cyber security Crossword Puzzles
InfoSec Puzzles - Crossword #01 2014-07-17
Across
- No Compromise. Just ___________
- Any event that affects Confidentiality, Integrity and Availability of Information
- All the employees should complete the mandatory _________
- Information Security is Everyone's _____________
- ________ any security incidents immediately
Down
- The most important asset of the organisation to safeguard first from any disaster
- You should logon to ___________ to report any security incidents
- The principle of InfoSec that is applicable for taking regular back up of Information
- The principle of InfoSec to prevent information from unauthorized access
- The principle of InfoSec to protect information from unauthorized modification
- An important business asset to secure always
- The International Standard for Information Security Management System
12 Clues: No Compromise. Just ___________ • ________ any security incidents immediately • An important business asset to secure always • Information Security is Everyone's _____________ • All the employees should complete the mandatory _________ • You should logon to ___________ to report any security incidents • ...
CompTIA Cloud+ Ch. 10 2025-01-06
Across
- Keeping cloud workloads separated for security.
- Giving users only the access they need.
- Unauthorized access to a system.
- Dividing networks to improve security.
- Security extensions for DNS.
Down
- Duplicate data stored for recovery.
- Recording events in a system.
- Web Application Firewall.
- Watching for suspicious activity.
- Rights granted to a user or role.
- Permissions to use resources.
- Isolated environment for testing.
12 Clues: Web Application Firewall. • Security extensions for DNS. • Recording events in a system. • Permissions to use resources. • Unauthorized access to a system. • Watching for suspicious activity. • Rights granted to a user or role. • Isolated environment for testing. • Duplicate data stored for recovery. • Dividing networks to improve security. • ...
Cybersecurity Crossword 2024-04-23
Across
- The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
- Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
- A person who uses computers to gain unauthorized access to data.
- Any malicious computer program which misleads users of its true intent.
- Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
- A collection of software tools that enable unauthorized access to a computer or areas of its software.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A piece of data that is used in network communications to identify a session.
- A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- A type of surveillance technology used to record keystrokes made by a user.
- The art of manipulating people so they give up confidential information.
- Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
- Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
- A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
- Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
- Malicious software designed to harm or exploit any programmable device or network.
- The study of analyzing information systems in order to study the hidden aspects of the systems.
- Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
- An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
- Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
- The act of disguising a communication from an unknown source as being from a known, trusted source.
- An algorithm for performing encryption or decryption.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Exfiltration The unauthorized transfer of data from a computer or server.
- Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
- Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
- Response The methodology an organization uses to respond to and manage a cyberattack.
- Operations Center A centralized unit that deals with security issues on an organizational and technical level.
- Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
- Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
- The method by which information is converted into secret code that hides the information's true meaning.
35 Clues: An algorithm for performing encryption or decryption. • A person who uses computers to gain unauthorized access to data. • Any malicious computer program which misleads users of its true intent. • The art of manipulating people so they give up confidential information. • Exfiltration The unauthorized transfer of data from a computer or server. • ...
The Life of Kaming & Ben 03.24.17 2017-10-12
Across
- Couple's favorite underwater pastime
- Fragrant harbour
- Ben likes to buy these at the bar
- Ben's jersey number
- Ben's college
- Best dressed feline
- Kaming's school of nerds
- Ben's handle
- Their first date
- When Ben's not from NJ, he's from here
- Groom had this pierced
Down
- This anniversary year
- Ithaca is ____
- Kaming was a band geek and played this
- Wedding #
- Kaming's college degree
- Kaming's favorite food
- The version where you play with your hands, not your feet
- Ben proposed on this
- Homegirl's home state
- A little posh corps
- Best dressed canine
22 Clues: Wedding # • Ben's handle • Ben's college • Ithaca is ____ • Fragrant harbour • Their first date • Ben's jersey number • Best dressed feline • A little posh corps • Best dressed canine • Ben proposed on this • This anniversary year • Homegirl's home state • Kaming's favorite food • Groom had this pierced • Kaming's college degree • Kaming's school of nerds • Ben likes to buy these at the bar • ...
QBE 2020-04-01
Across
- Head of BA
- System used for policy premium transactions
- Principle of Insurance
- QBE CEO
- Diverse Hashtag
- London based Insurer
- P&C Product
- #together
- Stafford Team
- E-Trade Platform
- Insured vehicles must be logged on
- Offshore Office
- QBE Headquarters
Down
- Fleet Product
- Minibus Product
- Employee Assistance
- A vehicle which is off the road must be declared
- Data Protection
- Complaints are logged on
- QBE’s E-Trade Platform
- Large broker for Minibus
- Minibus has been trading for how many years
- Annual Staff Survey
- Partner Charity
- Large broker for Minibus
- Newest SME Product
26 Clues: QBE CEO • #together • Head of BA • P&C Product • Fleet Product • Stafford Team • Minibus Product • Data Protection • Diverse Hashtag • Partner Charity • Offshore Office • E-Trade Platform • QBE Headquarters • Newest SME Product • Employee Assistance • Annual Staff Survey • London based Insurer • Principle of Insurance • QBE’s E-Trade Platform • Complaints are logged on • Large broker for Minibus • ...
Health crossword 2023-10-06
Types Of Threats 2019-01-09
Across
- Unauthorized access, modification, or use of an electronic device or some element of a computer system
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- Advertising-supported Software
- A type of Malware that locates and saves data from users without them knowing about it
- Malware that allows a cyber-security attacker to take control of an infected computer
- When someone deceives by pretending to be someone else in order to get personal data
- attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Down
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- An error in a program that prevents the program from running as expected
- Software that encrypts programs and data until a ransom is paid to remove it
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- Criminals make a promise of goods in return for details, such as offering a free music download
- A destructive computer program that bores its way through a computer's files or through a computer's network
- Collection of captured bot computers
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
15 Clues: Advertising-supported Software • Collection of captured bot computers • An error in a program that prevents the program from running as expected • Software that encrypts programs and data until a ransom is paid to remove it • When someone deceives by pretending to be someone else in order to get personal data • ...
Privacy and Security 2022-06-04
Across
- 1996; made up of the privacy, security and breach notification rules
- securing digital data with a password or key
- acquiring PHI in a manner that compromises the security or privacy of PHI
- keeping patient records from unwarranted view
- automated processes used to protect data and control access
- electronic protected health information
Down
- includes risk analysis, risk management and information security activities
- fine paid for breaking the law
- used to obtain sensitive information, primarily via email
- measures that protect electronic systems, equipment and data they hold
- control user access to safeguard ePHI from erroneous leaks
- covered entity
12 Clues: covered entity • fine paid for breaking the law • electronic protected health information • securing digital data with a password or key • keeping patient records from unwarranted view • used to obtain sensitive information, primarily via email • control user access to safeguard ePHI from erroneous leaks • automated processes used to protect data and control access • ...
Security Renewal Course 2013-11-14
Across
- Roll call
- The highest security level
- Coffee making course
- Possibility that something may happen to cause injury
- Code 718
- A person who has committed a crime
- Punishment for breaking a rule
- Someone who escapes from custody
- Classified and restricted access
- Becoming lenient
- A place that houses offenders
Down
- Reoffending
- Illegal items or substances
- Board of Studies
- Having responsibility or care for an individual
- Coercing someone to do something they don't want to do
- Not sentenced
- Something that requires immediate action
- TAFE roll book record
- Institute Juvenile Justice Liaison Officer
- Taking contraband into a juvenile or correctional centre
- Inmates are to return to their cells
- Being kept from harm
- A person who is sentenced of a crime
24 Clues: Code 718 • Roll call • Reoffending • Not sentenced • Board of Studies • Becoming lenient • Coffee making course • Being kept from harm • TAFE roll book record • The highest security level • Illegal items or substances • A place that houses offenders • Punishment for breaking a rule • Someone who escapes from custody • Classified and restricted access • A person who has committed a crime • ...
Biometric Security - Crossword 2017-11-18
Across
- In texture discrimination we divide intensities to ________ ranges.
- Gabor filters are the products of a Gaussian filter with _______
- Second-order gray-level statistics is described by ________matrix.
- One of the essential biometric characteristics.
- In the gaussian filter representation P denotes the phase of ________ carrier.
- ______ points are used to calculate the region of interest in Pre-Processing of Palm print verification system.
- ↓is a _________ operator in Gaussian pyramid.
- One of the disadvantages of UNI-MODAL Biometric system.
- In a texture the _________ distribution stays the same.
- One of the essential levels in fusion.
- Matching module uses this to distinguish between genuine and imposter range.
Down
- The Hough transform can be described as a transformation of a point in the x,y-plane to the _______ space.
- Gabor filters satisfy ________ principle.
- A ________ graph is used in ear localization.
- The Gaussian function (1-D) of the Gabor filter will not affect the edge information in the ________direction.
- DOG (Difference of Gaussian) uses the approximation of _____ of Gaussian.
- The number of leaf nodes in a second level graphical representation of Haar Wavelet decomposition.
- The preprocessing module first transforms the true color into _____ image.
- ROC curve plots _ _ _ against _ _ _.
- In texture edge extraction using set of 1-D Gabor filters, the bank of 1-D Gabor filters gives ______ image.
- In _______ filters the output of one filter is independent of others.
- FAR and FRR values are calculated based upon this matrix.
22 Clues: ROC curve plots _ _ _ against _ _ _. • One of the essential levels in fusion. • Gabor filters satisfy ________ principle. • A ________ graph is used in ear localization. • ↓is a _________ operator in Gaussian pyramid. • One of the essential biometric characteristics. • One of the disadvantages of UNI-MODAL Biometric system. • ...
Security crossword challenge 2018-09-01
20 Clues: TULLI • LIIVI • SOPIVA • NÄKYVÄ • SUMUTE • TYÖASU • PATUKKA • HANSKAT • HENKKARIT • LAILLINEN • PARTIOIDA • KÄSIRAUDAT • VARUSTEVYÖ • TASKULAMPPU • VARTIJAKORTTI • HÄLYTYSAJONEUVO • HÄLYTYSJÄRJESTELMÄ • KIINTEISTÖ/OMAISUUS • HUOMIOIDA/TARKKAILLA • TAPAHTUMA/VÄLIKOHTAUS
Network Security Fundamentals 2022-04-25
Across
- This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
- A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
- This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
- A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
- Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
- The degree of weakness in a network or a device.
- An infected host.
- Short for "malicious software".
- A network of zombies.
- A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
- Similar to a DoS attack, but it originates from multiple, coordinated sources.
