cyber security Crossword Puzzles

Cyber Love 2022-12-14

Cyber Love crossword puzzle
Across
  1. private
  2. personal information
  3. feelings
  4. opportunity
  5. at last
Down
  1. same interests
  2. to stop
  3. in fact really
  4. internet
  5. I think
  6. to talk

11 Clues: to stopprivateI thinkto talkat lastinternetfeelingsopportunitysame interestsin fact reallypersonal information

Cyber Safety 2025-02-05

Cyber Safety crossword puzzle
Across
  1. Stop
  2. Divide
  3. Appear
  4. Press a button on the mouse
  5. Security
  6. Complain
Down
  1. Power down
  2. Support button
  3. Have a high opinion of someone
  4. Unwanted presence of someone online
  5. Believe

11 Clues: StopDivideAppearBelieveSecurityComplainPower downSupport buttonPress a button on the mouseHave a high opinion of someoneUnwanted presence of someone online

Cyber Crossword 2025-06-11

Cyber Crossword crossword puzzle
Across
  1. A secret way for hackers to get access
  2. Restarting a computer
  3. A virus that is named for a Greek god
  4. An operating system. Or something you look out of.
  5. A half-person half-computer
  6. Someone who hacks
Down
  1. Malware that gives hackers access to root access
  2. A purple friend
  3. A way of tricking someone into giving access
  4. Make a message into a weird code
  5. Turn a weird code back into a message

11 Clues: A purple friendSomeone who hacksRestarting a computerA half-person half-computerMake a message into a weird codeA virus that is named for a Greek godTurn a weird code back into a messageA secret way for hackers to get accessA way of tricking someone into giving accessMalware that gives hackers access to root access...

IT, technology, computers 2023-06-10

IT, technology, computers crossword puzzle
Across
  1. : Wireless network technology
  2. : Unauthorized access to systems
  3. : A tiny element of an image
  4. : Central processing unit
  5. : A computer that provides services
  6. : Device for internet connection
  7. : Network device for internet connection
  8. : Software for web browsing
Down
  1. : An open-source operating system
  2. : Online storage and computing
  3. : Relating to computers and the internet
  4. : A programming language
  5. : Instructions for computers
  6. : Random access memory
  7. : A unit of digital information
  8. : A computer input device

16 Clues: : Random access memory: A programming language: Central processing unit: A computer input device: Software for web browsing: A tiny element of an image: Instructions for computers: Wireless network technology: Online storage and computing: A unit of digital information: Unauthorized access to systems: Device for internet connection...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

ETHICS AND SECURITY 2014-10-08

ETHICS AND SECURITY crossword puzzle
Across
  1. MONITORS USER USAGE AND DATAENTRY
  2. TEXT WHICH HAS BEEN SCRAMBLED
  3. THE SCRAMBLING/CODING OF DATA
  4. THE USER IS TRICKED BY A FAKE URL
  5. THE USER IS TRICKED BY A FAKE EMAIL
  6. A SET OF BELIEFS
  7. A IMAGE USED TO SHOW A SITE IS SECURE
  8. USED TO MONITOR USAGE AND STORE URLS
  9. THE UNSCRAMBLING OF DATA
  10. A BARRIER OF PROECTION PROVIDE BY SOFTWARE/HARDWARE
  11. PROCTECT COMPUTER BY RUNNING ALL TIME AND DAILY SCANS
Down
  1. AN INFECTION WHICH CHANGES COMPUTER SETTINGS AND SLOWS PERFORMANCE
  2. THIS SHOULD BE CHANGED OFTEN AND CONTAIN TEXT/NO./SYMBOLS
  3. TO TAKE SOMEONES WORK AND CLAIM IT IS YOUR OWN
  4. THE ENTRY OF DATA WHICH IS UNIQUE TO THE USER
  5. A SET OF LAWS TO PROTECT ARTISTS/CREATORS
  6. A METHOD OF SECURING DATA
  7. SOMEONE WHO TRIES TO STEAL INFORMATION
  8. AN INFECTION WHICH DUPLICATES ITSELF OVER AND OVER
  9. A FORM OF PROCTION WHEN EXCHANGING INFO ONLINE

20 Clues: A SET OF BELIEFSTHE UNSCRAMBLING OF DATAA METHOD OF SECURING DATATEXT WHICH HAS BEEN SCRAMBLEDTHE SCRAMBLING/CODING OF DATAMONITORS USER USAGE AND DATAENTRYTHE USER IS TRICKED BY A FAKE URLTHE USER IS TRICKED BY A FAKE EMAILUSED TO MONITOR USAGE AND STORE URLSA IMAGE USED TO SHOW A SITE IS SECURESOMEONE WHO TRIES TO STEAL INFORMATION...

Security in computing 2015-02-19

Security in computing crossword puzzle
Across
  1. a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
  2. the fault detection – waiting for a system to fail
  3. The science of deducing the plaintext from a ciphertext, without knowledge of the key
  4. The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
  5. protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
  6. malicious code detected based on the behavior
  7. a virus that attaches itself to a file and replicates when the infected program is executed
  8. A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
  9. The process of anticipating the faults and handling them to minimize disruption and maximize the safety
  10. These are the programs that leak the information
  11. the fault detection – construct a system that reacts to a failure
Down
  1. A cryptosystem is a system for encrypting and decrypting data
  2. is an unforgeable token that gives the possessor certain rights to an object
  3. – keeps a copy of everything pressed
  4. The assurance that the communicating entity is the one that it claims to be
  5. (secure shell) is a pair of protocols defined for Unix
  6. systems reveal information that could facilitate an attack
  7. in this Attack- Malicious program exists between two programs
  8. each program operates as if other routines in the system were malicious or incorrect
  9. door is an undocumented entry point to a module which has occurred because of the developer
  10. Provides protection against denial by one of the entities involved in a communication
  11. defines a single choke point that keeps unauthorized users out of the protected network
  12. this is a cipher which encrypts a digital data stream one bit or one byte at a time
  13. The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
  14. The study of cryptography and cryptanalysis
  15. This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination

26 Clues: – keeps a copy of everything pressedThe study of cryptography and cryptanalysismalicious code detected based on the behaviorThese are the programs that leak the informationthe fault detection – waiting for a system to fail(secure shell) is a pair of protocols defined for Unixsystems reveal information that could facilitate an attack...

