cyber security Crossword Puzzles

Sociology of deviant behaviour 2023-10-19

Sociology of deviant behaviour crossword puzzle
Across
  1. division of labour
  2. a behaviour stray from accepted norms
  3. a public order crime
  4. home a place for temporarily observing juvenile delinquents
  5. slaves committing suicide
  6. another word for anomie
Down
  1. dry state
  2. suicide due to lack of integration
  3. means become goals
  4. cyber crime
  5. Prohibitipon of alcohol in Rajasthan
  6. Mahila Anathalaya

12 Clues: dry statecyber crimeMahila Anathalayameans become goalsdivision of laboura public order crimeanother word for anomieslaves committing suicidesuicide due to lack of integrationProhibitipon of alcohol in Rajasthana behaviour stray from accepted normshome a place for temporarily observing juvenile delinquents

Cyber test 2014-03-28

Cyber test crossword puzzle
Across
  1. Currency
  2. Ironically targeted
  3. Much feared
  4. Best place for cyber advice
  5. Threat x vulnerablity
Down
  1. Regular bedtime read
  2. Don't like China
  3. Unidentifiable hackers

8 Clues: CurrencyMuch fearedDon't like ChinaIronically targetedRegular bedtime readThreat x vulnerablityUnidentifiable hackersBest place for cyber advice

Ap human Natalie Yanez p5 2023-05-12

Ap human Natalie Yanez p5 crossword puzzle
Across
  1. security and Food Security
  2. In Time Delivery
  3. theory
  4. Region
  5. and Intraregional
  6. Branch and Language Group
  7. Domestic Product and Gross National Product
  8. and Quantitive
  9. Settlement
Down
  1. and Subsequent Boundaries
  2. Geography
  3. Family
  4. and Burn
  5. and Metacity
  6. Fertility Rate

15 Clues: theoryRegionFamilyand BurnGeographySettlementand Metacityand QuantitiveFertility RateIn Time Deliveryand Intraregionaland Subsequent BoundariesBranch and Language Groupsecurity and Food SecurityDomestic Product and Gross National Product

Safety Week Crossword Puzzle. 2023-05-04

Safety Week Crossword Puzzle. crossword puzzle
Across
  1. Safety Objective #1: We will protect our People by reducing Employee “______”.
  2. The Mission Statement of the Safety and Security Department is to (3/4) …”and “______” deals with these issues before they become…”
  3. The Mission Statement of the Safety and Security Department is to (2/4) “that “______” risks to the operation and workplace……”
  4. All Southwest Employees are responsible for reading and being familiar with the Safety & Security Commitment and Safety “______”
  5. Safety can never be sacrificed to achieve our other “______” pillars.
  6. At the top of our Operational Philosophy sits “______”, and rightly so, as it’s our top priority at Southwest Airlines.
Down
  1. Safety “______” is the component of our SMS (Safety Management System) that includes training, communication, and other actions that create a positive safety culture within all levels of the Company.
  2. Safety “______” is the component of our SMS (Safety Management System) that evaluates the continued effectiveness of risk controls and supports the identification of new hazards.
  3. The Mission Statement of the Safety and Security Department is to (4/4) “…injuries, accidents or “______”.”
  4. Safety “______” Management is the component of our SMS (Safety Management System) that determines the need for and adequacy of new or revised risk controls based on the assessment of acceptable risk.
  5. The Mission Statement of the Safety and Security Department (1/4) is to “_______”and support a Safety and Security Culture….”
  6. Safety “______” is the component of our SMS (Safety Management System) that establishes our commitment to continually improve safety and defines the methods, processes, and organizational structure needed to meet our Company’s safety goals.
  7. Personal protective equipment, commonly referred to as “______”, is equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses.
  8. Safety Objective #3: We will reduce operational Safety “______”.
  9. Safety Objective #2: We will reduce aircraft “______” in our operation.
  10. Safety Objective #4: We will reduce Security “______” Violations.

16 Clues: Safety Objective #3: We will reduce operational Safety “______”.Safety Objective #4: We will reduce Security “______” Violations.Safety can never be sacrificed to achieve our other “______” pillars.Safety Objective #2: We will reduce aircraft “______” in our operation.Safety Objective #1: We will protect our People by reducing Employee “______”....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  3. Powerful intercepting proxy and web vulnerability scanner.
  4. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  5. uicydata;104.18.12.126
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. A remote code execution flaw in Nginx web server.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  5. Rhysider 44.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. uicydata;104.18.12.126
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  3. Rhysider 44.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  5. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
  1. Powerful intercepting proxy and web vulnerability scanner.
  2. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  3. Shadowy cyber collective widely known because of its work since 02.2022.
  4. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  5. A remote code execution flaw in Nginx web server.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

TTS Informatika Nizhar 2024-09-12

TTS Informatika Nizhar crossword puzzle
Across
  1. Poin profil pelajar pancasila
  2. Pilar dalam berpikir komputasional
  3. Bidang-bidang pengetahuan informatika
  4. Lebih lanjut
  5. Visual
  6. Bahasa inggris informatika
Down
  1. Infografis yang cocok untuk menjelaskan topik pembahasan secara poin per poin
  2. Cyber physical system
  3. Dunia siber
  4. Informatika mencakup

10 Clues: VisualDunia siberLebih lanjutInformatika mencakupCyber physical systemBahasa inggris informatikaPoin profil pelajar pancasilaPilar dalam berpikir komputasionalBidang-bidang pengetahuan informatikaInfografis yang cocok untuk menjelaskan topik pembahasan secara poin per poin

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

cyber 2023-09-28

cyber crossword puzzle
Across
  1. Combines technique from question 1 and , but engages the target through SMS/text messages.
  2. Is a social engineering technique in which an attacker sends fraudulent emails, claiming to be from a reputable and trusted source.
  3. Be care full with what personal information you share in your online presence or risk falling victim to ___, where an attacker uses that information to create a compelling, targeted attack.
Down
  1. If you get ___ request from your friends, they could potentially be social engineers attacks.
  2. When an attacker offers a free music download or gift card in an attempt to trick the user into providing credentials, that's ____.
  3. Social engineers typically use fear and ____ to trick users into committing risky actions.
  4. Not all social engineering attacks take place online such as in vishing where the attacker attempts to trick a victim into disclosing sensitive information or granting access to the target's computer over the---.

7 Clues: Combines technique from question 1 and , but engages the target through SMS/text messages.Social engineers typically use fear and ____ to trick users into committing risky actions.If you get ___ request from your friends, they could potentially be social engineers attacks....

Relations toxiques 2 2025-10-24

Relations toxiques 2 crossword puzzle
Across
  1. HARCÈLEMENT Harcèlement en ligne
  2. Acte violent ou illégal
  3. Faire peur ou menacer quelqu’un
  4. Mauvais traitement ou exploitation
  5. Rendre quelqu’un honteux
  6. Quelqu’un qui viole les règles
  7. Désaccord ou dispute
  8. Contrôle strict ou excessif
Down
  1. Forcer quelqu’un à faire quelque chose
  2. Personne qui subit un dommage
  3. Influencer quelqu’un pour son intérêt
  4. Traiter quelqu’un différemment et injustement
  5. Parole blessante
  6. Comportement répété et nuisible
  7. Influence forte pour faire agir quelqu’un

15 Clues: Parole blessanteDésaccord ou disputeActe violent ou illégalRendre quelqu’un honteuxContrôle strict ou excessifPersonne qui subit un dommageQuelqu’un qui viole les règlesFaire peur ou menacer quelqu’unComportement répété et nuisibleHARCÈLEMENT Harcèlement en ligneMauvais traitement ou exploitationInfluencer quelqu’un pour son intérêt...

SIEM Managed Security and Threat 2014-02-03

SIEM Managed Security and Threat crossword puzzle
Across
  1. an SIEM gathers Information and presents it in ______ ?
  2. SOC Location in Europe ?
  3. Security _____ & xxxxx Management ?
  4. Security xxxxx & _____ Management ?
  5. LME stands for Log ______ Enterprise ?
  6. an LME SIEM generates ______ to alert customer of security incidents ?
  7. What company received a Frost & Sullivan award for growth ?
  8. What does an SIEM gather to analyse ?
Down
  1. SOC Location in Mid USA ?
  2. _____ Protection System ?
  3. SOC Location in Asia ?
  4. Managed SWG protects customers when _______ the web ?
  5. What device sends SIEM logs showing user connects to the internet
  6. Managed WAF protects customer ________ on web servers ?
  7. What does the Managed IVS or EVS Service Scan for ?
  8. Managed NAC is xxxxxx xxxxxx ______ ?
  9. SOC Location in Windy City, USA ?
  10. Who reviews the logs in the SOC ?

18 Clues: SOC Location in Asia ?SOC Location in Europe ?SOC Location in Mid USA ?_____ Protection System ?SOC Location in Windy City, USA ?Who reviews the logs in the SOC ?Security _____ & xxxxx Management ?Security xxxxx & _____ Management ?Managed NAC is xxxxxx xxxxxx ______ ?What does an SIEM gather to analyse ?LME stands for Log ______ Enterprise ?...

Code CrossWord 2016-02-08

Code CrossWord crossword puzzle
Across
  1. to identify or remove errors
  2. a logic gate
  3. a command
  4. health and wellness physical and psychological well-being in a digital technology world
  5. a virus on a computer
  6. a programming
  7. getting mail from a computer
Down
  1. a file of information
  2. a error
  3. when you dont receive messages from that person
  4. communication electronic exchange of information
  5. literacy process of teaching and learning and using technology
  6. a system
  7. bully a bully over online

14 Clues: a errora systema commanda logic gatea programminga file of informationa virus on a computerbully a bully over onlineto identify or remove errorsgetting mail from a computerwhen you dont receive messages from that personcommunication electronic exchange of informationliteracy process of teaching and learning and using technology...

Fundamentals of CYbersecurity 2023-01-22

Fundamentals of CYbersecurity crossword puzzle
Across
  1. secrecy of the information
  2. Involves a computer or computer network
  3. Warning for malicious activity
  4. control Role management and rule management
  5. Weakness in information system
Down
  1. assurance that the information received is exact and accurate
  2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. Attempt to gain unauthorized access
  5. Virtual component world
  6. security triads
  7. identify the user or system or the entity

12 Clues: security triadsVirtual component worldsecrecy of the informationWarning for malicious activityWeakness in information systemAttempt to gain unauthorized accessInvolves a computer or computer networkidentify the user or system or the entitycontrol Role management and rule managementassurance that the information received is exact and accurate...

