps native Americans manage their affairs • services / funds health care research programs • ...
Challenges of Securing Information 2023-09-25
Across
- concurrent lines of execution a shared resource
- incorrectly configured
- company does not provide support for their device
- manufacturers security settings
- wrong personnel making security decisions
- deficiencies or weaknesses in software
- that is that's not filtered or validated could cause a malicious action
- has not been identified
- widespread proliferation of devices
Down
- options that provide limited security choices
- devices not accounted for
- account that may provide more access than necessary
- error condition that allows an attacker access
- a situation in which an attacker manipulates commonplace business processes that are routinely performed
- no longer receives updates due to age
15 Clues: incorrectly configured • has not been identified • devices not accounted for • manufacturers security settings • widespread proliferation of devices • no longer receives updates due to age • deficiencies or weaknesses in software • wrong personnel making security decisions • options that provide limited security choices • error condition that allows an attacker access • ...
IT Security 1 2017-05-19
Across
- This involves the illegal copying of information from the magnetic strip of a credit card.
- is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- is another type of malware that is activated each time a computer system boots (loads) up.
- involves gaining access to a computer or network with authorization from a company or organisation.
- is the processed output of data making it meaningful to the person who receives it.
- This involves gaining personal information through deception.
- involves gaining access to a computer or network without authorization.
- is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
- is the conversion of data into a form that cannot be easily understood by unauthorized people.
- also known as zombie is a group of computers connected together for malicious purposes.
- is a software application that automatically displays advertising banners while the program is running.
- This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- is a secret way to access a computer without passing security mechanisms.
- is a program that secretly installs itself on computers and collects information about users without their knowledge.
- refers to any crime that involves a computer and a network.
- is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- is raw unorganized facts that need to be processed.
- is malicious software designed to install itself on a computer without the owner’s knowledge.
- The practice of recovering sensitive information from discarded material.
- is a system designed to prevent unauthorized access to or from a private network (LAN).
- is sequences of instructions that make a computer program perform a specific task.
- it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
29 Clues: is raw unorganized facts that need to be processed. • refers to any crime that involves a computer and a network. • This involves gaining personal information through deception. • involves gaining access to a computer or network without authorization. • is a secret way to access a computer without passing security mechanisms. • ...
ETHICS AND SECURITY 2014-10-08
Across
- MONITORS USER USAGE AND DATAENTRY
- TEXT WHICH HAS BEEN SCRAMBLED
- THE SCRAMBLING/CODING OF DATA
- THE USER IS TRICKED BY A FAKE URL
- THE USER IS TRICKED BY A FAKE EMAIL
- A SET OF BELIEFS
- A IMAGE USED TO SHOW A SITE IS SECURE
- USED TO MONITOR USAGE AND STORE URLS
- THE UNSCRAMBLING OF DATA
- A BARRIER OF PROECTION PROVIDE BY SOFTWARE/HARDWARE
- PROCTECT COMPUTER BY RUNNING ALL TIME AND DAILY SCANS
Down
- AN INFECTION WHICH CHANGES COMPUTER SETTINGS AND SLOWS PERFORMANCE
- THIS SHOULD BE CHANGED OFTEN AND CONTAIN TEXT/NO./SYMBOLS
- TO TAKE SOMEONES WORK AND CLAIM IT IS YOUR OWN
- THE ENTRY OF DATA WHICH IS UNIQUE TO THE USER
- A SET OF LAWS TO PROTECT ARTISTS/CREATORS
- A METHOD OF SECURING DATA
- SOMEONE WHO TRIES TO STEAL INFORMATION
- AN INFECTION WHICH DUPLICATES ITSELF OVER AND OVER
- A FORM OF PROCTION WHEN EXCHANGING INFO ONLINE
20 Clues: A SET OF BELIEFS • THE UNSCRAMBLING OF DATA • A METHOD OF SECURING DATA • TEXT WHICH HAS BEEN SCRAMBLED • THE SCRAMBLING/CODING OF DATA • MONITORS USER USAGE AND DATAENTRY • THE USER IS TRICKED BY A FAKE URL • THE USER IS TRICKED BY A FAKE EMAIL • USED TO MONITOR USAGE AND STORE URLS • A IMAGE USED TO SHOW A SITE IS SECURE • SOMEONE WHO TRIES TO STEAL INFORMATION • ...
Security in computing 2015-02-19
Across
- a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
- the fault detection – waiting for a system to fail
- The science of deducing the plaintext from a ciphertext, without knowledge of the key
- The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
- protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
- malicious code detected based on the behavior
- a virus that attaches itself to a file and replicates when the infected program is executed
- A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
- The process of anticipating the faults and handling them to minimize disruption and maximize the safety
- These are the programs that leak the information
- the fault detection – construct a system that reacts to a failure
Down
- A cryptosystem is a system for encrypting and decrypting data
- is an unforgeable token that gives the possessor certain rights to an object
- – keeps a copy of everything pressed
- The assurance that the communicating entity is the one that it claims to be
- (secure shell) is a pair of protocols defined for Unix
- systems reveal information that could facilitate an attack
- in this Attack- Malicious program exists between two programs
- each program operates as if other routines in the system were malicious or incorrect
- door is an undocumented entry point to a module which has occurred because of the developer
- Provides protection against denial by one of the entities involved in a communication
- defines a single choke point that keeps unauthorized users out of the protected network
- this is a cipher which encrypts a digital data stream one bit or one byte at a time
- The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
- The study of cryptography and cryptanalysis
- This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination
26 Clues: – keeps a copy of everything pressed • The study of cryptography and cryptanalysis • malicious code detected based on the behavior • These are the programs that leak the information • the fault detection – waiting for a system to fail • (secure shell) is a pair of protocols defined for Unix • systems reveal information that could facilitate an attack • ...
Data Security Puzzle 2025-03-21
Across
- A weakness in system security procedures, software, hardware, design, implementation, internal controls, technical controls, physical controls, or other controls that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy
- attack created by a flood of requests from a coordinated large number of distributed nodes to overwhelm a server.
- a piece of code or a technique that takes advantage of a vulnerability or flaw in software or hardware to gain unauthorized access, cause unintended behavior, or disrupt a system
- an adversary sponsored by a country's government that are often well organized and funded
- using a carefully crafted software code that violates the operating systems access control policy and allows the attacker to gain full control of the system
- any method by which an adversary interferes with the traffic on a physical level.
- an attack enabled by leakage of information from a physical cryptosystem including timing, power consumption, and electromagnetic emissions.
- one principle of persuasion that says that people will tend to avoid mistakes by acting according to what others have done
- one principle of persuasion that says they are more likely to respond to messages from people they share similarities with or have a good feeling about
- one principle of persuasion that workers tend to respond to people above them such as their boss or higher ups
- a carefully crafted script in the user input to redirect a user and retrieve their login information (in the form of a cookie) from a legitimate website database.