Data Security Puzzle 2025-03-21

Data Security Puzzle crossword puzzle
Across
  1. A weakness in system security procedures, software, hardware, design, implementation, internal controls, technical controls, physical controls, or other controls that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy
  2. attack created by a flood of requests from a coordinated large number of distributed nodes to overwhelm a server.
  3. a piece of code or a technique that takes advantage of a vulnerability or flaw in software or hardware to gain unauthorized access, cause unintended behavior, or disrupt a system
  4. an adversary sponsored by a country's government that are often well organized and funded
  5. using a carefully crafted software code that violates the operating systems access control policy and allows the attacker to gain full control of the system
  6. any method by which an adversary interferes with the traffic on a physical level.
  7. an attack enabled by leakage of information from a physical cryptosystem including timing, power consumption, and electromagnetic emissions.
  8. one principle of persuasion that says that people will tend to avoid mistakes by acting according to what others have done
  9. one principle of persuasion that says they are more likely to respond to messages from people they share similarities with or have a good feeling about
  10. one principle of persuasion that workers tend to respond to people above them such as their boss or higher ups
  11. a carefully crafted script in the user input to redirect a user and retrieve their login information (in the form of a cookie) from a legitimate website database.
  12. an attack where the adversary uses carefully crafted code that sends the users cookie to their computer so they now control the current session
  13. a document signed in organizations to ensure that technology is used for their intended purposes only.
  14. a set of changes or updates to a software program or operating system, designed to fix bugs, address security vulnerabilities, or improve functionality or performance
  15. the idea that users complete tasks with the least amount of cognitive effort
  16. systems that closely connect hardware, software and networks that often run autonomously
  17. hiding in a network and collecting all the bits that are being transferred between hosts
  18. turning long numbers or passwords into smaller pieces of data to help user memory
  19. type of data that includes social security number, usernames, passwords, etc..
  20. a law that protects the personal private data for citizens in the European Union.
  21. an event where confidential, private, protected, or sensitive information is exposed to unauthorized individuals, either through an accidental occurrence or an intentional act to steal information
  22. one principle of persuasion that says perceived value is greater if they believe it is limited and they must hurry to get it
  23. the type of data that is stored, transferred, inputted/outputted, or processed
  24. this is the state we refer to data that is traveling across a network
  25. this attack uses the amount of time it takes for each part of a cryptographic function to infer information.
  26. one principle of persuasion that says people tend to repay someone that has provided them something
  27. measuring the surrounding EM of the hardware to infer cryptographic keys
Down
  1. type of attack that uses the fact that some data is not fully deleted
  2. this is the state we refer to data that is currently being stored either on a device, server, cloud, or backup medium
  3. sending fake information to a network devices, servers, or applications with malicious intent
  4. one principle of persuasion that says that you can pressure someone by crafting messages to a cause they believe in
  5. A type of DDoS attack that uses a large number of spoofed IP addresses to send UDP packets to overwhelm a server
  6. attack intent to deny legitimate network users access to a resource such as a network, server, or website
  7. carefully crafted command in the user input to execute a malicious command on the website's hosting server.
  8. Individuals or groups operating domestically or internationally who use violence or threat of violence inflicted through cyber means with the intention of coercing or intimidating governments or societies into succumbing to their demands
  9. a requiring that hardware respond to tampering by failing in a safe way
  10. a security requirement for any hardware handling data protection
  11. a string that says: this user is authenticated already
  12. federal law that sets the consequences for accessing data or computers that you are not authorized to access in the federal government
  13. type of data that contains roles and authorized resources to be used for reading, writing, and processing
  14. type of data that sets rules for how to protect data on all other levels
  15. carefully crafted SQL syntax in the user input to retrieve information stored in a database
  16. erasing critical parts of memory in response to tampering
  17. changing the identifyable information on a computer to be that of another computer. This can be done with MAC addresses or IP addresses
  18. federal law that protects a person's health records and sets rules for how it can be used or disclosed.
  19. individual that uses cyberspace to break the law
  20. a mathematical algorithm that converts an input of any length into a fixed-size output, called a hash or message digest, ensuring data integrity and authenticity
  21. a type of man-in-the-middle attack that allows an adversary to set up an unsecure connection to the user and establishes a secure connection with the target website gaining complete unencrypted access to user requests.
  22. an electrical grid that includes central control and monitoring connecting to smart meters, smart appliances, etc..
  23. a type of DDoS attack that exploits the TCP three way handshake.
  24. techniques for luring a user to yield their credentials using persuasion, technological manipulation, and carefully crafted messages
  25. a type of attack that measures the level of electricity needed for each bit of data. 1s use more energy than 0s.
  26. this is the state we refer to data that is currently being processed by an application
  27. 3D model used to represent design aspects for securing data at every level
  28. an accidental or non malicious individual that makes a mistake with sharing or triggering malicious software by not following standard cyber safety protocols
  29. a temporary place to put data to help predict possible next processes. This is often used to do side channel attacks as it takes a different amount of time to process compared to RAM.
  30. any method by which authorized or unauthorized users are able to get around a security policy in systems.
  31. a vulnerability discovered and exploited by adversaries but never reported to the software vendor, NVD, or CERT
  32. federal law that affords parents the right to have access to their children's records, the right to change records, and the right to have some control over disclosure.
  33. a law passed in California that protects the personal data for citizens of California.

60 Clues: individual that uses cyberspace to break the lawa string that says: this user is authenticated alreadyerasing critical parts of memory in response to tamperinga security requirement for any hardware handling data protectiona type of DDoS attack that exploits the TCP three way handshake....

Security Crossword Craziness 2025-06-11

Security Crossword Craziness crossword puzzle
Across
  1. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  2. Our email blocks ___ and ___ emails from being sent to uncleared staff employed at post
  3. ___ your laptop securely when it is not under your direct control
  4. – report all lost devices to the ___
  5. Change of ___
  6. Do not use ___ accessories such as headsets and keyboards
  7. A marking used to show a document is originator controlled
  8. – Online sites that can put your personal information at risk
  9. A secure way to connect remotely to our network
  10. Key to entering secure areas
  11. Bag used to transport material RESTRICTED and above
Down
  1. What you should do when you step away from your laptop
  2. – A way to categorise information to protect it
  3. Pre-travel notification is required when travelling through a ___ country
  4. Fake emails to get you to click
  5. Encourages putting sensitive information away at the end of the day
  6. A person who gains access by pretending to belong
  7. Suspicious, ongoing, unusual or ___
  8. – access to official information is governed by your ___
  9. Do not disclose online that you hold a ___ ___ clearance
  10. Must be strong and never shared
  11. – Reporting these allow MFAT to identify and manage security risks
  12. - Work laptops, iPads, phones, and documents being more susceptible to theft or loss when working ___

23 Clues: Change of ___Key to entering secure areasFake emails to get you to clickMust be strong and never sharedSuspicious, ongoing, unusual or ___– report all lost devices to the ___– A way to categorise information to protect itA secure way to connect remotely to our networkA person who gains access by pretending to belong...

Aviation Security & Safety 2025-06-13

Aviation Security & Safety crossword puzzle
Across
  1. Suitcases and bags you take with you when travelling
  2. Any potential risk to aviation safety, including unauthorized access over secutiry borders
  3. The key to sharing information clearly, whether in aviation or daily life
  4. A place where passengers check in, board flights, and retrieve luggage
  5. The hub where passengers arrive, depart, and connect in the skies
  6. The heart of hospitality in aviation, ensuring passengers needs are met with care and efficiency
  7. Someone who travels by plane, train or car but doesn't operate the vehicle
  8. The public area of an airport, accessible to the public
  9. Where passports are checked before passengers cross international borders
Down
  1. A type of flight that keeps you within your home country's borders
  2. Where passengers luggage and belongings are checked before entering or departing a country
  3. Planes need this long, clear path to lift off or touch down safely
  4. A type of flight that takes you beyond your home country's borders
  5. The invisible line separating nations, often requiring passports and security checks to cross
  6. A protective shelter where aircraft rest, get maintained and prepare for the next flight
  7. The secured part of an airport you reach when clearing security and boarding begins
  8. The process of inspecting passengers, luggage and cargo to detect prohibited or dangerous items
  9. Controlling who can enter restricted airport zones to prevent unauthorized personnel from reaching sensitive areas
  10. A situation requiring immediate attention, often triggering special airport procedures
  11. The top priority in aviation, guiding procedures to protect passengers and crew

20 Clues: Suitcases and bags you take with you when travellingThe public area of an airport, accessible to the publicThe hub where passengers arrive, depart, and connect in the skiesA type of flight that keeps you within your home country's bordersPlanes need this long, clear path to lift off or touch down safely...

Security Awareness Training 2025-07-23

Security Awareness Training crossword puzzle
Across
  1. Fined for transferring user data to China
  2. Phishing method that uses text messages
  3. Passwords should be at least this many characters long
  4. Former Yahoo scientist accused of stealing proprietary code
  5. AI-generated phishing that’s dynamic and hard to detect
  6. Your code, docs, and slides are this type of asset
  7. Company breached over Memorial Day weekend in 2025
  8. What you should do immediately if something goes wrong
  9. Browser-based password manager you should avoid
  10. Secure method that requires two steps to log in
Down
  1. Files should be saved here, not on your desktop
  2. Phishing that uses voice calls
  3. What hackers exploited at Co-op in May 2025
  4. QR code-based phishing
  5. Secure password manager employees should use
  6. One login, many tools — safer, faster, smarter
  7. Adidas breach was caused by this third party
  8. Must never be uploaded into public AI tools
  9. Exposed data for 6 years due to a misconfigured Google Drive
  10. Human factor responsible for 74% of breaches

20 Clues: QR code-based phishingPhishing that uses voice callsPhishing method that uses text messagesFined for transferring user data to ChinaWhat hackers exploited at Co-op in May 2025Must never be uploaded into public AI toolsSecure password manager employees should useAdidas breach was caused by this third partyHuman factor responsible for 74% of breaches...

security crossword puzzle 2022-12-02

security crossword puzzle crossword puzzle
Across
  1. a set of of software tools used by an attack to hide the actions or presence of other types of malicious software
  2. Software that scans the computer as well as any new documents for viruses
  3. a malicious program designed to enter a computer via a network to take advantage of vulnerability in an application or an operating system
  4. a logical computer network of zombies under the control of an attacker
  5. malware that can trigger arbitrary code execution from one computer to a second computer over a etwork or the internet
  6. a separate program or feature incorporated within a browser that stops popup advertisement from appearing
  7. an infected computer that is under the remote control of an attacker
  8. Hardware or software that limits the spread of malware
  9. software that is a cumulative package of all patches and features updates
Down
  1. software code that allows one incirconventing normal security measures
  2. a database of viruses that is used to identify an infected file
  3. Software that helps prevent computers from being infected by spyware
  4. Malware that prevents a users device from working properly until a fee is paid
  5. an attacker who controls a botnet
  6. enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
  7. an executable program that is advertised as performing one activity but actually performs a malicious activity
  8. a general term used to describe software that spies on users by gathering information without consent
  9. Computer code that lies dormant until triggered by a specific logical event
  10. software of a hardware device that captures and stores each keystroke that a user types on the computers keyboard
  11. a public release software security update intended to repair a vulnerability

20 Clues: an attacker who controls a botnetHardware or software that limits the spread of malwarea database of viruses that is used to identify an infected fileSoftware that helps prevent computers from being infected by spywarean infected computer that is under the remote control of an attacker...

