cyber security Crossword Puzzles
Sociology of deviant behaviour 2023-10-19
Across
- division of labour
- a behaviour stray from accepted norms
- a public order crime
- home a place for temporarily observing juvenile delinquents
- slaves committing suicide
- another word for anomie
Down
- dry state
- suicide due to lack of integration
- means become goals
- cyber crime
- Prohibitipon of alcohol in Rajasthan
- Mahila Anathalaya
12 Clues: dry state • cyber crime • Mahila Anathalaya • means become goals • division of labour • a public order crime • another word for anomie • slaves committing suicide • suicide due to lack of integration • Prohibitipon of alcohol in Rajasthan • a behaviour stray from accepted norms • home a place for temporarily observing juvenile delinquents
Cyber test 2014-03-28
8 Clues: Currency • Much feared • Don't like China • Ironically targeted • Regular bedtime read • Threat x vulnerablity • Unidentifiable hackers • Best place for cyber advice
Ap human Natalie Yanez p5 2023-05-12
15 Clues: theory • Region • Family • and Burn • Geography • Settlement • and Metacity • and Quantitive • Fertility Rate • In Time Delivery • and Intraregional • and Subsequent Boundaries • Branch and Language Group • security and Food Security • Domestic Product and Gross National Product
Safety Week Crossword Puzzle. 2023-05-04
Across
- Safety Objective #1: We will protect our People by reducing Employee “______”.
- The Mission Statement of the Safety and Security Department is to (3/4) …”and “______” deals with these issues before they become…”
- The Mission Statement of the Safety and Security Department is to (2/4) “that “______” risks to the operation and workplace……”
- All Southwest Employees are responsible for reading and being familiar with the Safety & Security Commitment and Safety “______”
- Safety can never be sacrificed to achieve our other “______” pillars.
- At the top of our Operational Philosophy sits “______”, and rightly so, as it’s our top priority at Southwest Airlines.
Down
- Safety “______” is the component of our SMS (Safety Management System) that includes training, communication, and other actions that create a positive safety culture within all levels of the Company.
- Safety “______” is the component of our SMS (Safety Management System) that evaluates the continued effectiveness of risk controls and supports the identification of new hazards.
- The Mission Statement of the Safety and Security Department is to (4/4) “…injuries, accidents or “______”.”
- Safety “______” Management is the component of our SMS (Safety Management System) that determines the need for and adequacy of new or revised risk controls based on the assessment of acceptable risk.
- The Mission Statement of the Safety and Security Department (1/4) is to “_______”and support a Safety and Security Culture….”
- Safety “______” is the component of our SMS (Safety Management System) that establishes our commitment to continually improve safety and defines the methods, processes, and organizational structure needed to meet our Company’s safety goals.
- Personal protective equipment, commonly referred to as “______”, is equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses.
- Safety Objective #3: We will reduce operational Safety “______”.
- Safety Objective #2: We will reduce aircraft “______” in our operation.
- Safety Objective #4: We will reduce Security “______” Violations.
16 Clues: Safety Objective #3: We will reduce operational Safety “______”. • Safety Objective #4: We will reduce Security “______” Violations. • Safety can never be sacrificed to achieve our other “______” pillars. • Safety Objective #2: We will reduce aircraft “______” in our operation. • Safety Objective #1: We will protect our People by reducing Employee “______”. • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
TTS Informatika Nizhar 2024-09-12
10 Clues: Visual • Dunia siber • Lebih lanjut • Informatika mencakup • Cyber physical system • Bahasa inggris informatika • Poin profil pelajar pancasila • Pilar dalam berpikir komputasional • Bidang-bidang pengetahuan informatika • Infografis yang cocok untuk menjelaskan topik pembahasan secara poin per poin
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
cyber 2023-09-28
Across
- Combines technique from question 1 and , but engages the target through SMS/text messages.
- Is a social engineering technique in which an attacker sends fraudulent emails, claiming to be from a reputable and trusted source.
- Be care full with what personal information you share in your online presence or risk falling victim to ___, where an attacker uses that information to create a compelling, targeted attack.
Down
- If you get ___ request from your friends, they could potentially be social engineers attacks.
- When an attacker offers a free music download or gift card in an attempt to trick the user into providing credentials, that's ____.
- Social engineers typically use fear and ____ to trick users into committing risky actions.
- Not all social engineering attacks take place online such as in vishing where the attacker attempts to trick a victim into disclosing sensitive information or granting access to the target's computer over the---.
7 Clues: Combines technique from question 1 and , but engages the target through SMS/text messages. • Social engineers typically use fear and ____ to trick users into committing risky actions. • If you get ___ request from your friends, they could potentially be social engineers attacks. • ...
Relations toxiques 2 2025-10-24
Across
- HARCÈLEMENT Harcèlement en ligne
- Acte violent ou illégal
- Faire peur ou menacer quelqu’un
- Mauvais traitement ou exploitation
- Rendre quelqu’un honteux
- Quelqu’un qui viole les règles
- Désaccord ou dispute
- Contrôle strict ou excessif
Down
- Forcer quelqu’un à faire quelque chose
- Personne qui subit un dommage
- Influencer quelqu’un pour son intérêt
- Traiter quelqu’un différemment et injustement
- Parole blessante
- Comportement répété et nuisible
- Influence forte pour faire agir quelqu’un
15 Clues: Parole blessante • Désaccord ou dispute • Acte violent ou illégal • Rendre quelqu’un honteux • Contrôle strict ou excessif • Personne qui subit un dommage • Quelqu’un qui viole les règles • Faire peur ou menacer quelqu’un • Comportement répété et nuisible • HARCÈLEMENT Harcèlement en ligne • Mauvais traitement ou exploitation • Influencer quelqu’un pour son intérêt • ...
SIEM Managed Security and Threat 2014-02-03
Across
- an SIEM gathers Information and presents it in ______ ?
- SOC Location in Europe ?
- Security _____ & xxxxx Management ?
- Security xxxxx & _____ Management ?
- LME stands for Log ______ Enterprise ?
- an LME SIEM generates ______ to alert customer of security incidents ?
- What company received a Frost & Sullivan award for growth ?
- What does an SIEM gather to analyse ?
Down
- SOC Location in Mid USA ?
- _____ Protection System ?
- SOC Location in Asia ?
- Managed SWG protects customers when _______ the web ?
- What device sends SIEM logs showing user connects to the internet
- Managed WAF protects customer ________ on web servers ?
- What does the Managed IVS or EVS Service Scan for ?
- Managed NAC is xxxxxx xxxxxx ______ ?
- SOC Location in Windy City, USA ?
- Who reviews the logs in the SOC ?
18 Clues: SOC Location in Asia ? • SOC Location in Europe ? • SOC Location in Mid USA ? • _____ Protection System ? • SOC Location in Windy City, USA ? • Who reviews the logs in the SOC ? • Security _____ & xxxxx Management ? • Security xxxxx & _____ Management ? • Managed NAC is xxxxxx xxxxxx ______ ? • What does an SIEM gather to analyse ? • LME stands for Log ______ Enterprise ? • ...
Code CrossWord 2016-02-08
Across
- to identify or remove errors
- a logic gate
- a command
- health and wellness physical and psychological well-being in a digital technology world
- a virus on a computer
- a programming
- getting mail from a computer
Down
- a file of information
- a error
- when you dont receive messages from that person
- communication electronic exchange of information
- literacy process of teaching and learning and using technology
- a system
- bully a bully over online
14 Clues: a error • a system • a command • a logic gate • a programming • a file of information • a virus on a computer • bully a bully over online • to identify or remove errors • getting mail from a computer • when you dont receive messages from that person • communication electronic exchange of information • literacy process of teaching and learning and using technology • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
Cyber-wellness Crossword Puzzle 2013-06-06
Across
- Save the ________ using screenshots when you were being cyber bullied.
- You should be ______________ for your words and action online because it can hurt others feelings.
- Do not post things that will _______ others feeling.
Down
- Gamming ___________ is when you can’t control yourself to stop playing that game.
- ______ bullying is using the computer or phone on online social media to say hurtful things to someone or to spread rumors
- You should have proper __________ when on the internet.
- Do not interfere other people’s quarrel as you can become another ________.
- Do not send _________ message or emails to unknown people as it could be spamming.
- You should not _________ or reply to strangers because they can ask you further private information.
- You should report the _________ to your parents or teachers.
10 Clues: Do not post things that will _______ others feeling. • You should have proper __________ when on the internet. • You should report the _________ to your parents or teachers. • Save the ________ using screenshots when you were being cyber bullied. • Do not interfere other people’s quarrel as you can become another ________. • ...
Camouflaged text 2023-08-01
Across
- uicydata;104.18.12.126
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
Down
- Powerful intercepting proxy and web vulnerability scanner.
