cyber security Crossword Puzzles

Energy & Food Security 2024-03-25

Energy & Food Security crossword puzzle
Across
  1. alcohol produced from plant matter (sugar cane or maize) which can be used as an alternative to petrol
  2. form of power for electricity that is generated by utilizing the energy of the sun
  3. the reliable availability of energy sources at an affordable price with consideration of the environmental impacts
  4. Cause of energy insecurity
  5. resources that will run out and not be replenished for millions of years
  6. impact of energy insecurity
  7. lack of adequate nutrition, caused by not having a balanced diet or enough to eat
  8. another form of energy utilizing the power of water
  9. energy generated from the heat under the surface of Earth
  10. any source of energy that can be naturally and quickly replenished
Down
  1. electricity generated by energy from waves or the tides
  2. suffering or death caused by lack of food
  3. renewable resource that utilizes currents in the atmosphere to generate electricity
  4. to store large amounts of goods or materials
  5. systems that react promptly to sudden changes in the supply-demand balance
  6. supply of energy that is in line with economic developments and environmental needs
  7. extreme scarcity of food
  8. defined as 'when all people, at all time, have physical, social and economic access to sufficient, safe & nutritious food that meets their dietary needs and food preferences for an active and healthy life.
  9. increase in salt content, usually of agricultural soils, irrigation water or drinking water
  10. limit the amount of food each person or family is allowed to purchase
  11. market determines the price of a food product; cause of food insecurity
  12. type of power using radioactive materials such as uranium & plutonium. Power is produced from energy released as materials undergo reactions
  13. gas such as methane that can be used as a fuel & is produced by fermenting organic matter.

23 Clues: extreme scarcity of foodCause of energy insecurityimpact of energy insecuritysuffering or death caused by lack of foodto store large amounts of goods or materialsanother form of energy utilizing the power of waterelectricity generated by energy from waves or the tidesenergy generated from the heat under the surface of Earth...

DTIN - Digital Security 2024-08-08

DTIN - Digital Security crossword puzzle
Across
  1. Significant increase in electrical power.
  2. Rules of an online community.
  3. Unwanted electrical signal.
  4. Process of encoding information to protect it from unauthorized access.
  5. Protects the use of original works.
  6. Disrupts computer access to an Internet service.
  7. An event causing loss or damage to computer hardware, software, data, or processing capability.
  8. Protects computer and equipment from electrical power disturbances.
  9. A group of compromised computers connected to a network.
  10. Steps to be taken immediately after a disaster.
  11. Use of digital communication tools to harm or harass others.
  12. Simulates disasters and records recovery ability.
  13. A type of malware that copies itself repeatedly.
  14. Software developed to detect and remove computer viruses.
Down
  1. Measures to protect information from unauthorized access.
  2. Licenses that allow creators to communicate which rights they reserve.
  3. A compromised computer or device.
  4. Larger scale of a DoS attack.
  5. Specific pattern of virus code.
  6. Drop in electrical supply.
  7. Prolonged malfunction of a computer.
  8. Process used by antivirus programs to prevent infection.
  9. Malware that hides within or looks like legitimate software.
  10. Actions to restore full information processing operations.
  11. Separating infected files that cannot be removed.
  12. Online or Internet-based illegal act.
  13. Program that protects your computer from unauthorized access.
  14. Attempts to disrupt or gain unauthorized access to computer networks.
  15. Surge protector that provides power during power loss.
  16. Fraudulent attempt to obtain sensitive information.
  17. A potentially damaging computer program.
  18. Program that allows users to bypass security controls.
  19. Allows limited use of copyrighted material without permission.
  20. How backup files and equipment resume information processing.
  21. Malicious software designed to harm or exploit any programmable device or network.

35 Clues: Drop in electrical supply.Unwanted electrical signal.Larger scale of a DoS attack.Rules of an online community.Specific pattern of virus code.A compromised computer or device.Protects the use of original works.Prolonged malfunction of a computer.Online or Internet-based illegal act.A potentially damaging computer program....

Information Security Puzzle 2023-04-11

Information Security Puzzle crossword puzzle
Across
  1. A key concept of data protection, where files and emails are tagged with labels in accordance to their sensitivity and value [Two word]
  2. Email used to report information security incidents at EDGE [Full email]
  3. A key risk associated with IP Theft that could lead to a detrimental impact on national security [Two word]
  4. Data that should not be stored on personally owned devices [Two words]
  5. Location of the Information Security (IS) policies at X [Three word]
  6. A classification tag that applies to X's non-military Intellectual property data [One word]
  7. Are not to be used to register or create accounts on public platforms [Two word]
  8. Downloading them from the internet or using unauthorised versions is prohibited [Two words]
  9. Are responsible and accountable for activities performed on X Group's information assets that are being used by them [One word]
  10. Refers to the act of sharing valuable information with unauthorised parties [Two words]
Down
  1. Is a key preventive control against insider threats [One word]
  2. A leading root cause for insider threats [Two word]
  3. Are not to be shared with anyone [Two words]
  4. Policy that provides directives on how to use information assets within the company to protect employees and the company from inappropriate exposure of risks [Two word]
  5. An action that end users must take, when aware or suspicious of unusual behavior that could lead to insider threat [One word]
  6. Information created, acquired, developed or discovered by X Group [Two words]
  7. An inappropriate act made following an informed and conscious decision with a motive to cause harm [One word]
  8. The act of bypassing internal security controls to satisfy a business need, with no intention to cause harm {One word]
  9. Can originate from current/former employees and third parties with authorised access to company systems [Two words]
  10. A tool used to apply manual protection to files and emails before sharing with authorised recipients [One word]

20 Clues: Are not to be shared with anyone [Two words]A leading root cause for insider threats [Two word]Is a key preventive control against insider threats [One word]Location of the Information Security (IS) policies at X [Three word]Data that should not be stored on personally owned devices [Two words]...

Safety & Security 1 2025-07-12

Safety & Security 1 crossword puzzle
Across
  1. Workstations with a proper _______ setup minimize strain.
  2. What would texting while driving be classified as?
  3. The abbreviation for Personal Protective Equipment is?
  4. Ignoring proper lifting leads to _______ (2 words).
  5. What compensation do you get when you purchase shoes? An ________.
  6. _______ Strain Injury (RSI).
  7. What is the "CP" in CPR?
  8. What item is recommended when riding a bike?
  9. A worksite hazard in a guest centre?
Down
  1. Why do we use gloves?
  2. You use a N-95 mask when the _______ (2 words) is extreme.
  3. What protection do we have that repels bears (2 words)?
  4. When entering the railyard, what should you be wearing?
  5. Each month a worksite safety _______ must be completed.
  6. What kind of document is used when the Corporation has rules employees must abide by?
  7. Working areas need to be _______.
  8. When it is hot, hot, hot, what should we drink?
  9. To put out a fire we need a _______(2 words).
  10. What category would extreme heat be classified as?
  11. What ergonomic engineering is used to assist with luggage handling? (2 words)
  12. Rest, Ice, _______, Elevation (RICE).

21 Clues: Why do we use gloves?What is the "CP" in CPR?_______ Strain Injury (RSI).Working areas need to be _______.A worksite hazard in a guest centre?Rest, Ice, _______, Elevation (RICE).What item is recommended when riding a bike?To put out a fire we need a _______(2 words).When it is hot, hot, hot, what should we drink?...

Computer Network & Security 2025-09-17

Computer Network & Security crossword puzzle
Across
  1. – Connection-oriented protocol that ensures reliable communication.
  2. – Protocol used to map IP addresses to MAC addresses.
  3. – Widely used point-to-point protocol for data link communication.
  4. – Reference model with seven layers for networking functions.
  5. - the rate at which data is successfully transmitted from one point to another in a network
  6. - Uniquely identifies a device (like a computer, phone, or server) on a network
  7. – Error detection technique using the sum of data units.
  8. – A collection of interconnected devices sharing resources.
  9. – Process of dividing a data stream into manageable units.
  10. – Scientist who gave a formula for maximum data rate in noiseless channels.
Down
  1. – Error detection method based on polynomial division.
  2. – The physical or logical arrangement of a network.
  3. – Line coding where each bit has a transition at the middle.
  4. – Transmission mode where data flows in one direction only.
  5. – Line coding scheme where voltages are positive or negative.
  6. – Variation in packet arrival time that affects performance.
  7. – Type of switched network where a dedicated path is reserved.
  8. - When two or more networks are connected
  9. – Basic unit of data in packet-switched networks.
  10. – Device that forwards frames based on MAC addresses.

20 Clues: - When two or more networks are connected– Basic unit of data in packet-switched networks.– The physical or logical arrangement of a network.– Protocol used to map IP addresses to MAC addresses.– Device that forwards frames based on MAC addresses.– Error detection method based on polynomial division....

Computer Networks & Security 2025-11-21

Computer Networks & Security crossword puzzle
Across
  1. Short-range wireless tech used for earbuds or keyboards
  2. Amount of data that can move through a network connection at once
  3. Device that connects a network to an internet provider
  4. Tool that blocks unwanted or unsafe network traffic
  5. Network that covers large areas like cities or countries
  6. Wired connection using physical network cables
  7. Very short-range network for nearby personal devices
  8. Device that directs network traffic to the correct destination
  9. Device or location that provides a Wi-Fi signal
  10. Address Unique number that identifies a device on a network
  11. Device that allows wireless devices to join a network
  12. Connection that sends data to equipment in orbit
  13. Network that connects devices in one building or campus
Down
  1. Storage Online service that stores files on remote servers
  2. Software that detects or removes harmful programs
  3. Secret code used for encryption and decryption
  4. Wireless technology for connecting devices to the internet
  5. Software designed to harm devices or steal information
  6. Process of turning scrambled data back into readable information
  7. Older communication line that can carry data as well as voice
  8. Process of scrambling data so only authorized users can read it
  9. Packet Small bundle of information that moves across a network
  10. Older mobile data system used before 3G and 4G
  11. Transfer Speed Measurement of how fast data moves between devices

24 Clues: Secret code used for encryption and decryptionWired connection using physical network cablesOlder mobile data system used before 3G and 4GDevice or location that provides a Wi-Fi signalConnection that sends data to equipment in orbitSoftware that detects or removes harmful programsTool that blocks unwanted or unsafe network traffic...

Cyber-Bullying 2013-04-12

Cyber-Bullying crossword puzzle
Across
  1. When somebody reveals personal or embarassing information over the internet
  2. Bullying somebody using the internet
  3. Person who is being bullied
  4. Also known as the "agitator"
  5. Deliberatly and disingenuouskly posting information to entice genuinely
Down
  1. A type of online attack that uses a blog or forum
  2. Fooling somebody into revealing personal information
  3. When someone pretends to be someone that they aren't
  4. Following victims on the internet
  5. Spreading gossip or rumours over the internet
  6. A computer file that records user information

11 Clues: Person who is being bulliedAlso known as the "agitator"Following victims on the internetBullying somebody using the internetSpreading gossip or rumours over the internetA computer file that records user informationA type of online attack that uses a blog or forumFooling somebody into revealing personal information...

Cyber Bully 2015-08-25

Cyber Bully crossword puzzle
Across
  1. Veronica had them on her leg
  2. Emily's brother
  3. Emily got the liquid there
  4. Emily got .... euro pocket money
  5. Emily's father was drinking it
Down
  1. Name of Emily's boyfriend
  2. word meaning 'disgusting' or 'very bad'
  3. Emily messaged her for over 2 hours
  4. word meaning 'replied sharply'
  5. Surname of guidance counsellor
  6. The place where Emily could hide

11 Clues: Emily's brotherName of Emily's boyfriendEmily got the liquid thereVeronica had them on her legword meaning 'replied sharply'Surname of guidance counsellorEmily's father was drinking itEmily got .... euro pocket moneyThe place where Emily could hideEmily messaged her for over 2 hoursword meaning 'disgusting' or 'very bad'

Cyber safety 2016-09-08

Cyber safety crossword puzzle
Across
  1. the school uses one of these to stop students from using certain websites
  2. it is illegal to sign up before the age of 13
  3. a place where photos are mostly posted
  4. this type of software can protect you against a virus
  5. when you are using the web you are
Down
  1. a harmful thing that can ruin your computer
  2. who should you see if you are being bullied at school
  3. it is important to keep your information .....
  4. an email that is unwanted
  5. when someone breaks into your account
  6. you should never display this publicly

11 Clues: an email that is unwantedwhen you are using the web you arewhen someone breaks into your accounta place where photos are mostly postedyou should never display this publiclya harmful thing that can ruin your computerit is illegal to sign up before the age of 13it is important to keep your information ........

Cyber bulling 2023-04-18

Cyber bulling crossword puzzle
Across
  1. rethink before you do this
  2. if your getting bullied you need to tell a trusted ...
  3. people who are getting cyberbullied
  4. a very common device for communicating over a distance.
  5. sending, posting, or sharing negative, harmful, false, or mean content about someone else.
Down
  1. a secret word or numbers that must be used to gain admission to something
  2. the act of forcing a person to do or pay something especially by a threat to reveal a secret
  3. when someone sets up a fake online profile to trick people who are looking for love, usually to get money out of them.
  4. a person who is present at an event or incident but does not take part
  5. a setting you need to check
  6. a popular video sharing website

11 Clues: rethink before you do thisa setting you need to checka popular video sharing websitepeople who are getting cyberbulliedif your getting bullied you need to tell a trusted ...a very common device for communicating over a distance.a person who is present at an event or incident but does not take part...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. people that be mean to you on your device
  2. something that takes over your device
  3. While there are many online scams on the internet, phishing is one that is geared specifically toward retrieving someone's personal information and using it to harm them. An identity thief
  4. Sharing someone's secrets or embarrassing information or images online.
  5. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
Down
  1. "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  2. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  3. form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity
  4. online fights using electronic messages
  5. when something is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work
  6. Repeatedly sending nasty, mean, and insulting message

11 Clues: something that takes over your deviceonline fights using electronic messagespeople that be mean to you on your deviceRepeatedly sending nasty, mean, and insulting messageSharing someone's secrets or embarrassing information or images online.Talking someone into revealing secrets or embarrassing information, then sharing it online....

Cyber threats 2022-11-15

Cyber threats crossword puzzle
Across
  1. this malware enables malicious actors to gain unauthorized access to data.
  2. attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email
  3. prevents access to the data of the victim and threatens to delete or publish it unless a ransom is paid.
  4. this phishing attack targets high-profile employees (whales), such as the chief executive officer (CEO) or chief financial officer (CFO).
  5. occurs when a threat actor tricks a target into using a malicious device, placing a malware-infected physical device, like a USB, where the target can find it.
Down
  1. a threat actor tricks the victim into thinking they inadvertently downloaded illegal content or that their computer is infected with malware.
  2. online advertising controlled by hackers, which contains malicious code that infects a user’s computer when they click, or even just view the ad.
  3. systems under hacker control that have been infected with malware.
  4. an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.
  5. this malware is designed to exploit backdoors and vulnerabilities to gain unauthorized access to operating systems.
  6. voice phishing (vishing) attacks use social engineering techniques to get targets to divulge financial or personal information over the phone.

11 Clues: systems under hacker control that have been infected with malware.this malware enables malicious actors to gain unauthorized access to data.an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email...

Cyber Ethics 2025-06-19

Cyber Ethics crossword puzzle
Across
  1. A type of attack that tricks a user into revealing their personal information is called
  2. This is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  3. observe threatening and aggressive behavior directed toward another
  4. is a security measure that prevents users from accessing unauthorized websites.
  5. experience threatening and aggressive behavior against themself
  6. threatening and aggressive behavior directed toward others
Down
  1. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer
  2. SQL is a type of attack that attempts to exploit a vulnerability in a web application.
  3. A person who uses computers to gain unauthorized access to data.
  4. This is a computer security system designed to prevent unauthorized access.
  5. bullies may be more likely to have callous-unemotional traits, psychopathic tendencies, conduct problems, antisocial personality traits, susceptibility to peer pressure, anxiety, and depression

11 Clues: threatening and aggressive behavior directed toward othersexperience threatening and aggressive behavior against themselfA person who uses computers to gain unauthorized access to data.observe threatening and aggressive behavior directed toward anotherThis is a computer security system designed to prevent unauthorized access....

Understanding Money Created By Sarah Dominguez 2024-05-09

Understanding Money Created By Sarah Dominguez crossword puzzle
Across
  1. money used in exchange for goods & services needed by individuals.
  2. mechanism a nation uses to provide & manage money for itself
  3. meaning money is a common measure worth or price of a good or service.
  4. transfer of money from one bank account to another.
  5. plastic card that allows the holder to make credit purchases up to an authorized amount.
  6. security that pays interest over terms of 10-30 years.
  7. another word for money.
  8. type of financial investment issued by a corporation, government, or other organizations.
  9. means it can be saved & used at a later date.
  10. anything of value that is accepted in return for goods or services.
Down
  1. process of transferring money from one individual or organization to another
  2. banks that are part of the Federal Reserve System.
  3. it can lose some of its purchasing power over time.
  4. security that pays interest over terms ranging from 2-10 years.
  5. type of document guaranteeing the payment for a specific amount of money.
  6. security that matures in a year or less.
  7. allows customers to pay for purchases directly from their checking account.
  8. action taken to manage the supply of money & interest rates in an economy
  9. the dollar is the official currency used for financial exchange.
  10. exchange one good or service for another good or service.

20 Clues: another word for money.security that matures in a year or less.means it can be saved & used at a later date.banks that are part of the Federal Reserve System.it can lose some of its purchasing power over time.transfer of money from one bank account to another.security that pays interest over terms of 10-30 years....