- an attack where the adversary uses carefully crafted code that sends the users cookie to their computer so they now control the current session
- a document signed in organizations to ensure that technology is used for their intended purposes only.
- a set of changes or updates to a software program or operating system, designed to fix bugs, address security vulnerabilities, or improve functionality or performance
- the idea that users complete tasks with the least amount of cognitive effort
- systems that closely connect hardware, software and networks that often run autonomously
- hiding in a network and collecting all the bits that are being transferred between hosts
- turning long numbers or passwords into smaller pieces of data to help user memory
- type of data that includes social security number, usernames, passwords, etc..
- a law that protects the personal private data for citizens in the European Union.
- an event where confidential, private, protected, or sensitive information is exposed to unauthorized individuals, either through an accidental occurrence or an intentional act to steal information
- one principle of persuasion that says perceived value is greater if they believe it is limited and they must hurry to get it
- the type of data that is stored, transferred, inputted/outputted, or processed
- this is the state we refer to data that is traveling across a network
- this attack uses the amount of time it takes for each part of a cryptographic function to infer information.
- one principle of persuasion that says people tend to repay someone that has provided them something
- measuring the surrounding EM of the hardware to infer cryptographic keys
Down
- type of attack that uses the fact that some data is not fully deleted
- this is the state we refer to data that is currently being stored either on a device, server, cloud, or backup medium
- sending fake information to a network devices, servers, or applications with malicious intent
- one principle of persuasion that says that you can pressure someone by crafting messages to a cause they believe in
- A type of DDoS attack that uses a large number of spoofed IP addresses to send UDP packets to overwhelm a server
- attack intent to deny legitimate network users access to a resource such as a network, server, or website
- carefully crafted command in the user input to execute a malicious command on the website's hosting server.
- Individuals or groups operating domestically or internationally who use violence or threat of violence inflicted through cyber means with the intention of coercing or intimidating governments or societies into succumbing to their demands
- a requiring that hardware respond to tampering by failing in a safe way
- a security requirement for any hardware handling data protection
- a string that says: this user is authenticated already
- federal law that sets the consequences for accessing data or computers that you are not authorized to access in the federal government
- type of data that contains roles and authorized resources to be used for reading, writing, and processing
- type of data that sets rules for how to protect data on all other levels
- carefully crafted SQL syntax in the user input to retrieve information stored in a database
- erasing critical parts of memory in response to tampering
- changing the identifyable information on a computer to be that of another computer. This can be done with MAC addresses or IP addresses
- federal law that protects a person's health records and sets rules for how it can be used or disclosed.
- individual that uses cyberspace to break the law
- a mathematical algorithm that converts an input of any length into a fixed-size output, called a hash or message digest, ensuring data integrity and authenticity
- a type of man-in-the-middle attack that allows an adversary to set up an unsecure connection to the user and establishes a secure connection with the target website gaining complete unencrypted access to user requests.
- an electrical grid that includes central control and monitoring connecting to smart meters, smart appliances, etc..
- a type of DDoS attack that exploits the TCP three way handshake.
- techniques for luring a user to yield their credentials using persuasion, technological manipulation, and carefully crafted messages
- a type of attack that measures the level of electricity needed for each bit of data. 1s use more energy than 0s.
- this is the state we refer to data that is currently being processed by an application
- 3D model used to represent design aspects for securing data at every level
- an accidental or non malicious individual that makes a mistake with sharing or triggering malicious software by not following standard cyber safety protocols
- a temporary place to put data to help predict possible next processes. This is often used to do side channel attacks as it takes a different amount of time to process compared to RAM.
- any method by which authorized or unauthorized users are able to get around a security policy in systems.
- a vulnerability discovered and exploited by adversaries but never reported to the software vendor, NVD, or CERT
- federal law that affords parents the right to have access to their children's records, the right to change records, and the right to have some control over disclosure.
- a law passed in California that protects the personal data for citizens of California.
60 Clues: individual that uses cyberspace to break the law • a string that says: this user is authenticated already • erasing critical parts of memory in response to tampering • a security requirement for any hardware handling data protection • a type of DDoS attack that exploits the TCP three way handshake. • ...
Security Crossword Craziness 2025-06-11
Across
- Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
- Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
- ___ your laptop securely when it is not under your direct control
- – report all lost devices to the ___
- Change of ___
- Do not use ___ accessories such as headsets and keyboards
- A marking used to show a document is originator controlled
- – Online sites that can put your personal information at risk
- A secure way to connect remotely to our network
- Key to entering secure areas
- Bag used to transport material RESTRICTED and above
Down
- What you should do when you step away from your laptop
- – A way to categorise information to protect it
- Pre-travel notification is required when travelling through a ___ country
- Fake emails to get you to click
- Encourages putting sensitive information away at the end of the day
- A person who gains access by pretending to belong
- Suspicious, ongoing, unusual or ___
- – access to official information is governed by your ___
- Do not disclose online that you hold a ___ ___ clearance
- Must be strong and never shared
- – Reporting these allow MFAT to identify and manage security risks
- - Work laptops, iPads, phones, and documents being more susceptible to theft or loss when working ___
23 Clues: Change of ___ • Key to entering secure areas • Fake emails to get you to click • Must be strong and never shared • Suspicious, ongoing, unusual or ___ • – report all lost devices to the ___ • – A way to categorise information to protect it • A secure way to connect remotely to our network • A person who gains access by pretending to belong • ...
Aviation Security & Safety 2025-06-13
Across
- Suitcases and bags you take with you when travelling
- Any potential risk to aviation safety, including unauthorized access over secutiry borders
- The key to sharing information clearly, whether in aviation or daily life
- A place where passengers check in, board flights, and retrieve luggage
- The hub where passengers arrive, depart, and connect in the skies
- The heart of hospitality in aviation, ensuring passengers needs are met with care and efficiency
- Someone who travels by plane, train or car but doesn't operate the vehicle
- The public area of an airport, accessible to the public
- Where passports are checked before passengers cross international borders
Down
- A type of flight that keeps you within your home country's borders
- Where passengers luggage and belongings are checked before entering or departing a country
- Planes need this long, clear path to lift off or touch down safely
- A type of flight that takes you beyond your home country's borders
- The invisible line separating nations, often requiring passports and security checks to cross
- A protective shelter where aircraft rest, get maintained and prepare for the next flight
- The secured part of an airport you reach when clearing security and boarding begins
- The process of inspecting passengers, luggage and cargo to detect prohibited or dangerous items
- Controlling who can enter restricted airport zones to prevent unauthorized personnel from reaching sensitive areas
- A situation requiring immediate attention, often triggering special airport procedures
- The top priority in aviation, guiding procedures to protect passengers and crew
20 Clues: Suitcases and bags you take with you when travelling • The public area of an airport, accessible to the public • The hub where passengers arrive, depart, and connect in the skies • A type of flight that keeps you within your home country's borders • Planes need this long, clear path to lift off or touch down safely • ...