Cyber-wellness Crossword Puzzle 2013-06-06

Cyber-wellness Crossword Puzzle crossword puzzle
Across
  1. Save the ________ using screenshots when you were being cyber bullied.
  2. You should be ______________ for your words and action online because it can hurt others feelings.
  3. Do not post things that will _______ others feeling.
Down
  1. Gamming ___________ is when you can’t control yourself to stop playing that game.
  2. ______ bullying is using the computer or phone on online social media to say hurtful things to someone or to spread rumors
  3. You should have proper __________ when on the internet.
  4. Do not interfere other people’s quarrel as you can become another ________.
  5. Do not send _________ message or emails to unknown people as it could be spamming.
  6. You should not _________ or reply to strangers because they can ask you further private information.
  7. You should report the _________ to your parents or teachers.

10 Clues: Do not post things that will _______ others feeling.You should have proper __________ when on the internet.You should report the _________ to your parents or teachers.Save the ________ using screenshots when you were being cyber bullied.Do not interfere other people’s quarrel as you can become another ________....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. uicydata;104.18.12.126
  2. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  3. Rhysider 44.
  4. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  5. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
  1. Powerful intercepting proxy and web vulnerability scanner.
  2. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  3. Shadowy cyber collective widely known because of its work since 02.2022.
  4. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  5. A remote code execution flaw in Nginx web server.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

Stock market 2024-10-21

Stock market crossword puzzle
Across
  1. A measure of stock price
  2. A professional who buys and sells security for claints
  3. trading A type of investment strategy involved burying and selling options
  4. order A type of order to sell the security at best available price
  5. price the price at which a security is currently trading
  6. A financial instrument representing ownership in company
Down
  1. order A type of order to buy or sell
  2. A market where security are bought and sold
  3. and hold A type of investment strategy that involves holding security for long period of time
  4. A measure of company profitability
  5. A sudden and significant drop in market

11 Clues: A measure of stock priceA measure of company profitabilityorder A type of order to buy or sellA sudden and significant drop in marketA market where security are bought and soldA professional who buys and sells security for claintsA financial instrument representing ownership in companyprice the price at which a security is currently trading...

Cybersecurity 2023-01-26

Cybersecurity crossword puzzle
Across
  1. steals information though a link
  2. keeps intruders out
  3. changes IP to look legitimate
  4. helps provent cyber attacks
  5. takes data for money
  6. looks safe but isn’t
  7. Malware that can reproduce itself
  8. checks vulnerabilities in a system
  9. manipulates human error
  10. someone successfully got in
Down
  1. identifying a user’s identity.
  2. malicious software or infected data
  3. a network of infected computers
  4. malware used to spy
  5. manipulating someone's mouse
  6. A series 15 numbers
  7. private encrypted network
  8. protects information from hackers
  9. locks up a website with requests

19 Clues: keeps intruders outmalware used to spyA series 15 numberstakes data for moneylooks safe but isn’tmanipulates human errorprivate encrypted networkhelps provent cyber attackssomeone successfully got inmanipulating someone's mousechanges IP to look legitimateidentifying a user’s identity.a network of infected computerssteals information though a link...

the great depression crossword chase little 2023-05-23

the great depression crossword chase little crossword puzzle
Across
  1. started to form in the skies 1930
  2. dry dirt in the skies
  3. the day the stock market crashed
  4. the crop prices plummeted
  5. traded 16 mil shares in 1930s
  6. protected people's economic status.
Down
  1. a lot of unemployed people
  2. dust cover the skies causing debris every where
  3. social security singed by?
  4. half of them failed
  5. gave people security for there econimic statuse
  6. socail security was caused by
  7. spiraled to the great depression
  8. messed up farm lands
  9. it is the dust bowl
  10. spiralled down in the great depression

16 Clues: half of them failedit is the dust bowlmessed up farm landsdry dirt in the skiesthe crop prices plummeteda lot of unemployed peoplesocial security singed by?socail security was caused bytraded 16 mil shares in 1930sthe day the stock market crashedspiraled to the great depressionstarted to form in the skies 1930protected people's economic status....

Explore the Refreshed ascendlearning.com 2023-09-01

Explore the Refreshed ascendlearning.com crossword puzzle
Across
  1. Ascend inclusion learning program
  2. Ascend Learning value
  3. Ascend Learning solution
  4. Ascend Learning healthcare brand
  5. Leawood office
  6. Ascend Learning value
  7. healthcare vertical
  8. Burlington community outreach group
  9. CHRO
  10. Safety & Security brand
  11. CFO
  12. Company that recognized Ascend as a Great Workplace for Diversity
Down
  1. executive VP of corporate development
  2. Ascend Learning tagline
  3. CTO
  4. Fitness and Wellness brand
  5. CEO
  6. president of safety and security and international
  7. general counsel
  8. president of healthcare

20 Clues: CTOCEOCFOCHROLeawood officegeneral counselhealthcare verticalAscend Learning valueAscend Learning valueAscend Learning taglinepresident of healthcareSafety & Security brandAscend Learning solutionFitness and Wellness brandAscend Learning healthcare brandAscend inclusion learning programBurlington community outreach group...

Executive Departments 2022-02-10

Executive Departments crossword puzzle
Across
  1. to enhance the health and well-being of all Americans
  2. assists U.S. communities in providing fair and equal housing
  3. counterterrorism, cybersecurity, aviation security, border security, port security, maritime security
  4. responsible for formulating and recommending domestic and international financial, economic, and tax policy
  5. oversees the management and distribution of the federal budget for education initiatives
  6. to enforce the law and defend the interests of the United States according to the law
  7. foster, promote, and develop the welfare of the wage earners
  8. to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions
  9. promotes job creation and economic growth by ensuring fair trade
Down
  1. responsible for planning and coordinating federal transportation projects
  2. to enforce the law and defend the interests of the United States according to the law
  3. the principal defense policymaker and adviser
  4. in charge of coordinating agricultural research, extension and teaching activity
  5. advises the president and leads the nation in foreign policy issues
  6. responsible for administering veteran benefits, memorials/cemeteries, and health care

15 Clues: the principal defense policymaker and adviserto enhance the health and well-being of all Americansassists U.S. communities in providing fair and equal housingfoster, promote, and develop the welfare of the wage earnerspromotes job creation and economic growth by ensuring fair tradeadvises the president and leads the nation in foreign policy issues...

HIPAA Crosswords 2023-08-17

HIPAA Crosswords crossword puzzle
Across
  1. Imposing penalties for HIPAA violations to ensure compliance.
  2. Healthcare providers, health plans, or clearinghouses subject to HIPAA.
  3. Central concept of HIPAA that protects individuals' health information.
  4. Sensitive patient data covered by HIPAA.
  5. Third parties that handle PHI on behalf of covered entities.
  6. Record of electronic PHI access to track potential security breaches.
  7. Permission required to disclose PHI for purposes not covered by HIPAA.
Down
  1. Assessing security vulnerabilities to prevent data breaches.
  2. HIPAA component focused on protecting electronic health information.
  3. Process of removing identifying information from health data.
  4. Requirement to inform affected individuals in case of a security breach.
  5. Principle of limiting PHI access to what's required for a specific purpose.
  6. Adhering to HIPAA regulations to ensure patient data security.
  7. Patient's agreement for certain uses and disclosures of their PHI.
  8. Department responsible for enforcing HIPAA regulations.

15 Clues: Sensitive patient data covered by HIPAA.Department responsible for enforcing HIPAA regulations.Assessing security vulnerabilities to prevent data breaches.Third parties that handle PHI on behalf of covered entities.Imposing penalties for HIPAA violations to ensure compliance.Process of removing identifying information from health data....

victor/bulling 2020-11-30

victor/bulling crossword puzzle
Across
  1. disclosing someones secrets
  2. spreading lies
  3. the person who stands up to a bully
  4. stalking repeating harassment
  5. trying to get rid of someone
  6. the person who has been bullied
  7. helping the bullied
Down
  1. not helping the bullied
  2. pretending to be someone else
  3. a mean person
  4. repeating online bulling
  5. tricking someone to give you personal info
  6. online arguments
  7. someone who repeats it

14 Clues: a mean personspreading liesonline argumentshelping the bulliedsomeone who repeats itnot helping the bulliedrepeating online bullingdisclosing someones secretstrying to get rid of someonepretending to be someone elsestalking repeating harassmentthe person who has been bulliedthe person who stands up to a bully...

Security Threats 2021-07-09

Security Threats crossword puzzle
Across
  1. Takes advantage of a vulnerability in order to access or infect a computer
  2. software that permits advertisers or hackers to gather sensitive information without your permission
  3. a form of malware that replicates across the Internet or local networks
  4. software that denies you access to your files or computer until you pay a ransom
  5. a form of trap security specialists use to detect hacking attacks or collect malware samples
  6. malicious computer programs that can spread to other files
Down
  1. A collection of infected computers that are remotely controlled by a hacker
  2. malicious software
  3. unsolicited bulk email
  4. Files placed on your computer that allow websites to remember details
  5. reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
  6. software add-ons designed to fix software bugs
  7. deceiving recipients into sharing sensitive

13 Clues: malicious softwareunsolicited bulk emaildeceiving recipients into sharing sensitivesoftware add-ons designed to fix software bugsmalicious computer programs that can spread to other filesFiles placed on your computer that allow websites to remember detailsa form of malware that replicates across the Internet or local networks...

Branch Security 2021-11-04

Branch Security crossword puzzle
Across
  1. CTR's must always reflect a _______ address
  2. Team members must never ________ a CTR.
  3. Opening procedures must never be
  4. items must remain in plain sight of other person
  5. opening procedures must be altered
  6. are responsible for keeping dual custody keys and combos in your possession at all times
  7. must be alerted for bomb threats, civil unrest, robberies
Down
  1. all bank locations must mainatin ___ ____ policy
  2. not accessible to customers
  3. should not converse with fellow team members or customers after a robbery
  4. confirm purpose and ID of all _____ that are not known to the branch
  5. a security technique that uses two team members
  6. information collected for transactions more than $3000

13 Clues: not accessible to customersOpening procedures must never beopening procedures must be alteredTeam members must never ________ a CTR.CTR's must always reflect a _______ addressa security technique that uses two team membersall bank locations must mainatin ___ ____ policyitems must remain in plain sight of other person...

Security Crossword 2013-05-01

Security Crossword crossword puzzle
Across
  1. Seeing issues before they happen
  2. not discussing matters outside of the hospital environment
  3. Take an item without asking the owner
  4. To be hit
  5. Trust reporting procedure
Down
  1. mandatory training for all frontline NHS staff 8&10
  2. Lock with key
  3. Communication tool used by security
  4. when something happens out of the ordinary
  5. protecting vunarable persons in our care
  6. To stop issues happening
  7. When working in an area by yourself
  8. Makes a sound if an area is breached

13 Clues: To be hitLock with keyTo stop issues happeningTrust reporting procedureSeeing issues before they happenCommunication tool used by securityWhen working in an area by yourselfMakes a sound if an area is breachedTake an item without asking the ownerprotecting vunarable persons in our carewhen something happens out of the ordinary...