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- A remote code execution flaw in Nginx web server.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
Stock market 2024-10-21
Across
- A measure of stock price
- A professional who buys and sells security for claints
- trading A type of investment strategy involved burying and selling options
- order A type of order to sell the security at best available price
- price the price at which a security is currently trading
- A financial instrument representing ownership in company
Down
- order A type of order to buy or sell
- A market where security are bought and sold
- and hold A type of investment strategy that involves holding security for long period of time
- A measure of company profitability
- A sudden and significant drop in market
11 Clues: A measure of stock price • A measure of company profitability • order A type of order to buy or sell • A sudden and significant drop in market • A market where security are bought and sold • A professional who buys and sells security for claints • A financial instrument representing ownership in company • price the price at which a security is currently trading • ...
Cybersecurity 2023-01-26
Across
- steals information though a link
- keeps intruders out
- changes IP to look legitimate
- helps provent cyber attacks
- takes data for money
- looks safe but isn’t
- Malware that can reproduce itself
- checks vulnerabilities in a system
- manipulates human error
- someone successfully got in
Down
- identifying a user’s identity.
- malicious software or infected data
- a network of infected computers
- malware used to spy
- manipulating someone's mouse
- A series 15 numbers
- private encrypted network
- protects information from hackers
- locks up a website with requests
19 Clues: keeps intruders out • malware used to spy • A series 15 numbers • takes data for money • looks safe but isn’t • manipulates human error • private encrypted network • helps provent cyber attacks • someone successfully got in • manipulating someone's mouse • changes IP to look legitimate • identifying a user’s identity. • a network of infected computers • steals information though a link • ...
the great depression crossword chase little 2023-05-23
Across
- started to form in the skies 1930
- dry dirt in the skies
- the day the stock market crashed
- the crop prices plummeted
- traded 16 mil shares in 1930s
- protected people's economic status.
Down
- a lot of unemployed people
- dust cover the skies causing debris every where
- social security singed by?
- half of them failed
- gave people security for there econimic statuse
- socail security was caused by
- spiraled to the great depression
- messed up farm lands
- it is the dust bowl
- spiralled down in the great depression
16 Clues: half of them failed • it is the dust bowl • messed up farm lands • dry dirt in the skies • the crop prices plummeted • a lot of unemployed people • social security singed by? • socail security was caused by • traded 16 mil shares in 1930s • the day the stock market crashed • spiraled to the great depression • started to form in the skies 1930 • protected people's economic status. • ...
Explore the Refreshed ascendlearning.com 2023-09-01
Across
- Ascend inclusion learning program
- Ascend Learning value
- Ascend Learning solution
- Ascend Learning healthcare brand
- Leawood office
- Ascend Learning value
- healthcare vertical
- Burlington community outreach group
- CHRO
- Safety & Security brand
- CFO
- Company that recognized Ascend as a Great Workplace for Diversity
Down
- executive VP of corporate development
- Ascend Learning tagline
- CTO
- Fitness and Wellness brand
- CEO
- president of safety and security and international
- general counsel
- president of healthcare
20 Clues: CTO • CEO • CFO • CHRO • Leawood office • general counsel • healthcare vertical • Ascend Learning value • Ascend Learning value • Ascend Learning tagline • president of healthcare • Safety & Security brand • Ascend Learning solution • Fitness and Wellness brand • Ascend Learning healthcare brand • Ascend inclusion learning program • Burlington community outreach group • ...
Executive Departments 2022-02-10
Across
- to enhance the health and well-being of all Americans
- assists U.S. communities in providing fair and equal housing
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security
- responsible for formulating and recommending domestic and international financial, economic, and tax policy
- oversees the management and distribution of the federal budget for education initiatives
- to enforce the law and defend the interests of the United States according to the law
- foster, promote, and develop the welfare of the wage earners
- to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions
- promotes job creation and economic growth by ensuring fair trade
Down
- responsible for planning and coordinating federal transportation projects
- to enforce the law and defend the interests of the United States according to the law
- the principal defense policymaker and adviser
- in charge of coordinating agricultural research, extension and teaching activity
- advises the president and leads the nation in foreign policy issues
- responsible for administering veteran benefits, memorials/cemeteries, and health care
15 Clues: the principal defense policymaker and adviser • to enhance the health and well-being of all Americans • assists U.S. communities in providing fair and equal housing • foster, promote, and develop the welfare of the wage earners • promotes job creation and economic growth by ensuring fair trade • advises the president and leads the nation in foreign policy issues • ...
HIPAA Crosswords 2023-08-17
Across
- Imposing penalties for HIPAA violations to ensure compliance.
- Healthcare providers, health plans, or clearinghouses subject to HIPAA.
- Central concept of HIPAA that protects individuals' health information.
- Sensitive patient data covered by HIPAA.
- Third parties that handle PHI on behalf of covered entities.
- Record of electronic PHI access to track potential security breaches.
- Permission required to disclose PHI for purposes not covered by HIPAA.
Down
- Assessing security vulnerabilities to prevent data breaches.
- HIPAA component focused on protecting electronic health information.
- Process of removing identifying information from health data.
- Requirement to inform affected individuals in case of a security breach.
- Principle of limiting PHI access to what's required for a specific purpose.
- Adhering to HIPAA regulations to ensure patient data security.
- Patient's agreement for certain uses and disclosures of their PHI.
- Department responsible for enforcing HIPAA regulations.
15 Clues: Sensitive patient data covered by HIPAA. • Department responsible for enforcing HIPAA regulations. • Assessing security vulnerabilities to prevent data breaches. • Third parties that handle PHI on behalf of covered entities. • Imposing penalties for HIPAA violations to ensure compliance. • Process of removing identifying information from health data. • ...
victor/bulling 2020-11-30
Across
- disclosing someones secrets
- spreading lies
- the person who stands up to a bully
- stalking repeating harassment
- trying to get rid of someone
- the person who has been bullied
- helping the bullied
Down
- not helping the bullied
- pretending to be someone else
- a mean person
- repeating online bulling
- tricking someone to give you personal info
- online arguments
- someone who repeats it
14 Clues: a mean person • spreading lies • online arguments • helping the bullied • someone who repeats it • not helping the bullied • repeating online bulling • disclosing someones secrets • trying to get rid of someone • pretending to be someone else • stalking repeating harassment • the person who has been bullied • the person who stands up to a bully • ...
Security Threats 2021-07-09
Across
- Takes advantage of a vulnerability in order to access or infect a computer
- software that permits advertisers or hackers to gather sensitive information without your permission
- a form of malware that replicates across the Internet or local networks
- software that denies you access to your files or computer until you pay a ransom
- a form of trap security specialists use to detect hacking attacks or collect malware samples
- malicious computer programs that can spread to other files
Down
- A collection of infected computers that are remotely controlled by a hacker
- malicious software
- unsolicited bulk email
- Files placed on your computer that allow websites to remember details
- reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
- software add-ons designed to fix software bugs
- deceiving recipients into sharing sensitive
13 Clues: malicious software • unsolicited bulk email • deceiving recipients into sharing sensitive • software add-ons designed to fix software bugs • malicious computer programs that can spread to other files • Files placed on your computer that allow websites to remember details • a form of malware that replicates across the Internet or local networks • ...
Branch Security 2021-11-04
Across
- CTR's must always reflect a _______ address
- Team members must never ________ a CTR.
- Opening procedures must never be
- items must remain in plain sight of other person
- opening procedures must be altered
- are responsible for keeping dual custody keys and combos in your possession at all times
- must be alerted for bomb threats, civil unrest, robberies
Down
- all bank locations must mainatin ___ ____ policy
- not accessible to customers
- should not converse with fellow team members or customers after a robbery
- confirm purpose and ID of all _____ that are not known to the branch
- a security technique that uses two team members
- information collected for transactions more than $3000
13 Clues: not accessible to customers • Opening procedures must never be • opening procedures must be altered • Team members must never ________ a CTR. • CTR's must always reflect a _______ address • a security technique that uses two team members • all bank locations must mainatin ___ ____ policy • items must remain in plain sight of other person • ...
Security Crossword 2013-05-01
Across
- Seeing issues before they happen
- not discussing matters outside of the hospital environment
- Take an item without asking the owner
- To be hit
- Trust reporting procedure
Down
- mandatory training for all frontline NHS staff 8&10
- Lock with key
- Communication tool used by security
- when something happens out of the ordinary
- protecting vunarable persons in our care
- To stop issues happening
- When working in an area by yourself
- Makes a sound if an area is breached
13 Clues: To be hit • Lock with key • To stop issues happening • Trust reporting procedure • Seeing issues before they happen • Communication tool used by security • When working in an area by yourself • Makes a sound if an area is breached • Take an item without asking the owner • protecting vunarable persons in our care • when something happens out of the ordinary • ...
Security Principles 2023-07-28
Across
- Security over intangible movable property
- A bond registered over movable property
- A debt backed by an asset as collateral is called a _______ debt
- ____ and _____ cessions require the title of the intangible movable property to be transferred to the cessionary
- Type of security arising out of operation of law
- A bond registered over immovable property
- Type of obligation created by guarantees
Down
- Business ______ is a formal restructuring process available to financially distressed companies
- Most common type of mortgage bond
- Contact us on info@___________.com
- Limited real right of security in a movable asset, created by delivery of the asset
- Fundamental to Pledge
- An asset is attached by the _____ of the High Court
13 Clues: Fundamental to Pledge • Most common type of mortgage bond • Contact us on info@___________.com • A bond registered over movable property • Type of obligation created by guarantees • Security over intangible movable property • A bond registered over immovable property • Type of security arising out of operation of law • An asset is attached by the _____ of the High Court • ...