Food Security 1 2026-01-20

Food Security 1 crossword puzzle
Across
  1. What people eat to survive and stay healthy
  2. Food that people can physically get to
  3. When weather patterns become different over time
  4. Long periods with little or no rain
  5. The ability to get food physically and economically
  6. Food that will not cause illness
  7. Government decisions that affect food security
  8. People who grow crops and raise animals
  9. Money earned to buy food
  10. The cost of food
  11. Places where food is bought and sold
  12. Too much water that destroys crops and roads
  13. Animals kept for food
  14. Long-term weather patterns
  15. Natural conditions that affect food production
Down
  1. Food that people have money to buy
  2. Food that helps people grow and think
  3. Everyone in a country, not just the rich or farmers
  4. When people do not have jobs
  5. A condition of good physical well-being
  6. Having reliable access to enough food
  7. Food that exists in shops or markets
  8. Food security must exist at all of these
  9. Plants grown for food
  10. Daily conditions like rain and temperature
  11. United Nations organisation that defines food security
  12. How food is moved from farms to markets
  13. Factors related to money and jobs
  14. A staple crop mentioned in the example
  15. The feeling of not having enough to eat

30 Clues: The cost of foodPlants grown for foodAnimals kept for foodMoney earned to buy foodLong-term weather patternsWhen people do not have jobsFood that will not cause illnessFactors related to money and jobsFood that people have money to buyLong periods with little or no rainFood that exists in shops or marketsPlaces where food is bought and sold...

Cyber Security 2022-03-10

Cyber Security crossword puzzle
Across
  1. purpose
Down
  1. case

2 Clues: casepurpose

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. male datoteke
  2. prividna stvranost nastala pomoću računala
  3. nosimo ih kao dan borbe protiv nasilja
  4. podatci koje ostavljamo na internetu
  5. nasilničko ponašanje
  6. namjerno ih ostavljamo na internetu
  7. neželjna pošta
  8. skup znakova koji imaju neko značenje
Down
  1. bez namjere ih ostavljamo na internetu
  2. govorenje nečeg ljepog nekoj osobi
  3. naslije preko interneta
  4. vrijeđanje druge osobe
  5. zbirka elektroničkih dokaza
  6. mogućnost slanja poruka putem interneta
  7. vrijeđanje osoba putem tehnologije

15 Clues: male datotekeneželjna poštanasilničko ponašanjevrijeđanje druge osobenaslije preko internetazbirka elektroničkih dokazagovorenje nečeg ljepog nekoj osobivrijeđanje osoba putem tehnologijenamjerno ih ostavljamo na internetupodatci koje ostavljamo na internetuskup znakova koji imaju neko značenjebez namjere ih ostavljamo na internetu...

February Hotel Hero 2025-02-27

February Hotel Hero crossword puzzle
Across
  1. Taylor - In Room Dining
  2. De Loera - Security
  3. Thomas - Reservations
  4. Patino - Culinary
  5. Schindler - Restaurant
  6. Fernandez - Restaurant
  7. Atkinson - Technology Innovation & Data
  8. Dubois - In Room Dining
Down
  1. Regalado Lopez - Security
  2. Aceves Mancilla - In Room Dining
  3. Tingle - Spa
  4. Nevarez - Culinary
  5. Anquetil - Housekeeping
  6. Baxter - Pastry
  7. Reyes - Housekeeping

15 Clues: Tingle - SpaBaxter - PastryPatino - CulinaryNevarez - CulinaryDe Loera - SecurityReyes - HousekeepingThomas - ReservationsSchindler - RestaurantFernandez - RestaurantTaylor - In Room DiningAnquetil - HousekeepingDubois - In Room DiningRegalado Lopez - SecurityAceves Mancilla - In Room DiningAtkinson - Technology Innovation & Data

Web Ethics & Security 2020-10-21

Web Ethics & Security crossword puzzle
Across
  1. The rights given to a person that created something of their own on their own.
  2. An individual who uses the internet to locate people, typically children to commit child sexual abuse.
  3. A type of program that uses a certain code which then is used to change the way that a computer operates.
  4. Stealing software that is legally protected. For example, copyright, modifying, and distributing.
  5. a scheme used to damage another individual by using email.
Down
  1. Using someone else's identity to gain benefits in their name.
  2. A type of program that copies itself that way it is able to spread onto other computers.
  3. The use of technology to bully someone over the internet. It is usually a mean message, or a threat.
  4. Creation, distribution, or forwarding of a message which contains sexually explicit materials through an electronic device.
  5. Number of internet connected devices, each of these are running one or possibly more bots.
  6. The act of a computer virus attaching itself to a virus
  7. The malicious activity a computer virus or worm is designed to do
  8. When A certain amount used permitted by Copyright.
  9. A device that provides security/safeguard from unauthorized people.
  10. this is a type of software that is usually used to damage other computers.
  11. A type of malware that misleads the person using the computer of its real intent.
  12. Taking someone else’s ideas, or work and saying that is it yours especially without permission.
  13. a large, frequently run program attached to the virus.
  14. The right given to somebody else from the creator in order to publish their work.
  15. Someone who uses computers to gain access to unauthorized data.

20 Clues: When A certain amount used permitted by Copyright.a large, frequently run program attached to the virus.The act of a computer virus attaching itself to a virusUsing someone else's identity to gain benefits in their name.Someone who uses computers to gain access to unauthorized data.The malicious activity a computer virus or worm is designed to do...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. is a type of malware that self-replicates and distributes copies of itself in a computer network.
  2. refers to any crime that involves a computer and a network.
  3. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  4. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  5. involves gaining access to a computer or network with authorization from a company or organisation.
  6. This involves the illegal copying of information from the magnetic strip of a credit card.
  7. is sequences of instructions that make a computer program perform a specific task.
  8. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  9. is another type of malware that is activated each time a computer system boots (loads) up.
  10. also known as zombie is a group of computers connected together for malicious purposes.
  11. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
  12. is a software application that automatically displays advertising banners while the program is running.
  13. is malicious software designed to install itself on a computer without the owner’s knowledge.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  16. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  17. This involves gaining personal information through deception.
  18. is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  2. involves gaining access to a computer or network without authorization.
  3. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  4. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  5. is raw unorganized facts that need to be processed.
  6. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. The practice of recovering sensitive information from discarded material.
  9. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  10. is a secret way to access a computer without passing security mechanisms.
  11. is the processed output of data making it meaningful to the person who receives it.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.The practice of recovering sensitive information from discarded material....

Security Awareness Puzzle 2014-10-20

Security Awareness Puzzle crossword puzzle
Across
  1. These programs/devices can be used both for legitimate network
  2. of computer systems or networks.
  3. Before you throw something in the __________, ask yourself, "Is this something I
  4. An __________ use policy is a set of rules and guidelines that specify appropriate
  5. When somebody sends an email with a link to a bogus website it's called.
  6. A __________ stick, is a plug-and-play portable storage
  7. One thing you should never do with any of your passwords(3 words)
  8. You can share your alarm code with this many people at the facility
  9. All visitors must check in with _________ before they can access our facility.
  10. give to an unauthorized person or want to become publicly available?"
  11. Other than locking the door when you are finished using a secure lab, you must also set this
  12. A __________ is a program and/or device that monitors data traveling over a
  13. True:False: It is good practice to wear your badge around outside the facility to show good company spirit.
Down
  1. and for stealing information off a network
  2. This must be worn at all times while in the facility with no exceptions
  3. Before entering a secure room you must check your pockets for any ________ devices and place them in the bins
  4. All of this material must be locked up when there is no one in the room
  5. If you unlock a room, what must you take off the door and either hold onto or pass to another program accessed person until the room is locked again.
  6. _________ Is required to take the yearly security training
  7. The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca, This_P^zz1e!
  8. Even if someone is cleared at the highest level, they still need this to access a classified program. (3 words)
  9. Every operating system and plugin needs these for good health.
  10. If you are holding a classified meeting in one of the conference rooms, these must be posted on the doors that state there is a classified meeting in progress.
  11. that uses flash memory and is lightweight enough to attach to a key chain. These under no circumstance should ever be brought into a work lab.