Security Awareness Training 2025-07-23
Across
- Fined for transferring user data to China
- Phishing method that uses text messages
- Passwords should be at least this many characters long
- Former Yahoo scientist accused of stealing proprietary code
- AI-generated phishing that’s dynamic and hard to detect
- Your code, docs, and slides are this type of asset
- Company breached over Memorial Day weekend in 2025
- What you should do immediately if something goes wrong
- Browser-based password manager you should avoid
- Secure method that requires two steps to log in
Down
- Files should be saved here, not on your desktop
- Phishing that uses voice calls
- What hackers exploited at Co-op in May 2025
- QR code-based phishing
- Secure password manager employees should use
- One login, many tools — safer, faster, smarter
- Adidas breach was caused by this third party
- Must never be uploaded into public AI tools
- Exposed data for 6 years due to a misconfigured Google Drive
- Human factor responsible for 74% of breaches
20 Clues: QR code-based phishing • Phishing that uses voice calls • Phishing method that uses text messages • Fined for transferring user data to China • What hackers exploited at Co-op in May 2025 • Must never be uploaded into public AI tools • Secure password manager employees should use • Adidas breach was caused by this third party • Human factor responsible for 74% of breaches • ...
security crossword puzzle 2022-12-02
Across
- a set of of software tools used by an attack to hide the actions or presence of other types of malicious software
- Software that scans the computer as well as any new documents for viruses
- a malicious program designed to enter a computer via a network to take advantage of vulnerability in an application or an operating system
- a logical computer network of zombies under the control of an attacker
- malware that can trigger arbitrary code execution from one computer to a second computer over a etwork or the internet
- a separate program or feature incorporated within a browser that stops popup advertisement from appearing
- an infected computer that is under the remote control of an attacker
- Hardware or software that limits the spread of malware
- software that is a cumulative package of all patches and features updates
Down
- software code that allows one incirconventing normal security measures
- a database of viruses that is used to identify an infected file
- Software that helps prevent computers from being infected by spyware
- Malware that prevents a users device from working properly until a fee is paid
- an attacker who controls a botnet
- enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
- an executable program that is advertised as performing one activity but actually performs a malicious activity
- a general term used to describe software that spies on users by gathering information without consent
- Computer code that lies dormant until triggered by a specific logical event
- software of a hardware device that captures and stores each keystroke that a user types on the computers keyboard
- a public release software security update intended to repair a vulnerability
20 Clues: an attacker who controls a botnet • Hardware or software that limits the spread of malware • a database of viruses that is used to identify an infected file • Software that helps prevent computers from being infected by spyware • an infected computer that is under the remote control of an attacker • ...
Friendship & Cyber Friends 2022-11-01
18 Clues: sammen • en ven • at såre • at dele • mobning • vigtigt • en tanke • en konto • en bølle • en besked • et forhold • et venskab • en følelse • en kammerat • et skænderi • en interesse • en opdatering • en hemmelighed
Amped Up 2025-11-18
Across
- Deville or Deluxe?
- variations include "cyber"
- Echo, echo echo...
- Shaky amp geared towards lower frequencies
- Tweed or Pro?
- Now in the LTX model
Down
- 1995 retro design
- 10 watt, great for beginners
- The rebranding of the "Dual Professional"
- 1948 low power studio staple
- Ivy League
- Evolution of the "Woodie"
- Early 50s amp designed by Freddie Tavares
13 Clues: Ivy League • Tweed or Pro? • 1995 retro design • Deville or Deluxe? • Echo, echo echo... • Now in the LTX model • Evolution of the "Woodie" • variations include "cyber" • 10 watt, great for beginners • 1948 low power studio staple • The rebranding of the "Dual Professional" • Early 50s amp designed by Freddie Tavares • Shaky amp geared towards lower frequencies
CWiCS Breaches of 2020 2021-02-11
Across
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- Malicious code was sneaked into updates to this SolarWinds software
- The telecom service provider became the victim of a Magecart card-skimming attack.
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- this based cyber attacks rose 630% between January and April 2020
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- this Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
- Malware designed to steal sensitive information stored on an infected device.
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------- and stole patient data
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
- Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
- hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
- Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
- A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Trojan functioning as a downloader or dropper of other malwares
- Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization
31 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • this based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
CWiCS Breaches of 2020 2021-02-16
Across
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- Malicious code was sneaked into updates to this SolarWinds software
- The telecom service provider became the victim of a Magecart card-skimming attack.
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- This based cyber attacks rose 630% between January and April 2020
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- This Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
- Malware designed to steal sensitive information stored on an infected device.
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------- and stole patient data
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
- Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
- Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
- Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
- A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Trojan functioning as a downloader or dropper of other malwares
- Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization
31 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • This based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
February Hotel Hero 2025-02-27
Across
- Taylor - In Room Dining
- De Loera - Security
- Thomas - Reservations
- Patino - Culinary
- Schindler - Restaurant
- Fernandez - Restaurant
- Atkinson - Technology Innovation & Data
- Dubois - In Room Dining
Down
- Regalado Lopez - Security
- Aceves Mancilla - In Room Dining
- Tingle - Spa
- Nevarez - Culinary
- Anquetil - Housekeeping
- Baxter - Pastry
- Reyes - Housekeeping
15 Clues: Tingle - Spa • Baxter - Pastry • Patino - Culinary • Nevarez - Culinary • De Loera - Security • Reyes - Housekeeping • Thomas - Reservations • Schindler - Restaurant • Fernandez - Restaurant • Taylor - In Room Dining • Anquetil - Housekeeping • Dubois - In Room Dining • Regalado Lopez - Security • Aceves Mancilla - In Room Dining • Atkinson - Technology Innovation & Data
Security Crossword Puzzle 2025-06-26
Across
- When classified information mistakenly ends up on an unsecured system.
- Everyone, cleared and uncleared, is responsible for ________ classified information.
- Sharing classified information with uncleared persons is called ________ disclosure.
- Reporting _________ information to security is a requirement for all employees.
- The document located on the FSO page where you can locate all security policies and procedures (Abbr.).
- To access classified information, you must first have a favorable _____________ determination at the appropriate level.
Down
- Security risk that comes from within the organization.
- Before you embark on any ________ travel, you must complete a pre-briefing in Sign-In Compliance.
- The person in charge of a company's security program.
- How often every employee must complete their required security trainings.
- Only those with eligibility AND need-to-know can _______ classified information.
- Not a classification, but a designation.
12 Clues: Not a classification, but a designation. • The person in charge of a company's security program. • Security risk that comes from within the organization. • When classified information mistakenly ends up on an unsecured system. • How often every employee must complete their required security trainings. • ...
Win an iPad mini from SIX Financial Information! 2013-05-09
Across
- US regulation to combat offshore tax evasion
- European tax on interest income
- How many millions of securities in SIX Financial’s DB?