- A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
- This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
- This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
- This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
- A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
- A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
- Prevents or allows access by specific application types based on port numbers.
- A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
- This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
- Prevents or allows access based on IP or MAC addresses.
- An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
- Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
- This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
- Also called a host. It is an individual computer system or devices that acts as a network client.
- A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
- A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
- Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
- Prevents or allows access to websites based on specific URLs or keywords.
- Enables a network administrator to apply specific policies for hosts connected to that network.
30 Clues: An infected host. • A network of zombies. • Short for "malicious software". • The degree of weakness in a network or a device. • Prevents or allows access based on IP or MAC addresses. • Prevents or allows access to websites based on specific URLs or keywords. • Prevents or allows access by specific application types based on port numbers. • ...
Computer Security Crossword 2022-05-17
Across
- A PC with a lid
- Begins with A but you don't wear it
- Tricking people into sharing their personal data
- Another word for computer programs
- How to keep your software secure
- Leaking data
- You connect to this when playing Minecraft
- Something about infrastructure
Down
- Begins with M but you don't wear it
- Usually the first step in virus protection
- Rules for employees to follow
- A horse
- Hopefully not pirated
- Like DOS but worse
- Is it hot in here?
- The opposite of secure
- What we need to protect
- The internet is made up of these
- Begins with S but you don't wear it
- What's that in your pocket?
- The bad guys
21 Clues: A horse • Leaking data • The bad guys • A PC with a lid • Like DOS but worse • Is it hot in here? • Hopefully not pirated • The opposite of secure • What we need to protect • What's that in your pocket? • Rules for employees to follow • Something about infrastructure • The internet is made up of these • How to keep your software secure • Another word for computer programs • ...
Safety & Security Crossword 2024-05-15
Across
- REGULATORY AUTHORITY FOR AVIATION SECURITY IN INDIA IS KNOWN AS ____
- Confidential Reports are mailed to ______@airvistara.com
- A condition, object, activity or event with the potential of causing injuries to personnel, damage to equipment or structures, loss of material, or reduction of the ability to perform a prescribed function is a ______
- A culture in which personnel are not punished for actions, omissions or decisions taken by them which are to commensurate with their experience and training, but where gross negligence, willful violations and destructive acts are not tolerated is known as ____
- A management tool for the management of safety by an organisation is
- Safety policies & objectives, Safety Risk Management, Safety Assurance and Safety Promotion are all ____ of SMS
- A Hazard Report is generally closed in __ days
- FOR LEGITIMATE REASON OF ACCESS TO AIRPORT / AIRCARFT AN EMPLOYEE NEEDS TO DISPLAY _____ALWAYS.
- RDX IS AN EXAMPLE OF ______
- WHICH WEAPON HAS EXEMPTION TO BE CARRIED ON BOARD BY SIKH PASSENGERS IN DOMESTIC FLIGHT ONLY?
- ANNEX 17 CONTAINS STANDARD AND RECOMMENDED PRACTICES FOR ____
Down
- Regulatory aviation authority of India.
- An in house publication released quarterly by the Safety division is __
- An application wherein we can raise a Hazard Report.
- PHONETIC ALPHABET FOR LETTER L?
- An ICAO model of human factors that clarifies the scope of aviation human factors and assist in understanding the human factor relationships between aviation system resources/environment and the human component in aviation
- A PASSENGER WITH VALID LICENSE CAN CARRY ________ NUMBER OF WEAPONS AND FIFTY AMMUNITIONS/BULLET IN HOLD BAGGAGE.
- ___ fuel contributes in reducing emissions needed by aviation to reach net zero CO2 emissions by 2050.
- HEAD OF AIRLINES SECURITY.
- A Hazard Report is a ______ hazard identification strategy.
20 Clues: HEAD OF AIRLINES SECURITY. • RDX IS AN EXAMPLE OF ______ • PHONETIC ALPHABET FOR LETTER L? • Regulatory aviation authority of India. • A Hazard Report is generally closed in __ days • An application wherein we can raise a Hazard Report. • Confidential Reports are mailed to ______@airvistara.com • A Hazard Report is a ______ hazard identification strategy. • ...
CO1 Aviation Security 2024-06-12
Across
- Abbreviation of the Civil Aviation Authority
- The 3 Digit IATA code for Gold Coast Airport
- The Area where planes park and is usually in line with the terminal
- The 3 Digit IATA Code for Dubai Airport
- Abbreviation of The Ministry of Primary Industries
- What Word is created using these Phonetic Alphabet words Tango, Romeo,Alpha, Victor,Echo,Lima
- Abbreviation for Passenger
- Abbreviation of Aviation Security
- The 3 Digit IATA Code for Houston Airport
- The 2 Digit flight code for Singapore Airlines
- The 3 Digit IATA Code for Hong Kong Airport
Down
- An Airline
- The area you must pass through before going through security
- The 2 Digit Flight Code for Air New Zealand
- Exiting or leaving the aircraft
- the type of permit you must get to leave certain countries
- What is the national carrier of Australia
- What word is created using these phonetic alphabet words Victor,India,Sierra,Alpha
- Abbreviation for air traffic control
- Abbreviation for Liquid, Aerosols and Gels
20 Clues: An Airline • Abbreviation for Passenger • Exiting or leaving the aircraft • Abbreviation of Aviation Security • Abbreviation for air traffic control • The 3 Digit IATA Code for Dubai Airport • What is the national carrier of Australia • The 3 Digit IATA Code for Houston Airport • Abbreviation for Liquid, Aerosols and Gels • The 2 Digit Flight Code for Air New Zealand • ...
4. Computer security 2024-06-18
Across
- The process of making data in a computer system unintelligible.
- Any software which has been written with the intent to cause disruption, damage or inconvenience.
- A form of identification and authentication which relies on comparing scans of e.g. your face, fingerprints, eye retina etc with a stored set of information."
- Any system which periodically checks and downloads / updates software to make sure it always has the latest bug fixes and enhancements.
- The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
- that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A program that appears harmless, but is, in fact, malicious."
- A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
- A group of software policies and written procedures which together help to enhance and maintain the security of data held on a computer network.
- Sending emails purporting to be from reputable companies to induce people to reveal personal information.
- A cyber attack intended to redirect a website's traffic to another, fake site.
- The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Down
- Testing designed to check the security and vulnerabilities of a system.
- The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- The process by which a user logging into a system can be checked and verified before being given access.
- Allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.
- A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites."
- that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data."
- A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- Observing a person's private information over their shoulder eg cashpoint machine PIN numbers.
- Any storage media which can easily be removed from a computer thus allowing the transport of data away e.g. Optical Disk, flash / USB pen etc.
- A secret word or phrase that must be used to gain access to a computer / program / interface / system.
24 Clues: A program that appears harmless, but is, in fact, malicious." • The process of making data in a computer system unintelligible. • Testing designed to check the security and vulnerabilities of a system. • A cyber attack intended to redirect a website's traffic to another, fake site. • ...
Safety/Security 2025 2025-11-13
Across
- A violent confrontation
- Our work location
- law enforcement officer
- Insurance Company
- SCOE's intercom system
- You do this to exercise
- Security Coordinator
- Round container with emergency supplies
- Chair with wheels
- Training, practicing exercises
- A cylinder with a wick, never leave unattended
Down
- Don't connect more than ___extension cords
- The action of emptying a building
- Underwriters Laboratories
- Use this to fight Bob the intruder
- Knowledge of surroundings
- Who to call when injured
- safety specialist
- A state of restricted movement and talking
- Use these when using stairs
- SCOE's guard
- Device that converts signals into sound waves
- Kids game, keep out of sight
- Trespasser
- Risk Manager
25 Clues: Trespasser • SCOE's guard • Risk Manager • Our work location • Insurance Company • safety specialist • Chair with wheels • Security Coordinator • SCOE's intercom system • A violent confrontation • law enforcement officer • You do this to exercise • Who to call when injured • Underwriters Laboratories • Knowledge of surroundings • Use these when using stairs • Kids game, keep out of sight • ...
Security and Safety 2025-11-10
Across
- Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
- Malicious computer code that reproduces itself on the same computer. Almost all viruses “infect” by inserting themselves into a computer file. When the file is opened, the virus is activated.
- Malware that hides inside another program, often one downloaded from the web.
- A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
- A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
- Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
- Attackers who are strongly motivated by principles or beliefs.
- The process of sifting through big data to find the important questions that will yield fruitful results.
- Bullying that takes place on technology devices using online social media platforms, public online forums, gaming sites, text messaging, or email
- The security threat to a company that comes from its own employees, contractors, and business partners.
- A technology used to verify a user’s identity and key that has been “signed” by a trusted third party
- A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
- Involves using someone’s personal information to commit financial fraud
Down
- An individual who attacks a nation’s computer networks to cause disruption and panic among citizens.
- A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie
- A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
- An individual who wants to attack computers but lacks the knowledge of computers and networks needed to do so.
- A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
- Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
- Longer combination of letters, numbers, symbols
- The process of “scrambling” information so it cannot be read unless the user possesses the “key” to unlock it (decryption)
21 Clues: Longer combination of letters, numbers, symbols • Attackers who are strongly motivated by principles or beliefs. • Involves using someone’s personal information to commit financial fraud • Malware that hides inside another program, often one downloaded from the web. • ...
Industrial Security Concepts 2025-09-23
Across
- sound and good judgment to arrive at wise and timely decisions
- information is discovered and develops
- always in a condition to render effective service even under the most strenuous conditions
- being watchful in spotting violator, a person, a vehicle or an incident
- ability to deal with others successfully without offending;
- ability to take hold of oneself regardless of a provoking situation.
- a metallic container used for the safekeeping of document or small items in an office or installation.
- distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person.
- uprightness in character, soundness of moral principle, freedom from moral delinquencies.
- the ability or tendency to act or to decide with prudence, the habit of wise judgment
Down
- inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury.
- opinion or estimation in which one is generally held. It is what a person is reported to be whereas character is what a person is.
- faith in oneself and his abilities;
- faithful allegiance to the Philippine government and its duly constitutional authorities
- is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). probability of an event to happen that will lead to loss.
- A chance of being injured or harmed;
- a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside
- An indication of impending danger or harm;
- heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, document and negotiable instruments. Vaults are bigger than safe but smaller than a file room.
- the sum of traits that have been impresses by nature, education and habit upon the individual
20 Clues: faith in oneself and his abilities; • A chance of being injured or harmed; • information is discovered and develops • An indication of impending danger or harm; • ability to deal with others successfully without offending; • sound and good judgment to arrive at wise and timely decisions • ability to take hold of oneself regardless of a provoking situation. • ...