Information security 2023-08-28
Across
- Short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer.
- Intent of doing harm.
- Gap or weakness which undermines an organization’s security efforts.
- Making sure a person is who they say they are.
- Rights an individual or organization has over information and how it is used.
- Procedure used to determine user privileges or access levels to the system.
Down
- Virus Macros which have been programmed to carry out malicious intent.
- How information is protected.
- Information or data which can be accessed when needed.
- State of being complete or uncorrupted.
- Calculated assessment of potential threats to an organization’s security.
- Network of computers and devices managed as a unit with the same procedures and rules.
- Requirement of being private or secret.
13 Clues: Intent of doing harm. • How information is protected. • State of being complete or uncorrupted. • Requirement of being private or secret. • Making sure a person is who they say they are. • Information or data which can be accessed when needed. • Gap or weakness which undermines an organization’s security efforts. • ...
information security 2023-08-28
Across
- networks of computers and devices managed as a unit with the same procedures and rules.
- intent of doing harm
- rights an individual or organization has over information and how it is used.
- gap or weakness which undermines an organization’s security efforts.
- calculated assessment of potential threats to an organization’s security.
- State of being complete or uncorrupted
- Short for malicious software and covers threats such as viruses, worms, trojans, Horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive info on a computer.
- how information is protected
Down
- making sure a person is who they say they are.
- Information or date which can be accessed when needed.
- procedure used to determine users privilege or access levels to the system.
- requirement of being private or secret
- virus macros which have been programmed to carry out malicious intent
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • State of being complete or uncorrupted • making sure a person is who they say they are. • Information or date which can be accessed when needed. • gap or weakness which undermines an organization’s security efforts. • ...
Food Security 2024-11-28
Across
- The state of having enough food for all people
- The number of servings of fruits and vegetables recommended per day
- A condition in which people do not have enough food to lead a healthy life
- A large area where food is grown
- A type of food that helps build muscles
- A food that is produced using sustainable farming methods
- A system that provides food to people in different regions
Down
- The act of providing food for a specific group or community
- The process of keeping food fresh for longer periods
- A person who works in agriculture
- The practice of growing crops and raising animals for food
- The essential nutrient in fruits and vegetables
- A type of food that provides energy
13 Clues: A large area where food is grown • A person who works in agriculture • A type of food that provides energy • A type of food that helps build muscles • The state of having enough food for all people • The essential nutrient in fruits and vegetables • The process of keeping food fresh for longer periods • A food that is produced using sustainable farming methods • ...
Godzilla 2023-03-01
10 Clues: He lived in • Godzilla was • He was a huge • Godzilla was a • Main character • What stopped the • Godzilla stopped the • He the whole universe • How did it include the • They were stuck in a traffic jam
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
AI Assistant for Observability 2024-03-01
Across
- How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution)
- The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
- What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
- This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution)
4 Clues: This action lets you retrieve answers across any cloud and vast data sets.(Hint: One of Elastic's solution) • What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution) • How can we achieve unified app and infrastructure visibility to proactively resolve issues?(Hint: One of Elastic's solution) • ...
cyber1 2024-03-29
Across
- Science of secure communication.
- Converting data into code.
- Code-breaking secret or tool.
- Related to encryption, secrecy.
- Method for encrypting text.
Down
- Deceptive information stealing tactic.
- Unauthorized computer system intruder.
- Related to computers, internet.
- Artificially generated realistic video (2 words).
- Malicious software spreading infection.
- Malicious software, harmful intent.
- Breaking cryptographic codes, systems.
12 Clues: Converting data into code. • Method for encrypting text. • Code-breaking secret or tool. • Related to computers, internet. • Related to encryption, secrecy. • Science of secure communication. • Malicious software, harmful intent. • Deceptive information stealing tactic. • Unauthorized computer system intruder. • Breaking cryptographic codes, systems. • ...
Camouflaged text 2023-08-01
Across
- Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey
- Shadowy cyber collective widely known because of its work since 02.2022.
- A remote code execution flaw in Nginx web server.
- Powerful intercepting proxy and web vulnerability scanner.
- Infamous hacking syndicate responsible for high-profile cyberattacks, including the 2021 JBS.
- uicydata;104.18.12.126
Down
- .... .... was a prominent, anonymous online marketplace on the dark web known for facilitating illegal transactions and trading in illicit goods.
- The covert cyber operation specifically targeted and disrupted industrial control systems, affecting critical infrastructure such as nuclear facilities and power plants.
- cybersecurity initiative launched by a tech giant, it is named after a number synonymous with 'nothing' and 'empty,' indicating its goal to eliminate software vulnerabilities in popular products and protect users from potential exploits
- Rhysider 44.
10 Clues: Rhysider 44. • uicydata;104.18.12.126 • A remote code execution flaw in Nginx web server. • Powerful intercepting proxy and web vulnerability scanner. • Lbrozz Ignceunywfz Gkwdrz; key - information; Blaise autokey • Shadowy cyber collective widely known because of its work since 02.2022. • ...
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
TTS TOLERANSI DAN EMPATI NISA 2025-03-13
10 Clues: contoh empati • contoh toleransi • Cyber bullying adalah • dampak perundungan digital • pencegahan perundungan digital • apa yang dimaksud dengan empati • apa yang dimaksud dengan toleransi • dampak ekstrem perundungan digital • cara mengatasi perundungan digital • pentingnya toleransi dan empati adalah
IT Quiz_SET-4 2026-01-03
Across
- Operating system example
- Process scheduling unit
- Software testing technique
- Collection of related files
- Software without cost
- Visual representation of an algorithm
Down
- Logical part of the computer
- Error due to wrong syntax
- Web page structure language
- Database management system example
- Cyber attack using fake emails
- Program used to write code
- Key used to reference another table
- Device that converts digital to analog signals
- Network protocol for file transfer
15 Clues: Software without cost • Process scheduling unit • Operating system example • Error due to wrong syntax • Software testing technique • Program used to write code • Web page structure language • Collection of related files • Logical part of the computer • Cyber attack using fake emails • Database management system example • Network protocol for file transfer • ...
Ασφαλή χρήση διαδικτύου 2024-02-12
10 Clues: κακόβουλο λογισμικό • news ψευδείς ειδήσεις • διαδικτυακός εκφοβισμός • scams ηλεκτρονικές απάτες • reputationδιαδικτυακή φήμη • piracy πειρατεία λογισμικού • gaming παιχνίδια στο διαδίκτυο • advertisement στοχευμένες διαφημίσεις • privacy προστασία προσωπικών δεδομένων • positive εικόνα σώματος &κοινωνικά δίκτυα
AI Assistant for Observability 2024-03-02
Across
- How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution)
- The Platform Created by Elastic that enables enterprises to accelerate business outcomes by combining the power of search and AI.
Down
- What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution)
- This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution)
4 Clues: This action lets you retrieve answers across any cloud and vast data sets. (Hint: One of Elastic's solution) • What is required to protect against, investigate, and respond to cyber threats? (Hint: One of Elastic's solution) • How can we achieve unified app and infrastructure visibility to proactively resolve issues? (Hint: One of Elastic's solution) • ...
Cyberspace Article 2024-11-09
8 Clues: AI • Cyber Cognitive • Hispanic Author • Operators of AI • Representing Knowledge • University AI was founded • Prejudice that may impact AI • Working alongside Technology
AIRPORT CODES 2018-10-29
Across
- WELLINGTON AIRPORT CODES
- THE THING YOU GET AFTER CHECK IN
- AUCKLAND AIRPORT CODE
- DUNEDIN AIRPORT
- AUSTRALIAN AIRLINES
- SINGAPORE AIRPORT NAME
- TAURANGA AIRPORT CODES
- SHOPPING FACILITY INSIDE THE AIRPORT
- BAGGAGE TO BE CARRIED INSIDE THE CABIN
- AVIATION SECURITY SERVICE
- CHRISTCHURCH AIRPORT CODES
Down
- INTERNATIONAL ID
- LIVERPOOL AIRPORT NAME
- PILOT'S ROOM
- THE AREA BEFORE DEPARTING PASSENGERS PASS THROUGH SECURITY
- SYDNEY AIRPORT CODE
- COUNTRY WITH THE BUSIEST AIRPORT
- NUMBER OF RUNWAY IN AUCKLAND AIRPORT
- PASSENGER'S BELONGING
- AIR TRAFFIC CONTROL
20 Clues: PILOT'S ROOM • DUNEDIN AIRPORT • INTERNATIONAL ID • SYDNEY AIRPORT CODE • AUSTRALIAN AIRLINES • AIR TRAFFIC CONTROL • AUCKLAND AIRPORT CODE • PASSENGER'S BELONGING • LIVERPOOL AIRPORT NAME • SINGAPORE AIRPORT NAME • TAURANGA AIRPORT CODES • WELLINGTON AIRPORT CODES • AVIATION SECURITY SERVICE • CHRISTCHURCH AIRPORT CODES • THE THING YOU GET AFTER CHECK IN • COUNTRY WITH THE BUSIEST AIRPORT • ...