24 Clues: of computer systems or networks.and for stealing information off a networkA __________ stick, is a plug-and-play portable storage_________ Is required to take the yearly security trainingThese programs/devices can be used both for legitimate networkEvery operating system and plugin needs these for good health....

Security Awareness Puzzle 2015-02-11

Security Awareness Puzzle crossword puzzle
Across
  1. When creating a password do not use words from your favorite pet, team, hobby, recording artist or ________.
  2. A collection of information that is organized so that it can easily be accessed, managed, and updated.
  3. Never forward any _________ letter.
  4. Use __________ passwords for the various accounts that you may have.
  5. Email scam or attempt to trick you into giving your password or personal information.
  6. Applied to data to protect it from unauthorized use in case of theft or loss.
  7. Healthy email always includes a clear and specific ____________ line.
  8. Use this tool to dispose of documents that contain personal or financial information.
  9. To protect personal information, avoid sending it via_________.
  10. A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
  11. Do not send __________ information over email unless it is encrypted.
  12. A computer ______ can be considered as the modern counterpart of a paper document.
  13. A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit.
  14. Passwords should be _________ every 3-4 months.
  15. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
  16. Protect your laptop, cell phone or any other mobile devices by treating it like _______.
  17. Passwords should always be at least this many characters long.
  18. __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
Down
  1. Also known as malicious software; any program or file that is harmful to a computer user.
  2. _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
  3. Never share your _________ with another person.
  4. To ________ the amount of spam you receive, be careful who you give your email address to.
  5. ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
  6. A software that is designed to detect and destroy computer viruses.
  7. Do not leave your laptop or computer ____________.
  8. Do not _______ your password down or attach it to your keyword or monitor.
  9. Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
  10. Choose a password that is easy for you to ____________ but hard for someone to guess.
  11. Do not __________ your password or account with anyone.
  12. Bin Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?" (2 words)
  13. A password is stronger by using a combination of both upper and lower case ___________.
  14. Always ___________ your computer when you leave your desk.
  15. A secure password should contain at least one of these.
  16. A __________ is often an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus.

34 Clues: Never forward any _________ letter.Never share your _________ with another person.Passwords should be _________ every 3-4 months.Do not leave your laptop or computer ____________.Do not __________ your password or account with anyone.A secure password should contain at least one of these.Always ___________ your computer when you leave your desk....

Aviation Safety + Security 2023-11-15

Aviation Safety + Security crossword puzzle
Across
  1. when you get on the plane
  2. Making sure you are keeping everyone safe
  3. fly to another country
  4. A place where the plane waits
  5. where the plane takes off and lands
  6. A form of identification to travel internationally
  7. uses them to get identify drugs
  8. Gone through customs/security
  9. when going to a different destination
  10. fly in the same country
Down
  1. Anyone is allowed in this area of airport
  2. what happens when you enter a country without a visa
  3. someone who boards a plane
  4. Something you will need when in an airport or something to do
  5. Flying or operate of an aircraft
  6. A child travelling by themself under the age of 12
  7. Your belongs that you take with you
  8. A place you go when travelling domestic or international
  9. A place you go when you want to relax
  10. when you put your bag through an X-ray

20 Clues: fly to another countryfly in the same countrywhen you get on the planesomeone who boards a planeA place where the plane waitsGone through customs/securityuses them to get identify drugsFlying or operate of an aircraftYour belongs that you take with youwhere the plane takes off and landsA place you go when you want to relax...

Security Crossword Puzzle 2023-03-17

Security Crossword Puzzle crossword puzzle
Across
  1. Use two-factor authentication
  2. Trick people by canceling it
  3. Scare, get person to act
  4. Looks similar to actual site
  5. Tracks typing
  6. intrudes on device remotely
  7. Directly targets
  8. Protects with physical key
  9. Password manager
Down
  1. Trusted person betrays trust
  2. Are unaware device was infiltrated
  3. Protects your device using app
  4. origins with Phreaking
  5. Lengthy enough, complex
  6. Talking to a person for info
  7. Facial recognition, fingeprints, hand, etc
  8. Leaves their device unprotected
  9. Must be used during login
  10. Ethical, useful hackers by testing
  11. Person hijacking your SIM card

20 Clues: Tracks typingDirectly targetsPassword managerorigins with PhreakingLengthy enough, complexScare, get person to actMust be used during loginProtects with physical keyintrudes on device remotelyTrusted person betrays trustTrick people by canceling itTalking to a person for infoLooks similar to actual siteUse two-factor authentication...

Energy & Food Security 2024-03-25

Energy & Food Security crossword puzzle
Across
  1. alcohol produced from plant matter (sugar cane or maize) which can be used as an alternative to petrol
  2. form of power for electricity that is generated by utilizing the energy of the sun
  3. the reliable availability of energy sources at an affordable price with consideration of the environmental impacts
  4. Cause of energy insecurity
  5. resources that will run out and not be replenished for millions of years
  6. impact of energy insecurity
  7. lack of adequate nutrition, caused by not having a balanced diet or enough to eat
  8. another form of energy utilizing the power of water
  9. energy generated from the heat under the surface of Earth
  10. any source of energy that can be naturally and quickly replenished
Down
  1. electricity generated by energy from waves or the tides
  2. suffering or death caused by lack of food
  3. renewable resource that utilizes currents in the atmosphere to generate electricity
  4. to store large amounts of goods or materials
  5. systems that react promptly to sudden changes in the supply-demand balance
  6. supply of energy that is in line with economic developments and environmental needs
  7. extreme scarcity of food
  8. defined as 'when all people, at all time, have physical, social and economic access to sufficient, safe & nutritious food that meets their dietary needs and food preferences for an active and healthy life.
  9. increase in salt content, usually of agricultural soils, irrigation water or drinking water
  10. limit the amount of food each person or family is allowed to purchase
  11. market determines the price of a food product; cause of food insecurity
  12. type of power using radioactive materials such as uranium & plutonium. Power is produced from energy released as materials undergo reactions
  13. gas such as methane that can be used as a fuel & is produced by fermenting organic matter.

23 Clues: extreme scarcity of foodCause of energy insecurityimpact of energy insecuritysuffering or death caused by lack of foodto store large amounts of goods or materialsanother form of energy utilizing the power of waterelectricity generated by energy from waves or the tidesenergy generated from the heat under the surface of Earth...

DTIN - Digital Security 2024-08-08

DTIN - Digital Security crossword puzzle
Across
  1. Significant increase in electrical power.
  2. Rules of an online community.
  3. Unwanted electrical signal.
  4. Process of encoding information to protect it from unauthorized access.
  5. Protects the use of original works.
  6. Disrupts computer access to an Internet service.
  7. An event causing loss or damage to computer hardware, software, data, or processing capability.
  8. Protects computer and equipment from electrical power disturbances.
  9. A group of compromised computers connected to a network.
  10. Steps to be taken immediately after a disaster.
  11. Use of digital communication tools to harm or harass others.
  12. Simulates disasters and records recovery ability.
  13. A type of malware that copies itself repeatedly.
  14. Software developed to detect and remove computer viruses.
Down
  1. Measures to protect information from unauthorized access.
  2. Licenses that allow creators to communicate which rights they reserve.
  3. A compromised computer or device.
  4. Larger scale of a DoS attack.
  5. Specific pattern of virus code.
  6. Drop in electrical supply.
  7. Prolonged malfunction of a computer.
  8. Process used by antivirus programs to prevent infection.
  9. Malware that hides within or looks like legitimate software.
  10. Actions to restore full information processing operations.
  11. Separating infected files that cannot be removed.
  12. Online or Internet-based illegal act.
  13. Program that protects your computer from unauthorized access.
  14. Attempts to disrupt or gain unauthorized access to computer networks.
  15. Surge protector that provides power during power loss.
  16. Fraudulent attempt to obtain sensitive information.
  17. A potentially damaging computer program.
  18. Program that allows users to bypass security controls.
  19. Allows limited use of copyrighted material without permission.
  20. How backup files and equipment resume information processing.
  21. Malicious software designed to harm or exploit any programmable device or network.