Security Principles 2023-07-28

Security Principles crossword puzzle
Across
  1. Security over intangible movable property
  2. A bond registered over movable property
  3. A debt backed by an asset as collateral is called a _______ debt
  4. ____ and _____ cessions require the title of the intangible movable property to be transferred to the cessionary
  5. Type of security arising out of operation of law
  6. A bond registered over immovable property
  7. Type of obligation created by guarantees
Down
  1. Business ______ is a formal restructuring process available to financially distressed companies
  2. Most common type of mortgage bond
  3. Contact us on info@___________.com
  4. Limited real right of security in a movable asset, created by delivery of the asset
  5. Fundamental to Pledge
  6. An asset is attached by the _____ of the High Court

13 Clues: Fundamental to PledgeMost common type of mortgage bondContact us on info@___________.comA bond registered over movable propertyType of obligation created by guaranteesSecurity over intangible movable propertyA bond registered over immovable propertyType of security arising out of operation of lawAn asset is attached by the _____ of the High Court...

Information security 2023-08-28

Information security crossword puzzle
Across
  1. Short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer.
  2. Intent of doing harm.
  3. Gap or weakness which undermines an organization’s security efforts.
  4. Making sure a person is who they say they are.
  5. Rights an individual or organization has over information and how it is used.
  6. Procedure used to determine user privileges or access levels to the system.
Down
  1. Virus Macros which have been programmed to carry out malicious intent.
  2. How information is protected.
  3. Information or data which can be accessed when needed.
  4. State of being complete or uncorrupted.
  5. Calculated assessment of potential threats to an organization’s security.
  6. Network of computers and devices managed as a unit with the same procedures and rules.
  7. Requirement of being private or secret.

13 Clues: Intent of doing harm.How information is protected.State of being complete or uncorrupted.Requirement of being private or secret.Making sure a person is who they say they are.Information or data which can be accessed when needed.Gap or weakness which undermines an organization’s security efforts....

information security 2023-08-28

information security crossword puzzle
Across
  1. networks of computers and devices managed as a unit with the same procedures and rules.
  2. intent of doing harm
  3. rights an individual or organization has over information and how it is used.
  4. gap or weakness which undermines an organization’s security efforts.
  5. calculated assessment of potential threats to an organization’s security.
  6. State of being complete or uncorrupted
  7. Short for malicious software and covers threats such as viruses, worms, trojans, Horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive info on a computer.
  8. how information is protected
Down
  1. making sure a person is who they say they are.
  2. Information or date which can be accessed when needed.
  3. procedure used to determine users privilege or access levels to the system.
  4. requirement of being private or secret
  5. virus macros which have been programmed to carry out malicious intent

13 Clues: intent of doing harmhow information is protectedrequirement of being private or secretState of being complete or uncorruptedmaking sure a person is who they say they are.Information or date which can be accessed when needed.gap or weakness which undermines an organization’s security efforts....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. The state of having enough food for all people
  2. The number of servings of fruits and vegetables recommended per day
  3. A condition in which people do not have enough food to lead a healthy life
  4. A large area where food is grown
  5. A type of food that helps build muscles
  6. A food that is produced using sustainable farming methods
  7. A system that provides food to people in different regions
Down
  1. The act of providing food for a specific group or community
  2. The process of keeping food fresh for longer periods
  3. A person who works in agriculture
  4. The practice of growing crops and raising animals for food
  5. The essential nutrient in fruits and vegetables
  6. A type of food that provides energy

13 Clues: A large area where food is grownA person who works in agricultureA type of food that provides energyA type of food that helps build musclesThe state of having enough food for all peopleThe essential nutrient in fruits and vegetablesThe process of keeping food fresh for longer periodsA food that is produced using sustainable farming methods...

Godzilla 2023-03-01

Godzilla crossword puzzle
Across
  1. He was a huge
  2. They were stuck in a traffic jam
  3. He the whole universe
  4. Godzilla stopped the
  5. How did it include the
Down
  1. Godzilla was a
  2. He lived in
  3. Main character
  4. What stopped the
  5. Godzilla was

10 Clues: He lived inGodzilla wasHe was a hugeGodzilla was aMain characterWhat stopped theGodzilla stopped theHe the whole universeHow did it include theThey were stuck in a traffic jam

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

AI Assistant for Observability 2024-03-01

AI Assistant for Observability crossword puzzle
Across
  1. How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
  2. The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
  1. What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
  2. This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)

4 Clues: This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)...

cyber1 2024-03-29

cyber1 crossword puzzle
Across
  1. Science of secure communication.
  2. Converting data into code.
  3. Code-breaking secret or tool.
  4. Related to encryption, secrecy.
  5. Method for encrypting text.
Down
  1. Deceptive information stealing tactic.
  2. Unauthorized computer system intruder.
  3. Related to computers, internet.
  4. Artificially generated realistic video (2 words).
  5. Malicious software spreading infection.
  6. Malicious software, harmful intent.
  7. Breaking cryptographic codes, systems.

12 Clues: Converting data into code.Method for encrypting text.Code-breaking secret or tool.Related to computers, internet.Related to encryption, secrecy.Science of secure communication.Malicious software, harmful intent.Deceptive information stealing tactic.Unauthorized computer system intruder.Breaking cryptographic codes, systems....

Camouflaged text 2023-08-01

Camouflaged text crossword puzzle
Across
  1. Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
  2. Shadowy cyber collective widely known because of its work since 02.2022.
  3. A remote code execution flaw in Nginx web server.
  4. Powerful intercepting proxy and web vulnerability scanner.
  5. Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
  6. uicydata;104.18.12.126
Down
  1. .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
  2. The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
  3. cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
  4. Rhysider 44.

10 Clues: Rhysider 44.uicydata;104.18.12.126A remote code execution flaw in Nginx web server.Powerful intercepting proxy and web vulnerability scanner.Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokeyShadowy cyber collective widely known because of its work since 02.2022....

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

TTS TOLERANSI DAN EMPATI NISA 2025-03-13

TTS TOLERANSI DAN EMPATI NISA crossword puzzle
Across
  1. pentingnya toleransi dan empati adalah
  2. dampak perundungan digital
  3. apa yang dimaksud dengan empati
  4. dampak ekstrem perundungan digital
  5. cara mengatasi perundungan digital
  6. pencegahan perundungan digital
Down
  1. Cyber bullying adalah
  2. contoh empati
  3. contoh toleransi
  4. apa yang dimaksud dengan toleransi

10 Clues: contoh empaticontoh toleransiCyber bullying adalahdampak perundungan digitalpencegahan perundungan digitalapa yang dimaksud dengan empatiapa yang dimaksud dengan toleransidampak ekstrem perundungan digitalcara mengatasi perundungan digitalpentingnya toleransi dan empati adalah

IT Quiz_SET-4 2026-01-03

IT Quiz_SET-4 crossword puzzle
Across
  1. Operating system example
  2. Process scheduling unit
  3. Software testing technique
  4. Collection of related files
  5. Software without cost
  6. Visual representation of an algorithm
Down
  1. Logical part of the computer
  2. Error due to wrong syntax
  3. Web page structure language
  4. Database management system example
  5. Cyber attack using fake emails
  6. Program used to write code
  7. Key used to reference another table
  8. Device that converts digital to analog signals
  9. Network protocol for file transfer

15 Clues: Software without costProcess scheduling unitOperating system exampleError due to wrong syntaxSoftware testing techniqueProgram used to write codeWeb page structure languageCollection of related filesLogical part of the computerCyber attack using fake emailsDatabase management system exampleNetwork protocol for file transfer...

Ασφαλή χρήση διαδικτύου 2024-02-12

Ασφαλή χρήση διαδικτύου crossword puzzle
Across
  1. διαδικτυακός εκφοβισμός
  2. privacy προστασία προσωπικών δεδομένων
  3. gaming παιχνίδια στο διαδίκτυο
  4. news ψευδείς ειδήσεις
  5. κακόβουλο λογισμικό
  6. scams ηλεκτρονικές απάτες
Down
  1. positive εικόνα σώματος &κοινωνικά δίκτυα
  2. reputationδιαδικτυακή φήμη
  3. advertisement στοχευμένες διαφημίσεις
  4. piracy πειρατεία λογισμικού

10 Clues: κακόβουλο λογισμικόnews ψευδείς ειδήσειςδιαδικτυακός εκφοβισμόςscams ηλεκτρονικές απάτεςreputationδιαδικτυακή φήμηpiracy πειρατεία λογισμικούgaming παιχνίδια στο διαδίκτυοadvertisement στοχευμένες διαφημίσειςprivacy προστασία προσωπικών δεδομένωνpositive εικόνα σώματος &κοινωνικά δίκτυα

AI Assistant for Observability 2024-03-02

AI Assistant for Observability crossword puzzle
Across
  1. How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)
  2. The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
  1. What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
  2. This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)

4 Clues: This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)...

Cyberspace Article 2024-11-09

Cyberspace Article crossword puzzle
Across
  1. AI
  2. Representing Knowledge
  3. Working alongside Technology
  4. University AI was founded
Down
  1. Prejudice that may impact AI
  2. Cyber Cognitive
  3. Hispanic Author
  4. Operators of AI

8 Clues: AICyber CognitiveHispanic AuthorOperators of AIRepresenting KnowledgeUniversity AI was foundedPrejudice that may impact AIWorking alongside Technology

AIRPORT CODES 2018-10-29

AIRPORT CODES crossword puzzle
Across
  1. WELLINGTON AIRPORT CODES
  2. THE THING YOU GET AFTER CHECK IN
  3. AUCKLAND AIRPORT CODE
  4. DUNEDIN AIRPORT
  5. AUSTRALIAN AIRLINES
  6. SINGAPORE AIRPORT NAME
  7. TAURANGA AIRPORT CODES
  8. SHOPPING FACILITY INSIDE THE AIRPORT
  9. BAGGAGE TO BE CARRIED INSIDE THE CABIN
  10. AVIATION SECURITY SERVICE
  11. CHRISTCHURCH AIRPORT CODES
Down
  1. INTERNATIONAL ID
  2. LIVERPOOL AIRPORT NAME
  3. PILOT'S ROOM
  4. THE AREA BEFORE DEPARTING PASSENGERS PASS THROUGH SECURITY
  5. SYDNEY AIRPORT CODE
  6. COUNTRY WITH THE BUSIEST AIRPORT
  7. NUMBER OF RUNWAY IN AUCKLAND AIRPORT
  8. PASSENGER'S BELONGING
  9. AIR TRAFFIC CONTROL

20 Clues: PILOT'S ROOMDUNEDIN AIRPORTINTERNATIONAL IDSYDNEY AIRPORT CODEAUSTRALIAN AIRLINESAIR TRAFFIC CONTROLAUCKLAND AIRPORT CODEPASSENGER'S BELONGINGLIVERPOOL AIRPORT NAMESINGAPORE AIRPORT NAMETAURANGA AIRPORT CODESWELLINGTON AIRPORT CODESAVIATION SECURITY SERVICECHRISTCHURCH AIRPORT CODESTHE THING YOU GET AFTER CHECK INCOUNTRY WITH THE BUSIEST AIRPORT...