NHSScotland Security Questions and Advocates 2022-10-25

NHSScotland Security Questions and Advocates crossword puzzle
Across
  1. What is the reason for asking the Securityquestions, Full name, DOB, Postcode?
  2. What is the first security question?
  3. If you do not complete the security questions, what score will you receive from QA
  4. A child requires additional advocate details, what is it?
  5. If a citizen is unable to come to the phone to do security, what are the list of reasons called when an advocate can continue with the call
  6. When do you ask the Security questions for identification?
Down
  1. In addition to contact advocate details, what else needs to be included for adults
  2. Where do you include the advocates contact details
  3. What is the citizen called if they are calling on behalf of someone else?
  4. What is the reason for asking the covid security related questions?
  5. If speaking to an advocate, who completes the security questions?

11 Clues: What is the first security question?Where do you include the advocates contact detailsA child requires additional advocate details, what is it?When do you ask the Security questions for identification?If speaking to an advocate, who completes the security questions?What is the reason for asking the covid security related questions?...

CYBERCRIME 2021-07-10

CYBERCRIME crossword puzzle
Across
  1. measures promoting the safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
  2. is a form of bullying or harassment using electronic means
  3. Interception made by technical means without right
  4. It is when an individual or entity with malice or in bad faith
  5. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  6. is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access
  7. is data that describes other data.
  8. Intentional or reckless alteration, damaging, deletion of computer data
  9. protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  10. is a hacker who violates computer security for their own personal profit or out of malice.
  11. is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
  12. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  13. a string of characters that allows access to a computer system or service.
  14. a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations
  15. sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
  16. of 2012 therefore and for other purposes
  17. act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes.
  18. It is offense against the confidentiality, integrity and availability of computer data and systems.
  19. is pornography that exploits children for sexual stimulation.
  20. information of an individual in any container for trash collection.
  21. is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
  22. what comes after terabyte
  23. It is when personal
  24. is a form of phishing that uses mobile phones as the attack platform to gather personal details, like SSN or credit card number.
  25. is a suspected, attempted, successful, or imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction of information; interference with information technology operations; or significant violation of responsible use policy
  26. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Down
  1. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  2. is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet.
  3. Intentional alteration or reckless interference with the functioning of a computer or computer network
  4. when individual handling personal information knowingly or negligently disposed, discard, or abandon in an area accessible to the public or has otherwise placed the
  5. includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life.
  6. It is when an individual handling personal information or intentional knowingly and unlawfully, or violating data confidentiality breach and security
  7. breach It is when an individual or entity who has knowledge of a security breach and of the obligation
  8. It is when an individual or entity discloses to third party personal information.
  9. is a concept describing a widespread interconnected digital technology.
  10. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
  11. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
  12. Prevention investigation, suppression and the imposition of penalties
  13. is a data storage device that includes flash memory with an integrated USB interface.
  14. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
  15. refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
  16. Act of 2012
  17. is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.
  18. Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
  19. Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering.
  20. global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  21. what comes after zettabyte.
  22. Access Access to the whole or any part of a computer system without right
  23. is a shortfall that comes from fragmented thinking, reactive acquisition, and unmanaged vulnerability against the known threats that violate confidentiality, integrity, availability, and privacy of information in the infrastructure, process, data, application, and agreements of service delivery.
  24. An act defining cybercrime, providing for the prevention,
  25. is an electronic data storage device used for storing digital information, typically using flash memory.

51 Clues: Act of 2012It is when personalwhat comes after terabytewhat comes after zettabyte.is data that describes other data.of 2012 therefore and for other purposesInterception made by technical means without rightAn act defining cybercrime, providing for the prevention,is a form of bullying or harassment using electronic means...

Health 2023-09-01

Health crossword puzzle
Across
  1. standing around and do nothing
  2. mean person
  3. The state of being protected
  4. person who gets hurt
  5. a choice you make
Down
  1. The condition of being protected
  2. person who saves the victim
  3. bullying bullying someone online
  4. leader of school
  5. Person who teaches kids

10 Clues: mean personleader of schoola choice you makeperson who gets hurtPerson who teaches kidsperson who saves the victimThe state of being protectedstanding around and do nothingThe condition of being protectedbullying bullying someone online

Kornelia Zawalska 2c 2023-04-17

Kornelia Zawalska 2c crossword puzzle
Across
  1. forma pamiętnika prowadzonego w internecie
  2. oprogramowanie
  3. danych
  4. od internetu
  5. -manipulacja głosu
  6. atak
Down
  1. wiadomości
  2. rodzaj rozmowy prowadzonej w internecie
  3. w internecie
  4. prawny lub umowa

10 Clues: atakdanychwiadomościw internecieod internetuoprogramowanieprawny lub umowa-manipulacja głosurodzaj rozmowy prowadzonej w internecieforma pamiętnika prowadzonego w internecie

Black friday 2024-11-28

Black friday crossword puzzle
Across
  1. SWEET TREATS
  2. POPULAR ONLINE STORE
  3. PLAYED IN STORES ON BLACK FRIDAY
  4. A BIG SHOPPING SESSION
Down
  1. PLURAL OF A BARGAIN
  2. NIKE OR ADIDAS ARE EXAMPLES
  3. HOLDS YOUR CASH AND CARDS
  4. MONDAY'S ONLINE SHOPPING DAY
  5. WORN ON YOUR WRIST
  6. THINGS CHILDREN PLAY WITH

10 Clues: SWEET TREATSWORN ON YOUR WRISTPLURAL OF A BARGAINPOPULAR ONLINE STOREA BIG SHOPPING SESSIONHOLDS YOUR CASH AND CARDSTHINGS CHILDREN PLAY WITHNIKE OR ADIDAS ARE EXAMPLESMONDAY'S ONLINE SHOPPING DAYPLAYED IN STORES ON BLACK FRIDAY

crossword 2025-02-16

crossword crossword puzzle
Across
  1. - A unit of digital storage equal to 1,024 gigabytes.
  2. - A reference in a document that connects to another location or file.
  3. - Increasing a computer component’s speed beyond its specifications.
  4. - A cryptographic technique that uses quantum mechanics.
  5. - An organized collection of structured information or data.
  6. - A global network connecting millions of devices.
  7. - A cyber attack that tricks users into revealing personal information.
  8. - The maximum rate of data transfer across a network.
  9. - A security system that monitors and controls network traffic.
  10. - A temporary storage area for frequently accessed data.
  11. - Software with publicly available source code.
  12. - A type of AI that mimics human intelligence.
  13. - Temporary memory used for quick access.
  14. - The process of replacing sensitive data with unique identifiers.
  15. - A digital storage space in the cloud.
  16. - Data that describes other data.
  17. - A device that connects networks.
  18. - A wireless networking technology.
  19. - A step-by-step procedure for solving a problem.
  20. - The delivery of computing services over the internet.
  21. - Unwanted or unsolicited messages, typically emails.
  22. - A self-replicating computer program.
  23. - The smallest unit of data in computing.
  24. - A secret code used for security.
  25. - The smallest unit of a digital image.
Down
  1. - A decentralized ledger technology used in cryptocurrencies.
  2. - A program that translates source code into machine code.
  3. - Permanent software programmed into a hardware device.
  4. - An error in programming.
  5. - The manipulation of matter on an atomic scale.
  6. - A software testing method to verify previous functionality.
  7. - A set of rules for data transmission.
  8. - Software that harms a system.
  9. - The simulation of human intelligence in machines.
  10. - The delay before data is transferred over a network.
  11. - A technology that overlays digital content on the real world.
  12. - A subset of machine learning using neural networks.
  13. - The process of creating a virtual version of computing resources, such as servers or storage.
  14. - The practice of protecting systems and networks from digital attacks.
  15. - The part of a system that users interact with.
  16. - The process of converting information into a secure format.
  17. - A type of malware that spreads across networks automatically.
  18. - A program that performs a specific task.
  19. - A memory management technique using disk storage.
  20. - The process of converting analog data to digital.
  21. - A common wired networking technology.
  22. - A tool used to test and fix errors in software.
  23. - The physical parts of a computer.
  24. - A collection of tools for software development.
  25. - The brain of a computer.

50 Clues: - An error in programming.- The brain of a computer.- Software that harms a system.- Data that describes other data.- A device that connects networks.- A secret code used for security.- A wireless networking technology.- The physical parts of a computer.- A self-replicating computer program.- A set of rules for data transmission....

Alerts 2022-12-09

Alerts crossword puzzle
Across
  1. An alert that is undetected incident has occurred
  2. Is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution.
  3. This analysis estimates the potential success of an exploit by estimating the likelihood that if one step in an exploit has successfully been completed that the next step will also be successful
  4. It is a packet capture application that is integrated into the Security Onion suit
  5. Are notification messages that are generated by NSM tools, systems, and security devices
  6. The alert has been verified to be an actual security incident
Down
  1. The meaning of M in NSM
  2. Is a network traffic analyzer that serves as a security monitor.
  3. This is a Network Intrusion Detection System (NIDS).
  4. It is an interactive dashboard interface to Elasticsearch data.
  5. This tool provides a high-level console for investigating security alerts from a wide variety of sources
  6. alert evaluation where all prior steps in the exploit must also be successful

12 Clues: The meaning of M in NSMAn alert that is undetected incident has occurredThis is a Network Intrusion Detection System (NIDS).The alert has been verified to be an actual security incidentIt is an interactive dashboard interface to Elasticsearch data.Is a network traffic analyzer that serves as a security monitor....

Physical Security 2023-11-12

Physical Security crossword puzzle
Across
  1. Body measurements and calculations related to human characteristics
  2. The process of risk assessment is risk ________
  3. One of the physical security framework component
  4. Physical security threat caused by natural
  5. Most common type of physical security surveillance
Down
  1. Moving people away from an area where they are in potential danger to a safer location
  2. Access control weakness and risk
  3. Situation involving exposure to danger
  4. One of physical security main objective is to protect this
  5. Physical security risk

10 Clues: Physical security riskAccess control weakness and riskSituation involving exposure to dangerPhysical security threat caused by naturalThe process of risk assessment is risk ________One of the physical security framework componentMost common type of physical security surveillanceOne of physical security main objective is to protect this...

Anti-bulling 2014-08-08

Anti-bulling crossword puzzle
Across
  1. the person who is bulling
  2. consist bulling
  3. whispers about somebody
  4. having no propose
  5. somebody who has no affect on what is going on
  6. not the truth
  7. bulling someone online
  8. hard or to try change something
  9. making something better
Down
  1. with nobody,liked by nobody
  2. physically harming someone
  3. heeling someone
  4. the health of of your brain

13 Clues: not the truthheeling someoneconsist bullinghaving no proposebulling someone onlinewhispers about somebodymaking something betterthe person who is bullingphysically harming someonewith nobody,liked by nobodythe health of of your brainhard or to try change somethingsomebody who has no affect on what is going on

Arent 1c 2023-03-06

Arent 1c crossword puzzle
Across
  1. chce wpływać na innych ośmieszać ich , wyzywać
  2. pamiętnik prowadzony w internecje
  3. cyber atak
  4. mylne informacje rozpowszechniane bez złej intencji
  5. przemoc związana z użyciem urządzeń elektrycznych
Down
  1. zmanipulowana informacja
  2. złamanie zabezpieczenia
  3. forma komunikacji erotycznej
  4. technika obróbki zdjęć
  5. strach przed ominięciem ważnej informacji
  6. niechciane , irytujące wiadomośći
  7. zbiór zasad dotyczące dobrego zachowania w internecje
  8. rodzaj rozmowy prowadzony dwoma osobami lub więcej

13 Clues: cyber ataktechnika obróbki zdjęćzłamanie zabezpieczeniazmanipulowana informacjaforma komunikacji erotycznejpamiętnik prowadzony w internecjeniechciane , irytujące wiadomośćistrach przed ominięciem ważnej informacjichce wpływać na innych ośmieszać ich , wyzywaćprzemoc związana z użyciem urządzeń elektrycznych...

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ 2020-03-05

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ crossword puzzle
Across
  1. Ιός της εποχής μας
  2. Εκεί βρίσκεται το σχολείο μας
  3. Στα ελληνικά το cyber bullying
  4. Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές
  5. Μπορεί να συμβεί και κατά την ώρα του....
  6. Δέχεται τον εκφοβισμό
  7. Στα ελληνικά ο bully
  8. Το βαπτιστικό του Καραϊσκάκη
Down
  1. Ηγέτης της Νότιας Αφρικής
  2. Εκφοβισμός με λόγια
  3. Εκεί συμβαίνει συχνά ο εκφοβισμός
  4. Σήμερα είναι...
  5. Ασκεί τον εκφοβισμό

13 Clues: Σήμερα είναι...Ιός της εποχής μαςΕκφοβισμός με λόγιαΑσκεί τον εκφοβισμόΣτα ελληνικά ο bullyΔέχεται τον εκφοβισμόΗγέτης της Νότιας ΑφρικήςΤο βαπτιστικό του ΚαραϊσκάκηΕκεί βρίσκεται το σχολείο μαςΣτα ελληνικά το cyber bullyingΕκεί συμβαίνει συχνά ο εκφοβισμόςΜπορεί να συμβεί και κατά την ώρα του....Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές

bullying crossword 2020-06-07

bullying crossword crossword puzzle
Across
  1. if you are being bullied tell the______
  2. getting hit
  3. getting item's through ________
  4. choosing to not include someone
  5. hurt through words.
Down
  1. hurting
  2. people who see the bullying
  3. the person doing the bullying.
  4. punches.
  5. this happens on the in the internet.

10 Clues: hurtingpunches.getting hithurt through words.people who see the bullyingthe person doing the bullying.getting item's through ________choosing to not include someonethis happens on the in the internet.if you are being bullied tell the______

Cybersecurity Awareness 2024-11-06

Cybersecurity Awareness crossword puzzle
Across
  1. ERROR Unintentional actions by people that can compromise security systems.
  2. ___ your device before leaving your workplace is a good practice.
  3. Connecting your device to a free access public wi-fi can lead to ___ attack.
  4. A feature to switch off connections in mobile devices.
  5. One of the factors to check whether the website is official and safe.
  6. Always verify whether the website is ___ or not before entering any credentials.
  7. Passwords like “123456” and “password” is in this category.
  8. Best practice before downloading a software online. / Always ___ when you are calling someone.
  9. Download mobile applications from an ___ app store.
  10. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
  1. Never click on an ___ if you received an email from an unknown sender.
  2. Using an ___ version of software is like giving chances for hackers to hack.
  3. This tool can track your typing habits and log your passwords without your knowledge.
  4. ___ engineering is the art of manipulating humans in giving away all of your information.
  5. Best practice if an unknown device wants to connect to your device.
  6. Never share your sensitive information on ___.
  7. Using a ___ password for all accounts is not a good practice.
  8. An unauthorized individual who gains access to systems, often to modify or destroy data.
  9. This method enhances security by requiring two or more forms of verification during authentication.
  10. In an organization, who plays a role in ensuring data security?
  11. What security method uses two forms of verification, like a password and a code?
  12. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
  13. __ key + L is the shortcut to lock your screen.

23 Clues: Never share your sensitive information on ___.__ key + L is the shortcut to lock your screen.Download mobile applications from an ___ app store.A feature to switch off connections in mobile devices.Passwords like “123456” and “password” is in this category.Using a ___ password for all accounts is not a good practice....

U11 - Review Cyber Security Plan, Constraints & Test Plan 2025-11-17

U11 - Review Cyber Security Plan, Constraints & Test Plan crossword puzzle
Across
  1. (6,3,8) A type of testing ensures data can be restored.
  2. (11,7) Simulate attacks to find weaknesses.
  3. (5,3,16) as part of the CSP who manages security, audits, and response.
  4. This part of the CSP ensures confidentiality, integrity, and availability of information.
  5. (6,7) A type of testing that verifies permissions and authentication.
Down
  1. This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
  2. (13,8) Automated tools to detect flaws.
  3. These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
  4. (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
  5. (5,8,4) (CSP) This outlines how to protect systems, data, and networks
  6. Defines which systems, applications, and data are covered in the CSP.
  7. (4,4) This ensures the security measures work as intended.

12 Clues: (13,8) Automated tools to detect flaws.(11,7) Simulate attacks to find weaknesses.(6,3,8) A type of testing ensures data can be restored.(4,4) This ensures the security measures work as intended.Defines which systems, applications, and data are covered in the CSP.(6,7) A type of testing that verifies permissions and authentication....