Aviation Security & Safety 2025-07-20
Across
- The heart of hospitality in aviation, ensuring passengers needs are met with care and efficiency
- A type of flight that takes you beyond your home country's borders
- A situation requiring immediate action, often triggering special airport procedures
- Planes need this long, clear path to lift off or touch down safely
- A protective shelter where aircraft rest, get maintained, and prepare for their next flight
- The invisible line separating nations, often requiring passports and security checks to cross
- Where travelers declared goods are checked before entering the country
- Any potential risk to affect safety, including unauthorized access over security borders
- Where passports are checked before travelers' cross international borders
- Suitcases and bags you take with you when travelling
- Controlling who can enter restricted airport zones to protect unauthorized personal from reaching restricted areas
Down
- The hub where passengers arrive, depart, and connect across the states
- The process of inspecting passengers, luggage and cargo to detect prohibited or dangerous items
- Type of flight that keeps you within your home country's borders
- The key to sharing information clearly, whether in aviation or daily life
- Someone who travels by plane, train or car but doesn't operate the vehicle
- A place where passengers check in, board flights, and retrieve luggage
- The secured part of the airport you reach after clearing security, where boarding begins
- The public area of an airport, accessible without passing through security
- The top priority in aviation, guiding procedures to protect passengers and crew
20 Clues: Suitcases and bags you take with you when travelling • Type of flight that keeps you within your home country's borders • A type of flight that takes you beyond your home country's borders • Planes need this long, clear path to lift off or touch down safely • The hub where passengers arrive, depart, and connect across the states • ...
SAFETY AND SECURITY 2025-07-10
Across
- What part of the airport coordinates safety on runway?
- What officer checks for prohibited foods or plants?
- Where can family and friends wait to pick you up?
- What process scans your baggage for dangerous items?
- What must be locked for taxi, take off and landing?
- What’s required to board an international flight?
- What security tool detects metal on passengers?
- What vehicle moves aircraft backwards from the gate?
- What area allows passengers to drop off bags?
Down
- Where do you go through security screening?
- What connects the terminal to the aircraft for boarding?
- What rule limits liquids in carry on?
- What must be declared at customs?
- What area do only passengers with boarding passes enter?
- Who gives passengers safety instructions on board?
- What are you asked to remove at the checkpoint?
- What is checked at customs?
- What must passengers show at boarding?
- What clearance is required before entering secure zones?
- What must be turned off when take off and landing?
20 Clues: What is checked at customs? • What must be declared at customs? • What rule limits liquids in carry on? • What must passengers show at boarding? • Where do you go through security screening? • What area allows passengers to drop off bags? • What are you asked to remove at the checkpoint? • What security tool detects metal on passengers? • ...
CYBERSECURITY 2021-01-15
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- a defense technology designed to keep the malicious attacks out.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- internet version of a home address for your computer.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
17 Clues: internet version of a home address for your computer. • a defense technology designed to keep the malicious attacks out. • A group of computers, printers and devices that are interconnected and governed as a whole. • The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • ...
3 2024-06-12
Across
- Security that gives the right to buy a stock at a specific price by a certain date
- Firm that facilitates buying and selling of securities
- Visual representation of a stock's price history
- (Initial Public Offering)** See above (already used)
- RATIO** Measure of a company's financial leverage
- ANALYSIS** Study of price charts and indicators to predict future price movements
- Number of shares traded in a specific period
- (Earnings Per Share)** Company's profit divided by the number of outstanding shares
- ANALYSIS** Evaluation of a company's financial health and future prospects
Down
- Combining multiple shares of a company's stock into fewer shares
- Offer to sell a security at a specific price
- Division of a company's stock into a larger number of shares
- Difference between the buy and sell price of a security
- Offer to buy a security at a specific price
- CALL** Broker's demand for additional funds to maintain a margin position
- Completion of a buy or sell order
16 Clues: Completion of a buy or sell order • Offer to buy a security at a specific price • Offer to sell a security at a specific price • Number of shares traded in a specific period • Visual representation of a stock's price history • RATIO** Measure of a company's financial leverage • (Initial Public Offering)** See above (already used) • ...
cyber bulling! 2023-05-22
5 Clues: Bulling online. • stalking online. • - pretending to be some else • - you don't let someone join you • - The may include trolling, bullying, hate speech and doxing.
cyber bullying 2015-11-10
11 Clues: to pevent • a website • being rude • on internet • on the internet • taking gods name in vain • bullying more than one person • for everyone to use. socialise • making someone feel uncomfortable • gaining access to info on an organisation computer • someone who gains access to information on an organisation computer
Information Security Crossword Puzzle 2018-07-16
Across
- Type of information that requires protection
- Threats to Information Security
- An unauthorised programme, which replicates itself and spreads onto various data storage media and/or across a network
- One of the three basic components of information security
- One way that information security ensures trust and privacy
Down
- Considered one of the threats to your information security policy
- An essential company asset
- A goal of information security
- One of the high Level information security principles
9 Clues: An essential company asset • A goal of information security • Threats to Information Security • Type of information that requires protection • One of the high Level information security principles • One of the three basic components of information security • One way that information security ensures trust and privacy • ...
Mortal Kombat Kharacters 2023-08-17
Across
- Guest Kharacter who hunts species across the galaxy
- Artificial construct of Time
- Guest Kharacter from "the Boys"
- Fallen Eldergod with an Amulet
- Martial Arts master of drunken boxing
- New Princess of Outworld created from her sister
- Hanzo Hasashi's Apprentice
- New timeline Cyber Lin Kuei member
- Amalgamation of Souls created by Quan Chi
- Skinned flesh monster from the fleshpits
- Shirai Ryu Wraith
- Shaolin Archer
- SubZero's apprentice
- Ninja Mine
- Member of the New Black Dragon
- Oni demon partnered with Drahmin
- Netherrealm demon using a Kriss to cleanse her soul
- Former Outworld King turned into an Oni
- Guest Kharacter, exclusive to Playstation
- The Osh-Tekk leader of Outworld
- Centaur who hates the Shokan
- Symbiotic Warriors from Outworld
- Demon under control of Quan Chi, who falls in love with SubZero
- Bodyguard of Princess Kitana
- Female Shokan Warrior who guards the Edenian Queen
- Guest Kharacter played by Arnold Schwartzenegger
- Mercenary for hire, originally from Earthrealm now lives in Outworld
- Blind Swordsman
- Earthrealm's Champion
- Elemental created to monitor the realms
- Palette Swap ninja whi uses the moves of other male ninjas
- Leader of the Black Dragon
- Edenian Demi-God who has become an outcast
- The Dragon King
- Lieutenant (later commander) of the Special Forces
- Shokan Prince
- Warrior created through Blood Magic
- Lin Kuei warrior created by a cult
- Matoka Warrior with green tomahawks
- Tarkatan Warrior
- Princess of Edenia and Outworld
Down
- High-ranking Red Dragon Member
- Guest Kharacter with a cape
- Orderrealm Mercenary
- Red Lin Kuei Warrior who heads the cyber initiative
- Guest Kharacter with a Chainsaw
- Queen of Edenia
- Special Forces member with gauntlets
- Shokan killed by Sonya Blade
- God of Thunder
- Kytinn warrior loyal to Shinnok and Kronika
- The Guardsman of the Orderrealm
- Motion Capture actor
- Cyber Lin Kuei Warrior drafted against his will
- Guest Kharacter from "the Boys"
- Brown Ninja who joined the Black Dragon
- Leader of Outworld
- The new identity of the undead spirit of the original Sub-Zero
- Naknadan Warrior
- General who serves both Shinnok and Shao Kahn
- God of Wind
- Elder Goddess of Life and Virtue
- Guest Kharacter from Suicide Squad
- Lin Kuei Assassin, later grandmaster
- Former Black Dragon member, helped to reform the New Black Dragon
- Guest Kharacter played by Sylvester Stallone
- Kombat Kid that leads a division of the special forces
- The Cleric of Chaos
- Saurian servant of Shang Tsung
- Argus's good son
- NYPD Police Officer
- Sorcerer from the Netherrealm
- Outworld Sorcerer
- Guest Kharacter from the Dreamrealm
- Guest Kharacter with a machete
- Special Forces Major
- Leader of the resistence in the Orderrealm
- Time Titan, Mother of two Elder Gods
- Guest Kharacter who is a police officer from the future
- Shaolin Monk on a path to enlightenment
- Cyber Lin Kuei Amalgamation of three other warriors
- Member of the Red Dragon
- Member of the Black Dragon
- He collected the Kamidogu
- Guest Kharacter seeking a place to repopulate
- Outworlder who defects to aid Earthrealm
- Last female Zaterran
- The Edenian Traitor
- Descendant of a the first mortal kombat champion
- Member of the New Black Dragon
- Vampire from the realm of Vaeternus
- Argus' s evil son
92 Clues: Ninja Mine • God of Wind • Shokan Prince • God of Thunder • Shaolin Archer • Queen of Edenia • Blind Swordsman • The Dragon King • Naknadan Warrior • Argus's good son • Tarkatan Warrior • Shirai Ryu Wraith • Outworld Sorcerer • Argus' s evil son • Leader of Outworld • The Cleric of Chaos • NYPD Police Officer • The Edenian Traitor • Orderrealm Mercenary • Motion Capture actor • SubZero's apprentice • ...
CYBERSECURITY 2021-01-05
Across
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- a defense technology designed to keep the malicious attacks out.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- internet version of a home address for your computer.
- A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- A group of computers, printers and devices that are interconnected and governed as a whole.
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
17 Clues: internet version of a home address for your computer. • a defense technology designed to keep the malicious attacks out. • A group of computers, printers and devices that are interconnected and governed as a whole. • The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • ...