Security Forces 2025-07-15

Security Forces crossword puzzle
Across
  1. Non-lethal weapon used for close-quarters
  2. Emergency vehicle response mode.
  3. Used to restrain suspects.
  4. An individual actively engaged in killing or attempting to kill.
  5. Senior SF leader in charge of unit security operations.
Down
  1. Worn headgear that identifies SF personnel.
  2. Latin motto meaning “Strong” representing SF spirit.
  3. Daily pre-duty briefing for Security Forces.
  4. Elite SF team specializing in aircraft security.
  5. Someone attempting to unlawfully drive through a base checkpoint.
  6. Storage location for weapons and gear.
  7. Random security practices designed to deter threats (acronym).

12 Clues: Used to restrain suspects.Emergency vehicle response mode.Storage location for weapons and gear.Non-lethal weapon used for close-quartersWorn headgear that identifies SF personnel.Daily pre-duty briefing for Security Forces.Elite SF team specializing in aircraft security.Latin motto meaning “Strong” representing SF spirit....

SDG Goal 16: Peace, Justice and Strong Institutions 2024-11-24

SDG Goal 16: Peace, Justice and Strong Institutions crossword puzzle
Across
  1. Process of resolving disputes without violence
  2. Fair treatment under the law
  3. Freedom from fear and want
  4. The opposite of corruption
  5. A serious crime, usually with violence involved
  6. Absence of conflict
  7. International organisation promoting peace and security
Down
  1. Systems that provide safety and security to citizens
  2. Government where everyone has a say
  3. Fundamental freedoms that all people should have
  4. Taking responsibility for your actions
  5. Use of power for private gain
  6. Treating everyone equally, regardless of background
  7. Working together towards a common goal

14 Clues: Absence of conflictFreedom from fear and wantThe opposite of corruptionFair treatment under the lawUse of power for private gainGovernment where everyone has a sayTaking responsibility for your actionsWorking together towards a common goalProcess of resolving disputes without violenceA serious crime, usually with violence involved...

cyber 2023-06-20

cyber crossword puzzle
Across
  1. : Réglementation européenne sur la protection de données personnelles.
  2. : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès.
  3. : Technique utilisant principalement la messagerie électronique, et usurpant l'identité d'un organisme dans le but de tromper l'utilisateur et obtenir des informations sensibles.
  4. : Acte de malveillance envers des systèmes informatiques, pouvant être classé en 4 catégories : la cybercriminalité, la déstabilisation, l’espionnage, le sabotage.
Down
  1. : Message électronique non sollicité, à but publicitaire.
  2. : Logiciel malveillant utiliser par les cybercriminels permettant de bloquer l'accès aux données, par chiffrement, en échange d'une somme d'argent.
  3. de passe : Permet l’identification et la sécurisation de la connexion de l’utilisateur à un système informatique ou une application.

7 Clues: : Message électronique non sollicité, à but publicitaire.: Réglementation européenne sur la protection de données personnelles.: Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès....

Security Crossword 2024-05-19

Security Crossword crossword puzzle
Across
  1. a secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-fi
  2. Should be constructed of uppercase, lowercase letters, numbers, and special characters
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid
  4. Fraudulent phone calls or voice message purporting to be from reputable companies in order to trick individuals into revealing personnel information
  5. A type of malware that can collect and transit private user information without the user's knowledge or consent
  6. The "A" in the CIA triad that ensures authorized users have access
Down
  1. faking the sending address of a transmission to gain unauthorized access to a secure system
  2. A type of media manipulation, where bad actors alter an image or video to create a false perception of reality
  3. A sequence of words or text used to control access to a computer, similar to a password
  4. A flaw or weakness in a computer system that could be exploited to violate the system's security
  5. by scanning files and detecting suspicious activity, these programs help protect against cyber attacks that could result in data breaches or stolen information
  6. Unauthorized access to a network, information systems, or application

12 Clues: The "A" in the CIA triad that ensures authorized users have accessUnauthorized access to a network, information systems, or applicationShould be constructed of uppercase, lowercase letters, numbers, and special charactersA sequence of words or text used to control access to a computer, similar to a password...

DEX+: Across & Down to Delivery Greatness! 2025-08-19

DEX+: Across & Down to Delivery Greatness! crossword puzzle
Across
  1. Accountable to deliver various products and services to Business within agreed Service Level / Statement of Work under his/her portfolio.
  2. Accountable for the pre-execution process, i.e. ensuring all service requests are managed promptly from ​Gate 0 to Gate D.
  3. One of the common artifacts/deliverables in the Close Delivery process
  4. The objective of this process is to release the deployed solution to end user upon obtaining Go-Live approval.
  5. Manage project resources according to the scope, budget and project schedule.
  6. An official governing working group responsible for reviewing, assessing, discussing project issues and challenges.
  7. Lead the program throughout the program life cycle and ensure objectives of program are achieved.
Down
  1. The objective of this process is to plan and manage activities for obtaining Change Advisory Committee (CAC) approval to release solution to production environment
  2. Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.
  3. Accountable to project delivery under his/her portfolio and to endorse closure of projects under his/her portfolio.​
  4. The objective of this process is to pre-identify endorser and approver and develop workplan to prepare for the development of solution proposal.
  5. Accountable to ensure Cyber Security Business Impact and Legal and Regulatory Assessments (CS BIA & LRA) are performed and updated annually.

12 Clues: One of the common artifacts/deliverables in the Close Delivery processManage project resources according to the scope, budget and project schedule.Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.Lead the program throughout the program life cycle and ensure objectives of program are achieved....

Trend Micro Mobile Security 2024-05-06

Trend Micro Mobile Security crossword puzzle
Across
  1. Trend Micro Mobile Security is designed to protect ____ and tablets.
  2. Trend Micro Mobile Security helps protect against ____ attacks. These attacks are deceptive attempts by attackers to trick victims into revealing sensitive information like passwords or financial data by masquerading as a trusted entity.
  3. Trend Micro Mobile Security protects devices running this Google mobile OS
  4. Trend Micro Mobile Security is a ____ security solution
  5. Trend Micro Mobile Security offers ____ browsing protection
Down
  1. Trend Micro Mobile Security supports this Apple mobile OS
  2. Trend Micro Mobile Security scans for ____ on mobile devices. (Starts with m)
  3. Trend Micro Mobile Security helps safeguard user's ____ on mobile devices. (Starts with p)
  4. Trend Micro Mobile Security has features such as ____ tools. These tools help locate, lock or wipe lost/stolen devices to prevent unauthorized access. (Starts with a)

9 Clues: Trend Micro Mobile Security is a ____ security solutionTrend Micro Mobile Security supports this Apple mobile OSTrend Micro Mobile Security offers ____ browsing protectionTrend Micro Mobile Security is designed to protect ____ and tablets.Trend Micro Mobile Security protects devices running this Google mobile OS...

Fundamentals of CYbersecurity 2023-01-22

Fundamentals of CYbersecurity crossword puzzle
Across
  1. secrecy of the information
  2. Involves a computer or computer network
  3. Warning for malicious activity
  4. control Role management and rule management
  5. Weakness in information system
Down
  1. assurance that the information received is exact and accurate
  2. enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
  3. Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
  4. Attempt to gain unauthorized access
  5. Virtual component world
  6. security triads
  7. identify the user or system or the entity

12 Clues: security triadsVirtual component worldsecrecy of the informationWarning for malicious activityWeakness in information systemAttempt to gain unauthorized accessInvolves a computer or computer networkidentify the user or system or the entitycontrol Role management and rule managementassurance that the information received is exact and accurate...

Cisco 5 2024-09-19

Cisco 5 crossword puzzle
Across
  1. Cisco's integrated security solution that provides visibility and control across the entire attack continuum
  2. Cisco's product for secure network connectivity, including remote access
  3. Cisco's solution for detecting and responding to advanced threats
  4. Cisco's security management platform that provides insights and automation to efficiently manage security policies and devices
Down
  1. Cisco's platform for security policy management and orchestration
  2. Cisco's secure internet gateway in the cloud that provides the first line of defense against threats
  3. Cisco's product that provides secure access to the network for any user, from any device, at any time, in any location
  4. Cisco's enterprise firewall product line
  5. Cisco's security framework designed to provide end-to-end network visibility and segmentation
  6. Cisco's email security appliance that blocks phishing, spoofing, and malware emails
  7. Cisco's cloud-based platform that provides advanced malware protection

11 Clues: Cisco's enterprise firewall product lineCisco's platform for security policy management and orchestrationCisco's solution for detecting and responding to advanced threatsCisco's cloud-based platform that provides advanced malware protectionCisco's product for secure network connectivity, including remote access...

computer crimes 2024-11-08

computer crimes crossword puzzle
Across
  1. SOFTWARE Internet based software or programs that are used to disrupt a network
  2. SOLICITING AND ABUSE Type of cyber crime wherein criminals solicit minors via chat rooms
  3. VANDALISM Damaging or destroying data rather than stealing
  4. HORSES malicious program that appears to be friendly, they are not technically viruses.
  5. Act by the criminal who floods the bandwidth of the victim’s network.
  6. refers to any crime that involves a computer/ mobile and a network
  7. type of virus hides on the user’s disk and waits for a specific event to occur before running.
  8. a program whose purpose is to duplicate itself.
  9. The least common cybercrime
Down
  1. This category of cybercrime involves one individual distributing malicious or illegal information online.
  2. VIRUSES these viruses take up residence in the computer’s memory, making then hard to detect
  3. VIRUS Type of virus make changes to a disk’s file system
  4. Means an illegal intrusion into a computer system and/or network
  5. HAT HACKERS hackers between the good and the bad guys
  6. STALKING A kind of online harrassment wherein the victim is subjected to a barrage of online messages and emails.
  7. DISSEMINATION- Malicious software that attches itself to other software.
  8. PIRACY Theft of software through the illegal copying of genuine products.
  9. TERRORISM Defined as an act of terrorism committed through the use of cyberspace
  10. VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT
  11. HAT HACKERS can be seen as the “good guys”

20 Clues: The least common cybercrimeHAT HACKERS can be seen as the “good guys”a program whose purpose is to duplicate itself.HAT HACKERS hackers between the good and the bad guysVIRUS Type of virus make changes to a disk’s file systemVANDALISM Damaging or destroying data rather than stealingVIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT...