Security Forces 2025-07-15
Across
- Non-lethal weapon used for close-quarters
- Emergency vehicle response mode.
- Used to restrain suspects.
- An individual actively engaged in killing or attempting to kill.
- Senior SF leader in charge of unit security operations.
Down
- Worn headgear that identifies SF personnel.
- Latin motto meaning “Strong” representing SF spirit.
- Daily pre-duty briefing for Security Forces.
- Elite SF team specializing in aircraft security.
- Someone attempting to unlawfully drive through a base checkpoint.
- Storage location for weapons and gear.
- Random security practices designed to deter threats (acronym).
12 Clues: Used to restrain suspects. • Emergency vehicle response mode. • Storage location for weapons and gear. • Non-lethal weapon used for close-quarters • Worn headgear that identifies SF personnel. • Daily pre-duty briefing for Security Forces. • Elite SF team specializing in aircraft security. • Latin motto meaning “Strong” representing SF spirit. • ...
SDG Goal 16: Peace, Justice and Strong Institutions 2024-11-24
Across
- Process of resolving disputes without violence
- Fair treatment under the law
- Freedom from fear and want
- The opposite of corruption
- A serious crime, usually with violence involved
- Absence of conflict
- International organisation promoting peace and security
Down
- Systems that provide safety and security to citizens
- Government where everyone has a say
- Fundamental freedoms that all people should have
- Taking responsibility for your actions
- Use of power for private gain
- Treating everyone equally, regardless of background
- Working together towards a common goal
14 Clues: Absence of conflict • Freedom from fear and want • The opposite of corruption • Fair treatment under the law • Use of power for private gain • Government where everyone has a say • Taking responsibility for your actions • Working together towards a common goal • Process of resolving disputes without violence • A serious crime, usually with violence involved • ...
cyber 2023-06-20
Across
- : Réglementation européenne sur la protection de données personnelles.
- : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès.
- : Technique utilisant principalement la messagerie électronique, et usurpant l'identité d'un organisme dans le but de tromper l'utilisateur et obtenir des informations sensibles.
- : Acte de malveillance envers des systèmes informatiques, pouvant être classé en 4 catégories : la cybercriminalité, la déstabilisation, l’espionnage, le sabotage.
Down
- : Message électronique non sollicité, à but publicitaire.
- : Logiciel malveillant utiliser par les cybercriminels permettant de bloquer l'accès aux données, par chiffrement, en échange d'une somme d'argent.
- de passe : Permet l’identification et la sécurisation de la connexion de l’utilisateur à un système informatique ou une application.
7 Clues: : Message électronique non sollicité, à but publicitaire. • : Réglementation européenne sur la protection de données personnelles. • : Technique permettant d'encoder des données ou du texte, à l'aide d'une clef, pour en protéger et contrôler l'accès. • ...
Security Crossword 2024-05-19
Across
- a secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-fi
- Should be constructed of uppercase, lowercase letters, numbers, and special characters
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Fraudulent phone calls or voice message purporting to be from reputable companies in order to trick individuals into revealing personnel information
- A type of malware that can collect and transit private user information without the user's knowledge or consent
- The "A" in the CIA triad that ensures authorized users have access
Down
- faking the sending address of a transmission to gain unauthorized access to a secure system
- A type of media manipulation, where bad actors alter an image or video to create a false perception of reality
- A sequence of words or text used to control access to a computer, similar to a password
- A flaw or weakness in a computer system that could be exploited to violate the system's security
- by scanning files and detecting suspicious activity, these programs help protect against cyber attacks that could result in data breaches or stolen information
- Unauthorized access to a network, information systems, or application
12 Clues: The "A" in the CIA triad that ensures authorized users have access • Unauthorized access to a network, information systems, or application • Should be constructed of uppercase, lowercase letters, numbers, and special characters • A sequence of words or text used to control access to a computer, similar to a password • ...
DEX+: Across & Down to Delivery Greatness! 2025-08-19
Across
- Accountable to deliver various products and services to Business within agreed Service Level / Statement of Work under his/her portfolio.
- Accountable for the pre-execution process, i.e. ensuring all service requests are managed promptly from Gate 0 to Gate D.
- One of the common artifacts/deliverables in the Close Delivery process
- The objective of this process is to release the deployed solution to end user upon obtaining Go-Live approval.
- Manage project resources according to the scope, budget and project schedule.
- An official governing working group responsible for reviewing, assessing, discussing project issues and challenges.
- Lead the program throughout the program life cycle and ensure objectives of program are achieved.
Down
- The objective of this process is to plan and manage activities for obtaining Change Advisory Committee (CAC) approval to release solution to production environment
- Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user.
- Accountable to project delivery under his/her portfolio and to endorse closure of projects under his/her portfolio.
- The objective of this process is to pre-identify endorser and approver and develop workplan to prepare for the development of solution proposal.
- Accountable to ensure Cyber Security Business Impact and Legal and Regulatory Assessments (CS BIA & LRA) are performed and updated annually.
12 Clues: One of the common artifacts/deliverables in the Close Delivery process • Manage project resources according to the scope, budget and project schedule. • Assets owned by Business and the beneficiary is respective asset/OPU/HCU/user. • Lead the program throughout the program life cycle and ensure objectives of program are achieved. • ...
Trend Micro Mobile Security 2024-05-06
Across
- Trend Micro Mobile Security is designed to protect ____ and tablets.
- Trend Micro Mobile Security helps protect against ____ attacks. These attacks are deceptive attempts by attackers to trick victims into revealing sensitive information like passwords or financial data by masquerading as a trusted entity.
- Trend Micro Mobile Security protects devices running this Google mobile OS
- Trend Micro Mobile Security is a ____ security solution
- Trend Micro Mobile Security offers ____ browsing protection
Down
- Trend Micro Mobile Security supports this Apple mobile OS
- Trend Micro Mobile Security scans for ____ on mobile devices. (Starts with m)
- Trend Micro Mobile Security helps safeguard user's ____ on mobile devices. (Starts with p)
- Trend Micro Mobile Security has features such as ____ tools. These tools help locate, lock or wipe lost/stolen devices to prevent unauthorized access. (Starts with a)
9 Clues: Trend Micro Mobile Security is a ____ security solution • Trend Micro Mobile Security supports this Apple mobile OS • Trend Micro Mobile Security offers ____ browsing protection • Trend Micro Mobile Security is designed to protect ____ and tablets. • Trend Micro Mobile Security protects devices running this Google mobile OS • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
Cisco 5 2024-09-19
Across
- Cisco's integrated security solution that provides visibility and control across the entire attack continuum
- Cisco's product for secure network connectivity, including remote access
- Cisco's solution for detecting and responding to advanced threats
- Cisco's security management platform that provides insights and automation to efficiently manage security policies and devices
Down
- Cisco's platform for security policy management and orchestration
- Cisco's secure internet gateway in the cloud that provides the first line of defense against threats
- Cisco's product that provides secure access to the network for any user, from any device, at any time, in any location
- Cisco's enterprise firewall product line
- Cisco's security framework designed to provide end-to-end network visibility and segmentation
- Cisco's email security appliance that blocks phishing, spoofing, and malware emails
- Cisco's cloud-based platform that provides advanced malware protection
11 Clues: Cisco's enterprise firewall product line • Cisco's platform for security policy management and orchestration • Cisco's solution for detecting and responding to advanced threats • Cisco's cloud-based platform that provides advanced malware protection • Cisco's product for secure network connectivity, including remote access • ...
computer crimes 2024-11-08
Across
- SOFTWARE Internet based software or programs that are used to disrupt a network
- SOLICITING AND ABUSE Type of cyber crime wherein criminals solicit minors via chat rooms
- VANDALISM Damaging or destroying data rather than stealing
- HORSES malicious program that appears to be friendly, they are not technically viruses.
- Act by the criminal who floods the bandwidth of the victim’s network.
- refers to any crime that involves a computer/ mobile and a network
- type of virus hides on the user’s disk and waits for a specific event to occur before running.
- a program whose purpose is to duplicate itself.
- The least common cybercrime
Down
- This category of cybercrime involves one individual distributing malicious or illegal information online.
- VIRUSES these viruses take up residence in the computer’s memory, making then hard to detect
- VIRUS Type of virus make changes to a disk’s file system
- Means an illegal intrusion into a computer system and/or network
- HAT HACKERS hackers between the good and the bad guys
- STALKING A kind of online harrassment wherein the victim is subjected to a barrage of online messages and emails.
- DISSEMINATION- Malicious software that attches itself to other software.
- PIRACY Theft of software through the illegal copying of genuine products.