35 Clues: Drop in electrical supply.Unwanted electrical signal.Larger scale of a DoS attack.Rules of an online community.Specific pattern of virus code.A compromised computer or device.Protects the use of original works.Prolonged malfunction of a computer.Online or Internet-based illegal act.A potentially damaging computer program....

Information Security Puzzle 2023-04-11

Information Security Puzzle crossword puzzle
Across
  1. A key concept of data protection, where files and emails are tagged with labels in accordance to their sensitivity and value [Two word]
  2. Email used to report information security incidents at EDGE [Full email]
  3. A key risk associated with IP Theft that could lead to a detrimental impact on national security [Two word]
  4. Data that should not be stored on personally owned devices [Two words]
  5. Location of the Information Security (IS) policies at X [Three word]
  6. A classification tag that applies to X's non-military Intellectual property data [One word]
  7. Are not to be used to register or create accounts on public platforms [Two word]
  8. Downloading them from the internet or using unauthorised versions is prohibited [Two words]
  9. Are responsible and accountable for activities performed on X Group's information assets that are being used by them [One word]
  10. Refers to the act of sharing valuable information with unauthorised parties [Two words]
Down
  1. Is a key preventive control against insider threats [One word]
  2. A leading root cause for insider threats [Two word]
  3. Are not to be shared with anyone [Two words]
  4. Policy that provides directives on how to use information assets within the company to protect employees and the company from inappropriate exposure of risks [Two word]
  5. An action that end users must take, when aware or suspicious of unusual behavior that could lead to insider threat [One word]
  6. Information created, acquired, developed or discovered by X Group [Two words]
  7. An inappropriate act made following an informed and conscious decision with a motive to cause harm [One word]
  8. The act of bypassing internal security controls to satisfy a business need, with no intention to cause harm {One word]
  9. Can originate from current/former employees and third parties with authorised access to company systems [Two words]
  10. A tool used to apply manual protection to files and emails before sharing with authorised recipients [One word]

20 Clues: Are not to be shared with anyone [Two words]A leading root cause for insider threats [Two word]Is a key preventive control against insider threats [One word]Location of the Information Security (IS) policies at X [Three word]Data that should not be stored on personally owned devices [Two words]...

Safety & Security 1 2025-07-12

Safety & Security 1 crossword puzzle
Across
  1. Workstations with a proper _______ setup minimize strain.
  2. What would texting while driving be classified as?
  3. The abbreviation for Personal Protective Equipment is?
  4. Ignoring proper lifting leads to _______ (2 words).
  5. What compensation do you get when you purchase shoes? An ________.
  6. _______ Strain Injury (RSI).
  7. What is the "CP" in CPR?
  8. What item is recommended when riding a bike?
  9. A worksite hazard in a guest centre?
Down
  1. Why do we use gloves?
  2. You use a N-95 mask when the _______ (2 words) is extreme.
  3. What protection do we have that repels bears (2 words)?
  4. When entering the railyard, what should you be wearing?
  5. Each month a worksite safety _______ must be completed.
  6. What kind of document is used when the Corporation has rules employees must abide by?
  7. Working areas need to be _______.
  8. When it is hot, hot, hot, what should we drink?
  9. To put out a fire we need a _______(2 words).
  10. What category would extreme heat be classified as?
  11. What ergonomic engineering is used to assist with luggage handling? (2 words)
  12. Rest, Ice, _______, Elevation (RICE).

21 Clues: Why do we use gloves?What is the "CP" in CPR?_______ Strain Injury (RSI).Working areas need to be _______.A worksite hazard in a guest centre?Rest, Ice, _______, Elevation (RICE).What item is recommended when riding a bike?To put out a fire we need a _______(2 words).When it is hot, hot, hot, what should we drink?...

Computer Network & Security 2025-09-17

Computer Network & Security crossword puzzle
Across
  1. – Connection-oriented protocol that ensures reliable communication.
  2. – Protocol used to map IP addresses to MAC addresses.
  3. – Widely used point-to-point protocol for data link communication.
  4. – Reference model with seven layers for networking functions.
  5. - the rate at which data is successfully transmitted from one point to another in a network
  6. - Uniquely identifies a device (like a computer, phone, or server) on a network
  7. – Error detection technique using the sum of data units.
  8. – A collection of interconnected devices sharing resources.
  9. – Process of dividing a data stream into manageable units.
  10. – Scientist who gave a formula for maximum data rate in noiseless channels.
Down
  1. – Error detection method based on polynomial division.
  2. – The physical or logical arrangement of a network.
  3. – Line coding where each bit has a transition at the middle.
  4. – Transmission mode where data flows in one direction only.
  5. – Line coding scheme where voltages are positive or negative.
  6. – Variation in packet arrival time that affects performance.
  7. – Type of switched network where a dedicated path is reserved.
  8. - When two or more networks are connected
  9. – Basic unit of data in packet-switched networks.
  10. – Device that forwards frames based on MAC addresses.

20 Clues: - When two or more networks are connected– Basic unit of data in packet-switched networks.– The physical or logical arrangement of a network.– Protocol used to map IP addresses to MAC addresses.– Device that forwards frames based on MAC addresses.– Error detection method based on polynomial division....

Computer Networks & Security 2025-11-21

Computer Networks & Security crossword puzzle
Across
  1. Short-range wireless tech used for earbuds or keyboards
  2. Amount of data that can move through a network connection at once
  3. Device that connects a network to an internet provider
  4. Tool that blocks unwanted or unsafe network traffic
  5. Network that covers large areas like cities or countries
  6. Wired connection using physical network cables
  7. Very short-range network for nearby personal devices
  8. Device that directs network traffic to the correct destination
  9. Device or location that provides a Wi-Fi signal
  10. Address Unique number that identifies a device on a network
  11. Device that allows wireless devices to join a network
  12. Connection that sends data to equipment in orbit
  13. Network that connects devices in one building or campus
Down
  1. Storage Online service that stores files on remote servers
  2. Software that detects or removes harmful programs
  3. Secret code used for encryption and decryption
  4. Wireless technology for connecting devices to the internet
  5. Software designed to harm devices or steal information
  6. Process of turning scrambled data back into readable information
  7. Older communication line that can carry data as well as voice
  8. Process of scrambling data so only authorized users can read it
  9. Packet Small bundle of information that moves across a network
  10. Older mobile data system used before 3G and 4G
  11. Transfer Speed Measurement of how fast data moves between devices

24 Clues: Secret code used for encryption and decryptionWired connection using physical network cablesOlder mobile data system used before 3G and 4GDevice or location that provides a Wi-Fi signalConnection that sends data to equipment in orbitSoftware that detects or removes harmful programsTool that blocks unwanted or unsafe network traffic...

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. ne saranno capaci Le macchine
  2. Sono sistemi di produzione
  3. come sono le macchine
  4. Industrial
  5. Sono state create…intelligenti
Down
  1. rende più…il lavoro
  2. Bisogna dare attenzione
  3. aumento dell’uso
  4. contiene 4 elementi chiave

9 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineBisogna dare attenzionecontiene 4 elementi chiaveSono sistemi di produzionene saranno capaci Le macchineSono state create…intelligenti

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. Sono sistemi di produzione
  2. ne saranno capaci Le macchine
  3. come sono le macchine
  4. aumento dell’uso
  5. contiene 4 elementi chiave
Down
  1. Bisogna dare attenzione
  2. Industrial
  3. Sono state create…intelligenti
  4. rende più…il lavoro

9 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineBisogna dare attenzioneSono sistemi di produzionecontiene 4 elementi chiavene saranno capaci Le macchineSono state create…intelligenti

Team-3 2023-03-31

Team-3 crossword puzzle
Across
  1. Maximum tolerable time that a computer/application can be down after a failure/disaster occurs
  2. Document for capturing all the contractual security requirements
Down
  1. Issues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions

3 Clues: Document for capturing all the contractual security requirementsMaximum tolerable time that a computer/application can be down after a failure/disaster occursIssues general licenses in order to authorize activities that would otherwise be prohibited with regard to the Cyber-related sanctions

Security Crossword Puzzle 2025-06-26

Security Crossword Puzzle crossword puzzle
Across
  1. When classified information mistakenly ends up on an unsecured system.
  2. Everyone, cleared and uncleared, is responsible for ________ classified information.
  3. Sharing classified information with uncleared persons is called ________ disclosure.
  4. Reporting _________ information to security is a requirement for all employees.
  5. The document located on the FSO page where you can locate all security policies and procedures (Abbr.).
  6. To access classified information, you must first have a favorable _____________ determination at the appropriate level.
Down
  1. Security risk that comes from within the organization.
  2. Before you embark on any ________ travel, you must complete a pre-briefing in Sign-In Compliance.
  3. The person in charge of a company's security program.
  4. How often every employee must complete their required security trainings.
  5. Only those with eligibility AND need-to-know can _______ classified information.
  6. Not a classification, but a designation.