- FACTA report and revenue collector
- How many global security ID schemes cross-referenced by SIX
- Managing Director of SIX Financial Information USA
- Requirement for FATCA compliance: Fund ___________
- Nothing is certain but death and ________ (Benjamin Franklin)
- Adherence to regulations
- "Legal Entity _____________"
- Fund look through required for this regulation
Down
- Market transparency directive dating to 2004
- No. times SIX named "Best Corp. Actions Data Provider"
- Type of data describing a security or an issuer
- First country to introduce a financial transaction tax
- Swiss tax treaty with UK & Austria, "Final __________ Tax"
- Provider of robust tax & compliance data
- Set of directives allowing cross-border fund sales in the EU
- How many decades SIX has been in business?
- Swiss national security ID number
- Second country to introduce a financial transaction tax
21 Clues: Adherence to regulations • "Legal Entity _____________" • European tax on interest income • Swiss national security ID number • FACTA report and revenue collector • Provider of robust tax & compliance data • How many decades SIX has been in business? • Market transparency directive dating to 2004 • US regulation to combat offshore tax evasion • ...
bullying 2023-03-21
Cyber Quiz 2021-08-30
Across
- assortment of PCs with enormous capacity abilities that distantly serve demands.
- Any endeavor to disregard the security border of a consistent climate
- The action of breaking down and additionally looking through information to discover things of importance, importance or worth.
- - communicated as series of the digits 0 and 1
- A stack of info sent from a site to an internet browser that records a client's action on that site.
Down
- Equipment and additionally programming intended to keep unapproved clients from getting to a PC framework.
- the change of text, pictures, or sound into a computerized structure that can be prepared by a PC
- A strategically or philosophically propelled digital assault or hack.
- The second a programmer effectively takes advantage of a weakness in a PC or gadget, and accesses its records and organization.
- An online diary. Constriction of the term web log.
- Making a copy duplicate of information onto a different actual stockpiling gadget or on the web/distributed storage arrangement
11 Clues: - communicated as series of the digits 0 and 1 • An online diary. Constriction of the term web log. • A strategically or philosophically propelled digital assault or hack. • Any endeavor to disregard the security border of a consistent climate • assortment of PCs with enormous capacity abilities that distantly serve demands. • ...
Cyber Crossword 2021-09-05
Across
- “the adoption or increase in use of digital or computer technology by an organization, industry, country.
- a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
- a paperless method of sending messages, notes or letters from one person to another or even many people at the same time via Internet.
- action or process of digitizing or conversion of analogue data in digital form.
- an integrated service of electronic applications needed for any kind of healthcare function.
Down
- validates contracts entered into electronically, and validates electronic signatures.
- virtual network of websites connected by hyperlinks.
- This in Cyber space is a focal point for two opposing schools of thought, the Cyberlibertarians and the Cyber-paternalists.
- an Internet utility software used touploaded and download files.
- a type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure.
- the first paying method from partner to partner,which does not have any mediator and obtains its power from the users.
11 Clues: virtual network of websites connected by hyperlinks. • an Internet utility software used touploaded and download files. • action or process of digitizing or conversion of analogue data in digital form. • validates contracts entered into electronically, and validates electronic signatures. • ...
Cyber Safety 2022-09-26
11 Clues: who you are • where you live • your contact number • putting something online • people who see your posts • content that everyone can see • telling others not to give up • Apps like Facebook and TikTok • what you think about something • organisation that cares for money • content that only trusted people can see
CYBER BULLYING 2019-11-19
11 Clues: MEAN TO DO • HAS A KEYBORD • adults HAVE THIS APP • you CAN SNAP PITHURES • THIS IS WHAT GETS BULLIED • its A MOTHER BOARD OF APPS • GETS BULLIED ON THE INTERNET • little KIDS HAS THIS ELETRONIC • A ELECTRONIC THAT TENNAGERS HAVE • TO PUT SOMETHING ON THE INTERNET • presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
Cyber-bullying 2020-11-20
Across
- photo editor
- an app where you can post images
- the effect on someone
- people who comment hateful messages
- an image you take off of the device your on
- the act of someone or yourself acting like someone else
Down
- the act of being bullied online
- a funny photo with a caption
- a social platform where you can post images and text
- online platform where you make videos with dances
- a symbol and a title
11 Clues: photo editor • a symbol and a title • the effect on someone • a funny photo with a caption • the act of being bullied online • an app where you can post images • people who comment hateful messages • an image you take off of the device your on • online platform where you make videos with dances • a social platform where you can post images and text • ...
Cyber Love 2022-12-14
Cyber Safety 2025-02-05
11 Clues: Stop • Divide • Appear • Believe • Security • Complain • Power down • Support button • Press a button on the mouse • Have a high opinion of someone • Unwanted presence of someone online
Cyber Crossword 2025-06-11
Across
- A secret way for hackers to get access
- Restarting a computer
- A virus that is named for a Greek god
- An operating system. Or something you look out of.
- A half-person half-computer
- Someone who hacks
Down
- Malware that gives hackers access to root access
- A purple friend
- A way of tricking someone into giving access
- Make a message into a weird code
- Turn a weird code back into a message
11 Clues: A purple friend • Someone who hacks • Restarting a computer • A half-person half-computer • Make a message into a weird code • A virus that is named for a Greek god • Turn a weird code back into a message • A secret way for hackers to get access • A way of tricking someone into giving access • Malware that gives hackers access to root access • ...
Health Informatics 2024-02-19
Across
- the ability of different systems and devices to work together and exchange data effectively
- the process of identifying, assessing, and mitigating potential risks to the confidentiality, integrity, and availability of sensitive information
- a security system that controls access to a network or system by blocking unauthorized traffic.
- a comprehensive clinical terminology used for coding and indexing of health information
- the use of computer algorithms to perform tasks that normally require human intelligence, such as decision-making or pattern recognition.
- a digital record of a patient's health information that they can access and update themselves
- the act of adhering to laws, regulations, and standards related to information security and privacy.
- the use of technology to provide healthcare services remotely such as through video calls or online
Down
- a digital version of a patient's medical history and treatment information within one healthcare organization.
- the unauthorized access or release of sensitive information.
- the process of identifying and evaluating potential risks to the security and confidentiality of Information.
- the use of technology to manage and analyze health-related data and processes
- a standard for information security management systems (ISMS)
- the use of mobile devices and technology to support health and healthcare.
- the field of science that uses computational techniques to analyze and interpret biological data
- the process of managing who can access information and resources.
- the process of converting data into a code to protect it from unauthorized access
- the process of reviewing and evaluating information security and privacy practices to ensure compliance with laws, regulations, and standards.
- the study of how genetic information is modified by environmental factors
- a standard for identifying laboratory and other clinical observations
20 Clues: the unauthorized access or release of sensitive information. • a standard for information security management systems (ISMS) • the process of managing who can access information and resources. • a standard for identifying laboratory and other clinical observations • the study of how genetic information is modified by environmental factors • ...