Foreign Policer 2023-06-01

Foreign Policer crossword puzzle
Across
  1. the president’s national security and foreign policy personnel. The NSC staff receives direction from the president via the national security advisor, provides expertise on issues and regions, and collaborates frequently with employees from other government departments and agencies to carry out the interagency policymaking process
  2. the group comprising the vice president of the United States and the heads of all fifteen federal executive departments, such as the secretaries of state, defense, commerce, labor, and education. Other officials may also have cabinet rank, depending on the administration
  3. one of the president’s chief economic advisors and head of the department of the treasury, which carries out policy on issues related to the U.S. and global economies and financial systems. The department is home to the U.S. Mint and Internal Revenue Service, among other agencies
  4. the highest-ranking member of the U.S. armed forces. The CJCS does not exercise command authority over U.S. troops, but instead works with the leaders of the U.S. military services to fulfill their function as the top military advisor to the president and other senior officials
  5. an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense
  6. a law signed by President Harry S. Truman in 1947 to reorganize the agencies and processes related to intelligence, foreign policy, and the military. Among its reforms, the act established the National Security Council (NSC) and the Central Intelligence Agency (CIA)
  7. undertaken between two entities, generally countries
  8. an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies. In 1962, President John F. Kennedy ordered a blockade of Cuba—calling it a “quarantine” to avoid the implication of declaring war—in response to Soviet missile activity on the island
  9. a tax on goods arriving from a foreign country, generally used as a tool of trade and foreign policy to penalize adversaries or favor allies or domestic producers
  10. the so-called honest broker of the national security policy process and the president’s principal advisor on national security issues. The NSA manages the National Security Council (NSC) staff, chairs the principals committee, and coordinates and manages policymaking with the goal of ensuring effective policy development and implementation
  11. individuals or groups that do not belong to or act on behalf of a state. This may refer to nongovernmental organizations such as Amnesty International, media outlets such as the New York Times, or terrorist groups such as al-Qaeda
  12. second-highest-ranking official of the U.S. government and first in line to assume the presidency if the president dies, resigns, or becomes unable to serve. Though given only one responsibility in the Constitution—to serve as president of the U.S. Senate, with the power to break ties—the vice presidency has become a visible part of the modern White House. Today’s vice presidents undertake a variety of functions, from serving as an all-purpose presidential advisor to carrying out diplomatic trips abroad. The personality of the individual who occupies this post and their relationship with the president define the scope of the role
Down
  1. undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations
  2. the principal defense policy advisor to the president and head of the Department of Defense, which oversees the formulation and execution of defense policy and manages U.S. military forces
  3. a type of presidential directive, or official order from the president, on matters related to national security. Called different names by different administrations, these documents may initiate a review of current policy, reorganize the structure of the national security policy apparatus, or lay out new strategies
  4. an interagency body that serves as the forum for the president to discuss and take action on the most critical national security issues facing the United States. Its membership has varied since its creation in 1947, and now includes the president, vice president, national security advisor, secretaries of state and defense, and a variety of other senior officials
  5. he ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system
  6. the president’s chief foreign affairs advisor, the country’s chief diplomat, and the head of the Department of State, which conducts the United States’ relationships with foreign countries and international organizations
  7. the president’s principal advisor for intelligence-related matters and the head of the intelligence community, a network of seventeen agencies and organizations, such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and Defense Intelligence Agency (DIA), that collect and analyze information to assist policymaking
  8. the head of the Department of Homeland Security since its creation after the attacks of September 11, 2001. This department works to protect U.S. security by implementing federal policy concerning terrorism prevention, border security, immigration, disaster response, and cybersecurity
  9. undertaken by only one entity, generally a country
  10. the head of the Department of Energy, which executes U.S. policy on energy, environmental, and nuclear issues and oversees seventeen national scientific research laboratories
  11. a decision issued by the president that carries the full force and effect of law. An executive order usually instructs government departments and agen
  12. defensive and offensive actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure. Specific actions include planting computer viruses, mounting denial-of-service attacks to disrupt internet and network activity, and conducting electronic surveillance
  13. a tool of statecraft, frequently involving economic measures such as asset freezes and trade restrictions, used to exact a certain behavior or outcome from another party. The U.S. and European Union sanctions against Russian companies and individuals that aim to encourage Russia to end its interference in Ukraine are an example
  14. head of the Department of Justice and chief lawyer of the U.S. government. Among other duties, they offer advice on the legal aspects of proposed policies to the president and other department heads.
  15. involving two or more agencies. The National Security Council (NSC), for example, is an interagency forum, not a forum internal to any one agency
  16. the intermediate-level setting, below the principals committee, for debating issues in the National Security Council (NSC) system. Chaired by the deputy national security advisor, it comprises the second- and third-ranking leaders of the departments and agencies represented on the National Security Council. It manages the interagency process up and down, answering to the principals committee and assigning and reviewing the work of interagency policy committees
  17. the lowest-level setting for debating issues in the National Security Council (NSC) system and the home of much of the day-to-day work needed to formulate and implement U.S. foreign policy. Often chaired by a senior director on the NSC staff, IPCs develop, coordinate, and carry out policy options in distinct regional and functional areas
  18. a country’s attitudes and actions in the international arena. Foreign policy includes two principal elements: goals or interests as the country defines them, such as peace with one’s neighbors, and the means pursued to advance these interests, such as diplomatic negotiations, trade agreements, and military alliances. A country carries out its foreign policy through its dealings with other countries, international organizations such as the United Nations (UN), and nonstate actors such as corporations and advocacy groups

30 Clues: undertaken by only one entity, generally a countryundertaken between two entities, generally countrieshe ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN systemundertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations...

Heard It Through the Grapevine: Common FFS Slang 2015-04-29

Heard It Through the Grapevine: Common FFS Slang crossword puzzle
Across
  1. Integral team in striking the NAV of the funds each night
  2. This system processes and reports most functions online in real-time, such as: posting all transactions, correcting all transactions, calculating net asset valuations, reporting cash management, and listing security pricing from multiple vendors
  3. The value investors believe a firm is worth—calculated by multiplying the number of shares outstanding by the current market price of a firm's shares
  4. Investment Book of Record​
  5. Maintain and support all equity security pricing activities and FX rate analysis required to create market value for the funds.
  6. Centralized source for enterprise investment data and supplies enterprise with investment date, manages processes administrator data and provides data.
  7. Nine digit unique identifier that is used in over 30 global markets, typically starts with an alphabetic
  8. IT team aligned towards fixing the daily production issues in the UI and enhancing currrent interfaces to meet data sourcing needs
  9. Accounting Book of Records
Down
  1. ​Big Hairy Aggressive Goals
  2. Nine digit identifier that is unique to each security and used only in the US and Canada
  3. Capture and distribute security changes caused by market activity
  4. Improve long-term returns for our shareholders by advocating for the effective governance of portfolio companies
  5. Seven digit identifier designated to securities that trade on smaller exchanges globally like the London Stock exchange
  6. Executes post trad compliance levels for all Vanguard funds and accounts globally
  7. Term for a forward settling MBS (mortgage-backed security) trade, due to the fact that the actual security or securities ​are not known at the time of the trade.
  8. Trade Date = when a order is placed in the market
  9. Flexible Outbound Messaging Interface​
  10. Responsible for sourcing, storing, validating, and distributing enterprise investment data.
  11. Provide oversight of fund accounting and fund administration services for internationally-domiciled funds
  12. 12 digit code used to aid in trading across borders
  13. Responsible for the creation of financial statements, communications of capital gains to shareholders and calculations of fees to external advisors

22 Clues: Investment Book of Record​Accounting Book of Records​Big Hairy Aggressive GoalsFlexible Outbound Messaging Interface​Trade Date = when a order is placed in the market12 digit code used to aid in trading across bordersIntegral team in striking the NAV of the funds each nightCapture and distribute security changes caused by market activity...

International Security 6 (KCNS) 2021-10-18

International Security 6 (KCNS) crossword puzzle
Across
  1. The legislative body of the CSTO (abbraviation).
  2. Troops of the CSTO which formed or assembled by collection.
  3. It was established at the Council of Ministers of Defense of the Collective Security Treaty Organization.
  4. What is the English for "миротворчество".
  5. Task.
  6. The place where the Collective Security Treaty was signed on 15 May 1992.
  7. The Regional Anti-Drug Operation of the CSTO.
Down
  1. This country is a member of the CSTO.
  2. They organize the implementation of decisions and recommendations of the CSTO Collective Security Council.
  3. A union or association formed for mutual benefit, especially between countries or organizations.
  4. A month when the charter of the Collective Security Treaty Organization was signed in Moldova.
  5. An alliance or agreement to work together.
  6. It is a presidential republic which president is Lukashenko.
  7. Operations of the CSTO to counter crime on the common user network Internet.
  8. Actions taken to protect someone or something from attack.

15 Clues: Task.This country is a member of the CSTO.The Regional Anti-Drug Operation of the CSTO.What is the English for "миротворчество".An alliance or agreement to work together.Troops of the CSTO which formed or assembled by collection.It is a presidential republic which president is Lukashenko....

advanced comp security 2015-03-18

advanced comp security crossword puzzle
Across
  1. malicious software
  2. is a type of display used in mobile phone
  3. android version 1.5
  4. alternative to iptables discussed in the paper
  5. the name of mobile app to steal confidential data
  6. barcode in matrix form
  7. type of malware that prevents or limits users from accessing their system and forces victim to pay money
  8. it refers to connecting one device to another
  9. is a daemon whose goal is to launch Apps(parent process for all apps)
  10. an organization set up by Sony in 2003 that determines a universal set of rules and guidelines so devices can share digital media.
Down
  1. block cipher used in GSM/UMTS
  2. a piece of code which performs bad activities when certain conditions are met
  3. a type of phishing attacks that target to specific victims
  4. using the internet to harass, intimidate, embarrass or demean others
  5. is a filename extension for android apps
  6. gzip and bzip2 uses this for data integrity
  7. key used to reset pin in 3gpp phones
  8. Temporary storage area for data that a user wants to copy from one place to another
  9. The theft of information from a wireless device through a Bluetooth connection
  10. type of spam targeting users of instant messaging services
  11. is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don't permit.
  12. state of android phone when you cannot succeed in rooting and gets halted
  13. A set of protocols to support secure exchange of packets at the network layer
  14. An extension of an enterprise's private intranet
  15. technique used to take screenshots /backups

25 Clues: malicious softwareandroid version 1.5barcode in matrix formblock cipher used in GSM/UMTSkey used to reset pin in 3gpp phonesis a filename extension for android appsis a type of display used in mobile phonegzip and bzip2 uses this for data integritytechnique used to take screenshots /backupsit refers to connecting one device to another...

Security Awareness 101 2016-03-27

Security Awareness 101 crossword puzzle
Across
  1. An essential part of data protection and should be performed regularly
  2. Someone else's computer
  3. Use this to stay safe on public wifi
  4. Phishing that targets specific people or job functions
  5. Software that can record and transmit every keystroke
  6. Dangerous physical delivery mode of malicious software
  7. When you should report things
  8. Self-replicating software
  9. The single most important thing you can do to improve security here at work is use this.
  10. You might receive a spoofed email coming from your boss or a higher up executive
  11. Having systems & information when needed
  12. Three areas of information security.
  13. Following policy for remotely and securely connecting to work computers and networks is more important than ever
  14. Never let technology out of your control when doing this
  15. Strong, unique, private.
  16. Compliance mandate in the healthcare sector
  17. Personal information that criminals can use to commit identity theft
  18. Compliance mandate in the education sector
  19. Non-technical identification and authentication
  20. Percentage of Americans who have their identity stolen before then age of 18.
Down
  1. A Trojan that provides unauthorized access to a system
  2. Compliance mandate in the retail space
  3. Accuracy
  4. Keeping secrets a secret
  5. Phishing through text messages
  6. Not the spy agency.
  7. Sneaking in a door or other type of entrance along with you if you are required to use a badge or code.
  8. Warns you that you have been locked out of your computer, or the data has been encrypted until you pay a fine or other fee
  9. Compliance mandate in the financial sector
  10. Phishing over the phone
  11. Pretends to be a good program to remove Malware infections, but it is actually the Malware itself
  12. Phishing that targets high profile employees, such as senior executives

32 Clues: AccuracyNot the spy agency.Someone else's computerPhishing over the phoneKeeping secrets a secretStrong, unique, private.Self-replicating softwareWhen you should report thingsPhishing through text messagesUse this to stay safe on public wifiThree areas of information security.Compliance mandate in the retail space...

Security Trade Lingo 2018-03-16

Security Trade Lingo crossword puzzle
Across
  1. something causing unavoidable danger, peril, risk, or difficulty
  2. exposure to the chance of injury or loss
  3. interchange of goods or commodities
  4. regulation and control of a community, especially for the maintenance of public order, safety
  5. an official examination and verification of accounts and records
  6. the ability, right, or permission to approach, enter, speak with, or use
  7. capable of being wounded or hurt
  8. any general business activity or commercial enterprise
  9. to determine the worth or value of
  10. set fire intentionally
  11. resistance against attack
  12. philosophy of what is morally right or wrong
  13. property of a person, corporation or estate
Down
  1. to pay little or no attention to
  2. statistical study of human populaitons
  3. a wrongful entry
  4. something disadvantageous
  5. forceful action
  6. concealed, secret, disguised
  7. difference, variety, unlikeness
  8. concealment or distortion of the truth
  9. evaluate
  10. process concept that all should be treated fairly

23 Clues: evaluateforceful actiona wrongful entryset fire intentionallysomething disadvantageousresistance against attackconcealed, secret, disguiseddifference, variety, unlikenessto pay little or no attention tocapable of being wounded or hurtto determine the worth or value ofinterchange of goods or commoditiesstatistical study of human populaitons...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

Biometric Security - Crossword 2017-11-18

Biometric Security - Crossword crossword puzzle
Across
  1. In texture edge extraction using set of 1-D Gabor filters, the bank of 1-D Gabor filters gives ______ image.
  2. ROC curve plots _ _ _ against _ _ _.
  3. The number of leaf nodes in a second level graphical representation of Haar Wavelet decomposition.
  4. The Hough transform can be described as a transformation of a point in the x,y-plane to the _______ space.
  5. One of the disadvantages of UNI-MODAL Biometric system.
  6. Matching module uses this to distinguish between genuine and imposter range.
  7. Gabor filters satisfy ________ principle.
  8. Second-order gray-level statistics is described by ________matrix.
  9. In a texture the _________ distribution stays the same.
  10. Gabor filters are the products of a Gaussian filter with _______Sinusoids.
  11. ______ points are used to calculate the region of interest in Pre-Processing of Palm print verification system.
  12. ↓is a _________ operator in Gaussian pyramid.
Down
  1. In the gaussian filter representation P denotes the phase of ________ carrier.
  2. DOG (Difference of Gaussian) uses the approximation of _____ of Gaussian.
  3. The preprocessing module first transforms the true color into _____ image.
  4. The Gaussian function (1-D) of the Gabor filter will not affect the edge information in the ________direction.
  5. One of the essential biometric characteristics.
  6. A ________ graph is used in ear localization.
  7. In texture discrimination we divide intensities to ________ ranges.
  8. In _______ filters the output of one filter is independent of others.

20 Clues: ROC curve plots _ _ _ against _ _ _.Gabor filters satisfy ________ principle.A ________ graph is used in ear localization.↓is a _________ operator in Gaussian pyramid.One of the essential biometric characteristics.One of the disadvantages of UNI-MODAL Biometric system.In a texture the _________ distribution stays the same....

Basic Virtual Security 2023-09-07

Basic Virtual Security crossword puzzle
Across
  1. an intermediary device that blocks unauthorized access to your network
  2. when a third party alters the communication between two sides
  3. form of attack that looks secure but is not
  4. Encoding something so certain people may be able to view it
  5. a copy of data stored away so it can be recovered if the original is damaged
  6. program which will help protect your customer's privacy
  7. a university connector
  8. when scammers send out a message with a company's email address
  9. Passcode to prove you are allowed access
Down
  1. asks for payment in return for solving the problem
  2. gaining sensitive information by looking over the target's shoulder
  3. Volatile memory
  4. attacking through a program or equipment thrown in the trash
  5. a method of resolving a problem
  6. Sign in once to get various service
  7. This program allows your network to be private
  8. an intermediary device that directs traffic
  9. is a key used to pass
  10. Frequent changes downloaded to keep your device secure from adaptive malware
  11. surpasses 100% voltage for a brief moment

20 Clues: Volatile memoryis a key used to passa university connectora method of resolving a problemSign in once to get various servicePasscode to prove you are allowed accesssurpasses 100% voltage for a brief momentform of attack that looks secure but is notan intermediary device that directs trafficThis program allows your network to be private...

Aviation safety & Security 2023-11-15

Aviation safety & Security crossword puzzle
Across
  1. another term for passenger.
  2. getting off the plane.
  3. travelling within your home country
  4. sheltered walkway onto the flight or terminal.
  5. only flight ticket holders can access this area.
  6. something you need to travel internationally.
  7. a child travelling alone.
Down
  1. general public can access this area in an airport.
  2. shorted down 3 letter words of an airport.
  3. something your clothes belong in when travelling.
  4. you go through here after landing in a country.
  5. the letter d in the phonetic alphabet.
  6. where the luggage is stored.
  7. travelling overseas.
  8. some countries require this prior to entry.
  9. getting on the plane.
  10. where aircrafts usually parked.
  11. travelling by air.
  12. the term used for those who need extra assistance.
  13. the letter H in the phonetic alphabet.

20 Clues: travelling by air.travelling overseas.getting on the plane.getting off the plane.a child travelling alone.another term for passenger.where the luggage is stored.where aircrafts usually parked.travelling within your home countrythe letter d in the phonetic alphabet.the letter H in the phonetic alphabet.shorted down 3 letter words of an airport....

Network and Security 2024-07-24

Network and Security crossword puzzle
Across
  1. Refers to several types of malicious computer programs that are created to harm computer systems and their users.
  2. A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
  3. Any step you take to ward off a threat is called a
  4. The capacity to provide increasing amounts of computing power, storage, and/or software.
  5. A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
  6. Involves luring individuals into entering personal information into a website controlled by the hacker.
  7. Used to share some of a company’s intranet resources with people outside the organization
  8. A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
  9. A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
  10. Speed of data that can be transmitted over a given amount of time.
Down
  1. Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
  2. A type of malware that self-replicates and spreads through computers and networks.
  3. Weakness that has not been protected against threats.
  4. Fundamental building block for the storage, retrieval, and analysis of a company’s data.
  5. The most widely-used standard for local area networks.
  6. Layout of the cables and devices that connect the nodes of the network
  7. designed to report activity on your computer to another party.
  8. Anything that can cause harm.
  9. Internal version of the internet containing a company's private information
  10. Communication system physically connected using cables or wireless media.

20 Clues: Anything that can cause harm.Any step you take to ward off a threat is called aWeakness that has not been protected against threats.The most widely-used standard for local area networks.designed to report activity on your computer to another party.Speed of data that can be transmitted over a given amount of time....