12 Clues: Not a classification, but a designation.The person in charge of a company's security program.Security risk that comes from within the organization.When classified information mistakenly ends up on an unsecured system.How often every employee must complete their required security trainings....

15 Exectutive Departments 2016-09-20

15 Exectutive Departments crossword puzzle
Across
  1. / represents the united states in court
  2. / grants patents and registers trademarks
  3. / provides military forces and protects the nations security
  4. / inspects food
  5. affairs / oversees military cemeteries
  6. / produces coins and bills
  7. / operates job training programs
  8. / enforces fair housing laws
  9. / negotiates agreements with foreign countries
Down
  1. / helps native Americans manage their affairs
  2. security / in charge of border and transportation security
  3. / administers federal aid to schools
  4. / promotes production of renewable energy, fossil fuels, and nuclear energy
  5. / administers programs to promote and regulate highways, mass transit, railroads, waterways, air travel, and oil & gas pipelines
  6. services / funds health care research programs

15 Clues: / inspects food/ produces coins and bills/ enforces fair housing laws/ operates job training programs/ administers federal aid to schoolsaffairs / oversees military cemeteries/ represents the united states in court/ grants patents and registers trademarks/ helps native Americans manage their affairsservices / funds health care research programs...

Challenges of Securing Information 2023-09-25

Challenges of Securing Information crossword puzzle
Across
  1. concurrent lines of execution a shared resource
  2. incorrectly configured
  3. company does not provide support for their device
  4. manufacturers security settings
  5. wrong personnel making security decisions
  6. deficiencies or weaknesses in software
  7. that is that's not filtered or validated could cause a malicious action
  8. has not been identified
  9. widespread proliferation of devices
Down
  1. options that provide limited security choices
  2. devices not accounted for
  3. account that may provide more access than necessary
  4. error condition that allows an attacker access
  5. a situation in which an attacker manipulates commonplace business processes that are routinely performed
  6. no longer receives updates due to age

15 Clues: incorrectly configuredhas not been identifieddevices not accounted formanufacturers security settingswidespread proliferation of devicesno longer receives updates due to agedeficiencies or weaknesses in softwarewrong personnel making security decisionsoptions that provide limited security choiceserror condition that allows an attacker access...

Win an iPad mini from SIX Financial Information! 2013-05-09

Win an iPad mini from SIX Financial Information! crossword puzzle
Across
  1. US regulation to combat offshore tax evasion
  2. European tax on interest income
  3. How many millions of securities in SIX Financial’s DB?
  4. FACTA report and revenue collector
  5. How many global security ID schemes cross-referenced by SIX
  6. Managing Director of SIX Financial Information USA
  7. Requirement for FATCA compliance: Fund ___________
  8. Nothing is certain but death and ________ (Benjamin Franklin)
  9. Adherence to regulations
  10. "Legal Entity _____________"
  11. Fund look through required for this regulation
Down
  1. Market transparency directive dating to 2004
  2. No. times SIX named "Best Corp. Actions Data Provider"
  3. Type of data describing a security or an issuer
  4. First country to introduce a financial transaction tax
  5. Swiss tax treaty with UK & Austria, "Final __________ Tax"
  6. Provider of robust tax & compliance data
  7. Set of directives allowing cross-border fund sales in the EU
  8. How many decades SIX has been in business?
  9. Swiss national security ID number
  10. Second country to introduce a financial transaction tax

21 Clues: Adherence to regulations"Legal Entity _____________"European tax on interest incomeSwiss national security ID numberFACTA report and revenue collectorProvider of robust tax & compliance dataHow many decades SIX has been in business?Market transparency directive dating to 2004US regulation to combat offshore tax evasion...

SMS des Schreckens 2017-12-21

SMS des Schreckens crossword puzzle
Across
  1. Wichtigstes Utensil für viele Jugendliche
  2. Name einer Online Beratung bei Mobbing
  3. Was wurde bei der Kaffeejause gegessen
  4. Hauptperson
  5. Lieblingsspeise Julias
Down
  1. Absichtliches Beleidigen im Internet oder über das Handy
  2. Vorname der Autorin
  3. Spitzname von Julias Geographielehrerin
  4. Abkürzung für Short Message Sending
  5. Bruder von Emma
  6. SMS Kürzel für See you
  7. Name von Julias zukünftigen Stiefvater
  8. Julias beste Freundin

13 Clues: HauptpersonBruder von EmmaVorname der AutorinJulias beste FreundinSMS Kürzel für See youLieblingsspeise JuliasAbkürzung für Short Message SendingName einer Online Beratung bei MobbingWas wurde bei der Kaffeejause gegessenName von Julias zukünftigen StiefvaterSpitzname von Julias GeographielehrerinWichtigstes Utensil für viele Jugendliche...

2.4/2.5 2021-10-06

2.4/2.5 crossword puzzle
Across
  1. The greatest security threat to individuals or organisations. Often dangerous due to BYOD.
  2. Hoax websites can be created to steal information from an individual. Cookies also used to track activity.
  3. Information such as bank details or card details which could be stolen from an individual, organisation or the state.
  4. An organisations patents or designs which they would not want to be stolen.
  5. Funny videos from the past may have been funny back then but could jeopardize someones career prospects if found by employers.
Down
  1. An attack where a server is overloaded with requests and so refuses to process your request and you don't get the information. Typically a threat to organisations or websites.
  2. One of the most valuable things in the world, capable of providing great wealth or power to anyone who possesses it.
  3. Data can be stolen from Individuals, Organisations or The ____.
  4. Pieces of information that would allow a hacker to know information about an individuals name and address.
  5. Organisations could become vulnerable to _____ if information is stolen by someone who wants to gain leverage over the organisation.
  6. What could an organisation lose if they are a victim of a cyber attack. Customers may not trust them anymore.
  7. An organisations development plans may contain possible ____ with other organisations.

12 Clues: Data can be stolen from Individuals, Organisations or The ____.An organisations patents or designs which they would not want to be stolen.An organisations development plans may contain possible ____ with other organisations.The greatest security threat to individuals or organisations. Often dangerous due to BYOD....

Cyber 2022-11-16

Cyber crossword puzzle
Across
  1. are in place
  2. must be classified
  3. how it works
  4. are faced daily
Down
  1. work together
  2. must be followed
  3. is a must

7 Clues: is a mustare in placehow it workswork togetherare faced dailymust be followedmust be classified

SN33003FP Chapter 7 2024-07-06

SN33003FP Chapter 7 crossword puzzle
Across
  1. Secure privileged accounts, configure password policies and lockout policies and enable logs to record all events
  2. Protects data by transforming it using a complicated algorithm to make it unreadable
  3. Include measurements of the face, fingerprint, hand geometry, iris, retina, signature, and voice
  4. Hardware/software that enforces network security policies by filtering unauthorized or potentially dangerous traffic
  5. Uses Message Integrity Check (MIC) to detect if an attacker had altered the data and Temporal Key Integrity Protocol (TKIP) to better handle, protect and change encryption keys
  6. Any wireless device can connect to the wireless network and is used where security is of no concern
  7. Equipment uses networks (e.g. internet) to make / receive phone calls
  8. Consists of permissions that limit folder or file access for an individual or for a group of users
  9. Users should be limited to only the resources they need
  10. Fends off problems posed by rogue access points and requires two-way authentication
  11. Freezes hard drive partitions, reverting a system to its preset state upon restart
  12. Allows an individual to gain access to an area with automated entry points using various technologies
  13. Uses Advanced Encryption Standard (AES) for even better key management and encryption protection
  14. Control access to an organization's sensitive areas
  15. Manufacturers combine patches and upgrades into a service pack to mitigate attacks
Down
  1. Automatically logs the user out and locks the screen after a specified period
  2. Private network that connects remote sites or users together over a public network, like the Internet
  3. Copies the contents of a computer's hard disk to an image file
  4. Video and electronic surveillance supplement or in some cases, replace security guards
  5. Enhances default security, removes unnecessary programs, applies patches, systematically updates, and identifies vulnerabilities
  6. Power protection controls, HVAC systems, and hardware monitoring systems
  7. One of the first widely used Wi-Fi security standards that suffered from numerous security weaknesses
  8. Uses satellites and computers to determine the location of a device
  9. A dedicated site that monitors, assesses, and defends the organization's information systems
  10. One or more locations containing the tools that provide administrators with a detailed status of the organization's network
  11. Antivirus protection, adware protection, phishing protection, spyware protection
  12. A program that allows or denies traffic between the computer and other connected computers
  13. Provides mechanisms to authenticate and encrypt data between a wireless client and wireless router