SecureEdge 2023-05-22
Across
- SASE Network Edge
- CGF Management UI
- An on-prem or cloud-delivered network security service
- Barracuda’s VPN protocol
- By 2025, Gartner predicts ____ % of enterprises will adopt SASE solutions
- SecureEdge ____ runs on the Barracuda Cloud
- Simplified Cloud Management Portal
- An on-prem or cloud-based security policy enforcement point
- SecureEdge replaces this product
- Core function of CGF and SecureEdge
- Needed to connect to GCP
Down
- Coined by Gartner
- SecureEdge is a ____ replacement
- Half of SASE framework that provides cloud-based network services
- An expensive networking technology
- ____ provides a highly granular access mechanism to apps, data, services based on a user’s identity
- Campus SecureEdge Sales Specialist Course
- Enterprise grade firewall with SD-WAN
- Half of SASE framework the provides cloud-based network security services
- SecureEdge Hardware or Virtual appliance
- SecureEdge WorkRamp analogy for SASE
- Cloud-based firewall
- SecureEdge remote access client
23 Clues: Coined by Gartner • SASE Network Edge • CGF Management UI • Cloud-based firewall • Barracuda’s VPN protocol • Needed to connect to GCP • SecureEdge remote access client • SecureEdge is a ____ replacement • SecureEdge replaces this product • An expensive networking technology • Simplified Cloud Management Portal • Core function of CGF and SecureEdge • ...
¿A dónde vas a viajar? list 1 Sp 2 2025-05-08
Across
- ticket 1
- suitcase
- seatbelt/security belt
- ticket 2
- to pack a suitcase
- layover
- to take a trip
- to board
- platform
- baggage claim
- plane
- airport
- to be delayed
- train station
- customs
- to fly
- ticket counter (airport)
- to camp, to go camping
- arrival
- to take off
- to stay
- passport
- to be on vacation
- to make plans
- carry-on luggage
- gate
Down
- flight
- ticket booth (train station)
- to travel
- to lose; to miss
- departure
- to check luggage
- stop
- security agent (TSA)
- luggage
- conductor/controller
- passenger
- flight attendant
- sleeping car
- boarding pass
- to be on time
- to wait (for); to hope
- to go through security
- to land (plane)
- in the airport
- seat
46 Clues: stop • seat • gate • plane • flight • to fly • layover • luggage • airport • customs • arrival • to stay • ticket 1 • suitcase • ticket 2 • to board • platform • passport • to travel • departure • passenger • to take off • sleeping car • baggage claim • to be delayed • train station • boarding pass • to be on time • to make plans • to take a trip • in the airport • to land (plane) • to lose; to miss • to check luggage • flight attendant • ...
Code CrossWord 2016-02-08
Across
- bully a bully over online
- a logic gate
- to identify or remove errors
- a command
- a file of information
- a programming
- getting mail from a computer
- a virus on a computer
Down
- when you dont receive messages from that person
- literacy process of teaching and learning and using technology
- a system
- health and wellness physical and psychological well-being in a digital technology world
- a error
13 Clues: a error • a system • a command • a logic gate • a programming • a file of information • a virus on a computer • bully a bully over online • to identify or remove errors • getting mail from a computer • when you dont receive messages from that person • literacy process of teaching and learning and using technology • ...
SN33003FP Chapter 7 2024-07-06
Across
- Secure privileged accounts, configure password policies and lockout policies and enable logs to record all events
- Protects data by transforming it using a complicated algorithm to make it unreadable
- Include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice
- Hardware/software that enforces network security policies by filtering unauthorized or potentially dangerous traffic
- Uses Message Integrity Check (MIC) to detect if an attacker had altered the data and Temporal Key Integrity Protocol (TKIP) to better handle, protect and change encryption keys
- Any wireless device can connect to the wireless network and is used where security is of no concern
- Equipment uses networks (e.g. internet) to make / receive phone calls
- Consists of permissions that limit folder or file access for an individual or for a group of users
- Users should be limited to only the resources they need
- Fends off problems posed by rogue access points and requires two-way authentication
- Freezes hard drive partitions, reverting a system to its preset state upon restart
- Allows an individual to gain access to an area with automated entry points using various technologies
- Uses Advanced Encryption Standard (AES) for even better key management and encryption protection
- Control access to an organization's sensitive areas
- Manufacturers combine patches and upgrades into a service pack to mitigate attacks
Down
- Automatically logs the user out and locks the screen after a specified period
- Private network that connects remote sites or users together over a public network, like the Internet
- Copies the contents of a computer's hard disk to an image file
- Video and electronic surveillance supplement or in some cases, replace security guards
- Enhances default security, removes unnecessary programs, applies patches, systematically updates, and identifies vulnerabilities
- Power protection controls, HVAC systems, and hardware monitoring systems
- One of the first widely used Wi-Fi security standards that suffered from numerous security weaknesses
- Uses satellites and computers to determine the location of a device
- A dedicated site that monitors, assesses, and defends the organization's information systems
- One or more locations containing the tools that provide administrators with a detailed status of the organization's network
- Antivirus protection, adware protection, phishing protection, spyware protection
- A program that allows or denies traffic between the computer and other connected computers
- Provides mechanisms to authenticate and encrypt data between a wireless client and wireless router
28 Clues: Control access to an organization's sensitive areas • Users should be limited to only the resources they need • Copies the contents of a computer's hard disk to an image file • Uses satellites and computers to determine the location of a device • Equipment uses networks (e.g. internet) to make / receive phone calls • ...
SMS des Schreckens 2017-12-21
Across
- Wichtigstes Utensil für viele Jugendliche
- Name einer Online Beratung bei Mobbing
- Was wurde bei der Kaffeejause gegessen
- Hauptperson
- Lieblingsspeise Julias
Down
- Absichtliches Beleidigen im Internet oder über das Handy
- Vorname der Autorin
- Spitzname von Julias Geographielehrerin
- Abkürzung für Short Message Sending
- Bruder von Emma
- SMS Kürzel für See you
- Name von Julias zukünftigen Stiefvater
- Julias beste Freundin
13 Clues: Hauptperson • Bruder von Emma • Vorname der Autorin • Julias beste Freundin • SMS Kürzel für See you • Lieblingsspeise Julias • Abkürzung für Short Message Sending • Name einer Online Beratung bei Mobbing • Was wurde bei der Kaffeejause gegessen • Name von Julias zukünftigen Stiefvater • Spitzname von Julias Geographielehrerin • Wichtigstes Utensil für viele Jugendliche • ...
IT, technology, computers 2023-06-10
Across
- : Wireless network technology
- : Unauthorized access to systems
- : A tiny element of an image
- : Central processing unit
- : A computer that provides services
- : Device for internet connection
- : Network device for internet connection
- : Software for web browsing
Down
- : An open-source operating system
- : Online storage and computing
- : Relating to computers and the internet
- : A programming language
- : Instructions for computers
- : Random access memory
- : A unit of digital information
- : A computer input device
16 Clues: : Random access memory • : A programming language • : Central processing unit • : A computer input device • : Software for web browsing • : A tiny element of an image • : Instructions for computers • : Wireless network technology • : Online storage and computing • : A unit of digital information • : Unauthorized access to systems • : Device for internet connection • ...