HANDS OFF!! 2025-04-05

HANDS OFF!! crossword puzzle
Across
  1. Preschool for the poor
  2. Soft Power
  3. VA
  4. Int'l Students
  5. Elder Health
  6. health security
  7. Parks
Down
  1. ret security
  2. Public Ed
  3. NEH
  4. Do good volunteers
  5. DEI
  6. Farm and nutrition

13 Clues: VANEHDEIParksPublic EdSoft Powerret securityElder HealthInt'l Studentshealth securityDo good volunteersFarm and nutritionPreschool for the poor

Pan-Domain Operations Crosswords 2021-03-09

Pan-Domain Operations Crosswords crossword puzzle
Across
  1. learning associated with AI
  2. _____, contest, confront, combat
  3. integration beyond whole-of-government
  4. domain of zeros and ones
  5. major division within the military environment
Down
  1. domain governed by orbital mechanics
  2. domain of narratives
  3. under the threshold zone
  4. speed of operational ______
  5. matrix of _____
  6. type of spine

11 Clues: type of spinematrix of _____domain of narrativesunder the threshold zonedomain of zeros and oneslearning associated with AIspeed of operational ___________, contest, confront, combatdomain governed by orbital mechanicsintegration beyond whole-of-governmentmajor division within the military environment

Sigma Crossword 2016-11-28

Sigma Crossword crossword puzzle
Across
  1. Name the industry leading mindmapping Software
  2. Quest's industry leading database tool
  3. Traditionally hung above the fireplace
  4. Which Flexera product is the only solution for a unified application readiness process for Windows, Mac and Mobile
  5. Which vendors solutions include Business Security, CloudCare and Managed Workplace
  6. Data erasure management software
  7. Whose products run on the Orion platform
  8. Santa's helpers
  9. Songs sung at Christmas
  10. Who is the leading supplier of innovative mobile security products that are Government certified?
Down
  1. 2015's CRN Specialist Distributor of the year
  2. Santa's chosen method of transportation
  3. Company creating dynamic screencapture Software
  4. Who are Sigma the official EMEA based distributor f or (5,8)
  5. Charles Dickens' Christmas loathing character
  6. Simplify the security of an Active Directory with this Quest product
  7. A sparkly Christmas decoration
  8. Who is the red nosed reindeer?
  9. A striped Christmas treat
  10. A famous snowman

20 Clues: Santa's helpersA famous snowmanSongs sung at ChristmasA striped Christmas treatA sparkly Christmas decorationWho is the red nosed reindeer?Data erasure management softwareQuest's industry leading database toolTraditionally hung above the fireplaceSanta's chosen method of transportationWhose products run on the Orion platform...

Session 1, Foundations (Day One) 2024-04-26

Session 1, Foundations (Day One) crossword puzzle
Across
  1. Deliver as _.
  2. _Integration is the single point of accountability for Natl Security missions delivery.
  3. People + Process = _
  4. Last name of new Project Integration Group director
  5. Last name of Sec of Energy
  6. Triple Constraint + _, the center triangle.
  7. Three types of projects: Expense, Capital and _.
  8. An effort with defined start and end points
  9. Acronym of Lawrence Livermore Nat
  10. Last name of Under Sec of Nuclear Security
Down
  1. _, Time and Cost are the triple constraints.
  2. Name of project management training: _ Project Management
  3. EVM or Earned Value _.
  4. Managing and _ (M&O)contractors
  5. Acronym for Contracting Officer Representative
  6. Acronym of Los Alamos Nat Lab
  7. Name of plant located in Amarillo, Texas
  8. Acronym for Other Project Cost
  9. Frequency of CNS program planning cycle
  10. Acronym for Consolidated Nuclear Security
  11. Acronym for earned value management system
  12. Last name of Infrastructure portfolio manager

22 Clues: Deliver as _.People + Process = _EVM or Earned Value _.Last name of Sec of EnergyAcronym of Los Alamos Nat LabAcronym for Other Project CostManaging and _ (M&O)contractorsAcronym of Lawrence Livermore NatFrequency of CNS program planning cycleName of plant located in Amarillo, TexasAcronym for Consolidated Nuclear Security...

Cybersecurity Crossword Puzzle 2025-03-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Network of hijacked computers
  2. Manipulating people for access
  3. Physically isolates a system
  4. Vulnerability with no fix yet
  5. Isolates programs for security
  6. Adds extra login security
  7. Impersonates a trusted source
  8. Blocks unauthorized network access
  9. Fixes security vulnerabilities
  10. Self-replicates across networks
  11. Steals active user session
  12. Takes advantage of a weakness
  13. Disguised malware for attacks
  14. Malicious software harming devices
  15. Tricks users into clicking links
Down
  1. Hidden entry for unauthorized access
  2. Secretly monitors user activity
  3. Secures internet connection
  4. Tries all password combinations
  5. Converts data into fixed string
  6. Unwanted or junk emails
  7. Attacks databases with queries
  8. Records keystrokes for theft
  9. Displays unwanted advertisements
  10. Encrypts files for payment
  11. Overwhelms a server with traffic
  12. Secures data using codes
  13. Fraudulent attempt to steal data
  14. Hidden part of the internet
  15. Hides malware in a system

30 Clues: Unwanted or junk emailsSecures data using codesAdds extra login securityHides malware in a systemEncrypts files for paymentSteals active user sessionSecures internet connectionHidden part of the internetPhysically isolates a systemRecords keystrokes for theftNetwork of hijacked computersVulnerability with no fix yetImpersonates a trusted source...

CTF-CW-9 2025-11-17

CTF-CW-9 crossword puzzle
Across
  1. Native risk without any safety measures
  2. Time attackers spend undetected
  3. Raising a problem to higher-level personnel
  4. Mathematical technique adding statistical noise to protect individual privacy
  5. Trust service criteria audit report
  6. Abbreviation for Confidentiality, Integrity, and Availability
  7. Rules for managing and protecting data
  8. Correctly identified security threat
  9. Red team�s go-to platform for offensive security at Tekion.
  10. Critical information for encryption and decryption
Down
  1. Ensuring maximum privacy protection without user action required
  2. Creating multiple simulated systems on one machine
  3. Anti-phishing and brand protection platform adopted by Tekion.
  4. Real-time monitoring tool at Tekion.
  5. Ethical approach to artificial intelligence development and deployment
  6. Anything of value owned or used
  7. The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
  8. (Duplicate) Procedures for automated or manual response actions
  9. Gathering data from publicly available sources
  10. Again, technology for preventing leaks

20 Clues: Time attackers spend undetectedAnything of value owned or usedTrust service criteria audit reportReal-time monitoring tool at Tekion.Correctly identified security threatRules for managing and protecting dataAgain, technology for preventing leaksNative risk without any safety measuresRaising a problem to higher-level personnel...

Server 2023-10-30

Server crossword puzzle
Across
  1. Servera nosaukums?
  2. Servera drošība? Security
  3. Servera pārlāde?
  4. Servera datu kopijas?
  5. Servera atbilde klientam?
  6. Servera kļūdu žurnāls?
  7. Servera pārvaldības rīki?
  8. Servera kapacitāte?
  9. Servera tīkla adrese?
  10. Servera datu drošība?
  11. Servera veiktspēja?
  12. Servera uzticamība?
  13. Servera izmitināšana?
  14. Servera izslēgšana?
  15. Servera nodrošināšana?
  16. Servera datu krātuve?
  17. Servera izglītība?
Down
  1. Servera atrašanās vieta?
  2. Servera saskarne?
  3. Servera atrašanās vieta?
  4. Servera resursi?
  5. Servera konfigurācija?
  6. Servera uzstādīšana?
  7. Servera izslēgšanas komanda?
  8. Servera izturība?
  9. Servera resursu sadale?
  10. Servera operētājsistēma?
  11. Servera atjaunināšana?
  12. Servera pārvaldība?
  13. Servera pilnveide?

30 Clues: Servera resursi?Servera pārlāde?Servera saskarne?Servera izturība?Servera nosaukums?Servera pilnveide?Servera izglītība?Servera uzstādīšana?Servera kapacitāte?Servera veiktspēja?Servera pārvaldība?Servera uzticamība?Servera izslēgšana?Servera konfigurācija?Servera datu kopijas?Servera tīkla adrese?Servera datu drošība?...

Cybersecurity Terms 2024-07-13

Cybersecurity Terms crossword puzzle
Across
  1. Secure online service
  2. AKA UI Redress attack
  3. Have to pay
  4. Gain access to sensitive infromation
  5. Method of scrambling data
  6. Attempts to steal personal data
  7. Appears harmless
  8. Bring your device
  9. Prevent unauthorized access
Down
  1. Protect, prevent, remove
  2. Harmful software designed to damage
  3. Online harassment
  4. Protect data during encryption process
  5. Security in cloud infrastructure
  6. Interment protocol address
  7. Network of compromised computers
  8. A security feature
  9. Media manipulation
  10. Type of malware
  11. Can be particularly dangerous

20 Clues: Have to payType of malwareAppears harmlessOnline harassmentBring your deviceA security featureMedia manipulationSecure online serviceAKA UI Redress attackProtect, prevent, removeMethod of scrambling dataInterment protocol addressPrevent unauthorized accessCan be particularly dangerousAttempts to steal personal dataSecurity in cloud infrastructure...