Computer Systems Crossword 2014-09-10
Across
- popular social networking site
- proof for a point/argument
- patent so that it is inaccessible
- trustworthy, dependable
- being secure, having a firewall
- security precaution applied to a computer
- communicating with various other people on line
Down
- disguarding to be used as something else
- the act of accessing another's computer from an external source
- not using a computer in the right way
- having security, being private
- computer system with a dedicated function within a larger mechanical or electrical system
- protecting data
- able to access, not closed
14 Clues: protecting data • trustworthy, dependable • proof for a point/argument • able to access, not closed • popular social networking site • having security, being private • being secure, having a firewall • patent so that it is inaccessible • not using a computer in the right way • disguarding to be used as something else • security precaution applied to a computer • ...
compliance 2016-06-09
Across
- business continuity abbreviation
- where you dispose of confidential documents
- 2nd information security principle
- way to communicate directly with a member of management
- 3rd information security principle
- proper disposal of consumer information act
Down
- 1st information security principle
- provides education,tools, and resources to reduce risk from injuries
- you plug your cell phone into your SF equipment
- either purposeful or willingly let unauthorized person pass through
- ataccidentally or inadvertently let unauthorized person pass through
- information retention abbreviation
- must display on your person above the waist
- days to file an expense report
14 Clues: days to file an expense report • business continuity abbreviation • 1st information security principle • 2nd information security principle • 3rd information security principle • information retention abbreviation • where you dispose of confidential documents • must display on your person above the waist • proper disposal of consumer information act • ...
IT Stuff 2024-05-30
Across
- Your ID on the computer
- Extra login security
- What you type on
- People who program
- Can wear black or white hats
- What computers run
- Secret word or phrase
- What we work with
Down
- What you look at
- Bad software, demands money
- Connects computers
- For safety
- A computer or program that serves users
- Brain of the computer
- The plural of DATUM
- Pointer controller
- Wireless
- The singular of DATA
- Where you can store data
19 Clues: Wireless • For safety • What you look at • What you type on • What we work with • Connects computers • People who program • What computers run • Pointer controller • The plural of DATUM • Extra login security • The singular of DATA • Brain of the computer • Secret word or phrase • Your ID on the computer • Where you can store data • Bad software, demands money • Can wear black or white hats • ...
Cybersecurity crossword 2025-06-07
Across
- Overwhelms servers with traffic
- Scrambling data for security
- Fraudulent attempt to steal data
- Stealthy malware with deep access
- Secures internet connections
- Popular cryptocurrency
- Malware that demands payment
- Malware disguised as legitimate
- Breaches systems illegally
Down
- Remote data storage
- Tracks keystrokes secretly
- Network of infected devices
- Uses fingerprints or face ID
- Artificial intelligence
- Software update fixing flaws
- Software that spies on users
- Harmful software like viruses
- Network security barrier
- Secret code for access
19 Clues: Remote data storage • Secret code for access • Popular cryptocurrency • Artificial intelligence • Network security barrier • Tracks keystrokes secretly • Breaches systems illegally • Network of infected devices • Uses fingerprints or face ID • Scrambling data for security • Software update fixing flaws • Software that spies on users • Secures internet connections • ...
Cybersecurity 2023-01-25
Across
- changing ip addresses
- malware that collects personal data
- applications that direct computers
- program that allows remote access
- "UI redress attack"
- network of computers for attacks
- short for malicious software
- an attack that wants ransom
- means to attack a system
- connected items that represent one
Down
- protects data by scrambling it
- protects your location
- using media manipulation to scam
- cyber attack that is disguised
- filters network traffic
- used to detect viruses
- being bullied using the internet
- where users store data
- using your own device
- malware that reproduces itself
20 Clues: "UI redress attack" • changing ip addresses • using your own device • protects your location • used to detect viruses • where users store data • filters network traffic • means to attack a system • an attack that wants ransom • short for malicious software • protects data by scrambling it • cyber attack that is disguised • malware that reproduces itself • ...
The Happy Class of 6B! The 6B crossword that makes you truly know your friends! 2022-11-14
Across
- The one who is on her way to success.
- Marvel fan
- His name ends with a hero's name.
- He plays black and white on a green field.
- He's our habibi
- The New Member of 6B
- Our French amie
- Our future lawyer
- The one who speaks with love
- The deep voice actor
Down
- She can paint Pennywise on a cloth
- Always happy
- Tennis master
- The tallest, yet the youngest.
- Cooking Queen
- His last name rhymes with his first
- The Cheetah of our class
- The Class Artist.
- Gymnastics pro
- Cyber Star
20 Clues: Marvel fan • Cyber Star • Always happy • Tennis master • Cooking Queen • Gymnastics pro • He's our habibi • Our French amie • The Class Artist. • Our future lawyer • The New Member of 6B • The deep voice actor • The Cheetah of our class • The one who speaks with love • The tallest, yet the youngest. • His name ends with a hero's name. • She can paint Pennywise on a cloth • ...
Sean Internet Crossword 2015-04-30
Across
- Blocks access from hackers or unwanted access
- A hack that infects files
- A website about a specific topic
- to renew
- Law granting no use of Something without permission
- Bully a bully online
- Something you use for internet
Down
- To cite Someone
- Someone who gets on computer remotely without permission
- Full link name
- Engine Google
- Global Network
12 Clues: to renew • Engine Google • Full link name • Global Network • To cite Someone • Bully a bully online • A hack that infects files • Something you use for internet • A website about a specific topic • Blocks access from hackers or unwanted access • Law granting no use of Something without permission • Someone who gets on computer remotely without permission
CWiCS Cybersecurity Crossword Event 2021-02-25
Across
- A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- The telecom service provider became the victim of a Magecart card-skimming attack.
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
- -- based cyber attacks rose 630% between January and April 2020
- Trojan functioning as a downloader or dropper of other malwares
- Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------------- and stole patient data
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Malicious code was sneaked into updates to this SolarWinds software
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Since -------, the US FBI reported a 300% increase in reported cybercrimes
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher
25 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • -- based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
Explore the new ascendlearning.com 2023-08-24
Across
- Ascend value
- Ascend safety and security brand
- Ascend Learning tagline
- Ascend solution
- Ascend CFO
- Ascend healthcare brand
- Ascend CEO
- Company that recognized Ascend as a Great Workplace for Diversity
- Ascend inclusion learning program
- Ascend General Counsel
Down
- Ascend president of healthcare
- Ascend fitness and wellness brand
- Ascend value
- Ascend executive VP of corporate development
- Ascend Burlington community outreach group
- Ascend president of safety and security
- Healthcare vertical
- Ascend CHRO
- Ascend CTO
- Ascend Burlington address
20 Clues: Ascend CTO • Ascend CFO • Ascend CEO • Ascend CHRO • Ascend value • Ascend value • Ascend solution • Healthcare vertical • Ascend General Counsel • Ascend Learning tagline • Ascend healthcare brand • Ascend Burlington address • Ascend president of healthcare • Ascend safety and security brand • Ascend fitness and wellness brand • Ascend inclusion learning program • ...
FMI1 2020-08-18
Across
- – number of shares that are available for public to trade
- – B in CBLO
- – Settlement T+2
- - Governor
- – Exchanging one for another
- – Repurchase Option
- – 1969 Bank….
Down
- – Call and Put
- – Same income taxed twice
- – Person providing both bid and ask quotes for same security so as to enable trading in that security
- – 1992 Big Bull
- – Govt security typically of less than 1 year duration
12 Clues: - Governor • – B in CBLO • – 1969 Bank…. • – Call and Put • – 1992 Big Bull • – Settlement T+2 • – Repurchase Option • – Same income taxed twice • – Exchanging one for another • – Govt security typically of less than 1 year duration • – number of shares that are available for public to trade • ...
cyber bulling! 2023-05-22
5 Clues: Bulling online. • stalking online. • - pretending to be some else • - you don't let someone join you • - The may include trolling, bullying, hate speech and doxing.
Security Guard Crossword 2021-11-11
Across
- accomplished primarily by non-verbal communication
- when using a fire extinguisher you should sweep at what part of the fire
- shape of sign that should be displayed showing the type of hazardous material
- lowest level of the Use of Force Continuum
- security services contractor can provide security patrol services to a business on a
- crime that carries the most punishment
Down
- person that is responsible for the day to day operations for a security company
- a pocket card is the property of
- the Private Security Bureau has the authority to license who as a peace officer
- a security officer must always have this on his person while on duty
- what crime is committed when a person breaks into a car shop and steals a set of tires
- should be checked before your shift starts
12 Clues: a pocket card is the property of • crime that carries the most punishment • lowest level of the Use of Force Continuum • should be checked before your shift starts • accomplished primarily by non-verbal communication • a security officer must always have this on his person while on duty • when using a fire extinguisher you should sweep at what part of the fire • ...
Cyber Safety 2022-09-06
Across
- Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money.
- Set a ________________ password to keep your online accounts secure.
- Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
- Spam, phishing and scams are examples of cyber __________________.
Down
- A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
- ________________ suspicious attachments or links.
- Remember to ________ ________ of your accounts.
7 Clues: Remember to ________ ________ of your accounts. • ________________ suspicious attachments or links. • Spam, phishing and scams are examples of cyber __________________. • Set a ________________ password to keep your online accounts secure. • A cyber attack that uses emails or malicious websites to steal a person’s login and password details. • ...
Cyber Safety 2022-09-06
Across
- A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
- Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money.
- Remember to ________ ________ of your accounts.
Down
- Spam, phishing and scams are examples of cyber __________________.
- Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
- ________________ suspicious attachments or links.
- Set a ________________ password to keep your online accounts secure.
7 Clues: Remember to ________ ________ of your accounts. • ________________ suspicious attachments or links. • Spam, phishing and scams are examples of cyber __________________. • Set a ________________ password to keep your online accounts secure. • A cyber attack that uses emails or malicious websites to steal a person’s login and password details. • ...
Black Friday Mania!!! 2021-11-26
Across
- they usually have long lines
- devices for kids and adults
- Kids favorites for Christmas
- the reason for the day
- goods sold at reduced prices
Down
- celebrated the day before
- everyone gets these for Christmas
- Major retailer
- Monday, celebrated the day after
- Most wonderful time of the year
- gift option
- a device or piece of equipment
12 Clues: gift option • Major retailer • the reason for the day • celebrated the day before • devices for kids and adults • they usually have long lines • Kids favorites for Christmas • goods sold at reduced prices • a device or piece of equipment • Most wonderful time of the year • Monday, celebrated the day after • everyone gets these for Christmas
GENERASI TANGGUH ANTI BULLY 2024-09-09
Across
- PERUNDUNGAN DENGAN MEMUKUL DAN MENENDANG
- DAMPAK DIANCAM
- PERUNDUNGAN DENGAN MENGUCILKAN ORANG LAIN
- JIKA TERJADI PERUNDUNGAN
- BERANI BERKATA ... PADA PELAKU PERUNDUNGAN
- SALAH SATU CARA MENGAJAK ORANG LAIN MENCEGAH PERUNDUNGAN
Down
- MEMBANGUN ... ANTARA ANAK DAN ORANGTUA
- SALAH SATU AKIBAT PERUNDUNGAN
- PERUNDUNGAN MELALUI MEDIA SOSIAL
- PERILAKU TIDAK MENYENANGKAN
- SALAH SATU CARA MENGHADAPI PERUNDUNGAN
- TIM PENCEGAHAN DAN PENANGANAN TINDAKAN KEKERASAN
- DAMPAK DIEJEK
- PERUNDUNGAN DENGAN MEMANGGIL JULUKAN TERTENTU
14 Clues: DAMPAK DIEJEK • DAMPAK DIANCAM • JIKA TERJADI PERUNDUNGAN • PERILAKU TIDAK MENYENANGKAN • SALAH SATU AKIBAT PERUNDUNGAN • PERUNDUNGAN MELALUI MEDIA SOSIAL • MEMBANGUN ... ANTARA ANAK DAN ORANGTUA • SALAH SATU CARA MENGHADAPI PERUNDUNGAN • PERUNDUNGAN DENGAN MEMUKUL DAN MENENDANG • PERUNDUNGAN DENGAN MENGUCILKAN ORANG LAIN • BERANI BERKATA ... PADA PELAKU PERUNDUNGAN • ...