Security and Networking 2024-07-24

Security and Networking crossword puzzle
Across
  1. Mining New patterns or relationships between data.
  2. A scam that threatens to delete or expose victims stolen data for money.
  3. provides multiple port for connecting nodes.
  4. Term for many types of malicious computer programs that is created to harm users and their computer systems.
  5. Some information sytems are called.
  6. A node on a network that serves as an entrance to another network.
  7. Is a type of computer that is able to continue when problems are present.
  8. Any step taken to ward off a threat.
  9. Allows sharing and communication between devices.
  10. A weakness that's not protected against threats.
Down
  1. system The complex system for acquiring, storing, organizing, using, and sharing data and information.
  2. Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
  3. Information System Software tools that allows managers to gather, organize, and evaluate information.
  4. Is term for infected computers that under control of a hacker.
  5. warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
  6. Assessment Used to identify and examine possible threats.
  7. Anything that causes harm.
  8. The act of gaining someones trust by pretending you are someone else.
  9. Structures that data moves through networks.
  10. Is used to share company resources with individuals not in the organization.
  11. Designed to report activity on your computer to another party.
  12. The most widely used standard for local area networks.

22 Clues: Anything that causes harm.Some information sytems are called.Any step taken to ward off a threat.provides multiple port for connecting nodes.Structures that data moves through networks.A weakness that's not protected against threats.Allows sharing and communication between devices.Mining New patterns or relationships between data....

Edgeworth Security Terminology 2023-04-24

Edgeworth Security Terminology crossword puzzle
Across
  1. No response from camera ping
  2. The phone system used in the EMC
  3. Use to closeout an alarm quickly
  4. Utilizing the speakers with the camera to deter
  5. Used to alert the site of issues
  6. Watching a site in real time in its VMS
  7. An second set of eyes
  8. EP
  9. Edgeworth's principal philosophy
  10. Review a site without an alarm
Down
  1. NVR
  2. Used to inform agent & supervisors about an event
  3. EMC
  4. ACC
  5. Software system used to open gates in ACC
  6. The EMC primary alarm processing application
  7. PER
  8. Timeframe the EMC receives alarms for a particular site
  9. VMS - Ex. ACC,IVMS,OpenEye
  10. Gatehouse Software Company used to remotely operate gates
  11. The service that the EMC provides

21 Clues: EPNVREMCACCPERAn second set of eyesVMS - Ex. ACC,IVMS,OpenEyeNo response from camera pingReview a site without an alarmThe phone system used in the EMCUse to closeout an alarm quicklyUsed to alert the site of issuesEdgeworth's principal philosophyThe service that the EMC providesWatching a site in real time in its VMS...

Physical Security Policy 2025-02-11

Physical Security Policy crossword puzzle
Across
  1. No one shall ______ or allow access to any building or room to anyone who is not known to them to be a trusted workforce members member.
  2. Users shall secure media (such as hard copy, diskettes, etc.), which contain __________ information in a locked desk, cabinet, or room.
  3. Copying of confidential documents will be only __________ by appropriate department manager
  4. Terminated workforce members will be regarded as __________ to Crane Memorial facilities.
  5. Workstations/terminals will be positioned or __________ so that screens are not visible to the general public or unauthorized workforce members.
  6. and that only the __________ scope of disclosure needed to accomplish the intended purpose is copied.
  7. If PHI or other confidential information needs to be shielded from a visitor while the workforce member is at the workstation, pressing the Ctrl Alt and Delete keys __________ will display a Security Screen.
  8. Users shall either __________ or lock workstations/terminals when not in use or when leaving the work area for breaks.
  9. At the end of the day, users will sign off of all __________.
Down
  1. Computers will be located in a normally __________(or at least occupied) office where appropriate.
  2. Workforce members should __________ documents only when necessary and as part of their job function.
  3. Workforce members are encouraged to _________, in a non-offensive manner, anyone in Crane Memorial building or in a room who they do not know.
  4. Crane Memorial will document the security plan to safeguard its facilities from __________ physical access and to safeguard the equipment therein from unauthorized physical access, tampering, and theft.
  5. Any electronic media being discarded or replaced (including hard drives in workstations) shall be written over, degaussed, or irrecoverably __________ to ensure proper erasure of confidential or proprietary data.
  6. Each Department Manager will ensure the outside entrance from their __________ is locked when they leave.
  7. All authentication mechanisms such as physical security tokens, smart cards or keys must each be assigned to an individual account and __________ logged.
  8. Any person who appears _________ or cannot provide workforce members identification must be reported.
  9. Crane Memorial will have a document the facility security plan to safeguard the premises and buildings, exterior and interior from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, __________ and theft.
  10. Third Party activities will be __________ to assure that they do not compromise security.
  11. Dismissed workforce members will be removed from the computing and physical environment __________.

20 Clues: At the end of the day, users will sign off of all __________.Terminated workforce members will be regarded as __________ to Crane Memorial facilities.Third Party activities will be __________ to assure that they do not compromise security.Copying of confidential documents will be only __________ by appropriate department manager...

11 Digital Security 2025-02-20

11 Digital Security crossword puzzle
Across
  1. A hidden way to bypass security measures
  2. The trail of data left by online activity
  3. A large-scale attack using multiple compromised devices to disrupt a service
  4. A tool that encrypts internet traffic and hides the user’s IP address
  5. A program that spreads by inserting copies of itself into other files
  6. Harassment or bullying that occurs online
  7. Configurations that specify which network traffic is allowed or blocked
  8. Any illegal act involving the use of a computer or related devices
  9. A tool that stores and generates secure passwords
  10. A process of verifying the identity of a user or device
  11. A legal doctrine allowing limited use of copyrighted material
  12. A cyberattack targeting computer networks
  13. Software used to detect and remove malware
  14. A self-replicating program that spreads through networks
  15. An attack that overloads a server to make it unavailable
  16. Manipulating people into revealing confidential information
Down
  1. Unauthorized access to a computer system or network
  2. A group of compromised computers controlled by a hacker
  3. An event that could cause loss or damage to computer hardware, software, or data
  4. A plan to restore data and systems after a failure
  5. How a person presents themselves online
  6. A potential security risk due to lack of encryption
  7. The process of converting data into a code to prevent unauthorized access
  8. An update that fixes security vulnerabilities in software
  9. A backup power device that provides electricity during an outage
  10. A licensing system that allows content sharing with conditions
  11. A type of malware disguised as a legitimate program
  12. The rules of conduct for interacting online
  13. Malicious software designed to harm or exploit any computing device
  14. A device that protects electronics from power surges
  15. A technique used to trick users into revealing personal information
  16. An authentication method that requires two forms of verification
  17. A type of malware that locks files and demands payment to unlock them
  18. Software that secretly collects user information without consent
  19. A security system that controls incoming and outgoing network traffic

35 Clues: How a person presents themselves onlineA hidden way to bypass security measuresThe trail of data left by online activityHarassment or bullying that occurs onlineA cyberattack targeting computer networksSoftware used to detect and remove malwareThe rules of conduct for interacting onlineA tool that stores and generates secure passwords...

Network Security Crossword 2024-11-14

Network Security Crossword crossword puzzle
Across
  1. A network comprised of clients all connected to the same server.
  2. What IAM stands for
  3. A program that disguises itself as something else to let malicious users access your system.
  4. What ZTNA stands for
  5. Also known as the "group chat" network type
  6. "Intrusion Prevention Systems"
  7. Applications / workloads that are hosted on a cloud / not locally
  8. Prevents exposure of sensitive information outside of an organization.
  9. The thing that sends the signal to the clients to connect to the server.
  10. Keeps out unfriendly network traffic, and controls incoming and outgoing traffic.
  11. What WAN stands for
  12. What DoS stands for
  13. Processes, products, and services designed to protect email accounts.
Down
  1. A network comprised of local machines all connected to each other
  2. A user / device on a network
  3. What "A" stands for in WAN
  4. What RBAC stands for
  5. Virus that gather info about a person or organization without them knowing
  6. A way a network is setup, such that if one client sends a message, then NOT EVERYONE gets it
  7. "Eats" bandwidth, slows networks. Is a standalone malware.
  8. What the "W" stands for in WLAN
  9. What VPN stands for
  10. Defines the people or groups & devices that have access to network applications and systems.
  11. Customized ads show up because of data they collected on you.
  12. What FWaaS stands for
  13. Ability of an architecture to scale appropriately as more things are added to the system or network.
  14. "Wireless local area network"
  15. Malware that is designed to hold someone / an organization's data on "ransom"
  16. Running code / opening files in a safe, isolated environment.
  17. Any program that is intentionally designed with malicious intent
  18. A downloadable malicious file that replicates itself, much like the real life version of this does.
  19. "Personally Identifiable Information"
  20. Defines boundaries between parts of a network where clients have common aspects.
  21. Digital space where data is stored non-locally

34 Clues: What IAM stands forWhat VPN stands forWhat WAN stands forWhat DoS stands forWhat RBAC stands forWhat ZTNA stands forWhat FWaaS stands forWhat "A" stands for in WANA user / device on a network"Wireless local area network""Intrusion Prevention Systems"What the "W" stands for in WLAN"Personally Identifiable Information"...

FNAF Security Breach 2025-04-29

FNAF Security Breach crossword puzzle
Across
  1. The animatronic that helps you
  2. What do you get from chica
  3. Who is theorized to have destroyed Bonnie
  4. The alligator animatronic
  5. The fox animatronic
  6. Aftons animatronic
  7. what do you get from Roxy
  8. The day time daycare attendant
  9. Ruin Sun and Moondrop
  10. The nickname of these animatronics
  11. The DDLC
  12. The night guard
Down
  1. Who you play as
  2. The killer rabbit
  3. The missing animatronic
  4. The night time daycare attendant
  5. Who you play as in the DDLC
  6. how many endings are there
  7. What do you get from Monty
  8. Where the animatronics charge
  9. The villian of the DDLC
  10. The chicken animatronic

22 Clues: The DDLCWho you play asThe night guardThe killer rabbitAftons animatronicThe fox animatronicRuin Sun and MoondropThe missing animatronicThe villian of the DDLCThe chicken animatronicThe alligator animatronicwhat do you get from RoxyWhat do you get from chicahow many endings are thereWhat do you get from MontyWho you play as in the DDLC...

Network Security & Protection 2025-05-14

Network Security & Protection crossword puzzle
Across
  1. Unique mark indicating authenticity or approval.
  2. Assurance that a party cannot deny their actions.
  3. Temporary credential for secure access.
  4. Reverting encrypted data back to its original form.
  5. Verifying user identity or access rights.
  6. Malicious software that secretly monitors user activity.
  7. Fraudulent attempts to obtain sensitive information online.
  8. Analyzing patterns in user actions for security.
  9. Converting data into a secure format.
  10. Luring victims with false promises or goods.
  11. Ensuring data remains accurate and unaltered.
  12. Software designed to detect and eliminate malware.
  13. Decentralized ledger technology for secure transactions.
Down
  1. Encrypted data that is unreadable without decryption.
  2. Readable data before encryption.
  3. Identifying individuals or objects based on characteristics.
  4. Secretly listening to private communications or data.
  5. Software that displays unwanted advertisements on devices.
  6. Unauthorized access to computer systems or networks.
  7. Malware that encrypts files for ransom payment.
  8. Secret word or phrase for user authentication.
  9. Identifying individuals using biological traits.
  10. Protecting personal information from unauthorized access.

23 Clues: Readable data before encryption.Converting data into a secure format.Temporary credential for secure access.Verifying user identity or access rights.Luring victims with false promises or goods.Ensuring data remains accurate and unaltered.Secret word or phrase for user authentication.Malware that encrypts files for ransom payment....

Security/Safety Terminology 2024-03-09

Security/Safety Terminology crossword puzzle
Across
  1. Verifying identity of a user
  2. Term for fraudulent business
  3. (2words) P2P network used by criminals
  4. Used to access the internet
  5. Unauthorized intrusion into a computer
  6. Identifies a network address
  7. (2 words)Simulation of human intelligence
  8. Allows to connect to Internet
  9. Junk e-mail
  10. High-speed data transmission system
  11. Wireless technology for exchanging data
  12. Programs used on digital devices
Down
  1. special high-speed storage mechanism
  2. Decides Computers and Humans Apart
  3. Malicious software program on computer
  4. Malware that replicates to spread
  5. Capacity of a communication channel
  6. Converting data into secret code
  7. Malicious software developed by hackers
  8. Small files stored on computer
  9. Network resources to lure hackers
  10. Virtual perimeter around a network
  11. cryptographic algorithm for encryption

23 Clues: Junk e-mailUsed to access the internetVerifying identity of a userTerm for fraudulent businessIdentifies a network addressAllows to connect to InternetSmall files stored on computerConverting data into secret codePrograms used on digital devicesMalware that replicates to spreadNetwork resources to lure hackersDecides Computers and Humans Apart...

Safety and security 2025-07-17

Safety and security crossword puzzle
Across
  1. The act of removing a passenger from a flight
  2. An item that can cause harm on board
  3. Machines used to scan luggage for dangerous items
  4. A plan for what to do in an emergency
  5. A report written about any safety incident
  6. staff who check travel documents before boarding
  7. Part of the airport open to the public, like check-in and arrivals
  8. Items passengers must declare to customs
  9. staff who help passengers check-in and board
  10. Person who checks passengers and luggage for prohibited items
  11. System that alerts security to danger
Down
  1. Area of an airport only accessible to passengers with a boarding pass
  2. Security pass used to enter airside areas
  3. Room where suspicious passengers are questioned
  4. To look inside someones bag carefully
  5. The process of checking passengers identities
  6. The security check area you pass through before the boarding gate
  7. International document needed to travel abroad
  8. Another word for baggage claim area.
  9. The action of stopping someone for questioning
  10. Hidden items found in luggage
  11. The process of protecting passengers and crew
  12. A special check for dangerous items on passengers
  13. A sudden risk or danger
  14. Restricted area where aircraft are parked, loaded and refueled

25 Clues: A sudden risk or dangerHidden items found in luggageAn item that can cause harm on boardAnother word for baggage claim area.To look inside someones bag carefullyA plan for what to do in an emergencySystem that alerts security to dangerItems passengers must declare to customsSecurity pass used to enter airside areas...

Online security crossword 2025-08-27

Online security crossword crossword puzzle
Across
  1. Fake emails for info
  2. Monitors user activity
  3. Adds extra login security
  4. Locks files for ransom
  5. Fakes identity online
  6. Records keystrokes secretly
  7. Protects account access
  8. Store browsing information
Down
  1. Secure internet connection
  2. Scrambles data securely
  3. Network of infected computers
  4. Hidden unauthorized access
  5. Harmful software program
  6. Software to stop malware
  7. Unwanted bulk emails
  8. Blocks unauthorized access
  9. Malware hidden inside
  10. Unauthorized system intruder
  11. Fixes software vulnerability
  12. Self-replicating malware

20 Clues: Fake emails for infoUnwanted bulk emailsFakes identity onlineMalware hidden insideMonitors user activityLocks files for ransomScrambles data securelyProtects account accessHarmful software programSoftware to stop malwareSelf-replicating malwareAdds extra login securitySecure internet connectionHidden unauthorized accessBlocks unauthorized access...

National Security - VOCABULARY 2025-09-22

National Security - VOCABULARY crossword puzzle
Across
  1. – To weaken something or make it less strong.
  2. – Trouble or fighting in a group or country.
  3. - To end or break up something.
  4. – To make peace with someone or calm them down.
  5. – Not tight or firmly fixed.
  6. – Not understanding something correctly.
  7. – An agreement where both sides give up something.
  8. – To talk to reach an agreement.
  9. – Easy to see; not hidden.
  10. – In the past; relating to history.
  11. – A punishment for breaking rules or laws.
  12. – To help two sides agree or solve a problem.
  13. – Another choice or option.
  14. – A way to help or adjust to a situation.
  15. – In a legal or court-related way.
  16. – A hard choice between two things.
  17. – Information used to influence people’s opinions.
  18. – To become worse or more serious.
  19. – Being open to harm or attack.
  20. – Fighting in a war or battle.
Down
  1. – A place to talk about ideas or problems.
  2. – Entering a place or group secretly.
  3. – A serious argument or disagreement.
  4. – A group of countries working together.
  5. – When people must join the army by law.
  6. – Someone who acts for another person or group.
  7. – An agreement between groups or countries.
  8. – The act of becoming bigger or spreading out.
  9. – The quality of being steady and not changing.
  10. – To do something as a final option.
  11. – Not real; made to look real.
  12. – Hidden or secret.
  13. - A mix of different types.
  14. – What is real or actually exists.
  15. – To damage something on purpose.
  16. – To take part in something.
  17. – Something you must do.
  18. – A situation where no one can win or move forward.

38 Clues: – Hidden or secret.– Something you must do.– Easy to see; not hidden.- A mix of different types.– Another choice or option.– Not tight or firmly fixed.– To take part in something.– Not real; made to look real.– Fighting in a war or battle.- To end or break up something.– Being open to harm or attack.– To talk to reach an agreement....

BENTUK KERJASAMA KERAJAAN PERSEKUTUAN DAN KERAJAAN NEGERI 2022-08-03

BENTUK KERJASAMA KERAJAAN PERSEKUTUAN DAN KERAJAAN NEGERI crossword puzzle
Across
  1. Tertumpu kepada pembukaan tanah baharu
  2. Diwartakan sejak 1994 di perairan Kedah, Terengganu, Pahang, Johor, Sabah
  3. Majlis Keselamatan Negara
  4. Merupakan perancangan strategik jangka panjang
  5. Kementerian Pertahanan
  6. Eastern Sabah Security Command
Down
  1. Pembangunan kawasan lebih luas di beberapa buah negeri untuk bangunkan wilayah baru
  2. Federal Land Development Authority (Lembaga Kemajuan Tanah Persekutuan)
  3. Kementerian Dalam Negeri
  4. Memastikan pembangunan dapat beri manfaat demi kesejahteraan rakyat
  5. Tanggungjawab bersama Persekutuan dan negeri
  6. Perbadanan Perumahan 1 Malaysia
  7. Rajang Area Security Commang
  8. Eastern Sabah Security Zone
  9. Federal Land Consolidation and Rehabilitation Authority (Lembaga Penyatuan dan Pemulihan Tanah Persekutuan)

15 Clues: Kementerian PertahananKementerian Dalam NegeriMajlis Keselamatan NegaraEastern Sabah Security ZoneRajang Area Security CommangEastern Sabah Security CommandPerbadanan Perumahan 1 MalaysiaTertumpu kepada pembukaan tanah baharuTanggungjawab bersama Persekutuan dan negeriMerupakan perancangan strategik jangka panjang...