Annu's world! 2023-02-23

Annu's world! crossword puzzle
Across
  1. Mr Lomas' kannada advice "Dont do .."
  2. Cake + fruits + juice + sweets + ..
  3. Not a smash
  4. Tortoise's coat
  5. That 834 am activity
  6. 30 min of this time means 60 min .. He he he
Down
  1. Colorful bday gift
  2. Hindustani Gaga
  3. Avidin's processor
  4. My favorite brand err fruit
  5. old school cyber people
  6. "Not at 530 am please!"
  7. is always his policy

13 Clues: Not a smashHindustani GagaTortoise's coatColorful bday giftAvidin's processorThat 834 am activityis always his policyold school cyber people"Not at 530 am please!"My favorite brand err fruitCake + fruits + juice + sweets + ..Mr Lomas' kannada advice "Dont do .."30 min of this time means 60 min .. He he he

Internet 2024-10-15

Internet crossword puzzle
Across
  1. krađa identiteta, krađa lozinki ili lažno predstavljanje
  2. Slanje agresivnih poruka
  3. programi koji mogu ugroziti računalo
  4. Društvena mreža
  5. TCP-IP
  6. Slijed koraka u programiranju
Down
  1. online nasilje
  2. prevara koja korisnika navodi na otkrivanje korisničkog imena i lozinke
  3. nasilan upad 'prijatelja' na društvenim mrežama na nečije profile
  4. socijalna izolacija osobe
  5. Umjetna inteligencija
  6. Globalna računalna mreža
  7. Društvena mreža
  8. e-klevetanje

14 Clues: TCP-IPe-klevetanjeDruštvena mrežaDruštvena mrežaonline nasiljeUmjetna inteligencijaGlobalna računalna mrežaSlanje agresivnih porukasocijalna izolacija osobeSlijed koraka u programiranjuprogrami koji mogu ugroziti računalokrađa identiteta, krađa lozinki ili lažno predstavljanjenasilan upad 'prijatelja' na društvenim mrežama na nečije profile...

QBE 2020-04-01

QBE crossword puzzle
Across
  1. Head of BA
  2. QBE's platform to process payments
  3. Principle of Insurance
  4. QBE CEO
  5. Diverse Hashtag
  6. London based Insurer
  7. P&C Product
  8. #together
  9. SME Team
  10. E-Trade Platform
  11. Insured vehicles must be logged on
  12. Offshore Office
  13. QBE Headquarters
Down
  1. Fleet Product
  2. Minibus Product
  3. Employee Assistance
  4. A vehicle which is off the road must be declared
  5. Data Protection
  6. Complaints are logged on
  7. QBE’s E-Trade Platform
  8. Large broker for Minibus
  9. Minibus has been trading for how many years
  10. Annual Staff Survey
  11. Partner Charity
  12. Large broker for Minibus
  13. Newest SME Product

26 Clues: QBE CEOSME Team#togetherHead of BAP&C ProductFleet ProductMinibus ProductData ProtectionDiverse HashtagPartner CharityOffshore OfficeE-Trade PlatformQBE HeadquartersNewest SME ProductEmployee AssistanceAnnual Staff SurveyLondon based InsurerPrinciple of InsuranceQBE’s E-Trade PlatformComplaints are logged onLarge broker for Minibus...

Cyber Safety - Blake Biddell 2016-05-26

Cyber Safety - Blake Biddell crossword puzzle
Across
  1. downloadable fun
  2. cable needed to power a device
  3. appropriate level of content
  4. protect yourself online
  5. protect your online identity
  6. used to get online
  7. someone who helps at home
  8. site to gain information on the web
  9. to not be online
  10. person who helps at school
Down
  1. people online who aren't nice
  2. one of Apples products
  3. someone who looks after you
  4. provides power
  5. random information sometimes not wanted
  6. uses Electricity
  7. makes your computer sick
  8. scams games that aren't safe
  9. fun to play with
  10. to make a computer screen smaller

20 Clues: provides powerdownloadable funuses Electricityfun to play withto not be onlineused to get onlineone of Apples productsprotect yourself onlinemakes your computer sicksomeone who helps at homeperson who helps at schoolsomeone who looks after youappropriate level of contentscams games that aren't safeprotect your online identity...

Crossword 2 2024-06-07

Crossword 2 crossword puzzle
Across
  1. _ut (c or k?)
  2. _am (j or g?)
  3. _ber (c or s?)
  4. _ki (c or s?)
  5. _ un (j or g?)
  6. _ _ ide (j or g?) and what else?
  7. _olly (j or g?)
  8. _iraffe (j or g?)
  9. _ensus (c or s?)
  10. _angaroo (c or k?)
Down
  1. _ummer (c or s?)
  2. _ivil (c or s?)
  3. _ _ ilty (j or g?) and what else?
  4. _elebrate (c or s?)
  5. _ym (j or g?)
  6. _leeping (c or s?)
  7. _itrus (c or s?)
  8. _andy (c or k?)
  9. _ _ ess (j or g?) and what else?
  10. _otton (c or k?)

20 Clues: _ut (c or k?)_am (j or g?)_ki (c or s?)_ym (j or g?)_ber (c or s?)_ un (j or g?)_ivil (c or s?)_olly (j or g?)_andy (c or k?)_ummer (c or s?)_itrus (c or s?)_ensus (c or s?)_otton (c or k?)_iraffe (j or g?)_leeping (c or s?)_angaroo (c or k?)_elebrate (c or s?)_ _ ide (j or g?) and what else?_ _ ess (j or g?) and what else?...

Westhill Crossword 2024-03-10

Westhill Crossword crossword puzzle
Across
  1. Teachers are wearing this in protest
  2. Helpful Study Resource
  3. Westhills past participle
  4. Superintendent
  5. The 300s and 400s are in the _____ building
  6. You apply to college when you are a ______
  7. ________ Playmakers
  8. _____ and purple
  9. Mr. Alswanger and Mr. Cooney
  10. Alternative to the SAT
Down
  1. Upperclassmen illness
  2. Part of a class curriculum
  3. The Cyber Rams
  4. Nickname for the head janitor at Westhill
  5. Northernmost section of the school building
  6. Popular college for Westhill graduates
  7. Learned in math class
  8. Westhill’s favorite gym rat
  9. We write what you are reading
  10. Created in 1916

20 Clues: The Cyber RamsSuperintendentCreated in 1916_____ and purple________ PlaymakersUpperclassmen illnessLearned in math classHelpful Study ResourceAlternative to the SATWesthills past participlePart of a class curriculumWesthill’s favorite gym ratMr. Alswanger and Mr. CooneyWe write what you are readingTeachers are wearing this in protest...

Masalah Sosial 2025-10-01

Masalah Sosial crossword puzzle
Across
  1. Cyber crime?
  2. Bentuk diskriminasi berbasis genjer disebut?
  3. Apa yang di maksud kesenjangan sosial?
  4. Apa dampak urbanisasi berlebihan?
  5. Penyebaran budaya asing tanpa filter disebut?
  6. Teori anonim dikemukakan oleh?
  7. White collar crime artinya?
  8. Contoh masalah sosial modern?
  9. Penyalahgunaan anak untuk bekerja disebut?
  10. Diskriminasi berbasis orientasi seksual?
  11. Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
  12. Kemiskinan relatif dibandingkan dengan?
Down
  1. Eufemisme untuk pengemis?
  2. Kesenjangan akses antara kota dan desa disebut?
  3. Apa penyebab utama kemiskinan?
  4. Kemiskinan absolut diukur dari?
  5. Apa dampak utama pengangguran?
  6. Contoh masalah sosial di bidang pendidikan?
  7. Pengangguran musiman contohnya?
  8. Apa penyebab kriminalitas?

20 Clues: Cyber crime?Eufemisme untuk pengemis?Apa penyebab kriminalitas?White collar crime artinya?Contoh masalah sosial modern?Apa penyebab utama kemiskinan?Apa dampak utama pengangguran?Teori anonim dikemukakan oleh?Kemiskinan absolut diukur dari?Pengangguran musiman contohnya?Apa dampak urbanisasi berlebihan?Apa yang di maksud kesenjangan sosial?...

Masalah Sosial 2025-10-01

Masalah Sosial crossword puzzle
Across
  1. Cyber crime?
  2. Bentuk diskriminasi berbasis genjer disebut?
  3. Apa yang di maksud kesenjangan sosial?
  4. Apa dampak urbanisasi berlebihan?
  5. Penyebaran budaya asing tanpa filter disebut?
  6. Teori anonim dikemukakan oleh?
  7. White collar crime artinya?
  8. Contoh masalah sosial modern?
  9. Penyalahgunaan anak untuk bekerja disebut?
  10. Diskriminasi berbasis orientasi seksual?
  11. Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
  12. Kemiskinan relatif dibandingkan dengan?
Down
  1. Eufemisme untuk pengemis?
  2. Kesenjangan akses antara kota dan desa disebut?
  3. Apa penyebab utama kemiskinan?
  4. Kemiskinan absolut diukur dari?
  5. Apa dampak utama pengangguran?
  6. Contoh masalah sosial di bidang pendidikan?
  7. Pengangguran musiman contohnya?
  8. Apa penyebab kriminalitas?

20 Clues: Cyber crime?Eufemisme untuk pengemis?Apa penyebab kriminalitas?White collar crime artinya?Contoh masalah sosial modern?Apa penyebab utama kemiskinan?Apa dampak utama pengangguran?Teori anonim dikemukakan oleh?Kemiskinan absolut diukur dari?Pengangguran musiman contohnya?Apa dampak urbanisasi berlebihan?Apa yang di maksud kesenjangan sosial?...

Friendship & Cyber Friends 2022-11-01

Friendship & Cyber Friends crossword puzzle
Across
  1. sammen
  2. et venskab
  3. at dele
  4. en konto
  5. et skænderi
  6. en opdatering
  7. en ven
  8. mobning
  9. vigtigt
Down
  1. at såre
  2. en tanke
  3. et forhold
  4. en besked
  5. en hemmelighed
  6. en interesse
  7. en bølle
  8. en kammerat
  9. en følelse

18 Clues: sammenen venat såreat delemobningvigtigten tankeen kontoen bølleen beskedet forholdet venskaben følelseen kammeratet skænderien interesseen opdateringen hemmelighed

CWiCS Breaches of 2020 2021-02-11

CWiCS Breaches of 2020 crossword puzzle
Across
  1. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  2. Malicious code was sneaked into updates to this SolarWinds software
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  5. this based cyber attacks rose 630% between January and April 2020
  6. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  7. this Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
  8. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  9. Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
  10. Malware designed to steal sensitive information stored on an infected device.
  11. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  12. Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
  13. Hackers are now using this Google service to bypass web security and steal credit cards
  14. Hackers hit Nebraska Medical Center with --------- and stole patient data
  15. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  16. In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
  17. Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
  1. hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  2. LodaRAT Windows Malware Now Also Targets ______ Devices
  3. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  4. A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  5. Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  7. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  8. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  9. Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
  10. Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
  11. A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
  12. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  13. Trojan functioning as a downloader or dropper of other malwares
  14. Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization

31 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwaresthis based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

CWiCS Breaches of 2020 2021-02-16

CWiCS Breaches of 2020 crossword puzzle
Across
  1. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  2. Malicious code was sneaked into updates to this SolarWinds software
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  5. This based cyber attacks rose 630% between January and April 2020
  6. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  7. This Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
  8. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  9. Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
  10. Malware designed to steal sensitive information stored on an infected device.
  11. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  12. Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
  13. Hackers are now using this Google service to bypass web security and steal credit cards
  14. Hackers hit Nebraska Medical Center with --------- and stole patient data
  15. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  16. In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
  17. Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
  1. Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  2. LodaRAT Windows Malware Now Also Targets ______ Devices
  3. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  4. A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  5. Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  7. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  8. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  9. Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
  10. Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
  11. A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
  12. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  13. Trojan functioning as a downloader or dropper of other malwares
  14. Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization

31 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwaresThis based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

Cybersecurity 2025-03-10

Cybersecurity crossword puzzle
Across
  1. Fake emails to steal info
  2. Locks files for money
  3. Fixes security issue
  4. Shows unwanted ads
  5. horse Fake safe program
  6. Hides online activity
  7. force Guessing passwords
  8. Floods a website
  9. Extra password step
  10. Blocks bad connections
Down
  1. Hides info
  2. New security problem
  3. Looks safe but is bad
  4. Group of hacked computers
  5. Secret way in
  6. Records what you type
  7. Hides bad software
  8. Bad software
  9. Watches what you do
  10. engineering Tricks people

20 Clues: Hides infoBad softwareSecret way inFloods a websiteHides bad softwareShows unwanted adsWatches what you doExtra password stepNew security problemFixes security issueLooks safe but is badLocks files for moneyRecords what you typeHides online activityBlocks bad connectionshorse Fake safe programFake emails to steal infoGroup of hacked computers...