Puzzle #15 – “Social Security Fraud” 2025-06-29
Across
- - Illegal use or abuse of Social Security information
- - Never give out your Social Security ______ over the phone
- - Email tactic scammers use to steal info
- - Scammers often use this to trick people
- - What you must do to your Social Security information
Down
- - Type of theft involving stolen personal information
- - Type of program scammers try to exploit
- - What you should do if you suspect fraud
- - A common scheme to steal your Social Security number
- - Agency that investigates Social Security fraud
10 Clues: - Type of program scammers try to exploit • - What you should do if you suspect fraud • - Email tactic scammers use to steal info • - Scammers often use this to trick people • - Agency that investigates Social Security fraud • - Type of theft involving stolen personal information • - Illegal use or abuse of Social Security information • ...
Quarta Rivoluzione industriale 2024-02-05
9 Clues: Industrial • aumento dell’uso • rende più…il lavoro • come sono le macchine • Bisogna dare attenzione • contiene 4 elementi chiave • Sono sistemi di produzione • ne saranno capaci Le macchine • Sono state create…intelligenti
Quarta Rivoluzione industriale 2024-02-05
9 Clues: Industrial • aumento dell’uso • rende più…il lavoro • come sono le macchine • Bisogna dare attenzione • Sono sistemi di produzione • contiene 4 elementi chiave • ne saranno capaci Le macchine • Sono state create…intelligenti
Social Security & Markets 2020-12-05
Across
- These enrollees must provide evidence of insurability if they enter the group plan after the open enrollment period.
- The acronym for the amount of monthly payment one receives once Social Security Benefits are activated and calculated by a formula into this amount.
- This type of ownership occurs when the applicant purchases a policy on the insured who is not themselves
- This type of plan is used when business partners purchase life insurance on one another so that in the event of one of their death the other business partner can purchase the shares of the deceased business partner.
- These groups are formed for a purpose other than to purchase insurance.
- The number of credits required to be considered eligible for the maximum amount of social security benefits.
- the minimum number of credits to qualify for disability insurance
- This is also is referred to as the minimum amount necessary to qualify for disability insurance.
- This type of group plan requires that 100% of eligible participants must participate and all premiums are paid by the employer.
- this is the number of credits a working individual receives for every year of work towards their social security
- Each group policy participant receives this as their proof of being part of the plan.
- Current full retirement age.
- The surviving spouse may continue to receive benefits until the youngest child reaches this age.
Down
- An individual who has succesfully received all of the credits necessary to receive the maximum amount of social security benefits.
- This plan is used so that the business can purchase life insurance on the partners and buy back the shares from the deceased partners' estate or family.
- This policy controls the group life insurance plan and must have the producers information and signature.
- almost every group life insurance policy is written as this type of insurance.
- The original name for social security
- The number of years required to work in order to qualify for the maximum benefit amount for social security benefits.
- This type of group plan requires that 75% of eligible participants must participate and some premiums are paid by the employer.
- This type of policy is purchased in order to protect the company from loss of an employee that is integral to the business.
- The minimum age at which someone could begin to receive social security benefits but would permanently reduce the benefits received.
22 Clues: Current full retirement age. • The original name for social security • the minimum number of credits to qualify for disability insurance • These groups are formed for a purpose other than to purchase insurance. • almost every group life insurance policy is written as this type of insurance. • ...
Zajedno za bolji internet 2023-03-01
Across
- male datoteke
- prividna stvranost nastala pomoću računala
- nosimo ih kao dan borbe protiv nasilja
- podatci koje ostavljamo na internetu
- nasilničko ponašanje
- namjerno ih ostavljamo na internetu
- neželjna pošta
- skup znakova koji imaju neko značenje
Down
- bez namjere ih ostavljamo na internetu
- govorenje nečeg ljepog nekoj osobi
- naslije preko interneta
- vrijeđanje druge osobe
- zbirka elektroničkih dokaza
- mogućnost slanja poruka putem interneta
- vrijeđanje osoba putem tehnologije
15 Clues: male datoteke • neželjna pošta • nasilničko ponašanje • vrijeđanje druge osobe • naslije preko interneta • zbirka elektroničkih dokaza • govorenje nečeg ljepog nekoj osobi • vrijeđanje osoba putem tehnologije • namjerno ih ostavljamo na internetu • podatci koje ostavljamo na internetu • skup znakova koji imaju neko značenje • bez namjere ih ostavljamo na internetu • ...
Cyber 2022-11-16
DOMESTIC & INTERNATIONAL AIRPORTS ASH 2017-09-11
Across
- A AREA WHERE YOU GO THROUGH SECURITY
- RUNWAYS
- A AREA BEFORE DEPARTING PASSENGERS
- A PLACE TO SELL AND BUY FOREIGN CURRENCY FOUND ON BOTH AIRSIDE AND LANDSIDE
- A WORD YOU SHOULD NOT USE IN AIRPORT AREA
- LUGGAGE STORAGE AREA
- THREE LETTER CODE FOR TAURANGA
- MANY AIRPORTS OFFER BOTH SHORT AND LONG TERM____
- NEED TO SHOW ______ AT THE PASSPORT CONTROL
Down
- THREE LETTER CODE FOR TIMARU
- AIRPORT OPERATES
- A MACHINE IN WHICH A CONVEYER BELTS MOVES THE ITEMS THROUGH THE MACHINE
- A AREA WHICH BAGS MUST NEVER BE LEFT UNATTENDED
- WHO HANDLE_____FOR A NUMBER OF AIRLINES
- A PLACE FOR PURCHASING GOODS ON AIRSIDE
- LIQUIDS, AEROSOLS AND GELS ARE KEPT INSIDE IT
- BEFORE GOING TO AIRSIDE YOU MUST PASS____
- A FAST FOOD RESTAURANT FOUND ON THE AIRSIDE OF THE AIRPORT
- AVIATION SECURITY
- A AIRPORT THAT HAS 15 MILLION PASSENGERS
20 Clues: RUNWAYS • AIRPORT OPERATES • AVIATION SECURITY • LUGGAGE STORAGE AREA • THREE LETTER CODE FOR TIMARU • THREE LETTER CODE FOR TAURANGA • A AREA BEFORE DEPARTING PASSENGERS • A AREA WHERE YOU GO THROUGH SECURITY • WHO HANDLE_____FOR A NUMBER OF AIRLINES • A PLACE FOR PURCHASING GOODS ON AIRSIDE • A AIRPORT THAT HAS 15 MILLION PASSENGERS • BEFORE GOING TO AIRSIDE YOU MUST PASS____ • ...
CTF-CW-2S 2025-11-17
Across
- Legal basis requiring explicit permission for data processing
- Special rights or access levels in a system
- Offensive security and threat-simulation platform at Tekion.