Koop 2022 2022-08-09

Koop 2022 crossword puzzle
Across
  1. főleg a mozgás szervrendszerrel foglalkoznak
  2. a leggazdagabb ember
  3. mindent tudnak a kalóriák rejtelmeiről
  4. ők mentenek meg baleset esetén
  5. ennek is tanulhatsz az ETK-n
  6. tavaly a legnépszerűbb közösségi médiai oldal
  7. az ÁOK hallgatói álomszakmája
Down
  1. az egészségügy méregkeverői
  2. a mai nap célja
  3. a PAKon végző emberek szakmája
  4. a tábor szervezői (lányfiú)
  5. bill gates alapította
  6. 2004-ben jött létre ez a közösségi oldal
  7. a tábor témája
  8. segítőitek a táborban

15 Clues: a tábor témájaa mai nap céljaa leggazdagabb emberbill gates alapítottasegítőitek a táborbanaz egészségügy méregkeverőia tábor szervezői (lányfiú)ennek is tanulhatsz az ETK-naz ÁOK hallgatói álomszakmájaa PAKon végző emberek szakmájaők mentenek meg baleset eseténmindent tudnak a kalóriák rejtelmeiről2004-ben jött létre ez a közösségi oldal...

Unit 2 health crossword 2023-10-06

Unit 2 health crossword crossword puzzle
Across
  1. Saying nothing and doesn’t really care
  2. Someone who watches it happen
  3. Making someone feel included.
  4. People having more power than others n this situation.
  5. You respect everyone equally
Down
  1. Complete
  2. Does their own thing
  3. Someone targeting someone
  4. Prevents the bullying
  5. bullying. One line bullying
  6. Someone getting targeted

11 Clues: CompleteDoes their own thingPrevents the bullyingSomeone getting targetedSomeone targeting someonebullying. One line bullyingYou respect everyone equallySomeone who watches it happenMaking someone feel included.Saying nothing and doesn’t really carePeople having more power than others n this situation.

Farid Putra Wibawa/12F10/09 2024-09-14

Farid Putra Wibawa/12F10/09 crossword puzzle
Across
  1. interaksi yang terjalin dalam lot
  2. Kecerdasan buatan
  3. nilai kegunaan data
  4. Industri Cyber physical system
  5. Cloud software as a service
  6. kumpulan data yang bersifat besar
Down
  1. bagian utama dalam kecerdasan buatan
  2. sebuah akurasi pada melakukan pengumpulan data
  3. data Terstruktur dan tidak terstruktur
  4. berbagai macam perangkat
  5. layanan dalam saas

11 Clues: Kecerdasan buatanlayanan dalam saasnilai kegunaan databerbagai macam perangkatCloud software as a serviceIndustri Cyber physical systeminteraksi yang terjalin dalam lotkumpulan data yang bersifat besarbagian utama dalam kecerdasan buatandata Terstruktur dan tidak terstruktursebuah akurasi pada melakukan pengumpulan data

gaming 2024-11-11

gaming crossword puzzle
Across
  1. When game is slow
  2. Where you come back after dying
  3. A malfunction
  4. An inexperienced gamer
  5. A low-level character with good gear
  6. Revive a teammate.
Down
  1. A malicious cyber-attack
  2. When a neutral mob becomes hostile
  3. A player's character
  4. A gamer that takes all the damage
  5. A tough enemy

11 Clues: A malfunctionA tough enemyWhen game is slowRevive a teammate.A player's characterAn inexperienced gamerA malicious cyber-attackWhere you come back after dyingA gamer that takes all the damageWhen a neutral mob becomes hostileA low-level character with good gear

Equity Crossword 2022-07-18

Equity Crossword crossword puzzle
Across
  1. Function to view analysts expectation on key fundamental data points related to selected company
  2. Proxy for the price at which an investor can buy
  3. Function to view the capital structure of a company
  4. Function to view pending and recently announced mergers and acquisitions
  5. Function to view recent equity offerings
  6. Hybrid security with equity and debt characteristics
  7. Proxy for the price at which an investor can sell
Down
  1. Function to view a company's financial statements and ratios
  2. Function to screen for stocks suited to specific categories inputted by the user.
  3. Represents ownership in a publicly traded firm
  4. Function to view historical information about a selected security
  5. Function to see sell side analysts buy/sell/hold recommendations related to a specific company
  6. Bank-issued securities trading in markets outside of parent firm's country
  7. Basket security representing an economy, market, or industry
  8. Equity basket security consisting of other equity securities

15 Clues: Function to view recent equity offeringsRepresents ownership in a publicly traded firmProxy for the price at which an investor can buyProxy for the price at which an investor can sellFunction to view the capital structure of a companyHybrid security with equity and debt characteristicsFunction to view a company's financial statements and ratios...

Computer Holiday Homework 2025-06-15

Computer Holiday Homework crossword puzzle
Across
  1. A set of rules or standards for transmitting data.
  2. An career that deals with cybersecurity
  3. One type of cybersecurity theft
  4. What is one example of network security?
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  6. A device that converts digital signals to analog signals for transmission over phone lines.
Down
  1. One cybersecurity is related to...
  2. One benefit of computer security
  3. One cybersecurity threat vector
  4. A computer or device that requests resources or services from a server.
  5. A device that forwards data packets between computer networks.
  6. A network that spans a large geographic area, such as a country or the world.
  7. A unique numerical label assigned to each device connected to a network.
  8. One thing cybersecurity aim at
  9. The arrangement of computer and devices and connection in a network

15 Clues: One thing cybersecurity aim atOne cybersecurity threat vectorOne type of cybersecurity theftOne benefit of computer securityOne cybersecurity is related to...An career that deals with cybersecurityWhat is one example of network security?A set of rules or standards for transmitting data.A device that forwards data packets between computer networks....

6.5 Social Security and Medicare 2022-02-01

6.5 Social Security and Medicare crossword puzzle
Across
  1. number of digits in your social security number
  2. can you change your social security number if you want?
  3. a ____ of each worker's salary is taken out of each paycheck
  4. nation's largest health insurance program.
  5. Social Security tax and Medicare tax fall under this category
Down
  1. social security provides ____ for people after they retire
  2. the money that you and your employer contribute to social security and Medicare is use to pay the ____ benefits to someone else
  3. this president started social security
  4. does the amount of social security tax you pay depends on your employer?

9 Clues: this president started social securitynation's largest health insurance program.number of digits in your social security numbercan you change your social security number if you want?social security provides ____ for people after they retirea ____ of each worker's salary is taken out of each paycheck...

Corrections Vocabulary List 2025-11-10

Corrections Vocabulary List crossword puzzle
Across
  1. and Unusual Punishment - Treatment prohibited by the Eighth Amendment that is considered inhumane, degrading, or disproportionate to the crime committed.
  2. Officer - A professional who monitors and supervises individuals released from prison on parole to help them successfully reintegrate into society.
  3. Corpus - A legal action filed by a single offender claiming unlawful imprisonment based on violations of constitutional rights.
  4. - A short-term, multipurpose holding facility that serves as the gateway to the criminal justice system, typically housing people awaiting trial or serving sentences of less than one year.
  5. Security - The lowest level of prison security with few physical barriers to escape and more programs available for offenders.
  6. - The act of confining someone in a jail or prison as punishment for a crime.
  7. - Programs and treatments designed to help offenders change their behavior and successfully reintegrate into society.
  8. State Penitentiary - A revolutionary prison built in 1829 that emphasized individual cells, reflection, and the "silent system" for prisoner rehabilitation.
  9. Street Jail - An early American prison (1790) that introduced humane reforms including adequate food, separation of different populations, and paid prisoner labor.
  10. Lease System - A post-Civil War practice in the South where prisoners were leased to private companies for labor, often under harsh conditions.
  11. - The tendency of former inmates to commit new crimes and return to prison after their release.
Down
  1. - The supervised early release of a prisoner before their full sentence is completed, based on good behavior and meeting certain requirements.
  2. 1983 - A federal civil rights law that allows class action lawsuits against prison systems for unfavorable conditions, seeking monetary damages.
  3. - An alternative to incarceration where offenders serve their sentence in the community under supervision and specific conditions.
  4. Confinement - The practice of isolating prisoners in closed cells for extended periods with minimal human contact or environmental stimulation.
  5. - The system of agencies and programs responsible for supervising individuals who have been arrested, convicted, or sentenced for criminal offenses.
  6. Segregation - A form of solitary confinement where inmates are kept in single cells for 23 hours a day, typically for disciplinary or safety reasons.
  7. - A long-term correctional institution designed to house individuals convicted of felonies and serving sentences longer than one year.
  8. Security - The highest level of prison security designed for dangerous or violent offenders, housed in fortress-like facilities with extensive security measures.
  9. - A correctional institution based on the concept that inmates could change their criminal behavior through reflection, penitence, and rehabilitation.
  10. Officer - A professional who supervises offenders serving probation sentences in the community and ensures compliance with court-ordered conditions.
  11. System - A prison model featuring congregate work during the day, individual cells at night, and strict enforcement of silence among inmates.
  12. Security - A moderate level of prison security featuring self-contained, walled facilities that offer vocational, educational, and rehabilitation programs.

23 Clues: - The act of confining someone in a jail or prison as punishment for a crime.- The tendency of former inmates to commit new crimes and return to prison after their release.- Programs and treatments designed to help offenders change their behavior and successfully reintegrate into society....

Test your cost basis knowledge 2017-07-06

Test your cost basis knowledge crossword puzzle
Across
  1. The original value of an asset; usually the purchase price of the security.
  2. Cost basis method where shares purchased first (the oldest shares in the account) are the first shares sold.
  3. A return of some or all of an investment in the stock of the company. Reduces cost basis.
  4. Examples include stock splits, mergers, and spin offs.
  5. This method calculates an Average Cost per share by dividing the total of all investments by the total number of shares in the account.
  6. Cost basis method where shares purchased at the highest price per share are the first shares sold.
  7. Shares that Vanguard is required to report to the IRS.
  8. shares purchased by a shareholder on or before December 31, 2011.
  9. Shares held for a year or more.
Down
  1. Occurs when an investor sells a security at a loss but then purchases the same (or a similar) security within 30 days of the sale.
  2. Separating covered from noncovered shares.
  3. Cost basis method where shares purchased last (the newest shares in the account) are the first shares sold.
  4. The person who receives the securities transferred from a deceased clients account.
  5. A bond is an example of a _____ Security.
  6. Entering missing cost basis information into wave upon the clients request.
  7. Adjusting the cost basis of a security to the market value on the date the account holder died.
  8. Cost basis method where shares are selected by the shareholder each time shares are sold.
  9. Shares held for less than a year.
  10. This type of account cannot be stepped up.
  11. A transfer of shares between spouses cannot be codded as a ____.

20 Clues: Shares held for a year or more.Shares held for less than a year.A bond is an example of a _____ Security.Separating covered from noncovered shares.This type of account cannot be stepped up.Examples include stock splits, mergers, and spin offs.Shares that Vanguard is required to report to the IRS....

Securities Vocabulary Review 2022-11-01

Securities Vocabulary Review crossword puzzle
Across
  1. Control exerted via something worth much money without much effort.
  2. This indicator tells you if the voulme of stocks bought and sold is outpacing their current value.
  3. Set of companies providing similar goods/services. (2 words)
  4. Disliking or being opposed to something.
  5. Financial contracts based on underlying assets.
  6. A compilation of securities
  7. Value at which an option is willing to be sold.
  8. Tpe of option reserving the right to sell at a certain price.
  9. Earnings per Share. (Abbr.)
  10. Unit of a securuity, such a stock.
  11. Mutual fund or ETF designed to mimic the performance of an exchange as a whole. (2 words)
  12. Person which facilitates investing, often for a fee.
  13. Uses patterns in market data to identify trends and opportunities which result from them. (2 words)
  14. Determines a security's true worth, AKA fair market value. (2 words)
  15. This indicator is used in the "Crossover Strategy". (2 words)
  16. Securities and Exchange Commission (Abbr.)
Down
  1. Every security traded on the market has one of these. (2 words)
  2. A tradeable financial asset.
  3. Exchange-traded Fund. (Abbr.)
  4. The ceiling of how high a stock has gone recently.
  5. The floor of how often a stock has gone recently.
  6. Type of security representing a piece of a company
  7. Quantity ; amount.
  8. No trend ; not up or down.
  9. Value at which an option is willing to be bought.
  10. Type of security often involving land and houses. (2 words)
  11. Debt security
  12. Useful in understanding how securities are behaving in the present.
  13. Type of option reserving the right to buy at a certain price.
  14. Moving Average - Convergence/Divergence. (Abbr.)
  15. Collection of securities organized by a manager. (2 words)
  16. The price on a call or put option. (2 words)

32 Clues: Debt securityQuantity ; amount.No trend ; not up or down.A compilation of securitiesA tradeable financial asset.Earnings per Share. (Abbr.)Exchange-traded Fund. (Abbr.)Unit of a securuity, such a stock.Disliking or being opposed to something.Securities and Exchange Commission (Abbr.)The price on a call or put option. (2 words)...

Crossword 2021-06-16

Crossword crossword puzzle
Across
  1. to stay in ....
  2. to call the ....
  3. you can read books there
  4. You can listen to music with ....
  5. .... to face
Down
  1. I´ve done this a ... times before.
  2. you are a ....
  3. cyber ...... .
  4. to .... a friend.
  5. to be .... to (do sth)

10 Clues: .... to faceyou are a ....cyber ...... .to stay in ....to call the ....to .... a friend.to be .... to (do sth)you can read books thereYou can listen to music with ....I´ve done this a ... times before.

HZ 2023-04-04

HZ crossword puzzle
Across
  1. - Field of study that applies psychology to understanding financial decision-making
  2. - Return on an investment in excess of the risk-free rate of return
  3. - Certificates representing ownership of foreign stocks traded on US exchanges
  4. - Method used to sell securities to investors at a set price
  5. - Risk that changes in interest rates will affect the value of a security
  6. - Sale of a security that the seller does not own, with the hope of buying it back at a lower price in the future
  7. - Phenomenon where stock prices tend to rise in January
  8. - Financial instrument used to hedge against credit risk
  9. - Securities that do not pay periodic interest
  10. - Market where large institutional investors trade securities with each other
  11. - Type of account where funds can be withdrawn at any time
  12. - Interest rate used to discount future cash flows to their present value
  13. - Legal agreement outlining the terms and conditions of a bond issue
  14. - Sale of securities directly to a specific investor or group of investors
  15. - Equity securities with a preference for dividends and a claim on assets ahead of common stock
  16. - Interest rate on a security for immediate delivery
Down
  1. - Market with high trading volume and many participants, resulting in easy buying and selling
  2. - Formula used to value a stock based on expected dividends
  3. - Equity securities representing ownership in a corporation
  4. - High-risk, high-yield bonds issued by companies with poor credit ratings
  5. - Ratio of a stock's price to its earnings per share
  6. - Annual income generated by a security, expressed as a percentage of its current market price
  7. - Predicted interest rate on a security at some point in the future
  8. - Strategy of buying and selling securities to take advantage of price discrepancies
  9. - Method used to sell securities to investors at the lowest possible cost
  10. - Measure of a security's sensitivity to changes in interest rates, taking into account the shape of the price-yield curve
  11. - Formula used to value a stock based on expected growth and dividends
  12. - Theory that asset prices reflect all available information
  13. - Promise by a third party to assume responsibility for a debtor's payment obligation
  14. - Stock exchange focused on technology companies
  15. - First sale of a company's shares to the public
  16. - Interest rate paid on a bond's face value
  17. - Short-term securities backed by a pool of assets
  18. - Payment made to shareholders by a corporation out of its profits
  19. - Measure of a security's sensitivity to changes in interest rates
  20. - Security with a specified maturity date
  21. - Amount paid above the face value of a security
  22. - Separate Trading of Registered Interest and Principal of Securities
  23. - Phenomenon where the price of a security becomes detached from its underlying value

39 Clues: - Security with a specified maturity date- Interest rate paid on a bond's face value- Securities that do not pay periodic interest- Stock exchange focused on technology companies- First sale of a company's shares to the public- Amount paid above the face value of a security- Short-term securities backed by a pool of assets...

Tech Refresh 2020-04-21

Tech Refresh crossword puzzle
Across
  1. Great design!
  2. Emanations
  3. 9001
  4. Blandford Gods
  5. record your time!
  6. Conveyor of light
  7. Air handling for NER
  8. I need me some info!
  9. CAT6a
  10. Big Delta-wing
  11. Serving a wider audience
  12. AC CODE (anag.)
  13. I want BIG prints
  14. X,Y,Z
  15. brighter training?
  16. Bomber
  17. No jail (anag.)
Down
  1. Linear artist
  2. 'This way if you please...'
  3. 8 legged communication?
  4. Local servery
  5. Normal business PM
  6. kubernētēs
  7. Set this to auto
  8. Always busy....
  9. Aircon for NER
  10. Down to earth
  11. 9001
  12. Shocking!
  13. Drafting tool

30 Clues: 90019001CAT6aX,Y,ZBomberShocking!EmanationskubernētēsGreat design!Linear artistLocal serveryDown to earthDrafting toolBlandford GodsBig Delta-wingAircon for NERAlways busy....AC CODE (anag.)No jail (anag.)Set this to autorecord your time!Conveyor of lightI want BIG printsNormal business PMbrighter training?Air handling for NERI need me some info!...