Personell in tourism 2024-03-21

Personell in tourism crossword puzzle
Across
  1. Flies aircraft.
  2. Provides medical care.
  3. Oversees operations.
  4. Teaches specific skills.
  5. Ensures safety and security.
  6. Provides amusement or enjoyment.
  7. Serves food and drinks.
  8. Manages office tasks.
  9. Maintains cleanliness.
  10. Books travel arrangements.
Down
  1. Organizes events or activities.
  2. Supervises swimming areas.
  3. Offers therapeutic services.
  4. Leads tours.
  5. Mixes and serves beverages.
  6. Prepares and cooks food.
  7. A person who buys goods or services.
  8. Cleans rooms and areas.
  9. Greets and assists guests.
  10. Helps with guest requests.
  11. Operates vehicles.

21 Clues: Leads tours.Flies aircraft.Operates vehicles.Oversees operations.Manages office tasks.Provides medical care.Maintains cleanliness.Cleans rooms and areas.Serves food and drinks.Prepares and cooks food.Teaches specific skills.Supervises swimming areas.Greets and assists guests.Helps with guest requests.Books travel arrangements....

CTF-CW-9 2025-11-17

CTF-CW-9 crossword puzzle
Across
  1. Native risk without any safety measures
  2. Time attackers spend undetected
  3. Raising a problem to higher-level personnel
  4. Mathematical technique adding statistical noise to protect individual privacy
  5. Trust service criteria audit report
  6. Abbreviation for Confidentiality, Integrity, and Availability
  7. Rules for managing and protecting data
  8. Correctly identified security threat
  9. Red team�s go-to platform for offensive security at Tekion.
  10. Critical information for encryption and decryption
Down
  1. Ensuring maximum privacy protection without user action required
  2. Creating multiple simulated systems on one machine
  3. Anti-phishing and brand protection platform adopted by Tekion.
  4. Real-time monitoring tool at Tekion.
  5. Ethical approach to artificial intelligence development and deployment
  6. Anything of value owned or used
  7. The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
  8. (Duplicate) Procedures for automated or manual response actions
  9. Gathering data from publicly available sources
  10. Again, technology for preventing leaks

20 Clues: Time attackers spend undetectedAnything of value owned or usedTrust service criteria audit reportReal-time monitoring tool at Tekion.Correctly identified security threatRules for managing and protecting dataAgain, technology for preventing leaksNative risk without any safety measuresRaising a problem to higher-level personnel...

CTF-CW-10 2025-11-17

CTF-CW-10 crossword puzzle
Across
  1. The practice of hiding meaning in messages
  2. Service at Tekion for simplifying software requests.
  3. Sprint and issue management dashboard at Tekion.
  4. Requirement to delete data when no longer needed for its purpose
  5. GDPR requirement to gather least amount of data needed
  6. Keeping personal or sensitive information safe
  7. Establishing true user identity
  8. International standard for Privacy Information Management Systems
  9. (Triplicate) Adversary methods description
Down
  1. (Duplicate) Handling threats as a team
  2. (Duplicate) Plan for handling security disasters
  3. United Kingdom's post-Brexit data protection regulation
  4. (Duplicate) Host-level monitoring security tool
  5. Ensuring data hasn�t been changed or tampered
  6. Person in charge of independent checks
  7. Test run or legal proceeding
  8. More than password needed to get in (again
  9. Choosing how to handle each identified threat
  10. Measure to prevent unwanted events
  11. Cloud-based security layer used by Tekion to protect its websites from online attacks.

20 Clues: Test run or legal proceedingEstablishing true user identityMeasure to prevent unwanted events(Duplicate) Handling threats as a teamPerson in charge of independent checksThe practice of hiding meaning in messagesMore than password needed to get in (again(Triplicate) Adversary methods descriptionEnsuring data hasn�t been changed or tampered...

ultimate fnaf quiz for sweaty gamers 2026-01-08

ultimate fnaf quiz for sweaty gamers crossword puzzle
Across
  1. Protagonist Of FNAF Ruin
  2. The Daycare Attendant During The Day
  3. Died In The Bite Of 83
  4. The Guitarist In FNAF 1
  5. Also Known as " The Marionette "
  6. The Soul Possessing Chica
  7. Protagonist Of FNAF Security Breach
  8. Replaced Bonnie In FNAF Security Breach
  9. Responsible For The Bite Of 87
  10. The Original Location
  11. Tutorial Giver In FNAF Games 1-3
  12. Replaced Foxy In FNAF Security Breach
  13. Known As " The One You Shouldn't Have Killed "
Down
  1. The Helper In FNAF Pizza Sim
  2. Animatronic Involved In The Bite Of 83
  3. The Creator Of FNAF
  4. First Name Of Fazbear Entertainment's Co- Founder
  5. William's Beloved Fursuit
  6. The Man Behind The Slaughter
  7. The Animatronic Built To Trap The Puppet
  8. FNAF RPG Game
  9. The Star Of The Show
  10. The Vessel C.C And Cassidy Inhabit
  11. The Soul Possessing Foxy

24 Clues: FNAF RPG GameThe Creator Of FNAFThe Star Of The ShowThe Original LocationDied In The Bite Of 83The Guitarist In FNAF 1Protagonist Of FNAF RuinThe Soul Possessing FoxyThe Soul Possessing ChicaWilliam's Beloved FursuitThe Helper In FNAF Pizza SimThe Man Behind The SlaughterResponsible For The Bite Of 87Also Known as " The Marionette "...

Security Cross Word 2025-10-14

Security Cross Word crossword puzzle
Across
  1. Virtual private connection over public networks
  2. Restricting distribution based on sensitivity
  3. Detects, blocks, and responds on endpoints (abbr.)
  4. Legal framework protecting personal information
  5. Network barrier enforcing traffic rules
  6. Targeted, well-researched phishing attack
  7. Manipulating people to bypass security
  8. Program that demands payment to restore data
  9. Authentication standard for phishing resistance
  10. Application for generating/storing credentials
  11. Principle: assume breach and verify explicitly
Down
  1. Backups that enable restoration after attacks
  2. Small software flaw exploited by attackers
  3. Process of reporting an event to Security
  4. Transforming data to unreadable form
  5. Attack where criminals pose as executives
  6. Practice of updating systems to fix flaws
  7. Limiting access to only what’s needed
  8. Protects data in transit on untrusted networks
  9. Malicious software
  10. Deceptive emails designed to steal information
  11. Policy prohibiting unapproved tools
  12. Security model emphasizing continuous verification
  13. Second factor for identity verification
  14. Preventing unauthorized data exfiltration (abbr.)

25 Clues: Malicious softwarePolicy prohibiting unapproved toolsTransforming data to unreadable formManipulating people to bypass securityLimiting access to only what‚Äôs neededNetwork barrier enforcing traffic rulesSecond factor for identity verificationProcess of reporting an event to SecurityAttack where criminals pose as executives...

November 2023-11-22

November crossword puzzle
Across
  1. Chronically online Monday.
  2. The preferred holiday meal.
  3. ICAC Conference #1s
  4. American organization; big part of our community
  5. It's a fruit, actually.
Down
  1. Funny feast
  2. Bring more!
  3. It's giving
  4. Brought Thanksgiving back.

9 Clues: Funny feastBring more!It's givingICAC Conference #1sIt's a fruit, actually.Chronically online Monday.Brought Thanksgiving back.The preferred holiday meal.American organization; big part of our community

TIK 2023-08-23

TIK crossword puzzle
Across
  1. jaringan yang terdiri dari komputer client dan server
  2. untuk mengakses berita di seluruh dunia
  3. jaringan yang mencakup dunia
  4. jaringan yang meliputi satu kota
  5. jaringan yang hanya mencakup wilayah kecil
Down
  1. Internet untuk militer
  2. Komputer yang menerima data dari server
  3. Penyakit yang ada di internet
  4. Pencurian Nomor kartu kredit
  5. dilarang oleh agama
  6. Nama awal internet
  7. terputusnya jaringan internet
  8. tempat awal pengembangan jaringan
  9. bentuk dokumen di Internet
  10. format file gambar
  11. kejahatan cyber

16 Clues: kejahatan cyberNama awal internetformat file gambardilarang oleh agamaInternet untuk militerbentuk dokumen di InternetPencurian Nomor kartu kreditjaringan yang mencakup duniaPenyakit yang ada di internetterputusnya jaringan internetjaringan yang meliputi satu kotatempat awal pengembangan jaringanKomputer yang menerima data dari server...

HACKTIVISM 2024-10-17

HACKTIVISM crossword puzzle
Across
  1. Of one’s own free will, without being forced
  2. Leaker, revealer
  3. To engage in a struggle or defense against opposition
  4. Done carelessly, without regard for consequences
  5. In a way that seeks to undermine
  6. To take action or stand firm against something or someone
Down
  1. To rise in opposition
  2. To challenge or dispute something
  3. In a bold, fearless manner
  4. Snitch, source
  5. Campaigner, advocate
  6. Speak in favor of, advertise something
  7. Intentionally
  8. Cyber activist
  9. Hacker
  10. Demonstrator

16 Clues: HackerDemonstratorIntentionallySnitch, sourceCyber activistLeaker, revealerCampaigner, advocateTo rise in oppositionIn a bold, fearless mannerIn a way that seeks to undermineTo challenge or dispute somethingSpeak in favor of, advertise somethingOf one’s own free will, without being forcedDone carelessly, without regard for consequences...