28 Clues: Control access to an organization's sensitive areasUsers should be limited to only the resources they needCopies the contents of a computer's hard disk to an image fileUses satellites and computers to determine the location of a deviceEquipment uses networks (e.g. internet) to make / receive phone calls...

Health Informatics 2024-02-19

Health Informatics crossword puzzle
Across
  1. the ability of different systems and devices to work together and exchange data effectively
  2. the process of identifying, assessing, and mitigating potential risks to the confidentiality, integrity, and availability of sensitive information
  3. a security system that controls access to a network or system by blocking unauthorized traffic.
  4. a comprehensive clinical terminology used for coding and indexing of health information
  5. the use of computer algorithms to perform tasks that normally require human intelligence, such as decision-making or pattern recognition.
  6. a digital record of a patient's health information that they can access and update themselves
  7. the act of adhering to laws, regulations, and standards related to information security and privacy.
  8. the use of technology to provide healthcare services remotely such as through video calls or online
Down
  1. a digital version of a patient's medical history and treatment information within one healthcare organization.
  2. the unauthorized access or release of sensitive information.
  3. the process of identifying and evaluating potential risks to the security and confidentiality of Information.
  4. the use of technology to manage and analyze health-related data and processes
  5. a standard for information security management systems (ISMS)
  6. the use of mobile devices and technology to support health and healthcare.
  7. the field of science that uses computational techniques to analyze and interpret biological data
  8. the process of managing who can access information and resources.
  9. the process of converting data into a code to protect it from unauthorized access
  10. the process of reviewing and evaluating information security and privacy practices to ensure compliance with laws, regulations, and standards.
  11. the study of how genetic information is modified by environmental factors
  12. a standard for identifying laboratory and other clinical observations

20 Clues: the unauthorized access or release of sensitive information.a standard for information security management systems (ISMS)the process of managing who can access information and resources.a standard for identifying laboratory and other clinical observationsthe study of how genetic information is modified by environmental factors...

SecureEdge 2023-05-22

SecureEdge crossword puzzle
Across
  1. SASE Network Edge
  2. CGF Management UI
  3. An on-prem or cloud-delivered network security service
  4. Barracuda’s VPN protocol
  5. By 2025, Gartner predicts ____ % of enterprises will adopt SASE solutions
  6. SecureEdge ____ runs on the Barracuda Cloud
  7. Simplified Cloud Management Portal
  8. An on-prem or cloud-based security policy enforcement point
  9. SecureEdge replaces this product
  10. Core function of CGF and SecureEdge
  11. Needed to connect to GCP
Down
  1. Coined by Gartner
  2. SecureEdge is a ____ replacement
  3. Half of SASE framework that provides cloud-based network services
  4. An expensive networking technology
  5. ____ provides a highly granular access mechanism to apps, data, services based on a user’s identity
  6. Campus SecureEdge Sales Specialist Course
  7. Enterprise grade firewall with SD-WAN
  8. Half of SASE framework the provides cloud-based network security services
  9. SecureEdge Hardware or Virtual appliance
  10. SecureEdge WorkRamp analogy for SASE
  11. Cloud-based firewall
  12. SecureEdge remote access client

23 Clues: Coined by GartnerSASE Network EdgeCGF Management UICloud-based firewallBarracuda’s VPN protocolNeeded to connect to GCPSecureEdge remote access clientSecureEdge is a ____ replacementSecureEdge replaces this productAn expensive networking technologySimplified Cloud Management PortalCore function of CGF and SecureEdge...

¿A dónde vas a viajar? list 1 Sp 2 2025-05-08

¿A dónde vas a viajar? list 1 Sp 2 crossword puzzle
Across
  1. ticket 1
  2. suitcase
  3. seatbelt/security belt
  4. ticket 2
  5. to pack a suitcase
  6. layover
  7. to take a trip
  8. to board
  9. platform
  10. baggage claim
  11. plane
  12. airport
  13. to be delayed
  14. train station
  15. customs
  16. to fly
  17. ticket counter (airport)
  18. to camp, to go camping
  19. arrival
  20. to take off
  21. to stay
  22. passport
  23. to be on vacation
  24. to make plans
  25. carry-on luggage
  26. gate
Down
  1. flight
  2. ticket booth (train station)
  3. to travel
  4. to lose; to miss
  5. departure
  6. to check luggage
  7. stop
  8. security agent (TSA)
  9. luggage
  10. conductor/controller
  11. passenger
  12. flight attendant
  13. sleeping car
  14. boarding pass
  15. to be on time
  16. to wait (for); to hope
  17. to go through security
  18. to land (plane)
  19. in the airport
  20. seat

46 Clues: stopseatgateplaneflightto flylayoverluggageairportcustomsarrivalto stayticket 1suitcaseticket 2to boardplatformpassportto traveldeparturepassengerto take offsleeping carbaggage claimto be delayedtrain stationboarding passto be on timeto make plansto take a tripin the airportto land (plane)to lose; to missto check luggageflight attendant...

Cyber-Bullying 2013-04-12

Cyber-Bullying crossword puzzle
Across
  1. When somebody reveals personal or embarassing information over the internet
  2. Bullying somebody using the internet
  3. Person who is being bullied
  4. Also known as the "agitator"
  5. Deliberatly and disingenuouskly posting information to entice genuinely
Down
  1. A type of online attack that uses a blog or forum
  2. Fooling somebody into revealing personal information
  3. When someone pretends to be someone that they aren't
  4. Following victims on the internet
  5. Spreading gossip or rumours over the internet
  6. A computer file that records user information

11 Clues: Person who is being bulliedAlso known as the "agitator"Following victims on the internetBullying somebody using the internetSpreading gossip or rumours over the internetA computer file that records user informationA type of online attack that uses a blog or forumFooling somebody into revealing personal information...

Cyber Bully 2015-08-25

Cyber Bully crossword puzzle
Across
  1. Veronica had them on her leg
  2. Emily's brother
  3. Emily got the liquid there
  4. Emily got .... euro pocket money
  5. Emily's father was drinking it
Down
  1. Name of Emily's boyfriend
  2. word meaning 'disgusting' or 'very bad'
  3. Emily messaged her for over 2 hours
  4. word meaning 'replied sharply'
  5. Surname of guidance counsellor
  6. The place where Emily could hide

11 Clues: Emily's brotherName of Emily's boyfriendEmily got the liquid thereVeronica had them on her legword meaning 'replied sharply'Surname of guidance counsellorEmily's father was drinking itEmily got .... euro pocket moneyThe place where Emily could hideEmily messaged her for over 2 hoursword meaning 'disgusting' or 'very bad'

Cyber safety 2016-09-08

Cyber safety crossword puzzle
Across
  1. the school uses one of these to stop students from using certain websites
  2. it is illegal to sign up before the age of 13
  3. a place where photos are mostly posted
  4. this type of software can protect you against a virus
  5. when you are using the web you are
Down
  1. a harmful thing that can ruin your computer
  2. who should you see if you are being bullied at school
  3. it is important to keep your information .....
  4. an email that is unwanted
  5. when someone breaks into your account
  6. you should never display this publicly

11 Clues: an email that is unwantedwhen you are using the web you arewhen someone breaks into your accounta place where photos are mostly postedyou should never display this publiclya harmful thing that can ruin your computerit is illegal to sign up before the age of 13it is important to keep your information ........