- TERRORISM Defined as an act of terrorism committed through the use of cyberspace
- VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT
- HAT HACKERS can be seen as the “good guys”
20 Clues: The least common cybercrime • HAT HACKERS can be seen as the “good guys” • a program whose purpose is to duplicate itself. • HAT HACKERS hackers between the good and the bad guys • VIRUS Type of virus make changes to a disk’s file system • VANDALISM Damaging or destroying data rather than stealing • VIRUSES VIRUS DESIGNED TO INFECT SPECIFIC TYPE OF DOCUMENT • ...
HANDS OFF!! 2025-04-05
13 Clues: VA • NEH • DEI • Parks • Public Ed • Soft Power • ret security • Elder Health • Int'l Students • health security • Do good volunteers • Farm and nutrition • Preschool for the poor
Pan-Domain Operations Crosswords 2021-03-09
Across
- learning associated with AI
- _____, contest, confront, combat
- integration beyond whole-of-government
- domain of zeros and ones
- major division within the military environment
Down
- domain governed by orbital mechanics
- domain of narratives
- under the threshold zone
- speed of operational ______
- matrix of _____
- type of spine
11 Clues: type of spine • matrix of _____ • domain of narratives • under the threshold zone • domain of zeros and ones • learning associated with AI • speed of operational ______ • _____, contest, confront, combat • domain governed by orbital mechanics • integration beyond whole-of-government • major division within the military environment
Sigma Crossword 2016-11-28
Across
- Name the industry leading mindmapping Software
- Quest's industry leading database tool
- Traditionally hung above the fireplace
- Which Flexera product is the only solution for a unified application readiness process for Windows, Mac and Mobile
- Which vendors solutions include Business Security, CloudCare and Managed Workplace
- Data erasure management software
- Whose products run on the Orion platform
- Santa's helpers
- Songs sung at Christmas
- Who is the leading supplier of innovative mobile security products that are Government certified?
Down
- 2015's CRN Specialist Distributor of the year
- Santa's chosen method of transportation
- Company creating dynamic screencapture Software
- Who are Sigma the official EMEA based distributor f or (5,8)
- Charles Dickens' Christmas loathing character
- Simplify the security of an Active Directory with this Quest product
- A sparkly Christmas decoration
- Who is the red nosed reindeer?
- A striped Christmas treat
- A famous snowman
20 Clues: Santa's helpers • A famous snowman • Songs sung at Christmas • A striped Christmas treat • A sparkly Christmas decoration • Who is the red nosed reindeer? • Data erasure management software • Quest's industry leading database tool • Traditionally hung above the fireplace • Santa's chosen method of transportation • Whose products run on the Orion platform • ...
Session 1, Foundations (Day One) 2024-04-26
Across
- Deliver as _.
- _Integration is the single point of accountability for Natl Security missions delivery.
- People + Process = _
- Last name of new Project Integration Group director
- Last name of Sec of Energy
- Triple Constraint + _, the center triangle.
- Three types of projects: Expense, Capital and _.
- An effort with defined start and end points
- Acronym of Lawrence Livermore Nat
- Last name of Under Sec of Nuclear Security
Down
- _, Time and Cost are the triple constraints.
- Name of project management training: _ Project Management
- EVM or Earned Value _.
- Managing and _ (M&O)contractors
- Acronym for Contracting Officer Representative
- Acronym of Los Alamos Nat Lab
- Name of plant located in Amarillo, Texas
- Acronym for Other Project Cost
- Frequency of CNS program planning cycle
- Acronym for Consolidated Nuclear Security
- Acronym for earned value management system
- Last name of Infrastructure portfolio manager
22 Clues: Deliver as _. • People + Process = _ • EVM or Earned Value _. • Last name of Sec of Energy • Acronym of Los Alamos Nat Lab • Acronym for Other Project Cost • Managing and _ (M&O)contractors • Acronym of Lawrence Livermore Nat • Frequency of CNS program planning cycle • Name of plant located in Amarillo, Texas • Acronym for Consolidated Nuclear Security • ...
Cybersecurity Crossword Puzzle 2025-03-14
Across
- Network of hijacked computers
- Manipulating people for access
- Physically isolates a system
- Vulnerability with no fix yet
- Isolates programs for security
- Adds extra login security
- Impersonates a trusted source
- Blocks unauthorized network access
- Fixes security vulnerabilities
- Self-replicates across networks
- Steals active user session
- Takes advantage of a weakness
- Disguised malware for attacks
- Malicious software harming devices
- Tricks users into clicking links
Down
- Hidden entry for unauthorized access
- Secretly monitors user activity
- Secures internet connection
- Tries all password combinations
- Converts data into fixed string
- Unwanted or junk emails
- Attacks databases with queries
- Records keystrokes for theft
- Displays unwanted advertisements
- Encrypts files for payment
- Overwhelms a server with traffic
- Secures data using codes
- Fraudulent attempt to steal data
- Hidden part of the internet
- Hides malware in a system
30 Clues: Unwanted or junk emails • Secures data using codes • Adds extra login security • Hides malware in a system • Encrypts files for payment • Steals active user session • Secures internet connection • Hidden part of the internet • Physically isolates a system • Records keystrokes for theft • Network of hijacked computers • Vulnerability with no fix yet • Impersonates a trusted source • ...
CTF-CW-9 2025-11-17
Across
- Native risk without any safety measures
- Time attackers spend undetected
- Raising a problem to higher-level personnel
- Mathematical technique adding statistical noise to protect individual privacy
- Trust service criteria audit report
- Abbreviation for Confidentiality, Integrity, and Availability
- Rules for managing and protecting data
- Correctly identified security threat
- Red team�s go-to platform for offensive security at Tekion.
- Critical information for encryption and decryption
Down
- Ensuring maximum privacy protection without user action required
- Creating multiple simulated systems on one machine
- Anti-phishing and brand protection platform adopted by Tekion.
- Real-time monitoring tool at Tekion.
- Ethical approach to artificial intelligence development and deployment
- Anything of value owned or used
- The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
- (Duplicate) Procedures for automated or manual response actions
- Gathering data from publicly available sources
- Again, technology for preventing leaks
20 Clues: Time attackers spend undetected • Anything of value owned or used • Trust service criteria audit report • Real-time monitoring tool at Tekion. • Correctly identified security threat • Rules for managing and protecting data • Again, technology for preventing leaks • Native risk without any safety measures • Raising a problem to higher-level personnel • ...
Server 2023-10-30
Across
- Servera nosaukums?
- Servera drošība? Security
- Servera pārlāde?
- Servera datu kopijas?
- Servera atbilde klientam?
- Servera kļūdu žurnāls?
- Servera pārvaldības rīki?
- Servera kapacitāte?
- Servera tīkla adrese?
- Servera datu drošība?
- Servera veiktspēja?
- Servera uzticamība?
- Servera izmitināšana?
- Servera izslēgšana?
- Servera nodrošināšana?
- Servera datu krātuve?
- Servera izglītība?
Down
- Servera atrašanās vieta?
- Servera saskarne?
- Servera atrašanās vieta?
- Servera resursi?
- Servera konfigurācija?
- Servera uzstādīšana?
- Servera izslēgšanas komanda?
- Servera izturība?
- Servera resursu sadale?
- Servera operētājsistēma?
- Servera atjaunināšana?
- Servera pārvaldība?
- Servera pilnveide?
30 Clues: Servera resursi? • Servera pārlāde? • Servera saskarne? • Servera izturība? • Servera nosaukums? • Servera pilnveide? • Servera izglītība? • Servera uzstādīšana? • Servera kapacitāte? • Servera veiktspēja? • Servera pārvaldība? • Servera uzticamība? • Servera izslēgšana? • Servera konfigurācija? • Servera datu kopijas? • Servera tīkla adrese? • Servera datu drošība? • ...
Cybersecurity Terms 2024-07-13
Across
- Secure online service
- AKA UI Redress attack
- Have to pay
- Gain access to sensitive infromation
- Method of scrambling data
- Attempts to steal personal data
- Appears harmless
- Bring your device
- Prevent unauthorized access
Down
- Protect, prevent, remove
- Harmful software designed to damage
- Online harassment
- Protect data during encryption process
- Security in cloud infrastructure
- Interment protocol address
- Network of compromised computers
- A security feature
- Media manipulation
- Type of malware
- Can be particularly dangerous
20 Clues: Have to pay • Type of malware • Appears harmless • Online harassment • Bring your device • A security feature • Media manipulation • Secure online service • AKA UI Redress attack • Protect, prevent, remove • Method of scrambling data • Interment protocol address • Prevent unauthorized access • Can be particularly dangerous • Attempts to steal personal data • Security in cloud infrastructure • ...
Annu's world! 2023-02-23
Across
- Mr Lomas' kannada advice "Dont do .."
- Cake + fruits + juice + sweets + ..
- Not a smash
- Tortoise's coat
- That 834 am activity
- 30 min of this time means 60 min .. He he he
Down
- Colorful bday gift
- Hindustani Gaga
- Avidin's processor
- My favorite brand err fruit
- old school cyber people
- "Not at 530 am please!"