Holiday Puzzle 2020-11-20

Holiday Puzzle crossword puzzle
Across
  1. Something that gets bright when you turn them on at night
  2. Santa's pet
  3. Something Santa eats
  4. White fluffy stuff that falls from the sky
  5. What you send in the mail
  6. This holiday is celebrated for 8 days
  7. Frosty the ________
  8. A ______ in a pear tree
  9. Where you hang stockings
  10. What reindeer pull
Down
  1. Santa's helper
  2. What you put presents under
  3. Christmas ________
  4. red & white striped
  5. This African-American holiday is held from Dec 26 - Jan 1
  6. Something Santa drinks
  7. Cyber ________
  8. Santa's last name
  9. How many days in December
  10. Last month of the year

20 Clues: Santa's petSanta's helperCyber ________Santa's last nameChristmas ________What reindeer pullred & white stripedFrosty the ________Something Santa eatsSomething Santa drinksLast month of the yearA ______ in a pear treeWhere you hang stockingsHow many days in DecemberWhat you send in the mailWhat you put presents under...

Cybersecurity Crossword Puzzle - MP 2023-01-27

Cybersecurity Crossword Puzzle - MP crossword puzzle
Across
  1. transforms plaintext into ciphertext
  2. key used to decrypt
  3. trap for cyber criminals
  4. unsolicited emails
  5. tricked into clicking
  6. intrusive computer software
  7. key to encrypt and decrypt
  8. helps prevent hackers and viruses
  9. hidden horse surprise
  10. malware that collects personal data
  11. hides users location
Down
  1. unwanted pop up ads
  2. used to detect viruses network
  3. program that allows remote access
  4. person who harms your computer
  5. protects data by scrambling it
  6. error on software
  7. malware that reproduces itself
  8. ethical hacker
  9. form of internet communication
  10. peripherals connected as one entity.

21 Clues: ethical hackererror on softwareunsolicited emailsunwanted pop up adskey used to decrypthides users locationtricked into clickinghidden horse surprisetrap for cyber criminalskey to encrypt and decryptintrusive computer softwareused to detect viruses networkperson who harms your computerprotects data by scrambling itmalware that reproduces itself...

Values and behaviours 2013-05-19

Values and behaviours crossword puzzle
Across
  1. Could be structural or emotional etc
  2. A little of a dangerous thing.
  3. Lucidity in red wine!
  4. Cyber cod not quite camping!
  5. Fraternize professionally.
  6. Master of torment!
  7. Appropriately included.
  8. Not quite the Spanish Inquisition!
  9. Bond's boss wields this almost!
  10. A bit more than Brahms' buddy!
  11. See to put in order.
Down
  1. Almost a hotel for octuplets!
  2. Franklin sang it!
  3. Gauntlet down!
  4. Lack of similarity.
  5. No indoor direction.
  6. Represent one's country.(Giver of golden chocolates!)
  7. Answering Bailey's drink!
  8. Job of a midwife.
  9. Impart learning by carriage!
  10. Morph usefully!

21 Clues: Gauntlet down!Morph usefully!Franklin sang it!Job of a midwife.Master of torment!Lack of similarity.No indoor direction.See to put in order.Lucidity in red wine!Appropriately included.Answering Bailey's drink!Fraternize professionally.Cyber cod not quite camping!Impart learning by carriage!Almost a hotel for octuplets!A little of a dangerous thing....

Fairtrading Healthcentre and Cybersafety 2025-03-02

Fairtrading Healthcentre and Cybersafety crossword puzzle
Across
  1. -Online
  2. Signals Directorate's -Abbreviation is ASD.
  3. -Example computers, technology.
  4. -Safe/strong/reliable for passwords.
  5. -message claiming to be from someone official.
  6. -A copy of something to be stored and saved.
  7. -Criminals online.
  8. -Dishonesty and deception.
  9. -Expose something illegal.
Down
  1. -Guidance and advising.
  2. media -Any apps online/communication.
  3. -To be able to live in a house but not buy it.
  4. -Unknown/not likely.
  5. -An agreement that allows you to understand how the business works.
  6. -A trick.
  7. -Being safe online
  8. -Purchasing a product.
  9. -Getting your money back.
  10. -Short supply of something.
  11. -Renew.

20 Clues: -Online-Renew.-A trick.-Being safe online-Criminals online.-Unknown/not likely.-Purchasing a product.-Guidance and advising.-Getting your money back.-Dishonesty and deception.-Expose something illegal.-Short supply of something.-Example computers, technology.-Safe/strong/reliable for passwords.media -Any apps online/communication....

Cyber Secuirty 2021-05-26

Cyber Secuirty crossword puzzle
Across
  1. Getting into someone else’s computer or device without their permission.
  2. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website.
  3. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge).
  4. A way to stop hackers getting into your accounts, even if they know your password.
  5. A sequence of characters (or words) used to stop criminals from accessing your accounts.
Down
  1. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of.
  2. You need to create one of these to access services on the internet (such as email and shopping).
  3. A copy of the information held on a device (such as photos and documents) which is stored somewhere else.
  4. Unwanted emails or messages that usually try to sell you something.
  5. A location on the internet where you can save your data (rather than on your computer or device).
  6. Nasty software that can have a bad impact on your device or computer.

11 Clues: Unwanted emails or messages that usually try to sell you something.Nasty software that can have a bad impact on your device or computer.Getting into someone else’s computer or device without their permission.A way to stop hackers getting into your accounts, even if they know your password....

Cyber Bullying 2022-04-19

Cyber Bullying crossword puzzle
Across
  1. Ability to have authority
  2. Understanding how someone feels
  3. Something that is true
  4. Assistance given
  5. Sustained repetitive hurting of someone
  6. People who care about you
Down
  1. An offence punishable by law
  2. Something mean you do to someone
  3. Deliberately causes pain
  4. Statement of intention to hurt
  5. Likely to cause harm

11 Clues: Assistance givenLikely to cause harmSomething that is trueDeliberately causes painAbility to have authorityPeople who care about youAn offence punishable by lawStatement of intention to hurtUnderstanding how someone feelsSomething mean you do to someoneSustained repetitive hurting of someone

Cyber Bullying 2013-11-05

Cyber Bullying crossword puzzle
Across
  1. Something that causes bodily or mental pain or suffering; to cause bodily or mental pain.
  2. Web sites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts:
  3. the intentional taking of one's own life; a person who intentionally takes his or her own life.
  4. happening or occurring at short intervals; constant, habitual, or regular
  5. to cause confusion and shame to; make uncomfortably self-conscious
  6. to give or impart knowledge of a fact or circumstance to;to supply (oneself) with knowledge
Down
  1. to be on the Internet
  2. to disturb persistently; bother continually; persecute.
  3. a person who perpetrates, or commits, an illegal, criminal, or evil act
  4. to cause of severe pain or anguish.
  5. the act of beating, whipping, or thrashing; physical assaults or verbal abuse against members of a specified group.

11 Clues: to be on the Internetto cause of severe pain or anguish.to disturb persistently; bother continually; persecute.to cause confusion and shame to; make uncomfortably self-consciousa person who perpetrates, or commits, an illegal, criminal, or evil acthappening or occurring at short intervals; constant, habitual, or regular...

Cyber Bullying 2013-11-05

Cyber Bullying crossword puzzle
Across
  1. constant, habitual, or regular
  2. to afflict with great bodily or mental suffering; pain: to be tormented with violent headaches; a state of great bodily or mental suffering; agony; misery.
  3. to give or impart knowledge of a fact or circumstance
  4. Web sites and other online means of communication
  5. the act of inflicting excruciating pain, as punishment or revenge; a method of inflicting such pain.
  6. to disturb persistently;bother continually; persecute.
Down
  1. a person who commits, an illegal, criminal, or evil act
  2. connected by computer to one or more other computers or the Internet.
  3. the intentional taking of one's own life.
  4. verbal abuse, as of a group or a nation.
  5. to cause confusion and shame; to make uncomfortably self-conscious

11 Clues: constant, habitual, or regularverbal abuse, as of a group or a nation.the intentional taking of one's own life.Web sites and other online means of communicationto give or impart knowledge of a fact or circumstanceto disturb persistently;bother continually; persecute.a person who commits, an illegal, criminal, or evil act...

Cyber Ethics 2025-06-12

Cyber Ethics crossword puzzle
Across
  1. all nodes are connected via central device
  2. criminal activities that include the use of computers
  3. network within city
  4. wireless fidelity
  5. sender transform data into unreadable code
Down
  1. illegal intrusion in a computer via internet
  2. fully connected network
  3. A program that disrupts the normal functioning of computer
  4. responsible behavior in social media
  5. legal right for original creator for his work
  6. wireless network

11 Clues: wireless networkwireless fidelitynetwork within cityfully connected networkresponsible behavior in social mediaall nodes are connected via central devicesender transform data into unreadable codeillegal intrusion in a computer via internetlegal right for original creator for his workcriminal activities that include the use of computers...

Cyber Puzzle 2022-09-20

Cyber Puzzle crossword puzzle
Across
  1. The form of encryption that requires a single key
  2. An important process that verifies a user is really who they are; many different ways this can be done.
  3. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  4. The _________ is used to verify that data is not modified, tampered with, or corrupted
  5. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
Down
  1. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  2. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. unique address that identifies a device on the internet or a local network.
  4. Special virus that moves from computer to computer without human interaction.
  5. An ________ is a program or code that makes use of the vulnerability in an application or system.
  6. a person who uses computers to gain unauthorized access to data.

11 Clues: The form of encryption that requires a single keya person who uses computers to gain unauthorized access to data.unique address that identifies a device on the internet or a local network.Special virus that moves from computer to computer without human interaction....

Cyber Thursday 2021-02-11

Cyber Thursday crossword puzzle
Across
  1. Used to identify specific users
  2. Capable of copying itself
  3. Data protection
  4. Theft stealing information
  5. Detect and remove viruses
Down
  1. Converting information or data into a code
  2. Protect from unauthorised access
  3. Uses computers to gain unauthorised access
  4. Computer programs
  5. Network protection
  6. Sent to a large number of recipients

11 Clues: Data protectionComputer programsNetwork protectionCapable of copying itselfDetect and remove virusesTheft stealing informationUsed to identify specific usersProtect from unauthorised accessSent to a large number of recipientsConverting information or data into a codeUses computers to gain unauthorised access

cyber-bulling 2018-07-05

cyber-bulling crossword puzzle
Across
  1. ΤΟΥΣ ΚΩΔΙΚΟΥΣ ΜΟΥ ΤΟΥΣ ΜΟΙΡΑΖΟΜΑΙ ΜΟΝΟ ΜΕ ΤΟΥΣ ... ΜΟΥ
  2. ΤΟ...ΔΕΝ ΠΡΕΠΕΙ ΝΑ ΦΑΝΕΡΩΝΕΙ ΤΗΝ ΗΛΙΚΙΑ & ΤΟ ΟΝΟΜΑ ΣΟΥ
  3. ΚΑΠΟΙΟΣ ΣΕ ΑΠΕΙΛΕΙ ΔΙΑΔΙΚΤΥΑΚΑ.ΓΙΑ ΝΑ ΜΗΝ ΚΙΝΔΥΝΕΨΕΙΣ ΠΑΤΑ ΤΟ ΚΟΥΜΠΙ ΤΗΣ..
  4. ΜΕΣΩ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ ΔΕΝ ΜΠΟΡΩ ΝΑ ΑΝΑΠΤΥΞΩ ΔΕΣΜΟΥΣ ΠΡΑΓΜΑΤΙΚΗΣ ...
  5. ΟΤΑΝ ΚΑΠΟΙΟΣ ΔΕΝ ΜΠΟΡΕΙ ΝΑ ΞΕΚΟΛΛΗΣΕΙ ΑΠΟ ΤΟΝ Η/Υ ΛΕΜΕ ΟΤΙ ΈΧΕΙ
  6. ΑΝ ΜΙΛΑΩ ΜΕ ΞΕΝΟΥΣ ΣΤΟ ΔΙΑΔΙΚΤΥΟ ΔΕ ΔΙΝΩ ... ΠΛΗΡΟΦΟΡΙΕΣ
  7. ΟΤΑΝ ΜΟΥ ΚΑΝΟΥΝ ΔΙΑΔΙΚΤΥΑΚΟ ΕΚΦΟΒΙΣΜΟ ΠΡΕΠΕΙ ΝΑ ΖΗΤΗΣΩ...
Down
  1. ΠΟΤΕ ΔΕ ΣΤΕΛΝΩ ΜΣΩ ΔΙΑΔΙΚΤΥΟΥ ΣΕ ΑΛΛΟΥΣ
  2. ΠΡΕΠΕΙ ΝΑ ΠΡΟΣΕΧΟΥΜΕ ΠΟΙΕΣ ΕΠΙΣΚΕΠΤΟΜΑΣΤΕ
  3. ΛΕΓΕΤΑΙ ΤΟ BULLYNING ΣΤΑ ΕΛΛΗΝΙΚΑ
  4. ΜΠΟΡΕΙ ΝΑ ΑΠΟΚΤΗΣΕΙ ΠΡΟΒΑΣΗ ΣΤΟΝ ΥΠΟΛΟΓΙΣΤΗ ΜΑΣ ΚΑΙ ΝΑ ΜΑΣ ΚΛΕΨΕΙ ΠΡΟΣΩΠΙΚΑ ΑΡΧΕΙΑ

11 Clues: ΛΕΓΕΤΑΙ ΤΟ BULLYNING ΣΤΑ ΕΛΛΗΝΙΚΑΠΟΤΕ ΔΕ ΣΤΕΛΝΩ ΜΣΩ ΔΙΑΔΙΚΤΥΟΥ ΣΕ ΑΛΛΟΥΣΠΡΕΠΕΙ ΝΑ ΠΡΟΣΕΧΟΥΜΕ ΠΟΙΕΣ ΕΠΙΣΚΕΠΤΟΜΑΣΤΕΤΟΥΣ ΚΩΔΙΚΟΥΣ ΜΟΥ ΤΟΥΣ ΜΟΙΡΑΖΟΜΑΙ ΜΟΝΟ ΜΕ ΤΟΥΣ ... ΜΟΥΤΟ...ΔΕΝ ΠΡΕΠΕΙ ΝΑ ΦΑΝΕΡΩΝΕΙ ΤΗΝ ΗΛΙΚΙΑ & ΤΟ ΟΝΟΜΑ ΣΟΥΑΝ ΜΙΛΑΩ ΜΕ ΞΕΝΟΥΣ ΣΤΟ ΔΙΑΔΙΚΤΥΟ ΔΕ ΔΙΝΩ ... ΠΛΗΡΟΦΟΡΙΕΣΟΤΑΝ ΜΟΥ ΚΑΝΟΥΝ ΔΙΑΔΙΚΤΥΑΚΟ ΕΚΦΟΒΙΣΜΟ ΠΡΕΠΕΙ ΝΑ ΖΗΤΗΣΩ......

Cyber Safety 2024-10-06

Cyber Safety crossword puzzle
Across
  1. Having the ability to access the internet without limitations, such as time restrictions or content filters, often without parental supervision
  2. A mobile electronic device (like a smartphone, tablet, or wearable) that can connect to the internet and run applications
  3. The process by which platforms like social media apps monitor and regulate what is shared, often aiming to remove inappropriate or harmful material
  4. The ability to use digital technology, communicate online, and find, evaluate, and create information responsibly
  5. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
Down
  1. Personal profiles created on social media platforms (e.g., Instagram, Snapchat, TikTok), used for sharing content and connecting with others
  2. Responsible and respectful behavior when using technology and engaging in the online world, including adhering to ethical practices
  3. The trail of data one leaves behind when using the internet, including social media interactions, browsing history, and online purchases
  4. Options provided by online platforms that allow users to control who can see their information and how their data is used
  5. The technology behind platforms like TikTok and YouTube that suggest content based on a user’s preferences and past behavior, sometimes leading to exposure to harmful content
  6. Features offered by software or devices to help parents restrict or monitor their children’s online activities, ensuring safe usage

11 Clues: The ability to use digital technology, communicate online, and find, evaluate, and create information responsiblyOptions provided by online platforms that allow users to control who can see their information and how their data is used...

Cyber Safety 2024-06-13

Cyber Safety crossword puzzle
Across
  1. What is a method you can use to let people know that bullying is happening in games?
  2. When someone steals your identity online. (2 words)
  3. Mini graphics that you can use in place of phrases or letters.
  4. What is the best pet? dogs or cats?
  5. What could this be? b13Ndln@
Down
  1. What should you install right away when you get a new computer? (3 words)
  2. Who can see your profile picture?
  3. A method cyber criminals use to get you to give them personal information
  4. When someone says mean things to you online.
  5. A word for something that you can get sick with as well as your computer.
  6. Who should you tell if someone is bulling you online? (two words)

11 Clues: What could this be? b13Ndln@Who can see your profile picture?What is the best pet? dogs or cats?When someone says mean things to you online.When someone steals your identity online. (2 words)Mini graphics that you can use in place of phrases or letters.Who should you tell if someone is bulling you online? (two words)...

Information Security General Awareness Challenge 2014-08-25

Information Security General Awareness Challenge crossword puzzle
Across
  1. Information security matters because it helps CIBC ensure that information and information assets do not fall into the wrong hands, become lost, or get ________ in any way
  2. Information Security General Awareness helps protect the __________ and public image of CIBC
  3. ________ protection – be careful about data you accept and from whom / don’t open any unexpected email attachments
  4. Report lost or stolen _____ cards
  5. Information security is about ensuring that info is _________ only to those authorized to have access to such information, protecting the accuracy and completeness of information and the systems use to process it
  6. All employees are accountable for the actions they take when using or _________ sensitive info on CIBC computer systems
  7. _______ customer info
Down
  1. Always lock _______
  2. Information Security ensures that CIBC info and computer systems are available to _______ users.
  3. Information security is about protecting CIBC’s information assets from potential loss, destruction, damage, misuse, theft, or abuse of _________ assets
  4. Keep your ________ confidential
  5. all software on CIBC computing resources must be tested, approved and installed by CIBC tech team / unauthorized __________ is not permitted
  6. Safeguard CIBC ___________, blackberry when in transit
  7. Securely dispose of _______ – grey bin and SHRED-it consoles
  8. ______ desk

15 Clues: ______ deskAlways lock ______________ customer infoKeep your ________ confidentialReport lost or stolen _____ cardsSafeguard CIBC ___________, blackberry when in transitSecurely dispose of _______ – grey bin and SHRED-it consolesInformation Security General Awareness helps protect the __________ and public image of CIBC...