- Privacy principle restricting how long personal data can be kept
- Copying data for recovery after loss
- AI-powered platform at Tekion that finds and fixes app code vulnerabilities.
- Sequence of actions to achieve an outcome
- Tactics, Techniques, and Procedures acronym
- Self-replicating malware spreading through networks
Down
- Unplanned event threatening data or operations
- A company you hire to run your security monitoring remotely
- Verifying identity to access a system
- Canada's Personal Information Protection and Electronic Documents Act
- Recovery strategy for a detected issue
- Combining individual data points into statistical summaries to protect privacy
- Document tracking known risks
- Runtime application security platform deployed at Tekion.
- Bringing operations back after an incident
- International standards-setting organization
- Data Loss Prevention: protecting info from leaving the network
20 Clues: Document tracking known risks • Copying data for recovery after loss • Verifying identity to access a system • Recovery strategy for a detected issue • Sequence of actions to achieve an outcome • Bringing operations back after an incident • Special rights or access levels in a system • Tactics, Techniques, and Procedures acronym • ...
Time and Space 2025-03-16
Across
- The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event?
- Which NASA mission was named after a Greek goddess?
- "Beyond the Light" includes a 26-minute cinematic experience divided into how many scenes?
- What is the primary tool used to study space, as highlighted in the exhibition?
- Jewel Box Sun" showcases the Sun in how many different wavelengths?
- What is the name of the art and technology studio that created "Beyond the Light"?
- Which Mars rover, represented in "Mars Rovers’ Dreams," was described as having a personality combining whimsy, wonder, and grit?
- Which space telescope’s discoveries are featured in "Beyond the Light"?
Down
- What type of orbit will Artemis missions use to help astronauts reach the Moon’s South Pole?
- What type of propulsion does the Artemis mission use for inclination control thrusters?
- The "Cyber Cocoon" installation explores the potential effects of which type of solar event?
- Which scientific institute curates the images from the James Webb Space Telescope?
- "Nature’s Pulse" visualizes Earth’s health using how many transparent OLED screens?
- What celestial body is the focus of NASA’s Artemis mission?
- What space agency collaborated with ARTECHOUSE to create "Beyond the Light"?
15 Clues: Which NASA mission was named after a Greek goddess? • What celestial body is the focus of NASA’s Artemis mission? • Jewel Box Sun" showcases the Sun in how many different wavelengths? • Which space telescope’s discoveries are featured in "Beyond the Light"? • The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event? • ...
RÕIVASTUSSTIILID 2022-12-28
8 Clues: TAASKASUTUS • VÄHEM ON ROHKEM • SWEET, CYBER, GOTIC... • KORRALIK JA HOOLISETUD • EBALOOMULIK JA UNENÄOLINE • LOOMAMUSTRID, LOODUSLIKUD VÄRVID • LILLELAPSED, VABADUS, NATURAALSUS • ILUS HIRMUÄRATAVAKS, HIRMUÄRATAV ILUSAKS
2.4/2.5 2021-10-06
Across
- The greatest security threat to individuals or organisations. Often dangerous due to BYOD.
- Hoax websites can be created to steal information from an individual. Cookies also used to track activity.
- Information such as bank details or card details which could be stolen from an individual, organisation or the state.
- An organisations patents or designs which they would not want to be stolen.
- Funny videos from the past may have been funny back then but could jeopardize someones career prospects if found by employers.
Down
- An attack where a server is overloaded with requests and so refuses to process your request and you don't get the information. Typically a threat to organisations or websites.
- One of the most valuable things in the world, capable of providing great wealth or power to anyone who possesses it.
- Data can be stolen from Individuals, Organisations or The ____.
- Pieces of information that would allow a hacker to know information about an individuals name and address.
- Organisations could become vulnerable to _____ if information is stolen by someone who wants to gain leverage over the organisation.
- What could an organisation lose if they are a victim of a cyber attack. Customers may not trust them anymore.
- An organisations development plans may contain possible ____ with other organisations.
12 Clues: Data can be stolen from Individuals, Organisations or The ____. • An organisations patents or designs which they would not want to be stolen. • An organisations development plans may contain possible ____ with other organisations. • The greatest security threat to individuals or organisations. Often dangerous due to BYOD. • ...
Web Ethics & Security 2020-10-21
Across
- The rights given to a person that created something of their own on their own.
- An individual who uses the internet to locate people, typically children to commit child sexual abuse.
- A type of program that uses a certain code which then is used to change the way that a computer operates.
- Stealing software that is legally protected. For example, copyright, modifying, and distributing.
- a scheme used to damage another individual by using email.
Down
- Using someone else's identity to gain benefits in their name.
- A type of program that copies itself that way it is able to spread onto other computers.
- The use of technology to bully someone over the internet. It is usually a mean message, or a threat.
- Creation, distribution, or forwarding of a message which contains sexually explicit materials through an electronic device.
- Number of internet connected devices, each of these are running one or possibly more bots.
- The act of a computer virus attaching itself to a virus
- The malicious activity a computer virus or worm is designed to do
- When A certain amount used permitted by Copyright.
- A device that provides security/safeguard from unauthorized people.
- this is a type of software that is usually used to damage other computers.
- A type of malware that misleads the person using the computer of its real intent.
- Taking someone else’s ideas, or work and saying that is it yours especially without permission.
- a large, frequently run program attached to the virus.
- The right given to somebody else from the creator in order to publish their work.
- Someone who uses computers to gain access to unauthorized data.
20 Clues: When A certain amount used permitted by Copyright. • a large, frequently run program attached to the virus. • The act of a computer virus attaching itself to a virus • Using someone else's identity to gain benefits in their name. • Someone who uses computers to gain access to unauthorized data. • The malicious activity a computer virus or worm is designed to do • ...
IT Security 1 2017-05-19
Across
- is a type of malware that self-replicates and distributes copies of itself in a computer network.
- refers to any crime that involves a computer and a network.
- occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- is a program that secretly installs itself on computers and collects information about users without their knowledge.
- involves gaining access to a computer or network with authorization from a company or organisation.
- This involves the illegal copying of information from the magnetic strip of a credit card.
- is sequences of instructions that make a computer program perform a specific task.
- is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- is another type of malware that is activated each time a computer system boots (loads) up.
- also known as zombie is a group of computers connected together for malicious purposes.
- it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
- is a software application that automatically displays advertising banners while the program is running.
- is malicious software designed to install itself on a computer without the owner’s knowledge.
- is a system designed to prevent unauthorized access to or from a private network (LAN).
- This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- This involves gaining personal information through deception.
- is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- involves gaining access to a computer or network without authorization.
- is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- is raw unorganized facts that need to be processed.
- involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- The practice of recovering sensitive information from discarded material.
- is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- is a secret way to access a computer without passing security mechanisms.
- is the processed output of data making it meaningful to the person who receives it.