Sample Quiz 1 2023-10-12

Sample Quiz 1 crossword puzzle
Across
  1. Compliance also includes satisfying _____ requirements.
  2. I am aware that breach of any policy requirement can result in _____ action.
  3. Security _____ of an organization are identified by conducting a risk assessment.
  4. Employee _____ is a mandatory requirement before an employee is employed.
Down
  1. Apart from any incident, I am also responsible for reporting any ______ which I may identify in any of the security controls.
  2. "Need to Know" is the _____ of granting access.
  3. The first point in Information Security Policy statement refers to ____ security.
  4. Senior management team is responsible for _______ the implementation of security controls.
  5. ______ usage policy specifies do’s and don’ts for online activities using company infrastructure.
  6. My company can ____ all my communications initiated from the company provided or owned electronic device.
  7. Information Security should become a part of the ____ of the organization.

11 Clues: "Need to Know" is the _____ of granting access.Compliance also includes satisfying _____ requirements.Employee _____ is a mandatory requirement before an employee is employed.Information Security should become a part of the ____ of the organization.I am aware that breach of any policy requirement can result in _____ action....

Investment Crossword 2025-03-25

Investment Crossword crossword puzzle
Across
  1. investors use a ____ time period, with no specific plan in time
  2. The "p" In IPO stands for _____
  3. you contribute, the state, and your ____ contributes to your pension plan
  4. one way investors can make money from stocks
  5. at age ___, you can collect full social security benefits
  6. thousand-Five-Hundred the max amount of money to contribute in a 401k is- __,___
  7. Bull market stock prices are __
  8. A pension is managed by your,
  9. 1.45% for this tax
  10. the opposite of traders
  11. a ____ symbol is used to represent a company
  12. Roth IRA contributions are made _____ tax
  13. Social Security was created by which president
Down
  1. What retirement income source is funded by the government?
  2. there are ____ sources of retirement incomes
  3. bear market stock prices are ____
  4. Higher risk often means ______ Return
  5. in year____ social security was created
  6. You can withdrawal funds for your IRA & Roth IRA with no ________ at age 59.5 Seventy-three RMDs must start at age ____
  7. The total maximum contribution for IRA combined per year is ______
  8. 401K contributions are taken out of your paycheck _____ Taxes.
  9. plan what plan is managed by your employer
  10. social security and medicare together are called _____ Tax
  11. what kind of gains increase in value when you sell an asset for more than you bought it
  12. traders use a _____ time frame

25 Clues: 1.45% for this taxthe opposite of tradersA pension is managed by your,The "p" In IPO stands for _____Bull market stock prices are __traders use a _____ time framebear market stock prices are ____Higher risk often means ______ Returnin year____ social security was createdRoth IRA contributions are made _____ tax...

Amped Up 2025-11-18

Amped Up crossword puzzle
Across
  1. Deville or Deluxe?
  2. variations include "cyber"
  3. Echo, echo echo...
  4. Shaky amp geared towards lower frequencies
  5. Tweed or Pro?
  6. Now in the LTX model
Down
  1. 1995 retro design
  2. 10 watt, great for beginners
  3. The rebranding of the "Dual Professional"
  4. 1948 low power studio staple
  5. Ivy League
  6. Evolution of the "Woodie"
  7. Early 50s amp designed by Freddie Tavares

13 Clues: Ivy LeagueTweed or Pro?1995 retro designDeville or Deluxe?Echo, echo echo...Now in the LTX modelEvolution of the "Woodie"variations include "cyber"10 watt, great for beginners1948 low power studio stapleThe rebranding of the "Dual Professional"Early 50s amp designed by Freddie TavaresShaky amp geared towards lower frequencies

Investing - Sky Garber 2026-03-20

Investing - Sky Garber crossword puzzle
Across
  1. Invest all money into the market all at once
  2. President who signed the Social Security Act
  3. Loans you give to companies or the government
  4. Sum of money saved for a purpose
  5. Index representing the top 500 market cap companies
  6. Social Security and Medicare taxes combined
  7. Age to receive full social security benefits
  8. A speculative currency
  9. Where stocks are bought and sold
Down
  1. Invest money in equal amounts and regular intervals
  2. Total maximum contribution for IRAs per year
  3. Market when stocks are down
  4. Availability to cash
  5. Retirement income source managed by employers
  6. Market when stocks are up

15 Clues: Availability to cashA speculative currencyMarket when stocks are upMarket when stocks are downSum of money saved for a purposeWhere stocks are bought and soldSocial Security and Medicare taxes combinedTotal maximum contribution for IRAs per yearInvest all money into the market all at oncePresident who signed the Social Security Act...

bullying 2023-03-21

bullying crossword puzzle
Across
  1. speaking
  2. online
  3. a type of physical
  4. repeated teasing
  5. to do with friends
  6. contact
Down
  1. a type of psychological
  2. to do with the brain

8 Clues: onlinecontactspeakingrepeated teasinga type of physicalto do with friendsto do with the braina type of psychological

Cyber Quiz 2021-08-30

Cyber Quiz crossword puzzle
Across
  1. assortment of PCs with enormous capacity abilities that distantly serve demands.
  2. Any endeavor to disregard the security border of a consistent climate
  3. The action of breaking down and additionally looking through information to discover things of importance, importance or worth.
  4. - communicated as series of the digits 0 and 1
  5. A stack of info sent from a site to an internet browser that records a client's action on that site.
Down
  1. Equipment and additionally programming intended to keep unapproved clients from getting to a PC framework.
  2. the change of text, pictures, or sound into a computerized structure that can be prepared by a PC
  3. A strategically or philosophically propelled digital assault or hack.
  4. The second a programmer effectively takes advantage of a weakness in a PC or gadget, and accesses its records and organization.
  5. An online diary. Constriction of the term web log.
  6. Making a copy duplicate of information onto a different actual stockpiling gadget or on the web/distributed storage arrangement

11 Clues: - communicated as series of the digits 0 and 1An online diary. Constriction of the term web log.A strategically or philosophically propelled digital assault or hack.Any endeavor to disregard the security border of a consistent climateassortment of PCs with enormous capacity abilities that distantly serve demands....

Cyber Crossword 2021-09-05

Cyber Crossword crossword puzzle
Across
  1. “the adoption or increase in use of digital or computer technology by an organization, industry, country.
  2. a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
  3. a paperless method of sending messages, notes or letters from one person to another or even many people at the same time via Internet.
  4. action or process of digitizing or conversion of analogue data in digital form.
  5. an integrated service of electronic applications needed for any kind of healthcare function.
Down
  1. validates contracts entered into electronically, and validates electronic signatures.
  2. virtual network of websites connected by hyperlinks.
  3. This in Cyber space is a focal point for two opposing schools of thought, the Cyberlibertarians and the Cyber-paternalists.
  4. an Internet utility software used touploaded and download files.
  5. a type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure.
  6. the first paying method from partner to partner,which does not have any mediator and obtains its power from the users.

11 Clues: virtual network of websites connected by hyperlinks.an Internet utility software used touploaded and download files.action or process of digitizing or conversion of analogue data in digital form.validates contracts entered into electronically, and validates electronic signatures....

Cyber Safety 2022-09-26

Cyber Safety crossword puzzle
Across
  1. putting something online
  2. content that only trusted people can see
  3. who you are
  4. your contact number
  5. where you live
  6. Apps like Facebook and TikTok
Down
  1. content that everyone can see
  2. people who see your posts
  3. what you think about something
  4. telling others not to give up
  5. organisation that cares for money

11 Clues: who you arewhere you liveyour contact numberputting something onlinepeople who see your postscontent that everyone can seetelling others not to give upApps like Facebook and TikTokwhat you think about somethingorganisation that cares for moneycontent that only trusted people can see

CYBER BULLYING 2019-11-19

CYBER BULLYING crossword puzzle
Across
  1. A ELECTRONIC THAT TENNAGERS HAVE
  2. little KIDS HAS THIS ELETRONIC
  3. presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
  4. adults HAVE THIS APP
  5. you CAN SNAP PITHURES
  6. GETS BULLIED ON THE INTERNET
Down
  1. THIS IS WHAT GETS BULLIED
  2. its A MOTHER BOARD OF APPS
  3. HAS A KEYBORD
  4. MEAN TO DO
  5. TO PUT SOMETHING ON THE INTERNET

11 Clues: MEAN TO DOHAS A KEYBORDadults HAVE THIS APPyou CAN SNAP PITHURESTHIS IS WHAT GETS BULLIEDits A MOTHER BOARD OF APPSGETS BULLIED ON THE INTERNETlittle KIDS HAS THIS ELETRONICA ELECTRONIC THAT TENNAGERS HAVETO PUT SOMETHING ON THE INTERNETpresedent DONALD TRUMP HAS A ACCOUNT ON THIS APP

Cyber-bullying 2020-11-20

Cyber-bullying crossword puzzle
Across
  1. photo editor
  2. an app where you can post images
  3. the effect on someone
  4. people who comment hateful messages
  5. an image you take off of the device your on
  6. the act of someone or yourself acting like someone else
Down
  1. the act of being bullied online
  2. a funny photo with a caption
  3. a social platform where you can post images and text
  4. online platform where you make videos with dances
  5. a symbol and a title

11 Clues: photo editora symbol and a titlethe effect on someonea funny photo with a captionthe act of being bullied onlinean app where you can post imagespeople who comment hateful messagesan image you take off of the device your ononline platform where you make videos with dancesa social platform where you can post images and text...

Cyber Love 2022-12-14

Cyber Love crossword puzzle
Across
  1. private
  2. personal information
  3. feelings
  4. opportunity
  5. at last
Down
  1. same interests
  2. to stop
  3. in fact really
  4. internet
  5. I think
  6. to talk

11 Clues: to stopprivateI thinkto talkat lastinternetfeelingsopportunitysame interestsin fact reallypersonal information

Cyber Safety 2025-02-05

Cyber Safety crossword puzzle
Across
  1. Stop
  2. Divide
  3. Appear
  4. Press a button on the mouse
  5. Security
  6. Complain
Down
  1. Power down
  2. Support button
  3. Have a high opinion of someone
  4. Unwanted presence of someone online
  5. Believe

11 Clues: StopDivideAppearBelieveSecurityComplainPower downSupport buttonPress a button on the mouseHave a high opinion of someoneUnwanted presence of someone online