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Type of malware that locates and saves data from users without them knowing about it
  2. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. Encrypts programs and data until ransome is paid
  5. Error in a program that prevents the program from running as expected
  6. Collection of captured bot computers
  7. Piece of code that is capable of copying itself and typically has a detrimental effect such as corruptin the system or destroying data
  8. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
Down
  1. A program that appears desirable but acctualy contains something harmful they can copy themselves steal info or harm the host computer
  2. Criminals promise a service in exchange for details - a common example is offering help with IT problems
  3. Software that shows adverts It can be harmless
  4. When someone deceives by pretending to be someone else in order to get personal data.
  5. Program that hides in a computer and allows someone from a remote location to take control
  6. Malware that allows cyber security attacker to take control of computer
  7. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

15 Clues: Collection of captured bot computersSoftware that shows adverts It can be harmlessEncrypts programs and data until ransome is paidError in a program that prevents the program from running as expectedMalware that allows cyber security attacker to take control of computer...

Cybersecurity terms 2025-02-10

Cybersecurity terms crossword puzzle
Across
  1. - Malicious software designed to damage a system.
  2. - A hidden method of bypassing security.
  3. - Gathering personal information using deceptive emails.
  4. - Coding used to protect information.
  5. Address - Identifies the connection between a computer and the network provide
  6. - Hardware that allows communication between a network and the Internet.
  7. - A network of infected devices controlled by malware.
Down
  1. - A security system that prevents intrusions.
  2. - A system update that covers security vulnerabilities.
  3. - A process that confirms a user’s identity.
  4. - Someone who tries to gain unauthorized access.
  5. - Distributed Denial of Service attack.
  6. - Software that blocks access until money is paid.
  7. - Virtual Private Network.
  8. - Malware designed to remain hidden.
  9. - A decoy system to attract attackers.
  10. - Taking advantage of a computer’s vulnerability.
  11. Breach - When information is stolen from a system.

18 Clues: - Virtual Private Network.- Malware designed to remain hidden.- Coding used to protect information.- A decoy system to attract attackers.- Distributed Denial of Service attack.- A hidden method of bypassing security.- A process that confirms a user’s identity.- A security system that prevents intrusions....

Chapter 2: Securities 2025-01-10

Chapter 2: Securities crossword puzzle
Across
  1. The lowest amount of money someone is willing to sell their security for.
  2. Type of share that is held by investors.
  3. Someone who buys and sells stocks on behalf of a client.
  4. The amount a security is actually sold for.
  5. Market where stock is sold after it has already been issued and bought.
  6. Type of share that a company can sell.
  7. Largest organized Stock Exchange in the U.S.
  8. Market where stock is first sold.
  9. A type of exchange that is used to trade securities that are not listed on organized exchanges.
Down
  1. Location that states how many shares a company can sell.
  2. Resources like raw materials.
  3. Type of share that has already been sold in the market/
  4. The highest amount of money a customer is willing to pay for a security.
  5. When a company issues stock for the first time.
  6. The price a customer pays to actually buy a security.

15 Clues: Resources like raw materials.Market where stock is first sold.Type of share that a company can sell.Type of share that is held by investors.The amount a security is actually sold for.Largest organized Stock Exchange in the U.S.When a company issues stock for the first time.The price a customer pays to actually buy a security....

FNF Mod Songs 2021-11-02

FNF Mod Songs crossword puzzle
Across
  1. Cyrix's second song
  2. Little man's final song
  3. Selever's song
  4. sarvente's first song
  5. Sky's final song
  6. Tabi's third song
  7. Kapi's first song(Arcade Showdown)
  8. whitty's second song
  9. Neon's final song
  10. Anders's final song
  11. hex's bonus song
  12. Shaggy's second song
  13. Bob's final song
  14. Annie's fourth song
Down
  1. Filip's sixth song
  2. Taeyei's first song(FNF Cyber Sensation)
  3. Taki's first song(Friday night Fever)
  4. amor's song
  5. Updike's song
  6. Tricky's second song
  7. Zardy's first song
  8. Majin Sonic's song
  9. AGOTI's first song
  10. Garcello's first song
  11. KOU's second song

25 Clues: amor's songUpdike's songSelever's songSky's final songhex's bonus songBob's final songTabi's third songNeon's final songKOU's second songFilip's sixth songZardy's first songMajin Sonic's songAGOTI's first songCyrix's second songAnders's final songAnnie's fourth songTricky's second songwhitty's second songShaggy's second songsarvente's first song...

Model Diplomacy 2023-04-26

Model Diplomacy crossword puzzle
Across
  1. the president’s chief foreign affairs advisor, the country’s chief diplomat, and the head of the Department of State, which conducts the United States’ relationships with foreign countries and international organizations.
  2. one of the president’s chief economic advisors and head of the department of the treasury, which carries out policy on issues related to the U.S. and global economies and financial systems. The department is home to the U.S. Mint and Internal Revenue Service, among other agencies.
  3. the head of the Department of Energy, which executes U.S. policy on energy, environmental, and nuclear issues and oversees seventeen national scientific research laboratories.
  4. a country’s attitudes and actions in the international arena. Foreign policy includes two principal elements: goals or interests as the country defines them, such as peace with one’s neighbors, and the means pursued to advance these interests, such as diplomatic negotiations, trade agreements, and military alliances. A country carries out its foreign policy through its dealings with other countries, international organizations such as the United Nations (UN), and nonstate actors such as corporations and advocacy groups.
  5. undertaken between two entities, generally countries.
  6. the group comprising the vice president of the United States and the heads of all fifteen federal executive departments, such as the secretaries of state, defense, commerce, labor, and education. Other officials may also have cabinet rank, depending on the administration.
  7. the so-called honest broker of the national security policy process and the president’s principal advisor on national security issues. The NSA manages the National Security Council (NSC) staff, chairs the principals committee, and coordinates and manages policymaking with the goal of ensuring effective policy development and implementation.
  8. the principal defense policy advisor to the president and head of the Department of Defense, which oversees the formulation and execution of defense policy and manages U.S. military forces.
  9. the ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system.
  10. head of the Department of Justice and chief lawyer of the U.S. government. Among other duties, they offer advice on the legal aspects of proposed policies to the president and other department heads.
  11. a type of presidential directive, or official order from the president, on matters related to national security. Called different names by different administrations, these documents may initiate a review of current policy, reorganize the structure of the national security policy apparatus, or lay out new strategies.
  12. a decision issued by the president that carries the full force and effect of law. An executive order usually instructs government departments and agencies to implement or modify particular policies or procedures.
  13. the president’s principal advisor for intelligence-related matters and the head of the intelligence community, a network of seventeen agencies and organizations, such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and Defense Intelligence Agency (DIA), that collect and analyze information to assist policymaking.
Down
  1. an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies. In 1962, President John F. Kennedy ordered a blockade of Cuba—calling it a “quarantine” to avoid the implication of declaring war—in response to Soviet missile activity on the island.
  2. the highest-ranking member of the U.S. armed forces. The CJCS does not exercise command authority over U.S. troops, but instead works with the leaders of the U.S. military services to fulfill their function as the top military advisor to the president and other senior officials.
  3. defensive and offensive actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure. Specific actions include planting computer viruses, mounting denial-of-service attacks to disrupt internet and network activity, and conducting electronic surveillance.
  4. an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense.
  5. undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations.
  6. the head of the Department of Homeland Security since its creation after the attacks of September 11, 2001. This department works to protect U.S. security by implementing federal policy concerning terrorism prevention, border security, immigration, disaster response, and cybersecurity.
  7. the second-highest-ranking official of the U.S. government and first in line to assume the presidency if the president dies, resigns, or becomes unable to serve. Though given only one responsibility in the Constitution—to serve as president of the U.S. Senate, with the power to break ties—the vice presidency has become a visible part of the modern White House. Today’s vice presidents undertake a variety of functions, from serving as an all-purpose presidential advisor to carrying out diplomatic trips abroad. The personality of the individual who occupies this post and their relationship with the president define the scope of the role.
  8. a law signed by President Harry S. Truman in 1947 to reorganize the agencies and processes related to intelligence, foreign policy, and the military. Among its reforms, the act established the National Security Council (NSC) and the Central Intelligence Agency (CIA).
  9. the president’s national security and foreign policy personnel. The NSC staff receives direction from the president via the national security advisor, provides expertise on issues and regions, and collaborates frequently with employees from other government departments and agencies to carry out the interagency policymaking process.
  10. a tool of statecraft, frequently involving economic measures such as asset freezes and trade restrictions, used to exact a certain behavior or outcome from another party. The U.S. and European Union sanctions against Russian companies and individuals that aim to encourage Russia to end its interference in Ukraine are an example.
  11. the intermediate-level setting, below the principals committee, for debating issues in the National Security Council (NSC) system. Chaired by the deputy national security advisor, it comprises the second- and third-ranking leaders of the departments and agencies represented on the National Security Council. It manages the interagency process up and down, answering to the principals committee and assigning and reviewing the work of interagency policy committees.
  12. individuals or groups that do not belong to or act on behalf of a state. This may refer to nongovernmental organizations such as Amnesty International, media outlets such as the New York Times, or terrorist groups such as al-Qaeda.
  13. involving two or more agencies. The National Security Council (NSC), for example, is an interagency forum, not a forum internal to any one agency.
  14. the lowest-level setting for debating issues in the National Security Council (NSC) system and the home of much of the day-to-day work needed to formulate and implement U.S. foreign policy. Often chaired by a senior director on the NSC staff, IPCs develop, coordinate, and carry out policy options in distinct regional and functional areas.
  15. a tax on goods arriving from a foreign country, generally used as a tool of trade and foreign policy to penalize adversaries or favor allies or domestic producers.
  16. undertaken by only one entity, generally a country.
  17. an interagency body that serves as the forum for the president to discuss and take action on the most critical national security issues facing the United States. Its membership has varied since its creation in 1947, and now includes the president, vice president, national security advisor, secretaries of state and defense, and a variety of other senior officials.

30 Clues: undertaken by only one entity, generally a country.undertaken between two entities, generally countries.the ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system.undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations....

Security day 1 2022-12-07

Security day 1 crossword puzzle
Across
  1. a written form of Hazard Communication
  2. promoting best behavior
  3. where to place prohibited but not illegal items found while a guest is going through screening.
  4. sending police into situations where individuals may have violated the law
  5. the 'D' in GUARD IT
  6. Code of _______
  7. the E in EASY model
  8. Manages guest flow by providing proper direction for the screening process
  9. bag inspection tool and PPE
  10. put in place for the safety of our guests and associates in the event of an emergency
Down
  1. Diffusing situations
  2. _____ and report
  3. monitors the guests as they pass through the metal detectors
  4. the acronym for fire extinguisher use.
  5. Bag inspection tool used to move items to the side in a bag.
  6. We detect violations of park policy and law
  7. Run ____ Fight
  8. guns/knives
  9. PPE used to protect your eyes
  10. ______ illness
  11. images that are used on materials to indicate different kinds of hazards

21 Clues: guns/knivesRun ____ Fight______ illnessCode of ____________ and reportthe 'D' in GUARD ITthe E in EASY modelDiffusing situationspromoting best behaviorbag inspection tool and PPEPPE used to protect your eyesa written form of Hazard Communicationthe acronym for fire extinguisher use.We detect violations of park policy and law...

FNAF: Security Breach 2023-01-10

FNAF: Security Breach crossword puzzle
Across
  1. Crazy Rabbit Lady
  2. "Work off the Calories while you Eat!"
  3. Nighttime Security Guard
  4. A Soda Drink that will Increase your Stamina
  5. Self-Absorbed Canine
  6. How Many Possible Game Endings?
  7. A Funky Arcade that Requires a Dance Pass
  8. Where to Burn Rubber?
  9. Lost Boy
  10. Great Thanks...
  11. Tasty Tacos and Burritos!
Down
  1. Where to bake a Pizza for Chica?
  2. An Out-of-this-World Adventure!
  3. Hungry Chick
  4. The Pizzaplex's Swampy Golf Course
  5. Gate-Smasher with Powerful Claws
  6. Where to Repair Freddy?
  7. You Can Only Run for So Long...
  8. "Lights On! Lights On!"
  9. Buried Far Beneath the Pizzaplex...
  10. Helpful Ally who Sacrifices Himself
  11. 2023 DLC
  12. The Pizzaplex's Chill Hangout Area
  13. "Naughty Boy... Naughty Boy..."

24 Clues: 2023 DLCLost BoyHungry ChickGreat Thanks...Crazy Rabbit LadySelf-Absorbed CanineWhere to Burn Rubber?Where to Repair Freddy?"Lights On! Lights On!"Nighttime Security GuardTasty Tacos and Burritos!An Out-of-this-World Adventure!You Can Only Run for So Long...How Many Possible Game Endings?"Naughty Boy... Naughty Boy..."...

Biometric Security - Crossword 2017-11-18

Biometric Security - Crossword crossword puzzle
Across
  1. The Hough transform can be described as a transformation of a point in the x,y-plane to the _______ space.
  2. Gabor filters satisfy ________ principle.
  3. Second-order gray-level statistics is described by ________matrix.
  4. In a texture the _________ distribution stays the same.
  5. A ________ graph is used in ear localization.
  6. ↓is a _________ operator in Gaussian pyramid.
  7. Gabor filters are the products of a Gaussian filter with _______
  8. In the gaussian filter representation P denotes the phase of ________ carrier.
  9. The number of leaf nodes in a second level graphical representation of Haar Wavelet decomposition.
  10. One of the disadvantages of UNI-MODAL Bio-metric system.
  11. Matching module uses this to distinguish between genuine and imposter range.
Down
  1. DOG (Difference of Gaussian) uses the approximation of _____ of Gaussian.
  2. ______ points are used to calculate the region of interest in Pre-Processing of Palm print verification system.
  3. ROC curve plots _ _ _ against _ _ _.
  4. One of the essential bio-metric characteristics.
  5. In _______ filters the output of one filter is independent of others.
  6. In texture discrimination we divide intensities to ________ ranges.
  7. The preprocessing module first transforms the true color into _____ image.
  8. The Gaussian function (1-D) of the Gabor filter will not affect the edge information in the ________direction.
  9. In texture edge extraction using set of 1-D Gabor filters, the bank of 1-D Gabor filters gives ______ image.

20 Clues: ROC curve plots _ _ _ against _ _ _.Gabor filters satisfy ________ principle.A ________ graph is used in ear localization.↓is a _________ operator in Gaussian pyramid.One of the essential bio-metric characteristics.In a texture the _________ distribution stays the same.One of the disadvantages of UNI-MODAL Bio-metric system....

Security Squares - Simple 2023-08-08

Security Squares - Simple crossword puzzle
Across
  1. Deceptive Text Messages
  2. Trained professional who specializes in IT infrastructure security
  3. Role-Based Access Control
  4. A digital form of payment
  5. A device that provides two-factor for users to prove their identity
  6. The art of protecting networks, devices and data from unauthorized access
  7. The use of a fabricated story to gain someone's trust
  8. National Institute of Standards and Technology
  9. The process of giving a user permission to access resources
  10. A Cybersecurity ----- is an attempt to gain unauthorized access to information
  11. A Cybersecurity -------- is a violation of computer security policies
Down
  1. Also know as MFA
  2. Security that manages digital identities and user access to data and systems
  3. Something you know, something you have, something you are
  4. Sets of documents describing guidelines, standards and best practices
  5. Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
  6. Illegal activity carried out on a digital network
  7. ----- coding, the process of designing code that adheres to best practices and safeguards
  8. The application of policies, technologies and procedures to reduce the overall impact and risk
  9. Voice Phishing

20 Clues: Voice PhishingAlso know as MFADeceptive Text MessagesRole-Based Access ControlA digital form of paymentNational Institute of Standards and TechnologyIllegal activity carried out on a digital networkThe use of a fabricated story to gain someone's trustSomething you know, something you have, something you are...

Security Squares - Advanced 2023-08-11

Security Squares - Advanced crossword puzzle
Across
  1. Software designed to monitor and record network traffic
  2. Specific training aimed at heightening knowledge within an organization
  3. Fake jobs, fake lottery, fake money scams are all examples
  4. Sizzle, Pork and MMM... or Junk E-mail
  5. The fraudulent practice of sending emails ostensibly to induce others to reveal confidential information
  6. What Spiderman spins during the night
  7. When an attacker sends an email to the CEO pretending to be a client
  8. A crime in which someone uses PII data to impersonate someone else
  9. One spider, one ant, or one cricket
  10. When you entice the fish with a worm
  11. A malicious application or script that can be used to take advantage of a computer's vulnerability
  12. Phishing with text
Down
  1. A "goodguy" cap
  2. The process of creating, communicating and maintaining policies and procedures within an organization
  3. Images and videos that appear real but are not
  4. When an authorized internal user poses a danger to an organization because they have authorized access to inside information
  5. A fix for a specific issue that is an emergency
  6. A blue monster who is obsessed with eating as many as possible of these
  7. An extreme coughing fit
  8. Often causes road rage

20 Clues: A "goodguy" capPhishing with textOften causes road rageAn extreme coughing fitOne spider, one ant, or one cricketWhen you entice the fish with a wormWhat Spiderman spins during the nightSizzle, Pork and MMM... or Junk E-mailImages and videos that appear real but are notA fix for a specific issue that is an emergency...