Nate k. 2021-03-04
Across
- When there is intent hurt or harm
- Writing mean messages on some elses social media
- what type of cyber bullying consist of, Online arguments using electronic messages with aggressive or abusive language
- An attack physically,emotionally, socially
- Some thing that happen more than once in a period of time
- what type of cyberbullying consist of, Disclosing someone else’s secrets or embarrassing information online without their consent
- to seek to harm, intimidate
- what type of cyberbullying consist of, pretending to be someone else and sending or posting material
Down
- what type of cyberbullying consist of, Spreading gossip, lies or rumours about someone to damage their reputation or friendships
- intentionally excluding someone from an online group is what type of cyberbullying
- what type of cyberbullying consist of, talking someone into revealing secrets or embarrassing information, then publishing it online
- What type of bullying is this an example of punching, kicking,spiting
- what type of cyberbullying consist of, repeatedly sending abusive, insulting, or unwanted messages
- Name calling, threatening is what type of bullying
- repeated, intense harassment and denigration that includes threats or creates significant fear what type of cyberbullying is this
15 Clues: to seek to harm, intimidate • When there is intent hurt or harm • An attack physically,emotionally, socially • Writing mean messages on some elses social media • Name calling, threatening is what type of bullying • Some thing that happen more than once in a period of time • What type of bullying is this an example of punching, kicking,spiting • ...
Bully By Allira 2023-11-28
10 Clues: online • Respect with dis • She was really ______. • Another word for mocking. • another word for upstander • She continued to ______ her. • Someone who stands and watches • She was the _____ of bullying. • person who is repetitively rude • The girl was about to ____ someone.
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
cyber safety 2024-07-25
11 Clues: weird • good guy • garbeage • bystander • the bully • upstander • toxic players • people screamed • people lucien is not weird • encourages us to be not gay • calls to make you do something
Cyber ethics 2025-06-12
Across
- Combining of word phishing and voice
- Combining of word net and etiquette
- footprints. Is an impression or information about a person that exists on the internet
- hacking. Hacking which is done for the good cause
- theft. Illegally stoles someone's identity and use it for bad practices
- Refers to unwanted bulk emails
Down
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- piracy. When software is copied and distributed illegally
- Illigal activity on internet
- Effects and damage the computer device
- Refers to an illegal intrusion into a computer system
11 Clues: Illigal activity on internet • Refers to unwanted bulk emails • Combining of word net and etiquette • Combining of word phishing and voice • Effects and damage the computer device • hacking. Hacking which is done for the good cause • Refers to an illegal intrusion into a computer system • piracy. When software is copied and distributed illegally • ...
Cyber Ethics 2025-06-12
Across
- all nodes are connected via central device
- criminal activities that include the use of computers
- network within city
- wireless fidelity
- sender transform data into unreadable code
Down
- illegal intrusion in a computer via internet
- fully connected network
- A program that disrupts the normal functioning of computer
- responsible behavior in social media
- legal right for original creator for his work
- wireless network
11 Clues: wireless network • wireless fidelity • network within city • fully connected network • responsible behavior in social media • all nodes are connected via central device • sender transform data into unreadable code • illegal intrusion in a computer via internet • legal right for original creator for his work • criminal activities that include the use of computers • ...
Netiquette nintendo 2023-02-27
Across
- il nome del bullismo tramite rete
- caratteri grandi che sul web equivale ad URLARE
- il contrario di buona educazione
- rendere pubblico sul web
- in rete
- persona cortese verso gli altri
Down
- riservato e rispetto delle proprie informazioni
- termini offensivi da non usare
- mail pubblicitarie da non condividere
- galateo informatico
- atteggiamento di riguardo
- rispetto degli altri
12 Clues: in rete • galateo informatico • rispetto degli altri • rendere pubblico sul web • atteggiamento di riguardo • termini offensivi da non usare • persona cortese verso gli altri • il contrario di buona educazione • il nome del bullismo tramite rete • mail pubblicitarie da non condividere • riservato e rispetto delle proprie informazioni • ...
Vocab Qtr 2 - Personal Finance 2025-01-13
Across
- Ownership of a company
- Tax on imported goods
- Money earned from investment
- Using the internet
- One's gain is another's loss
- Cyber threat
Down
- IRS college investment
- Money received from interest or gift
- Employers and/or employees pay as you earn
- Measurement on a monopoly
- Profit or loss on investment
- Digital Money not issued by government
12 Clues: Cyber threat • Using the internet • Tax on imported goods • IRS college investment • Ownership of a company • Measurement on a monopoly • Money earned from investment • Profit or loss on investment • One's gain is another's loss • Money received from interest or gift • Digital Money not issued by government • Employers and/or employees pay as you earn
Thanksgiving 2024-11-25
Across
- A brand of turkey which has a customer hotline
- Thanksgiving side dish
- Thanksgiving pie
- Friday after Thanksgiving
- Thanksgiving day of the week
Down
- Sport many enjoy playing or watching on Thanksgiving
- Common activity after Thanksgiving dinner
- Thanksgiving parade
- An amino acid in turkey
- Reason for celebrating Thanksgiving
- Thanksgiving main dish
- Monday after Thanksgiving
12 Clues: Thanksgiving pie • Thanksgiving parade • Thanksgiving side dish • Thanksgiving main dish • An amino acid in turkey • Monday after Thanksgiving • Friday after Thanksgiving • Thanksgiving day of the week • Reason for celebrating Thanksgiving • Common activity after Thanksgiving dinner • A brand of turkey which has a customer hotline • ...
December 2024 APCP Crossword 2024-12-02
Across
- drone delivery company
- repeat meal
- abbreviation for another live action remake
- self-driving car company
- (blank) Monday
- Monty (blank)
- ones and zeros
- this team will pay you to shovel snow
- also known as a custom block in Scratch
Down
- from Broadway to the screen
- game where you jump and avoid obstacles
- programming language
- you watched movies on this before DVDs
- you watched movies on this before streaming
- least populous US state
- Paul vs (blank)
- is this the future?
- a whole number
18 Clues: repeat meal • Monty (blank) • (blank) Monday • ones and zeros • a whole number • Paul vs (blank) • is this the future? • programming language • drone delivery company • least populous US state • self-driving car company • from Broadway to the screen • this team will pay you to shovel snow • you watched movies on this before DVDs • game where you jump and avoid obstacles • ...
Health 2023-09-01
10 Clues: mean person • leader of school • a choice you make • person who gets hurt • Person who teaches kids • person who saves the victim • The state of being protected • standing around and do nothing • The condition of being protected • bullying bullying someone online
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
weekly news 2025-01-09
10 Clues: resigned • truck explodes • carter dies at 100 • new 9 dollar tolls • storm across the U.S • catches fire on runway • la fire and 100 mph winds • wants greenland and canada • watching watch in the south • launches a new offense into russia
Information Security 2022-11-14
Across
- When Some User Alters Data
- Impact to _______ Security
- A Principle Of Information Security Beginning With A
- A Principle Of Information Security Beginning With I
- What Is An Unauthorised Access To Data
Down
- A Principle Of Information Security Beginning With C
- Loss Of Data
- Intentional ___________ Of Data
- When Someone Access Data They Shouldn't
- What Happens After A Risk Is Exploited
10 Clues: Loss Of Data • When Some User Alters Data • Impact to _______ Security • Intentional ___________ Of Data • What Happens After A Risk Is Exploited • What Is An Unauthorised Access To Data • When Someone Access Data They Shouldn't • A Principle Of Information Security Beginning With C • A Principle Of Information Security Beginning With A • ...
ACE: Cyber-Crime 2013-03-03
Across
- / coins or paper notes
- / dishonest or illegal behaviour, especially of people in authority
- / the act of harassing someone online by sending or posting mean messages, usually anonymously
- / the act of making illegal copies of video tapes, computer programs, books, etc.
- / a person who tries to get secret information about a country, organization, or person
- / the practice of sending mail, especially advertising material, through the Internet to a large number of people, who have not asked for it
- / instructions that are hidden within a computer program and are designed to cause faults or destroy data
- / the crime of deceiving somebody in order to get money or goods illegally
- / a machine which holds cash
- / not allowed by the law
Down
- / the rules of correct or polite behaviour among people using the Internet
- / books, videos, etc. that describe or show naked people and sexual acts in order to make people feel sexually excited, especially in a way that many other people find offensive
- / criminal activity or a crime that involves the Internet, a computer system, or computer technology
- / a system of trying to meet and talk to other people who may be useful to ou in your work
- / a person who spends a lot of time using computers for a hobby, especiallt to look at data without permission
- / the activities involved in protecting a country, building or person against attack, danger, etc.
- / a clever and dishonest plan for making money
17 Clues: / coins or paper notes • / not allowed by the law • / a machine which holds cash • / a clever and dishonest plan for making money • / dishonest or illegal behaviour, especially of people in authority • / the rules of correct or polite behaviour among people using the Internet • / the crime of deceiving somebody in order to get money or goods illegally • ...
CYBER ETHICS - 2 2025-05-24
Across
- is a type of phishing attacks
- is the combination of net and etiquette
- are defined as the legal rules
- refers to an illegal intrusion into a computer system or network.
- refers to the act of using or imitating the language
- refers to several computers loaded to the contrary licence terms
- refers to criminal activities that involve the use of computers
- is the criminal practice of using social influence
- is a malicious technique
Down
- refers to when someone copies a file and distribute them illegally
- refers to unwanted bulk emails that come from from unknown sources.