- is always his policy
13 Clues: Not a smash • Hindustani Gaga • Tortoise's coat • Colorful bday gift • Avidin's processor • That 834 am activity • is always his policy • old school cyber people • "Not at 530 am please!" • My favorite brand err fruit • Cake + fruits + juice + sweets + .. • Mr Lomas' kannada advice "Dont do .." • 30 min of this time means 60 min .. He he he
Internet 2024-10-15
Across
- krađa identiteta, krađa lozinki ili lažno predstavljanje
- Slanje agresivnih poruka
- programi koji mogu ugroziti računalo
- Društvena mreža
- TCP-IP
- Slijed koraka u programiranju
Down
- online nasilje
- prevara koja korisnika navodi na otkrivanje korisničkog imena i lozinke
- nasilan upad 'prijatelja' na društvenim mrežama na nečije profile
- socijalna izolacija osobe
- Umjetna inteligencija
- Globalna računalna mreža
- Društvena mreža
- e-klevetanje
14 Clues: TCP-IP • e-klevetanje • Društvena mreža • Društvena mreža • online nasilje • Umjetna inteligencija • Globalna računalna mreža • Slanje agresivnih poruka • socijalna izolacija osobe • Slijed koraka u programiranju • programi koji mogu ugroziti računalo • krađa identiteta, krađa lozinki ili lažno predstavljanje • nasilan upad 'prijatelja' na društvenim mrežama na nečije profile • ...
QBE 2020-04-01
Across
- Head of BA
- QBE's platform to process payments
- Principle of Insurance
- QBE CEO
- Diverse Hashtag
- London based Insurer
- P&C Product
- #together
- SME Team
- E-Trade Platform
- Insured vehicles must be logged on
- Offshore Office
- QBE Headquarters
Down
- Fleet Product
- Minibus Product
- Employee Assistance
- A vehicle which is off the road must be declared
- Data Protection
- Complaints are logged on
- QBE’s E-Trade Platform
- Large broker for Minibus
- Minibus has been trading for how many years
- Annual Staff Survey
- Partner Charity
- Large broker for Minibus
- Newest SME Product
26 Clues: QBE CEO • SME Team • #together • Head of BA • P&C Product • Fleet Product • Minibus Product • Data Protection • Diverse Hashtag • Partner Charity • Offshore Office • E-Trade Platform • QBE Headquarters • Newest SME Product • Employee Assistance • Annual Staff Survey • London based Insurer • Principle of Insurance • QBE’s E-Trade Platform • Complaints are logged on • Large broker for Minibus • ...
Cyber Safety - Blake Biddell 2016-05-26
Across
- downloadable fun
- cable needed to power a device
- appropriate level of content
- protect yourself online
- protect your online identity
- used to get online
- someone who helps at home
- site to gain information on the web
- to not be online
- person who helps at school
Down
- people online who aren't nice
- one of Apples products
- someone who looks after you
- provides power
- random information sometimes not wanted
- uses Electricity
- makes your computer sick
- scams games that aren't safe
- fun to play with
- to make a computer screen smaller
20 Clues: provides power • downloadable fun • uses Electricity • fun to play with • to not be online • used to get online • one of Apples products • protect yourself online • makes your computer sick • someone who helps at home • person who helps at school • someone who looks after you • appropriate level of content • scams games that aren't safe • protect your online identity • ...
Crossword 2 2024-06-07
Across
- _ut (c or k?)
- _am (j or g?)
- _ber (c or s?)
- _ki (c or s?)
- _ un (j or g?)
- _ _ ide (j or g?) and what else?
- _olly (j or g?)
- _iraffe (j or g?)
- _ensus (c or s?)
- _angaroo (c or k?)
Down
- _ummer (c or s?)
- _ivil (c or s?)
- _ _ ilty (j or g?) and what else?
- _elebrate (c or s?)
- _ym (j or g?)
- _leeping (c or s?)
- _itrus (c or s?)
- _andy (c or k?)
- _ _ ess (j or g?) and what else?
- _otton (c or k?)
20 Clues: _ut (c or k?) • _am (j or g?) • _ki (c or s?) • _ym (j or g?) • _ber (c or s?) • _ un (j or g?) • _ivil (c or s?) • _olly (j or g?) • _andy (c or k?) • _ummer (c or s?) • _itrus (c or s?) • _ensus (c or s?) • _otton (c or k?) • _iraffe (j or g?) • _leeping (c or s?) • _angaroo (c or k?) • _elebrate (c or s?) • _ _ ide (j or g?) and what else? • _ _ ess (j or g?) and what else? • ...
Westhill Crossword 2024-03-10
Across
- Teachers are wearing this in protest
- Helpful Study Resource
- Westhills past participle
- Superintendent
- The 300s and 400s are in the _____ building
- You apply to college when you are a ______
- ________ Playmakers
- _____ and purple
- Mr. Alswanger and Mr. Cooney
- Alternative to the SAT
Down
- Upperclassmen illness
- Part of a class curriculum
- The Cyber Rams
- Nickname for the head janitor at Westhill
- Northernmost section of the school building
- Popular college for Westhill graduates
- Learned in math class
- Westhill’s favorite gym rat
- We write what you are reading
- Created in 1916
20 Clues: The Cyber Rams • Superintendent • Created in 1916 • _____ and purple • ________ Playmakers • Upperclassmen illness • Learned in math class • Helpful Study Resource • Alternative to the SAT • Westhills past participle • Part of a class curriculum • Westhill’s favorite gym rat • Mr. Alswanger and Mr. Cooney • We write what you are reading • Teachers are wearing this in protest • ...
Masalah Sosial 2025-10-01
Across
- Cyber crime?
- Bentuk diskriminasi berbasis genjer disebut?
- Apa yang di maksud kesenjangan sosial?
- Apa dampak urbanisasi berlebihan?
- Penyebaran budaya asing tanpa filter disebut?
- Teori anonim dikemukakan oleh?
- White collar crime artinya?
- Contoh masalah sosial modern?
- Penyalahgunaan anak untuk bekerja disebut?
- Diskriminasi berbasis orientasi seksual?
- Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
- Kemiskinan relatif dibandingkan dengan?
Down
- Eufemisme untuk pengemis?
- Kesenjangan akses antara kota dan desa disebut?
- Apa penyebab utama kemiskinan?
- Kemiskinan absolut diukur dari?
- Apa dampak utama pengangguran?
- Contoh masalah sosial di bidang pendidikan?
- Pengangguran musiman contohnya?
- Apa penyebab kriminalitas?
20 Clues: Cyber crime? • Eufemisme untuk pengemis? • Apa penyebab kriminalitas? • White collar crime artinya? • Contoh masalah sosial modern? • Apa penyebab utama kemiskinan? • Apa dampak utama pengangguran? • Teori anonim dikemukakan oleh? • Kemiskinan absolut diukur dari? • Pengangguran musiman contohnya? • Apa dampak urbanisasi berlebihan? • Apa yang di maksud kesenjangan sosial? • ...
Masalah Sosial 2025-10-01
Across
- Cyber crime?
- Bentuk diskriminasi berbasis genjer disebut?
- Apa yang di maksud kesenjangan sosial?
- Apa dampak urbanisasi berlebihan?
- Penyebaran budaya asing tanpa filter disebut?
- Teori anonim dikemukakan oleh?
- White collar crime artinya?
- Contoh masalah sosial modern?
- Penyalahgunaan anak untuk bekerja disebut?
- Diskriminasi berbasis orientasi seksual?
- Penyalahgunaan kekuasaan untuk kepentingan pribadi disebut?
- Kemiskinan relatif dibandingkan dengan?
Down
- Eufemisme untuk pengemis?
- Kesenjangan akses antara kota dan desa disebut?
- Apa penyebab utama kemiskinan?
- Kemiskinan absolut diukur dari?
- Apa dampak utama pengangguran?
- Contoh masalah sosial di bidang pendidikan?
- Pengangguran musiman contohnya?
- Apa penyebab kriminalitas?
20 Clues: Cyber crime? • Eufemisme untuk pengemis? • Apa penyebab kriminalitas? • White collar crime artinya? • Contoh masalah sosial modern? • Apa penyebab utama kemiskinan? • Apa dampak utama pengangguran? • Teori anonim dikemukakan oleh? • Kemiskinan absolut diukur dari? • Pengangguran musiman contohnya? • Apa dampak urbanisasi berlebihan? • Apa yang di maksud kesenjangan sosial? • ...
Friendship & Cyber Friends 2022-11-01
18 Clues: sammen • en ven • at såre • at dele • mobning • vigtigt • en tanke • en konto • en bølle • en besked • et forhold • et venskab • en følelse • en kammerat • et skænderi • en interesse • en opdatering • en hemmelighed
CWiCS Breaches of 2020 2021-02-11
Across
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- Malicious code was sneaked into updates to this SolarWinds software
- The telecom service provider became the victim of a Magecart card-skimming attack.
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- this based cyber attacks rose 630% between January and April 2020
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- this Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
- Malware designed to steal sensitive information stored on an infected device.