Aviation safety & security 2023-11-15

Aviation safety & security crossword puzzle
Across
  1. another term for passenger.
  2. travelling by air.
  3. only flight ticket holders can access this area.
  4. the letter d in the phonetic alphabet
  5. the letter h in the phonetic alphabet
  6. sheltered walkway onto the plane or terminal.
  7. something you need to travel internationally.
  8. where the checked luggage is stored.
  9. shortened down three letter words of an airport.
  10. you go through here after you land in a different country.
Down
  1. getting on the plane.
  2. general public area in the airport.
  3. some countries require you to have this to enter their country.
  4. travelling overseas.
  5. where your items are stored when travelling, you check this in.
  6. a child travelling alone.
  7. where aircrafts usually park.
  8. the term used for people needing extra assistance.
  9. when you travel within your country of origin.
  10. getting off the plane.

20 Clues: travelling by air.travelling overseas.getting on the plane.getting off the plane.a child travelling alone.another term for passenger.where aircrafts usually park.general public area in the airport.where the checked luggage is stored.the letter d in the phonetic alphabetthe letter h in the phonetic alphabet...

Information Security Crossword 2023-11-15

Information Security Crossword crossword puzzle
Across
  1. Malicious software that demands a ransom. (First Letter R, Last Letter E)
  2. This cloud-based platform acts as a guardian, inspecting and securing your internet traffic regardless of your location. What is the name of this protective service? (First Letter Z, Last Letter R)
  3. Practice of ensuring that information is disclosed only to authorized individuals. (First Letter C, Last Letter Y)
  4. This software serves as a secure vault for your digital keys. It not only stores passwords but also helps generate complex ones. What am I? (First Letter K, Last Letter S)
  5. In access control systems, this security feature prevents a person from using the same access card or credential to enter an area twice in quick succession. What is this measure known as? (First Letter A, Last Letter K)
  6. A secure, digital quarantine zone where suspicious files are brought for observation and testing, shielding your system from potential threats. (First Letter S, Last Letter X)
  7. This proactive evaluation method involves simulated attacks on computer systems or networks to assess vulnerabilities and weaknesses. (First Letter P, Last Letter G)
  8. This term refers to a software vulnerability that is exploited by hackers before the developers even know about it. (First Letter Z, Last Letter Y)
  9. This document serves as a comprehensive list detailing identified risks, their potential impacts, and planned responses. (First Letter R, Last Letter R)
  10. Acts as a barrier against unauthorized access in a network. (First Letter F, Last Letter L)
  11. Information falling into this classification is sensitive and requires a higher level of protection. Access is typically limited to authorized personnel. (First Letter R, Last Letter D)
  12. A deceptive practice where cybercriminals use fraudulent emails or websites to trick individuals into revealing sensitive information such as passwords or credit card numbers. (First Letter P, Last Letter G)
  13. This policy ensures that sensitive information is promptly removed from screens to prevent unauthorized viewing, helping maintain a secure and confidential workspace. (First Letter C, Last Letter N)
  14. This tactic relies on exploiting human psychology rather than technical vulnerabilities. What's the term for tricking individuals into divulging confidential information or performing actions they normally wouldn't? (First Letter S, Last Letter G)
Down
  1. This sneaky practice involves someone secretly observing your screen or keyboard to gain unauthorized access to sensitive information. (First Letter S, Last Letter G)
  2. Often referred to as the first line of defense, this alphanumeric key guards your digital identity. Choosing a strong and unique one is crucial for keeping your accounts secure. What is this critical piece of information? (First Letter P, Last Letter D)
  3. Name of an antivirus for securing endpoints. (First Letter C, Last Letter E)
  4. A technique where attackers try various combinations of passwords to gain unauthorized access. (First Letter B, Last Letter E)
  5. This security principle advocates for providing individuals or systems with only the minimum levels of access or permissions needed to perform their tasks. (First Letter L, Last Letter E)
  6. this social engineering technique involves sending deceptive text messages to trick individuals into divulging sensitive information. (First Letter S, Last Letter G)
  7. Overloading a network to make it unavailable. (First Letter D, Last Letter S)
  8. This deceptive trap lures in potential attackers, helping security professionals study their tactics and protect against real threats. What is this virtual decoy called? (First Letter H, Last Letter T)
  9. Type of malware disguising as legitimate software. (First Letter T, Last Letter E)
  10. Your unique physical or behavioral traits are your key to access. Whether it's your fingerprint, face, or even your voice, what authentication method relies on these distinct features? (First Letter B, Last Letter S)
  11. This essential cybersecurity practice involves updating and fixing vulnerabilities in software to ensure that systems are protected against known threats. (First Letter P, Last Letter G)
  12. This unauthorized entry technique involves someone closely following an authorized person to gain access to a secure area without proper authentication. (First Letter T, Last Letter G)
  13. Ensures secure communication over a computer network. (Last Letter N)
  14. When it comes to securely disposing of sensitive documents, this process involves reducing paper into tiny, unreadable pieces. (First Letter S, Last Letter G)
  15. This policy encourages a tidy and secure workspace by requiring employees to clear their desks of sensitive or confidential information when they are away. (First Letter C, Last Letter K)
  16. Method of verifying the integrity and authenticity of a message or software. (First Letter H, Last Letter G)

30 Clues: Ensures secure communication over a computer network. (Last Letter N)Malicious software that demands a ransom. (First Letter R, Last Letter E)Name of an antivirus for securing endpoints. (First Letter C, Last Letter E)Overloading a network to make it unavailable. (First Letter D, Last Letter S)...

Basic Virtual Security 2023-09-07

Basic Virtual Security crossword puzzle
Across
  1. an intermediary device that blocks unauthorized access to your network
  2. when a third party alters the communication between two sides
  3. form of attack that looks secure but is not
  4. Encoding something so certain people may be able to view it
  5. a copy of data stored away so it can be recovered if the original is damaged
  6. program which will help protect your customer's privacy
  7. a university connector
  8. when scammers send out a message with a company's email address
  9. Passcode to prove you are allowed access
Down
  1. asks for payment in return for solving the problem
  2. gaining sensitive information by looking over the target's shoulder
  3. Volatile memory
  4. attacking through a program or equipment thrown in the trash
  5. a method of resolving a problem
  6. Sign in once to get various service
  7. This program allows your network to be private
  8. an intermediary device that directs traffic
  9. is a key used to pass
  10. Frequent changes downloaded to keep your device secure from adaptive malware
  11. surpasses 100% voltage for a brief moment

20 Clues: Volatile memoryis a key used to passa university connectora method of resolving a problemSign in once to get various servicePasscode to prove you are allowed accesssurpasses 100% voltage for a brief momentform of attack that looks secure but is notan intermediary device that directs trafficThis program allows your network to be private...

Aviation and Security 2024-06-13

Aviation and Security crossword puzzle
Across
  1. What flying class lets you take up to 7kg carry on
  2. An are, usually adjacent to a terminal, where aircraft park.
  3. What color is the standard passport in NZ
  4. What is the IATA code for Auckland
  5. This type of visa is a travel document allowing you to pass through another country
  6. What letter is G in the phonetic alphabet
  7. What color is the official passport in NZ
  8. The side of the airport where anyone can go
  9. These are the ideal solution for evacuating passengers from aircraft quickly and safely.
  10. The side of the airport where only passengers can go
  11. What letter is N in the phonetic alphabet
Down
  1. What is E in the phonetic alphabet
  2. The cargo and luggage compartment of the plane
  3. A covered walkway which allows passengers protected access to the aircraft
  4. These are vehicles with moveable belts for unloading and loading baggage off aircraft.
  5. What flying class lets you take up to 10kg carry on
  6. What letter is T in the phonetic alphabet
  7. This type of visa lets people stay up to 6 months without working
  8. What is W in the phonetic alphabet
  9. What color is the diplomatic passport in NZ

20 Clues: What is E in the phonetic alphabetWhat is the IATA code for AucklandWhat is W in the phonetic alphabetWhat color is the standard passport in NZWhat letter is T in the phonetic alphabetWhat letter is G in the phonetic alphabetWhat color is the official passport in NZWhat letter is N in the phonetic alphabetThe side of the airport where anyone can go...

Security Crossword Puzzle 2025-01-03

Security Crossword Puzzle crossword puzzle
Across
  1. the name of the app store on iOS devices
  2. how to open an app on a mobile device
  3. when someone connects to your to your device without your knowledge
  4. mobile devices are much easier to ________ than desktop devices, so it's important to secure the device
  5. the acronym for the protocol used to download emails
  6. press your finger to the screen and then brush it in a direction
  7. used to enable two Bluetooth devices to communicate
  8. a technology that works great for short-range connectivity with devices like mice and keyboards
  9. the name of the app store on Android devices
  10. you pay for a certain amount of ________ each month, and if you go over that amount, you will be charged extra
  11. the type of cable used to charge mobile devices
Down
  1. this feature lets you interact with a mobile device
  2. to understand how mobile devices work, you need to know a bit about hardware, operating systems and?
  3. enabling this mode on a mobile device disconnects ir from all connections
  4. this feature helps you change screen orientation from portrait to landscape
  5. used to type on the screen of a mobile device
  6. instead of using a passcode, you can be authenticated with your __________ or thumbprint
  7. the acronym for the protocol used to send email
  8. networks with a __________ icon next to them are secured and require a password to join
  9. the correct information needed to access and use a mobile or computer device
  10. you need to be familiar with 3 of these to be able to set up certain types of email accounts

21 Clues: how to open an app on a mobile devicethe name of the app store on iOS devicesthe name of the app store on Android devicesused to type on the screen of a mobile devicethe acronym for the protocol used to send emailthe type of cable used to charge mobile devicesthis feature lets you interact with a mobile device...

Social Security squares 2025-01-28

Social Security squares crossword puzzle
Across
  1. A law passed by a legislative body
  2. Assistance given to someone in difficulty
  3. Activity involving mental or physical effort
  4. President Roosevelt's program to combat the Great Depression
  5. Advantages or profits gained from a program
  6. Regular payments made to people after retirement
  7. Worthiness of respect
  8. New Deal program employing young men to work on conservation projects
  9. New Deal program providing work relief through public work projects
  10. New Deal program providing direct financial aid to states
  11. Relating to society or its organization
Down
  1. Period of life after leaving full-time employment
  2. Insures bank deposits, protecting people's savings
  3. President during the Great Depression and New Deal
  4. Paid employment
  5. Protection against a possible loss or damage
  6. Help or support
  7. State of being extremely poor
  8. People who are old or in the later part of life
  9. Financial safety net provided by the New Deal

20 Clues: Paid employmentHelp or supportWorthiness of respectState of being extremely poorA law passed by a legislative bodyRelating to society or its organizationAssistance given to someone in difficultyAdvantages or profits gained from a programActivity involving mental or physical effortProtection against a possible loss or damage...

SAFETY AND SECURITY 2025-07-10

SAFETY AND SECURITY crossword puzzle
Across
  1. What rule limits liquids in carry on?
  2. What security tool detects metal on passengers?
  3. Where can family and friends wait to pick you up?
  4. Where do you go through security screening?
  5. What must passengers show at boarding?
  6. What vehicle moves aircraft backwards from the gate?
  7. What clearance is required before entering secure zones?
  8. What part of the airport coordinates safety on runway?
  9. What are you asked to remove at the checkpoint?
  10. What officer checks for prohibited foods or plants?
  11. What is checked at customs?
Down
  1. What area do only passengers with boarding passes enter?
  2. What must be locked for taxi, take off and landing?
  3. What must be turned off when take off and landing?
  4. Who gives passengers safety instructions on board?
  5. What area allows passengers to drop off bags?
  6. What connects the terminal to the aircraft for boarding?
  7. What must be declared at customs?
  8. What process scans your baggage for dangerous items?
  9. What’s required to board an international flight?

20 Clues: What is checked at customs?What must be declared at customs?What rule limits liquids in carry on?What must passengers show at boarding?Where do you go through security screening?What area allows passengers to drop off bags?What security tool detects metal on passengers?What are you asked to remove at the checkpoint?...

OSHA, HIPAA & Security 2025-09-29

OSHA, HIPAA & Security crossword puzzle
Across
  1. every patient must have a _____ ID
  2. must not be shared
  3. all ___ with PHI must be locked or shredded
  4. how to respond in the event of a fire
  5. autoclave is tested ______
  6. _______ plan should be known
  7. the color of biohazard
  8. Keeping records safe
  9. patients may _____ use of PHI
  10. all ____ with PHI must be secured
  11. may not be in areas with PHI
Down
  1. always log off of when stepping away
  2. how to use a fire extinguisher
  3. never plug a ____ device into a work computer
  4. Globally ________ System
  5. _______ & sharps injuries reported immediately
  6. occupational _____ & health administration
  7. employees may not access _____ records
  8. ______ to Know Station
  9. health insurance ____ & accountability act
  10. look up patient by _______
  11. _________ necessary PHI
  12. must be labeled with contents and hazards
  13. always verify _____ identifiers
  14. items to be ______ inches below ceiling
  15. ____ binders contain information on hazardous material

26 Clues: must not be sharedKeeping records safethe color of biohazard______ to Know Station_________ necessary PHIGlobally ________ Systemautoclave is tested ______look up patient by ______________ plan should be knownmay not be in areas with PHIpatients may _____ use of PHIhow to use a fire extinguisheralways verify _____ identifiers...

Security Level 3 2025-10-19

Security Level 3 crossword puzzle
Across
  1. Crime involving illegal arms
  2. Scientific analysis of crime evidence
  3. Physical attack
  4. Formal accusation issued by a grand jury
  5. Organized criminal activity
  6. Illicit transport of goods
  7. Theft involving force or intimidation
  8. Lawyer for the accused
  9. Person who helps commit a crime
  10. White-collar crime involving financial deceit
  11. Entering a building to commit theft
Down
  1. Illegal drug-related crime
  2. Abuse of vulnerable individuals
  3. Interfering with legal proceedings or investigations
  4. Taking hostages
  5. Deception for personal gain
  6. Crime involving intentional fire-setting
  7. Falsifying documents
  8. Crime scene analyst
  9. Hidden observation of suspects
  10. Lying under oath
  11. Illegal stock market manipulation
  12. Offering illicit incentives
  13. Interference with justice
  14. Harassment or obsessive following
  15. Crime committed via computer or internet
  16. Stealing someone’s identity
  17. Unlawful killing

28 Clues: Physical attackTaking hostagesLying under oathUnlawful killingCrime scene analystFalsifying documentsLawyer for the accusedInterference with justiceIllegal drug-related crimeIllicit transport of goodsDeception for personal gainOrganized criminal activityOffering illicit incentivesStealing someone’s identityCrime involving illegal arms...

Digital Security Risks 2025-01-22

Digital Security Risks crossword puzzle
Across
  1. spies on the activity of a computer without your knowledge
  2. an assault whose purpose is to disrupt computer access to an internet service, such as the web or email
  3. program designed to gain access to the "root" of a computer system
  4. programs that install themselves on your computer without your knowledge or consent and deliberately alter the computer's operations
  5. a website that uses encryption techniques to secure its data
  6. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  7. software that delivers ads, mainly in a banner or pop-ups, to your desktop
  8. online or internet-based illegal acts
  9. a private combination of characters associated with a user name that allows access to certain resources
  10. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
  11. someone who accesses a computer or network illegally
  12. type of hacker whose goal is to exploit the data and do harm
  13. a compromised device whose owner is unaware the device is being controlled remotely by an outsider
  14. program that can reproduce itself and spread from computer to computer through a file attachment
  15. crime any illegal act involving the use of a computer or related devices
  16. program that replicates itself and infects the entire network
  17. use of passwords to make sure people accessing information are who they claim to be
  18. a notice that guarantees a user or a website is legitimate
  19. type of hacker who works to find the security breaches to improved security
  20. someone who uses the internet or network to destroy or damage computers for political reasons
Down
  1. can be used to learn passwords, account numbers, etc
  2. someone who demands payment to stop an attack on an organization’s technology
  3. has the same intent as a cracker but does not have the technical skills and knowledge
  4. log on name, or sign in name
  5. hardware and/or software that protects a network’s resources from intrusion by users on another network
  6. decoding and reading encrypted data
  7. an attack whose goal ranges from disabling a government’s computer network to crippling a country
  8. any event or action that could cause a loss of or damage to a computer
  9. someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions
  10. a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  11. the destructive event or prank
  12. a program that performs a repetitive task on a network
  13. hides within a computer and looks like a legitimate program
  14. a numeric password, either assigned by a company or selected by a user
  15. practice of using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
  16. program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money

36 Clues: log on name, or sign in namethe destructive event or prankdecoding and reading encrypted dataonline or internet-based illegal actscan be used to learn passwords, account numbers, etcsomeone who accesses a computer or network illegallya program that performs a repetitive task on a networkspies on the activity of a computer without your knowledge...

Types Of Threats 2019-01-09

Types Of Threats crossword puzzle
Across
  1. attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  2. Software that encrypts programs and data until a ransom is paid to remove it
  3. A type of Malware that locates and saves data from users without them knowing about it
  4. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  5. Criminals make a promise of goods in return for details, such as offering a free music download
  6. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
  7. Malware that allows a cyber-security attacker to take control of an infected computer
Down
  1. Advertising-supported Software
  2. When someone deceives by pretending to be someone else in order to get personal data
  3. A destructive computer program that bores its way through a computer's files or through a computer's network
  4. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  5. Unauthorized access, modification, or use of an electronic device or some element of a computer system
  6. An error in a program that prevents the program from running as expected
  7. Collection of captured bot computers
  8. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

15 Clues: Advertising-supported SoftwareCollection of captured bot computersAn error in a program that prevents the program from running as expectedSoftware that encrypts programs and data until a ransom is paid to remove itWhen someone deceives by pretending to be someone else in order to get personal data...