- is a practice which is a practice of sending bulk mails till the mail server gets full
- is a digital footprint
- is an integral part and parcel of our life.
- is a security system preventing unauthorised people to access your system
- is an equivalent term to hacking
- is the combination of voice and phishing
17 Clues: is a digital footprint • is a malicious technique • is a type of phishing attacks • are defined as the legal rules • is an equivalent term to hacking • is the combination of net and etiquette • is the combination of voice and phishing • is an integral part and parcel of our life. • is the criminal practice of using social influence • ...
Airports 2018-06-21
Across
- number of runways
- restrictions
- weight for a checked bag in economy class
- Gisborne three letter code
- animals for security
- perth
- Airport to Auckland city
- Airside
- landside
Down
- is not a dangerous good
- time
- me phonetic alphabet
- Wheelchair passengers
- 1 travel document
- the wall of an aircraft
- evacuating passengers from a stricken aircraft quickly and safely
- Number of Aviation security activities
- A passenger who does not turn up for their flight
- one entry level position
19 Clues: time • perth • Airside • landside • restrictions • number of runways • 1 travel document • me phonetic alphabet • animals for security • Wheelchair passengers • is not a dangerous good • the wall of an aircraft • Airport to Auckland city • one entry level position • Gisborne three letter code • Number of Aviation security activities • weight for a checked bag in economy class • ...
Allena L'Empatia 2025-03-11
Across
- Atto di discriminazione
- Offesa alla diversità
- Accettare tutte le persone
- Bullismo attraverso apparecchi elettronici
- Comprendere i sentimenti altrui
Down
- Coloro che sono fragili e subiscono atti di bullismo
- Aiutare chi è in difficoltà
- Voler bene a qualcuno
- Sostengono il bullo
- Considerare tutti uguali
- Cosa provoca il bullismo?
- Essere trattato nello stesso modo
- Persona non empatica e che provoca il bullismo
- Affrontare la situazione senza paura
14 Clues: Sostengono il bullo • Voler bene a qualcuno • Offesa alla diversità • Atto di discriminazione • Considerare tutti uguali • Cosa provoca il bullismo? • Accettare tutte le persone • Aiutare chi è in difficoltà • Comprendere i sentimenti altrui • Essere trattato nello stesso modo • Affrontare la situazione senza paura • Bullismo attraverso apparecchi elettronici • ...
Elle Severt- Types of bullying 2022-05-17
Across
- _____ Is the B of bullying,contains unequel power.
- ___ is the C of bullying, happens more than once.
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
- Layla spits on Jenny and laughs at her outfit, what is this?
Down
- Ms.Wilker is mean to Mrs.Black but apologizes, what is this considered?
- Cyber bullying can be someone texting or posting something __ photos of people.
- ___ is the D of bullying, it is a intention to harm.
- the A of bullying, physically, emotionally, or socially.
- Fred and Sammy are arguing and saying some mean things, but there's a solution to the problem. What is this called?
- Social bullying is spreading rumors,__ people from games and groups
- ___ has an unbalanced power and someone is getting harmed emotionally, socially,or physically.
- Jake threatened to beat up Marc after school, what is this?
- Jimmy and Timmy are calling each other names, but are laughing. What is this called?
15 Clues: ___ is the C of bullying, happens more than once. • _____ Is the B of bullying,contains unequel power. • ___ is the D of bullying, it is a intention to harm. • the A of bullying, physically, emotionally, or socially. • Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • ...
Security Awareness 2013-05-01
Across
- (2 words) An employee security awareness program across the ESPN and Walt Disney company.
- Distracted Drivers Awareness Month
- See ____? Say ___!
- DON’T BE A DISTRACTED ______!
- “Up from the ____” is Global Security’s initiative to reinforce Community Watch safety tips and give employees a fun way to learn more about our teammates.
Down
- ________ is a member of the security community.
- Never ____ your ID to another employee
- Do not open ___________ to unsolicited emails
- A type of “social engineering” generally in the form of an email or phone call intended to get people to respond to the phishers request for personal information.
- Self-Awareness is ________ Awareness - you know what is normal and not normal in your workplace.
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain standing with the victim via phone, email, or text, based on information they have obtained from these social networks.
- Contact Brian ____, Associate Director of Facility Security to find out more on how you can get involved with the Community Watch Team.
12 Clues: See ____? Say ___! • DON’T BE A DISTRACTED ______! • Distracted Drivers Awareness Month • Never ____ your ID to another employee • Do not open ___________ to unsolicited emails • ________ is a member of the security community. • (2 words) An employee security awareness program across the ESPN and Walt Disney company. • ...
Security - Hard 2023-11-28
Across
- practice of intentionally and ethically hacking into systems to discover vulnerabilities
- cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
- security model emphasizing the importance of confidentiality, integrity, and availability of information
- type of attack involves capturing and analyzing network traffic to obtain sensitive information
- attack that employs multiple methods simultaneously
- type of malware changes its appearance and characteristics to evade detection
Down
- process of hiding information within another file or message
- cybersecurity principle ensuring that data is accurate, complete, and unaltered
- practice of disguising data traffic to make it look like normal traffic
- Linux user's favorite game
- cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
- type of malware disguises itself as legitimate software to trick users into installing it
12 Clues: Linux user's favorite game • attack that employs multiple methods simultaneously • process of hiding information within another file or message • practice of disguising data traffic to make it look like normal traffic • type of malware changes its appearance and characteristics to evade detection • ...
SECURITY DOMAIN 2023-11-03
Across
- / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access.
- / Means the program to increase the knowledge and improve the attitude that members of an organization possess regarding the protection of the physical, and especially informational, assets of an organization.
- / Responsible for managing and maintaining the security of computer systems, including user accounts, access controls, and system configurations.
- Issues / Refers to the ethical, legal, and social considerations related to technology and cybersecurity, including privacy and compliance issues.
- / Refer to the underlying software and hardware technologies that provide a foundation for building applications or services, like operating systems or cloud platforms.
Down
- / The study, planning and design of how people and computers work together so that a person’s need are satisfied in the most effective way.
- and Architecture / Addresses the security aspects of integrating different systems and designing secure system architectures.
- / Refers to physical security measures, such as securing data centers, facilities, and infrastructure from physical threats.
- / Centered on securing web applications, servers, and the communication between users and web services.
- / Refers to the practice of integrating different software components or systems to work together cohesively and efficiently.
- / Deals with the secure handling, storage, retrieval, and sharing of sensitive information and data within an organization.
- / Refers to the foundational principles and concepts in computer programming, such as data structures, algorithms, and coding basics.
12 Clues: / Centered on securing web applications, servers, and the communication between users and web services. • / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access. • ...
Security & Safeguards 2024-10-04
Across
- Security Officer
- Protection from potential harm
- You walk through it
- ADM163
Down
- Department of Health & Human Services
- DHHS owned or leased building
- Any device that performs computing functions
- The release of information
- Staff Members
- Protective measures or actions
- Work related instruction
- Protection of personal information
12 Clues: ADM163 • Staff Members • Security Officer • You walk through it • Work related instruction • The release of information • DHHS owned or leased building • Protection from potential harm • Protective measures or actions • Protection of personal information • Department of Health & Human Services • Any device that performs computing functions
Food security 2024-10-17
Across
- Staple food that includes wheat, rice, and corn
- Organisms harmful to crops
- Common cereal crop for bread and flour
- Fair distribution of resources
- Severe shortage of food in a region
Down
- Land area where food is grown
- Environmental factor impacting agriculture
- Physical well-being affected by nutrition
- Essential resource for irrigation and crop growth
- Foundation needed for planting crops
- State of needing food due to lack of access
- Exchange of goods between regions
12 Clues: Organisms harmful to crops • Land area where food is grown • Fair distribution of resources • Exchange of goods between regions • Severe shortage of food in a region • Foundation needed for planting crops • Common cereal crop for bread and flour • Physical well-being affected by nutrition • Environmental factor impacting agriculture • ...
Test Security 2025-10-09
Across
- Involves protecting ALL secure test content and student information
- No person may view, ____, or discuss the contents of any state assessment before, during, or after a test administration.
- One of the two areas of test security
- One of the two types of irregularities
- All staff members must sign one today
- Test Security Ensures all students’ testing opportunities are meaningful and ____.
Down
- Some of the most common types of testing irregularities, but the can be reduced with annual training.
- One penalty of violating test security includes _____ student test results
- No person may duplicate, print, record, write notes about, or _____ (electronically or by any other means) any portion of a secure assessment instrument (paper or online).
- A one stop shopping for users needing information about all aspects of testing
- If you catch a student using a telecommunication device during testing, contact ____ immediately.
- Where secure materials are stored on our campus
12 Clues: One of the two areas of test security • All staff members must sign one today • One of the two types of irregularities • Where secure materials are stored on our campus • Involves protecting ALL secure test content and student information • One penalty of violating test security includes _____ student test results • ...
Air side and land side 2018-02-25
Across
- / Kapita Coast
- / Hokitika
- / Fill in gap... Air side is the area where you go through security & hand over your ..... and departure card for inspection.
- / How many restrictions does Auckland airport have from airfeild data.
- / Name of Blenheim airport.
- / Domestic flights involve passengers having to show there...
- / Name of Aucklands airport.
- / GDP stands for...
- / Can be accessed by both travellers and non-travellers.
- / Timaru
- / What must departing passengers pass through.
Down
- / Land side includes .... lots, public transports such as bus stations
- / What do you need to go through as well as passport control.
- / Any staff trying to access air side, must be wearing ther...
- / Land side is considered to be...
- / Which side would you find duty-free, shops, taxiways and aprons.
- / What must you be to get from land side to air side
- / Hamilton
- / Taupo
19 Clues: / GDP stands for... • / Taupo • / Timaru • / Hokitika • / Hamilton • / Name of Blenheim airport. • / Name of Aucklands airport. • / Kapita Coast • / Land side is considered to be... • / Any staff trying to access air side, must be wearing ther... • ...
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
Cyberpiracy 2022-05-19
Black Friday Bonanza! 2024-11-28
Across
- A compound word that is criminal!
- Confusion and disaster
- After Thanksgiving
- A large drop in wealth
- The sport associated with the real story of Black Friday
Down
- No compassion and all in a crooked house
- The city where it all began.