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------- and stole patient data
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
- Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
- hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
- Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
- A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Trojan functioning as a downloader or dropper of other malwares
- Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization
31 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • this based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
CWiCS Breaches of 2020 2021-02-16
Across
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- Malicious code was sneaked into updates to this SolarWinds software
- The telecom service provider became the victim of a Magecart card-skimming attack.
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- This based cyber attacks rose 630% between January and April 2020
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- This Milpitas, Calif.-based platform security vendor had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Such attacks target executives across manufacturing, finance, government, and tech with the goal of obtaining sensitive info
- Malware designed to steal sensitive information stored on an infected device.
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- Allows attackers to execute scripts in the victim’s browser which can hijack user sessions
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------- and stole patient data
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- In April 2020, Google blocked 18 million daily malware and phishing emails related to _______
- Since This , the US FBI reported a 300% increase in reported cybercrimes
Down
- Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- A _______ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- This Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Indian WAF vendor Indusface's this app offers protection to online businesses during corona virus outbreak
- Hackers target Microsoft Windows machines running which servers to deploy backdoors and other kinds of malware
- A dedicated, global Cisco team that manages the receipt, investigation, and public reporting of security vulnerabilities
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Trojan functioning as a downloader or dropper of other malwares
- Attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization
31 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • This based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
Cybersecurity 2025-03-10
Across
- Fake emails to steal info
- Locks files for money
- Fixes security issue
- Shows unwanted ads
- horse Fake safe program
- Hides online activity
- force Guessing passwords
- Floods a website
- Extra password step
- Blocks bad connections
Down
- Hides info
- New security problem
- Looks safe but is bad
- Group of hacked computers
- Secret way in
- Records what you type
- Hides bad software
- Bad software
- Watches what you do
- engineering Tricks people
20 Clues: Hides info • Bad software • Secret way in • Floods a website • Hides bad software • Shows unwanted ads • Watches what you do • Extra password step • New security problem • Fixes security issue • Looks safe but is bad • Locks files for money • Records what you type • Hides online activity • Blocks bad connections • horse Fake safe program • Fake emails to steal info • Group of hacked computers • ...
Personell in tourism 2024-03-21
Across
- Flies aircraft.
- Provides medical care.
- Oversees operations.
- Teaches specific skills.
- Ensures safety and security.
- Provides amusement or enjoyment.
- Serves food and drinks.
- Manages office tasks.
- Maintains cleanliness.
- Books travel arrangements.
Down
- Organizes events or activities.
- Supervises swimming areas.
- Offers therapeutic services.
- Leads tours.
- Mixes and serves beverages.
- Prepares and cooks food.
- A person who buys goods or services.
- Cleans rooms and areas.
- Greets and assists guests.
- Helps with guest requests.
- Operates vehicles.
21 Clues: Leads tours. • Flies aircraft. • Operates vehicles. • Oversees operations. • Manages office tasks. • Provides medical care. • Maintains cleanliness. • Cleans rooms and areas. • Serves food and drinks. • Prepares and cooks food. • Teaches specific skills. • Supervises swimming areas. • Greets and assists guests. • Helps with guest requests. • Books travel arrangements. • ...
CTF-CW-9 2025-11-17
Across
- Native risk without any safety measures
- Time attackers spend undetected
- Raising a problem to higher-level personnel
- Mathematical technique adding statistical noise to protect individual privacy
- Trust service criteria audit report
- Abbreviation for Confidentiality, Integrity, and Availability
- Rules for managing and protecting data
- Correctly identified security threat
- Red team�s go-to platform for offensive security at Tekion.
- Critical information for encryption and decryption
Down
- Ensuring maximum privacy protection without user action required
- Creating multiple simulated systems on one machine
- Anti-phishing and brand protection platform adopted by Tekion.
- Real-time monitoring tool at Tekion.
- Ethical approach to artificial intelligence development and deployment
- Anything of value owned or used
- The Confirmed Security Incident resulting in Unauth Access or Disclosure of PII.
- (Duplicate) Procedures for automated or manual response actions
- Gathering data from publicly available sources
- Again, technology for preventing leaks
20 Clues: Time attackers spend undetected • Anything of value owned or used • Trust service criteria audit report • Real-time monitoring tool at Tekion. • Correctly identified security threat • Rules for managing and protecting data • Again, technology for preventing leaks • Native risk without any safety measures • Raising a problem to higher-level personnel • ...
CTF-CW-10 2025-11-17
Across
- The practice of hiding meaning in messages
- Service at Tekion for simplifying software requests.
- Sprint and issue management dashboard at Tekion.
- Requirement to delete data when no longer needed for its purpose
- GDPR requirement to gather least amount of data needed
- Keeping personal or sensitive information safe
- Establishing true user identity
- International standard for Privacy Information Management Systems
- (Triplicate) Adversary methods description
Down
- (Duplicate) Handling threats as a team
- (Duplicate) Plan for handling security disasters
- United Kingdom's post-Brexit data protection regulation
- (Duplicate) Host-level monitoring security tool
- Ensuring data hasn�t been changed or tampered
- Person in charge of independent checks
- Test run or legal proceeding
- More than password needed to get in (again
- Choosing how to handle each identified threat
- Measure to prevent unwanted events
- Cloud-based security layer used by Tekion to protect its websites from online attacks.
20 Clues: Test run or legal proceeding • Establishing true user identity • Measure to prevent unwanted events • (Duplicate) Handling threats as a team • Person in charge of independent checks • The practice of hiding meaning in messages • More than password needed to get in (again • (Triplicate) Adversary methods description • Ensuring data hasn�t been changed or tampered • ...
ultimate fnaf quiz for sweaty gamers 2026-01-08
Across
- Protagonist Of FNAF Ruin
- The Daycare Attendant During The Day
- Died In The Bite Of 83
- The Guitarist In FNAF 1
- Also Known as " The Marionette "
- The Soul Possessing Chica
- Protagonist Of FNAF Security Breach
- Replaced Bonnie In FNAF Security Breach
- Responsible For The Bite Of 87
- The Original Location
- Tutorial Giver In FNAF Games 1-3
- Replaced Foxy In FNAF Security Breach
- Known As " The One You Shouldn't Have Killed "
Down
- The Helper In FNAF Pizza Sim
- Animatronic Involved In The Bite Of 83
- The Creator Of FNAF
- First Name Of Fazbear Entertainment's Co- Founder
- William's Beloved Fursuit
- The Man Behind The Slaughter
- The Animatronic Built To Trap The Puppet
- FNAF RPG Game
- The Star Of The Show
- The Vessel C.C And Cassidy Inhabit
- The Soul Possessing Foxy
24 Clues: FNAF RPG Game • The Creator Of FNAF • The Star Of The Show • The Original Location • Died In The Bite Of 83 • The Guitarist In FNAF 1 • Protagonist Of FNAF Ruin • The Soul Possessing Foxy • The Soul Possessing Chica • William's Beloved Fursuit • The Helper In FNAF Pizza Sim • The Man Behind The Slaughter • Responsible For The Bite Of 87 • Also Known as " The Marionette " • ...
Security Cross Word 2025-10-14
Across
- Virtual private connection over public networks
- Restricting distribution based on sensitivity
- Detects, blocks, and responds on endpoints (abbr.)
- Legal framework protecting personal information
- Network barrier enforcing traffic rules
- Targeted, well-researched phishing attack
- Manipulating people to bypass security
- Program that demands payment to restore data
- Authentication standard for phishing resistance
- Application for generating/storing credentials
- Principle: assume breach and verify explicitly
Down
- Backups that enable restoration after attacks
- Small software flaw exploited by attackers
- Process of reporting an event to Security
- Transforming data to unreadable form
- Attack where criminals pose as executives
- Practice of updating systems to fix flaws
- Limiting access to only what’s needed
- Protects data in transit on untrusted networks
- Malicious software
- Deceptive emails designed to steal information
- Policy prohibiting unapproved tools
- Security model emphasizing continuous verification
- Second factor for identity verification
- Preventing unauthorized data exfiltration (abbr.)
25 Clues: Malicious software • Policy prohibiting unapproved tools • Transforming data to unreadable form • Manipulating people to bypass security • Limiting access to only what‚Äôs needed • Network barrier enforcing traffic rules • Second factor for identity verification • Process of reporting an event to Security • Attack where criminals pose as executives • ...
November 2023-11-22
9 Clues: Funny feast • Bring more! • It's giving • ICAC Conference #1s • It's a fruit, actually. • Chronically online Monday. • Brought Thanksgiving back. • The preferred holiday meal. • American organization; big part of our community
TIK 2023-08-23
Across
- jaringan yang terdiri dari komputer client dan server
- untuk mengakses berita di seluruh dunia
- jaringan yang mencakup dunia
- jaringan yang meliputi satu kota
- jaringan yang hanya mencakup wilayah kecil
Down
- Internet untuk militer
- Komputer yang menerima data dari server
- Penyakit yang ada di internet
- Pencurian Nomor kartu kredit
- dilarang oleh agama
- Nama awal internet
- terputusnya jaringan internet
- tempat awal pengembangan jaringan
- bentuk dokumen di Internet
- format file gambar
- kejahatan cyber
16 Clues: kejahatan cyber • Nama awal internet • format file gambar • dilarang oleh agama • Internet untuk militer • bentuk dokumen di Internet • Pencurian Nomor kartu kredit • jaringan yang mencakup dunia • Penyakit yang ada di internet • terputusnya jaringan internet • jaringan yang meliputi satu kota • tempat awal pengembangan jaringan • Komputer yang menerima data dari server • ...