29 Clues: is raw unorganized facts that need to be processed. • refers to any crime that involves a computer and a network. • This involves gaining personal information through deception. • involves gaining access to a computer or network without authorization. • The practice of recovering sensitive information from discarded material. • ...
Security Awareness Puzzle 2014-10-20
Across
- These programs/devices can be used both for legitimate network
- of computer systems or networks.
- Before you throw something in the __________, ask yourself, "Is this something I
- An __________ use policy is a set of rules and guidelines that specify appropriate
- When somebody sends an email with a link to a bogus website it's called.
- A __________ stick, is a plug-and-play portable storage
- One thing you should never do with any of your passwords(3 words)
- You can share your alarm code with this many people at the facility
- All visitors must check in with _________ before they can access our facility.
- give to an unauthorized person or want to become publicly available?"
- Other than locking the door when you are finished using a secure lab, you must also set this
- A __________ is a program and/or device that monitors data traveling over a
- True:False: It is good practice to wear your badge around outside the facility to show good company spirit.
Down
- and for stealing information off a network
- This must be worn at all times while in the facility with no exceptions
- Before entering a secure room you must check your pockets for any ________ devices and place them in the bins
- All of this material must be locked up when there is no one in the room
- If you unlock a room, what must you take off the door and either hold onto or pass to another program accessed person until the room is locked again.
- _________ Is required to take the yearly security training
- The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca, This_P^zz1e!
- Even if someone is cleared at the highest level, they still need this to access a classified program. (3 words)
- Every operating system and plugin needs these for good health.
- If you are holding a classified meeting in one of the conference rooms, these must be posted on the doors that state there is a classified meeting in progress.
- that uses flash memory and is lightweight enough to attach to a key chain. These under no circumstance should ever be brought into a work lab.
24 Clues: of computer systems or networks. • and for stealing information off a network • A __________ stick, is a plug-and-play portable storage • _________ Is required to take the yearly security training • These programs/devices can be used both for legitimate network • Every operating system and plugin needs these for good health. • ...
Security Awareness Puzzle 2015-02-11
Across
- When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Never forward any _________ letter.
- Use __________ passwords for the various accounts that you may have.
- Email scam or attempt to trick you into giving your password or personal information.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- Healthy email always includes a clear and specific ____________ line.
- Use this tool to dispose of documents that contain personal or financial information.
- To protect personal information, avoid sending it via_________.
- A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
- Do not send __________ information over email unless it is encrypted.
- A computer ______ can be considered as the modern counterpart of a paper document.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
- Passwords should be _________ every 3-4 months.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- Passwords should always be at least this many characters long.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
Down
- Also known as malicious software; any program or file that is harmful to a computer user.
- _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
- Never share your _________ with another person.
- To ________ the amount of spam you receive, be careful who you give your email address to.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- A software that is designed to detect and destroy computer viruses.
- Do not leave your laptop or computer ____________.
- Do not _______ your password down or attach it to your keyword or monitor.
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- Do not __________ your password or account with anyone.
- Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
- A password is stronger by using a combination of both upper and lower case ___________.
- Always ___________ your computer when you leave your desk.
- A secure password should contain at least one of these.
- A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.
34 Clues: Never forward any _________ letter. • Never share your _________ with another person. • Passwords should be _________ every 3-4 months. • Do not leave your laptop or computer ____________. • Do not __________ your password or account with anyone. • A secure password should contain at least one of these. • Always ___________ your computer when you leave your desk. • ...
Aviation Safety + Security 2023-11-15
Across
- when you get on the plane
- Making sure you are keeping everyone safe
- fly to another country
- A place where the plane waits
- where the plane takes off and lands
- A form of identification to travel internationally
- uses them to get identify drugs
- Gone through customs/security
- when going to a different destination
- fly in the same country
Down
- Anyone is allowed in this area of airport
- what happens when you enter a country without a visa
- someone who boards a plane
- Something you will need when in an airport or something to do
- Flying or operate of an aircraft
- A child travelling by themself under the age of 12
- Your belongs that you take with you
- A place you go when travelling domestic or international
- A place you go when you want to relax
- when you put your bag through an X-ray
20 Clues: fly to another country • fly in the same country • when you get on the plane • someone who boards a plane • A place where the plane waits • Gone through customs/security • uses them to get identify drugs • Flying or operate of an aircraft • Your belongs that you take with you • where the plane takes off and lands • A place you go when you want to relax • ...
Security Crossword Puzzle 2023-03-17
Across
- Use two-factor authentication
- Trick people by canceling it
- Scare, get person to act
- Looks similar to actual site
- Tracks typing
- intrudes on device remotely
- Directly targets
- Protects with physical key
- Password manager
Down
- Trusted person betrays trust
- Are unaware device was infiltrated
- Protects your device using app
- origins with Phreaking
- Lengthy enough, complex
- Talking to a person for info
- Facial recognition, fingeprints, hand, etc
- Leaves their device unprotected
- Must be used during login
- Ethical, useful hackers by testing
- Person hijacking your SIM card
20 Clues: Tracks typing • Directly targets • Password manager • origins with Phreaking • Lengthy enough, complex • Scare, get person to act • Must be used during login • Protects with physical key • intrudes on device remotely • Trusted person betrays trust • Trick people by canceling it • Talking to a person for info • Looks similar to actual site • Use two-factor authentication • ...
Energy & Food Security 2024-03-25
Across
- alcohol produced from plant matter (sugar cane or maize) which can be used as an alternative to petrol
- form of power for electricity that is generated by utilizing the energy of the sun
- the reliable availability of energy sources at an affordable price with consideration of the environmental impacts
- Cause of energy insecurity
- resources that will run out and not be replenished for millions of years
- impact of energy insecurity
- lack of adequate nutrition, caused by not having a balanced diet or enough to eat
- another form of energy utilizing the power of water
- energy generated from the heat under the surface of Earth
- any source of energy that can be naturally and quickly replenished
Down
- electricity generated by energy from waves or the tides
- suffering or death caused by lack of food
- renewable resource that utilizes currents in the atmosphere to generate electricity
- to store large amounts of goods or materials
- systems that react promptly to sudden changes in the supply-demand balance
- supply of energy that is in line with economic developments and environmental needs
- extreme scarcity of food
- defined as 'when all people, at all time, have physical, social and economic access to sufficient, safe & nutritious food that meets their dietary needs and food preferences for an active and healthy life.
- increase in salt content, usually of agricultural soils, irrigation water or drinking water
- limit the amount of food each person or family is allowed to purchase
- market determines the price of a food product; cause of food insecurity
- type of power using radioactive materials such as uranium & plutonium. Power is produced from energy released as materials undergo reactions
- gas such as methane that can be used as a fuel & is produced by fermenting organic matter.
23 Clues: extreme scarcity of food • Cause of energy insecurity • impact of energy insecurity • suffering or death caused by lack of food • to store large amounts of goods or materials • another form of energy utilizing the power of water • electricity generated by energy from waves or the tides • energy generated from the heat under the surface of Earth • ...