- Very cheerful and delightful
- To change
- A loss
- Disaster and confusion
- Profit
12 Clues: A loss • Profit • To change • After Thanksgiving • Confusion and disaster • Disaster and confusion • A large drop in wealth • The city where it all began. • Very cheerful and delightful • A compound word that is criminal! • No compassion and all in a crooked house • The sport associated with the real story of Black Friday
moneyy 2023-11-07
Across
- things we can post
- cyber
- when people convince you to buy things you dont need
- something you own
- people convice you to give them money thats not theirs
- money one doesnt spend
Down
- stealing
- the final amount of ones paycheck
- things we shouldnt post
- something you owe
- something one can live without
- something one cant live without
- whats most important to someone
- scams that target older people
- a profession that holds your money for you
- what do we spend
16 Clues: cyber • stealing • what do we spend • something you owe • something you own • things we can post • money one doesnt spend • things we shouldnt post • something one can live without • scams that target older people • something one cant live without • whats most important to someone • the final amount of ones paycheck • a profession that holds your money for you • ...
Information Security 2022-11-14
Across
- When Some User Alters Data
- Impact to _______ Security
- A Principle Of Information Security Beginning With A
- A Principle Of Information Security Beginning With I
- What Is An Unauthorised Access To Data
Down
- A Principle Of Information Security Beginning With C
- Loss Of Data
- Intentional ___________ Of Data
- When Someone Access Data They Shouldn't
- What Happens After A Risk Is Exploited
10 Clues: Loss Of Data • When Some User Alters Data • Impact to _______ Security • Intentional ___________ Of Data • What Happens After A Risk Is Exploited • What Is An Unauthorised Access To Data • When Someone Access Data They Shouldn't • A Principle Of Information Security Beginning With C • A Principle Of Information Security Beginning With A • ...
Foreign Policy Crossword 2023-05-18
Across
- What is called when a country stays out of world affairs?
- another word for spies or subversion?
- What's the name of the free trade zone between Canada and Mexico?
- Who handles public security?
- Which branch declares war?
- Who chooses the US ambassador?
- What is the opposite of isolationism?
Down
- What's foreign policy position that opposes European colonialism in the western hemisphere?
- Who conforms the ambassador pick?
- Who interprets treaties?
- Who advises president ambassadors?
- Service Who carries out US policy and assists US citizens overseas?
- War fought indirectly is-
- Who handles security issues in US?
- Who handles security internationally?
15 Clues: Who interprets treaties? • War fought indirectly is- • Which branch declares war? • Who handles public security? • Who chooses the US ambassador? • Who conforms the ambassador pick? • Who advises president ambassadors? • Who handles security issues in US? • another word for spies or subversion? • Who handles security internationally? • What is the opposite of isolationism? • ...
Security Awareness Month 2025 2025-10-07
Across
- the credit card security audit we do
- Fastpass uses ____ to authenticate me to Okta.
- passwords should ____ be stored in plaintext
- the button to report a suspicious email
- the wiki code for the AI Knowledge Base
- our password manager tool
- phiches use ___ to pressure people to click or reply.
- Crowd____ is our AV software.
Down
- a pass____ is more memorable than a password
- the data classification for pii and credit card data
- ___@kayak.com where support tickets can be emailed
- ask-kayak-____ is the Slack channel for cybersecurity questions.
- our remote access tool
- ai tool to search all of kayak
- The Acceptable ____ Policy sets employee security rules
15 Clues: our remote access tool • our password manager tool • Crowd____ is our AV software. • ai tool to search all of kayak • the credit card security audit we do • the button to report a suspicious email • the wiki code for the AI Knowledge Base • a pass____ is more memorable than a password • passwords should ____ be stored in plaintext • ...
New Terminology 2017-08-06
Across
- Adult member
- Auto Payment
- When TD interest is paid to another account at maturity
- Refers to Internet, telephone and Agency banking
- Child member
- Used to restrict a card
- Arrears
- Fixed Rate
- Corporate Cheque
- Drawer 99/Treasury
Down
- Statement
- Security eg. residential property
- Property security ie. house or unit
- A monetary hold placed on a members account
- Lost or stolen card
- Start
- Penalty Interest
- Inform-let someone else know something
- Find
19 Clues: Find • Start • Arrears • Statement • Fixed Rate • Adult member • Auto Payment • Child member • Penalty Interest • Corporate Cheque • Drawer 99/Treasury • Lost or stolen card • Used to restrict a card • Security eg. residential property • Property security ie. house or unit • Inform-let someone else know something • A monetary hold placed on a members account • ...
The Eye Of Minds 2019-04-17
Across
- Michael’s boy best friend
- Victim of Kaine
- What Kaine does to people
- Where they met Cutter
- Security of the black and blue
- Agent of the VirtNet Security
- Master coder
- Title of the book
- Michael’s girl best friend
Down
- What Tanya Jumped off
- Place where Ronika died
- Main Character
- Where they live
- Where Michael and his friends like to eat.
- Where their real bodies are
- What Tanya tore out
- Victim of the Beast
- Yellow Beast
- Michael’s Nanny
19 Clues: Yellow Beast • Master coder • Main Character • Where they live • Victim of Kaine • Michael’s Nanny • Title of the book • What Tanya tore out • Victim of the Beast • What Tanya Jumped off • Where they met Cutter • Place where Ronika died • Michael’s boy best friend • What Kaine does to people • Michael’s girl best friend • Where their real bodies are • Agent of the VirtNet Security • ...
Elle Severt- Types of bullying 2022-05-17
Across
- _____ Is the B of bullying,contains unequel power.
- ___ is the C of bullying, happens more than once.
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
- Layla spits on Jenny and laughs at her outfit, what is this?
Down
- Ms.Wilker is mean to Mrs.Black but apologizes, what is this considered?
- Cyber bullying can be someone texting or posting something __ photos of people.
- ___ is the D of bullying, it is a intention to harm.
- the A of bullying, physically, emotionally, or socially.
- Fred and Sammy are arguing and saying some mean things, but there's a solution to the problem. What is this called?
- Social bullying is spreading rumors,__ people from games and groups
- ___ has an unbalanced power and someone is getting harmed emotionally, socially,or physically.
- Jake threatened to beat up Marc after school, what is this?
- Jimmy and Timmy are calling each other names, but are laughing. What is this called?
15 Clues: ___ is the C of bullying, happens more than once. • _____ Is the B of bullying,contains unequel power. • ___ is the D of bullying, it is a intention to harm. • the A of bullying, physically, emotionally, or socially. • Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • ...
Cybersecurity Crossword Puzzle 2023-07-26
Across
- Prevents unauthorized access.
- Unauthorized alteration of data.
- (Common Vulnerabilities and Exposures) Software vulnerability database.
- Flaws Software vulnerabilities.
- Breach Stealing sensitive data.
- Misleading email attacks.
- Malware with a harmful payload.
- Unauthorized access to data.
- Common entry point for attacks.
- Malware that hides within legitimate software.
- Engineering Attacks exploiting human behavior.
Down
- Encrypting communication data.
- Control Access rights limitation.
- Insecure code exploit.
- Scrambling data for security.
- Protects from viruses.
- Removing sensitive data.
- Malicious self-replicating code.
- Protects data from unauthorized changes.
- Malware that spreads via networks.
20 Clues: Insecure code exploit. • Protects from viruses. • Removing sensitive data. • Misleading email attacks. • Unauthorized access to data. • Prevents unauthorized access. • Scrambling data for security. • Encrypting communication data. • Flaws Software vulnerabilities. • Breach Stealing sensitive data. • Malware with a harmful payload. • Common entry point for attacks. • ...
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
ARI Acronyms Fun 2020-08-25
14 Clues: in • up • out • of use • of loss • address • to vacate • responsible • notice of loss • approval amount • security deposit • pay authorization • deposit agreement • air transportation association
SEP2 Crossword 2025-05-08
Across
- Automated sequence of response actions triggered by specific alerts
- The process of linking disparate security events to identify threats
- Fraudulent attempt to obtain sensitive information via deceptive emails
- The process of converting encrypted data back to its original form
- The act of adding contextual information to raw security data
- Network of compromised devices controlled by an attacker
Down
- Device such as a laptop or mobile phone connected to a network
- Regular communication from compromised endpoints to a command-and-control server
- Coordinated automation of security tools and processes
- Continuous data stream collected for threat analysis and system health
- Decoy system set up to attract and study attackers
- Isolated environment for safely analysing suspicious files or code
- Centralised team responsible for monitoring and responding to security incidents
- Prioritising alerts based on severity and potential impact
14 Clues: Decoy system set up to attract and study attackers • Coordinated automation of security tools and processes • Network of compromised devices controlled by an attacker • Prioritising alerts based on severity and potential impact • The act of adding contextual information to raw security data • Device such as a laptop or mobile phone connected to a network • ...
1.4 Network Security 2025-04-23
Across
- Permissions assigned to a user defining what resources they can access.
- Attempting to guess passwords by trying every possible combination.
- A term for malicious software.
- A self-replicating malware that spreads itself across networks, without user action.
- A form of social engineering that involves maintaining a conversation.
- Unauthorised access of data as it is being transmitted over a network.
- A technique that exploits vulnerabilities in databases by injecting malicious code.
- A type of malware that secretly monitors a user.
- A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- A form of testing designed to find any weaknesses in a system.
Down
- Observing someone's action, such as watching them enter their password.
- Manipulating people into sharing sensitive/confidential information.
- The process of scrambling data so it can only be read by authorised users.
- A malicious program that replicates itself and attaches itself to files.
- Overloading a network or website with traffic to make it unavailable.
- A malicious program that disguises itself as legitimate software.
- Malware that encrypts files and demands payment for decryption.
- Should be at least 8 characters long with upper and lowercase letters.
- Software or hardware that filters and blocks unauthorised access to a network.
19 Clues: A term for malicious software. • A type of malware that secretly monitors a user. • A form of testing designed to find any weaknesses in a system. • Malware that encrypts files and demands payment for decryption. • A malicious program that disguises itself as legitimate software. • Attempting to guess passwords by trying every possible combination. • ...
1.4 Network Security 2025-04-23
Across
- A type of malware that secretly monitors a user.
- Malware that encrypts files and demands payment for decryption.
- The process of scrambling data so it can only be read by authorised users.
- Unauthorised access of data as it is being transmitted over a network.
- A form of testing designed to find any weaknesses in a system.
- Overloading a network or website with traffic to make it unavailable.
- A malicious program that disguises itself as legitimate software.
- A technique that exploits vulnerabilities in databases by injecting malicious code.
- Should be at least 8 characters long with upper and lowercase letters.