HACKTIVISM 2024-10-17
Across
- Of one’s own free will, without being forced
- Leaker, revealer
- To engage in a struggle or defense against opposition
- Done carelessly, without regard for consequences
- In a way that seeks to undermine
- To take action or stand firm against something or someone
Down
- To rise in opposition
- To challenge or dispute something
- In a bold, fearless manner
- Snitch, source
- Campaigner, advocate
- Speak in favor of, advertise something
- Intentionally
- Cyber activist
- Hacker
- Demonstrator
16 Clues: Hacker • Demonstrator • Intentionally • Snitch, source • Cyber activist • Leaker, revealer • Campaigner, advocate • To rise in opposition • In a bold, fearless manner • In a way that seeks to undermine • To challenge or dispute something • Speak in favor of, advertise something • Of one’s own free will, without being forced • Done carelessly, without regard for consequences • ...
Sample Quiz 1 2023-10-12
Across
- Compliance also includes satisfying _____ requirements.
- I am aware that breach of any policy requirement can result in _____ action.
- Security _____ of an organization are identified by conducting a risk assessment.
- Employee _____ is a mandatory requirement before an employee is employed.
Down
- Apart from any incident, I am also responsible for reporting any ______ which I may identify in any of the security controls.
- "Need to Know" is the _____ of granting access.
- The first point in Information Security Policy statement refers to ____ security.
- Senior management team is responsible for _______ the implementation of security controls.
- ______ usage policy specifies do’s and don’ts for online activities using company infrastructure.
- My company can ____ all my communications initiated from the company provided or owned electronic device.
- Information Security should become a part of the ____ of the organization.
11 Clues: "Need to Know" is the _____ of granting access. • Compliance also includes satisfying _____ requirements. • Employee _____ is a mandatory requirement before an employee is employed. • Information Security should become a part of the ____ of the organization. • I am aware that breach of any policy requirement can result in _____ action. • ...
Investment Crossword 2025-03-25
Across
- investors use a ____ time period, with no specific plan in time
- The "p" In IPO stands for _____
- you contribute, the state, and your ____ contributes to your pension plan
- one way investors can make money from stocks
- at age ___, you can collect full social security benefits
- thousand-Five-Hundred the max amount of money to contribute in a 401k is- __,___
- Bull market stock prices are __
- A pension is managed by your,
- 1.45% for this tax
- the opposite of traders
- a ____ symbol is used to represent a company
- Roth IRA contributions are made _____ tax
- Social Security was created by which president
Down
- What retirement income source is funded by the government?
- there are ____ sources of retirement incomes
- bear market stock prices are ____
- Higher risk often means ______ Return
- in year____ social security was created
- You can withdrawal funds for your IRA & Roth IRA with no ________ at age 59.5 Seventy-three RMDs must start at age ____
- The total maximum contribution for IRA combined per year is ______
- 401K contributions are taken out of your paycheck _____ Taxes.
- plan what plan is managed by your employer
- social security and medicare together are called _____ Tax
- what kind of gains increase in value when you sell an asset for more than you bought it
- traders use a _____ time frame
25 Clues: 1.45% for this tax • the opposite of traders • A pension is managed by your, • The "p" In IPO stands for _____ • Bull market stock prices are __ • traders use a _____ time frame • bear market stock prices are ____ • Higher risk often means ______ Return • in year____ social security was created • Roth IRA contributions are made _____ tax • ...
Amped Up 2025-11-18
Across
- Deville or Deluxe?
- variations include "cyber"
- Echo, echo echo...
- Shaky amp geared towards lower frequencies
- Tweed or Pro?
- Now in the LTX model
Down
- 1995 retro design
- 10 watt, great for beginners
- The rebranding of the "Dual Professional"
- 1948 low power studio staple
- Ivy League
- Evolution of the "Woodie"
- Early 50s amp designed by Freddie Tavares
13 Clues: Ivy League • Tweed or Pro? • 1995 retro design • Deville or Deluxe? • Echo, echo echo... • Now in the LTX model • Evolution of the "Woodie" • variations include "cyber" • 10 watt, great for beginners • 1948 low power studio staple • The rebranding of the "Dual Professional" • Early 50s amp designed by Freddie Tavares • Shaky amp geared towards lower frequencies
Investing - Sky Garber 2026-03-20
Across
- Invest all money into the market all at once
- President who signed the Social Security Act
- Loans you give to companies or the government
- Sum of money saved for a purpose
- Index representing the top 500 market cap companies
- Social Security and Medicare taxes combined
- Age to receive full social security benefits
- A speculative currency
- Where stocks are bought and sold
Down
- Invest money in equal amounts and regular intervals
- Total maximum contribution for IRAs per year
- Market when stocks are down
- Availability to cash
- Retirement income source managed by employers
- Market when stocks are up
15 Clues: Availability to cash • A speculative currency • Market when stocks are up • Market when stocks are down • Sum of money saved for a purpose • Where stocks are bought and sold • Social Security and Medicare taxes combined • Total maximum contribution for IRAs per year • Invest all money into the market all at once • President who signed the Social Security Act • ...
bullying 2023-03-21
Cyber Quiz 2021-08-30
Across
- assortment of PCs with enormous capacity abilities that distantly serve demands.
- Any endeavor to disregard the security border of a consistent climate
- The action of breaking down and additionally looking through information to discover things of importance, importance or worth.
- - communicated as series of the digits 0 and 1
- A stack of info sent from a site to an internet browser that records a client's action on that site.
Down
- Equipment and additionally programming intended to keep unapproved clients from getting to a PC framework.
- the change of text, pictures, or sound into a computerized structure that can be prepared by a PC
- A strategically or philosophically propelled digital assault or hack.
- The second a programmer effectively takes advantage of a weakness in a PC or gadget, and accesses its records and organization.
- An online diary. Constriction of the term web log.
- Making a copy duplicate of information onto a different actual stockpiling gadget or on the web/distributed storage arrangement
11 Clues: - communicated as series of the digits 0 and 1 • An online diary. Constriction of the term web log. • A strategically or philosophically propelled digital assault or hack. • Any endeavor to disregard the security border of a consistent climate • assortment of PCs with enormous capacity abilities that distantly serve demands. • ...
Cyber Crossword 2021-09-05
Across
- “the adoption or increase in use of digital or computer technology by an organization, industry, country.
- a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
- a paperless method of sending messages, notes or letters from one person to another or even many people at the same time via Internet.
- action or process of digitizing or conversion of analogue data in digital form.
- an integrated service of electronic applications needed for any kind of healthcare function.
Down
- validates contracts entered into electronically, and validates electronic signatures.
- virtual network of websites connected by hyperlinks.
- This in Cyber space is a focal point for two opposing schools of thought, the Cyberlibertarians and the Cyber-paternalists.
- an Internet utility software used touploaded and download files.
- a type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure.
- the first paying method from partner to partner,which does not have any mediator and obtains its power from the users.
11 Clues: virtual network of websites connected by hyperlinks. • an Internet utility software used touploaded and download files. • action or process of digitizing or conversion of analogue data in digital form. • validates contracts entered into electronically, and validates electronic signatures. • ...
Cyber Safety 2022-09-26
11 Clues: who you are • where you live • your contact number • putting something online • people who see your posts • content that everyone can see • telling others not to give up • Apps like Facebook and TikTok • what you think about something • organisation that cares for money • content that only trusted people can see
CYBER BULLYING 2019-11-19
11 Clues: MEAN TO DO • HAS A KEYBORD • adults HAVE THIS APP • you CAN SNAP PITHURES • THIS IS WHAT GETS BULLIED • its A MOTHER BOARD OF APPS • GETS BULLIED ON THE INTERNET • little KIDS HAS THIS ELETRONIC • A ELECTRONIC THAT TENNAGERS HAVE • TO PUT SOMETHING ON THE INTERNET • presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
Cyber-bullying 2020-11-20
Across
- photo editor
- an app where you can post images
- the effect on someone
- people who comment hateful messages
- an image you take off of the device your on
- the act of someone or yourself acting like someone else
Down
- the act of being bullied online
- a funny photo with a caption
- a social platform where you can post images and text
- online platform where you make videos with dances
- a symbol and a title
11 Clues: photo editor • a symbol and a title • the effect on someone • a funny photo with a caption • the act of being bullied online • an app where you can post images • people who comment hateful messages • an image you take off of the device your on • online platform where you make videos with dances • a social platform where you can post images and text • ...
Cyber Love 2022-12-14
Cyber Safety 2025-02-05
11 Clues: Stop • Divide • Appear • Believe • Security • Complain • Power down • Support button • Press a button on the mouse • Have a high opinion of someone • Unwanted presence of someone online