Down
- A form of social engineering that involves maintaining a conversation.
- Manipulating people into sharing sensitive/confidential information.
- A malicious program that replicates itself and attaches itself to files.
- Permissions assigned to a user defining what resources they can access.
- A self-replicating malware that spreads itself across networks, without user action.
- A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- Attempting to guess passwords by trying every possible combination.
- A term for malicious software.
- Observing someone's action, such as watching them enter their password.
- Software or hardware that filters and blocks unauthorised access to a network.
19 Clues: A term for malicious software. • A type of malware that secretly monitors a user. • A form of testing designed to find any weaknesses in a system. • Malware that encrypts files and demands payment for decryption. • A malicious program that disguises itself as legitimate software. • Attempting to guess passwords by trying every possible combination. • ...
Test 2022-11-25
Across
- System must be ________ when you are away from your desk.
- ABC does not allow usage of _________ system though customer has BYOD policy.
- Project documents must not be _________ to external internet sites.
- Customer VDI cannot be used to navigate unwanted websites which are ________ in ABC.
- If there is conflict between ABC security policy and customer security policy then ABC associate has to follow _______ of the two.
- Sending email to personal mail ID from business email (ABC or ABC' customer email) is strictly ________.
- It is _______ responsibility to check the own system compliance regularly.
- All third party/customer provided information must be treated as __________ until and unless specified otherwise by the third party/customer.
Down
- User must be always responsible for the act perform by his own _________.
- It is always better to ______ security violation internally rather escalated by customer.
- Always check recipient email address before click on send button to ensure data _________.
- Always check sender's email ID before clicking on any email attachment or link to prevent from ________ attack.
- Security requirement for project or account must be governed by _______.
- Document signed by associate to protect ABC or ABC' customer confidential business information.(NDA)
- Unauthorized ___________ device must not be connected to ABC or client asset in any circumstances.
- The_________ of information is responsible for classifying the information, created in any form (electronic or non-electronic), and restricting access to the information.
- For any deviation from contractual agreement ________ approval must be obtained.
- When you are doing planning or at design state, you must consider ________ requirement as well.
- For any release or separation from account, access to customer environment must be revoked within _____ day(s).
19 Clues: System must be ________ when you are away from your desk. • Project documents must not be _________ to external internet sites. • Security requirement for project or account must be governed by _______. • User must be always responsible for the act perform by his own _________. • It is _______ responsibility to check the own system compliance regularly. • ...
Unit 3 2024-08-12
bullying 2021-08-31
Across
- effect on the bystander
- effect on the bully
- bullying that happens over social media
- effects on bullying
- bullying that includes manipulation
- speaking up about bullying
- an effect on the victim
Down
- witness of the bullying
- bullying that includes punching someone
- something someone does to make them feel bigger than someone else.
- bullying that includes lies being spread
- person doing the bullying
- person getting bullied
- something an upstander does
- bullying that includes abuse
- a severe effect on bullying
16 Clues: effect on the bully • effects on bullying • person getting bullied • witness of the bullying • effect on the bystander • an effect on the victim • person doing the bullying • speaking up about bullying • something an upstander does • a severe effect on bullying • bullying that includes abuse • bullying that includes manipulation • bullying that includes punching someone • ...
Airport 2024-11-26
bullying 2023-03-21
9 Clues: afraid • head games • constantly • intent to hurt • scared to walk alone • affect of being bullied • using words to hurt someone • using the internet to contsnatlly harass • using manipulation to change people on someone
types of threats 2019-01-09
Across
- A type of Malware that locates and saves data from users without them knowing about it
- Software that encrypts programs and data until a ransom is paid to remove it.
- Collection of captured bot computers
- Criminals promise a service in exchange for details - a common example is offering help with IT problems
- When someone deceives by pretending to be someone else in order to get personal data.
- An error in a program that prevents the program from running as expected.
- Criminals make a promise of goods in return for details, such as offering a free music download
Down
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
13 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Chapter 8 and Relevant Vocab 2025-02-25
Across
- A measure of how well an organization's Azure environment aligns with industry standards.
- A security feature that filters network traffic to and from Azure resources.
- A dedicated instance of Microsoft Entra ID (formerly Azure AD) for managing users and authentication.
- Metadata labels applied to Azure resources to categorize and track costs, ownership, and usage.
- The division of security responsibilities between Microsoft and the customer in cloud environments.
Down
- A unified data governance service that enables data discovery, classification, and compliance monitoring.
- Predefined sets of governance and compliance configurations that automate resource deployment.
- Security controls that prevent accidental deletion or modification of Azure resources.
- The stages of Azure service development, from preview to general availability and retirement.
- Logs that record changes and activities within Azure resources for security and compliance monitoring.
- A service that enforces rules and compliance across Azure resources to ensure governance.
- Microsoft's centralized hub for security, privacy, and compliance information.
- A system for managing permissions based on assigned roles.
13 Clues: A system for managing permissions based on assigned roles. • A security feature that filters network traffic to and from Azure resources. • Microsoft's centralized hub for security, privacy, and compliance information. • Security controls that prevent accidental deletion or modification of Azure resources. • ...
Cisco 4 2024-09-11
Across
- A type of software that records keystrokes on a computer, often used for malicious purposes
- A security approach that assumes breach and verifies each request as though it originates from an open network
- A comprehensive security solution that provides a defense against a variety of threats for endpoints
Down
- A strategy for ensuring that only trusted software can run on systems
- A security measure that involves checking the health of endpoints before allowing access to a network
- A type of attack that involves injecting malicious code into a program or system to compromise it
- A security incident in which sensitive, protected, or confidential data is copied, transmitted, or used by an individual unauthorized to do so
- A type of malware that is designed to take advantage of a security hole before it is known
- A type of software designed to protect endpoints from malicious activity
- A type of security threat in which an attacker seeks to damage or destroy a computer network or system
- A type of security software designed to detect and prevent unauthorized use and transmission of confidential information
11 Clues: A strategy for ensuring that only trusted software can run on systems • A type of software designed to protect endpoints from malicious activity • A type of malware that is designed to take advantage of a security hole before it is known • A type of software that records keystrokes on a computer, often used for malicious purposes • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
The Secrets of Jabari Manor 2024-09-03
Across
- Action taken by Jabari to safeguard his siblings
- Jabari's older sister who assists him in the investigation
- Time when the figure was spotted in the garden
- Action Jabari and his siblings take to uncover the truth
- Type of journal Jazmin finds
- Mysterious group referenced in Jabari's parents' files
- Type of system Jabari checks for security footage
- Family gathering that occurs despite the tragedy
- Relative who is often suspicious
- Character who is a family friend and businessman
- Overarching theme of the story related to family connections
Down
- Person who discovered the encrypted messages
- Atmosphere in Jabari Manor after the disappearance
- Device Jabari uses to access the security footage
- Name of Jabari's brother who often feels frustrated
- Emotion Jabari feels upon seeing the mysterious figure
- Type of messages found in the journal
- Last name of Jabari's family
- Feeling Jabari experiences following his parents' disappearance
- Hidden place where secrets are kept
20 Clues: Last name of Jabari's family • Type of journal Jazmin finds • Relative who is often suspicious • Hidden place where secrets are kept • Type of messages found in the journal • Person who discovered the encrypted messages • Time when the figure was spotted in the garden • Action taken by Jabari to safeguard his siblings • Family gathering that occurs despite the tragedy • ...
Security Quiz 2021-12-07
Across
- Risk identified for the project should be documented and tracked in
- Phishing is a form of
- The major ransomeware trojan targeting windows in 2014
- This gives the contact numbers of all stakeholders
- this attack can be deployed by infusing a malicious code in website's comment section(abbreviation)
Down
- lack of access control policy is a
- Technology to hide information inside a picture
- Using this for doing competitive information gathering is a crime
- Compromising confidential information comes under
- This automates an action or attack so that repetitive tasks are done at a faster rate
- A malicious program do not replicate automatically
- Attackers could steal this to achieve illegitimate accessing to online accounts and disturbs the personal information
12 Clues: Phishing is a form of • lack of access control policy is a • Technology to hide information inside a picture • Compromising confidential information comes under • A malicious program do not replicate automatically • This gives the contact numbers of all stakeholders • The major ransomeware trojan targeting windows in 2014 • ...
Food Security 2022-01-21
Across
- The cultivation of a single crop in a given area.
- The rearing of aquatic animals or the cultivation of aquatic plants for food.
- A destructive insect or other animal that attacks crops, food, or livestock.
- A form of growth failure that causes both physical and cognitive delays in growth and development.
- The state of having reliable access to a sufficient quantity of affordable, nutritious food.
- The salt content in the soil; the process of increasing the salt content is known as salinization.
- The state of being without reliable access to a sufficient quantity of affordable, nutritious food.
Down
- Products that are produced from chemical alteration.
- A form of malnutrition arising from excessive intake of nutrients.
- A sum of money granted by the government or a public body to assist an industry or business so that the price of a commodity or service may remain low or competitive.
- The top layer of soil.
- The simultaneous cultivation or exploitation of several crops or kinds of animals.
12 Clues: The top layer of soil. • The cultivation of a single crop in a given area. • Products that are produced from chemical alteration. • A form of malnutrition arising from excessive intake of nutrients. • A destructive insect or other animal that attacks crops, food, or livestock. • The rearing of aquatic animals or the cultivation of aquatic plants for food. • ...
Food Security 2022-01-21
Across
- The cultivation of a single crop in a given area.
- The rearing of aquatic animals or the cultivation of aquatic plants for food.
- A destructive insect or other animal that attacks crops, food, or livestock.
- A form of growth failure that causes both physical and cognitive delays in growth and development.
- The state of having reliable access to a sufficient quantity of affordable, nutritious food.
- The salt content in the soil; the process of increasing the salt content is known as salinization.
- The state of being without reliable access to a sufficient quantity of affordable, nutritious food.
Down
- Products that are produced from chemical alteration.
- A form of malnutrition arising from excessive intake of nutrients.
- A sum of money granted by the government or a public body to assist an industry or business so that the price of a commodity or service may remain low or competitive.
- The top layer of soil.
- The simultaneous cultivation or exploitation of several crops or kinds of animals.
12 Clues: The top layer of soil. • The cultivation of a single crop in a given area. • Products that are produced from chemical alteration. • A form of malnutrition arising from excessive intake of nutrients. • A destructive insect or other animal that attacks crops, food, or livestock. • The rearing of aquatic animals or the cultivation of aquatic plants for food. • ...