Cyber bulling 2023-04-18

Cyber bulling crossword puzzle
Across
  1. rethink before you do this
  2. if your getting bullied you need to tell a trusted ...
  3. people who are getting cyberbullied
  4. a very common device for communicating over a distance.
  5. sending, posting, or sharing negative, harmful, false, or mean content about someone else.
Down
  1. a secret word or numbers that must be used to gain admission to something
  2. the act of forcing a person to do or pay something especially by a threat to reveal a secret
  3. when someone sets up a fake online profile to trick people who are looking for love, usually to get money out of them.
  4. a person who is present at an event or incident but does not take part
  5. a setting you need to check
  6. a popular video sharing website

11 Clues: rethink before you do thisa setting you need to checka popular video sharing websitepeople who are getting cyberbulliedif your getting bullied you need to tell a trusted ...a very common device for communicating over a distance.a person who is present at an event or incident but does not take part...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. people that be mean to you on your device
  2. something that takes over your device
  3. While there are many online scams on the internet, phishing is one that is geared specifically toward retrieving someone's personal information and using it to harm them. An identity thief
  4. Sharing someone's secrets or embarrassing information or images online.
  5. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
Down
  1. "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  2. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  3. form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity
  4. online fights using electronic messages
  5. when something is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work
  6. Repeatedly sending nasty, mean, and insulting message

11 Clues: something that takes over your deviceonline fights using electronic messagespeople that be mean to you on your deviceRepeatedly sending nasty, mean, and insulting messageSharing someone's secrets or embarrassing information or images online.Talking someone into revealing secrets or embarrassing information, then sharing it online....

Cyber threats 2022-11-15

Cyber threats crossword puzzle
Across
  1. this malware enables malicious actors to gain unauthorized access to data.
  2. attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email
  3. prevents access to the data of the victim and threatens to delete or publish it unless a ransom is paid.
  4. this phishing attack targets high-profile employees (whales), such as the chief executive officer (CEO) or chief financial officer (CFO).
  5. occurs when a threat actor tricks a target into using a malicious device, placing a malware-infected physical device, like a USB, where the target can find it.
Down
  1. a threat actor tricks the victim into thinking they inadvertently downloaded illegal content or that their computer is infected with malware.
  2. online advertising controlled by hackers, which contains malicious code that infects a user’s computer when they click, or even just view the ad.
  3. systems under hacker control that have been infected with malware.
  4. an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.
  5. this malware is designed to exploit backdoors and vulnerabilities to gain unauthorized access to operating systems.
  6. voice phishing (vishing) attacks use social engineering techniques to get targets to divulge financial or personal information over the phone.

11 Clues: systems under hacker control that have been infected with malware.this malware enables malicious actors to gain unauthorized access to data.an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email...

Cyber Ethics 2025-06-19

Cyber Ethics crossword puzzle
Across
  1. A type of attack that tricks a user into revealing their personal information is called
  2. This is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  3. observe threatening and aggressive behavior directed toward another
  4. is a security measure that prevents users from accessing unauthorized websites.
  5. experience threatening and aggressive behavior against themself
  6. threatening and aggressive behavior directed toward others
Down
  1. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer
  2. SQL is a type of attack that attempts to exploit a vulnerability in a web application.
  3. A person who uses computers to gain unauthorized access to data.
  4. This is a computer security system designed to prevent unauthorized access.
  5. bullies may be more likely to have callous-unemotional traits, psychopathic tendencies, conduct problems, antisocial personality traits, susceptibility to peer pressure, anxiety, and depression

11 Clues: threatening and aggressive behavior directed toward othersexperience threatening and aggressive behavior against themselfA person who uses computers to gain unauthorized access to data.observe threatening and aggressive behavior directed toward anotherThis is a computer security system designed to prevent unauthorized access....

RÕIVASTUSSTIILID 2022-12-28

RÕIVASTUSSTIILID crossword puzzle
Across
  1. LOOMAMUSTRID, LOODUSLIKUD VÄRVID
  2. ILUS HIRMUÄRATAVAKS, HIRMUÄRATAV ILUSAKS
  3. TAASKASUTUS
  4. VÄHEM ON ROHKEM
  5. LILLELAPSED, VABADUS, NATURAALSUS
Down
  1. EBALOOMULIK JA UNENÄOLINE
  2. SWEET, CYBER, GOTIC...
  3. KORRALIK JA HOOLISETUD

8 Clues: TAASKASUTUSVÄHEM ON ROHKEMSWEET, CYBER, GOTIC...KORRALIK JA HOOLISETUDEBALOOMULIK JA UNENÄOLINELOOMAMUSTRID, LOODUSLIKUD VÄRVIDLILLELAPSED, VABADUS, NATURAALSUSILUS HIRMUÄRATAVAKS, HIRMUÄRATAV ILUSAKS

Anti-bulling 2014-08-08

Anti-bulling crossword puzzle
Across
  1. the person who is bulling
  2. consist bulling
  3. whispers about somebody
  4. having no propose
  5. somebody who has no affect on what is going on
  6. not the truth
  7. bulling someone online
  8. hard or to try change something
  9. making something better
Down
  1. with nobody,liked by nobody
  2. physically harming someone
  3. heeling someone
  4. the health of of your brain

13 Clues: not the truthheeling someoneconsist bullinghaving no proposebulling someone onlinewhispers about somebodymaking something betterthe person who is bullingphysically harming someonewith nobody,liked by nobodythe health of of your brainhard or to try change somethingsomebody who has no affect on what is going on

Arent 1c 2023-03-06

Arent 1c crossword puzzle
Across
  1. chce wpływać na innych ośmieszać ich , wyzywać
  2. pamiętnik prowadzony w internecje
  3. cyber atak
  4. mylne informacje rozpowszechniane bez złej intencji
  5. przemoc związana z użyciem urządzeń elektrycznych
Down
  1. zmanipulowana informacja
  2. złamanie zabezpieczenia
  3. forma komunikacji erotycznej
  4. technika obróbki zdjęć
  5. strach przed ominięciem ważnej informacji
  6. niechciane , irytujące wiadomośći
  7. zbiór zasad dotyczące dobrego zachowania w internecje
  8. rodzaj rozmowy prowadzony dwoma osobami lub więcej

13 Clues: cyber ataktechnika obróbki zdjęćzłamanie zabezpieczeniazmanipulowana informacjaforma komunikacji erotycznejpamiętnik prowadzony w internecjeniechciane , irytujące wiadomośćistrach przed ominięciem ważnej informacjichce wpływać na innych ośmieszać ich , wyzywaćprzemoc związana z użyciem urządzeń elektrycznych...

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ 2020-03-05

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ crossword puzzle
Across
  1. Ιός της εποχής μας
  2. Εκεί βρίσκεται το σχολείο μας
  3. Στα ελληνικά το cyber bullying
  4. Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές
  5. Μπορεί να συμβεί και κατά την ώρα του....
  6. Δέχεται τον εκφοβισμό
  7. Στα ελληνικά ο bully
  8. Το βαπτιστικό του Καραϊσκάκη
Down
  1. Ηγέτης της Νότιας Αφρικής
  2. Εκφοβισμός με λόγια
  3. Εκεί συμβαίνει συχνά ο εκφοβισμός
  4. Σήμερα είναι...
  5. Ασκεί τον εκφοβισμό

13 Clues: Σήμερα είναι...Ιός της εποχής μαςΕκφοβισμός με λόγιαΑσκεί τον εκφοβισμόΣτα ελληνικά ο bullyΔέχεται τον εκφοβισμόΗγέτης της Νότιας ΑφρικήςΤο βαπτιστικό του ΚαραϊσκάκηΕκεί βρίσκεται το σχολείο μαςΣτα ελληνικά το cyber bullyingΕκεί συμβαίνει συχνά ο εκφοβισμόςΜπορεί να συμβεί και κατά την ώρα του....Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές

DOMESTIC & INTERNATIONAL AIRPORTS ASH 2017-09-11

DOMESTIC & INTERNATIONAL AIRPORTS ASH crossword puzzle
Across
  1. A AREA WHERE YOU GO THROUGH SECURITY
  2. RUNWAYS
  3. A AREA BEFORE DEPARTING PASSENGERS
  4. A PLACE TO SELL AND BUY FOREIGN CURRENCY FOUND ON BOTH AIRSIDE AND LANDSIDE
  5. A WORD YOU SHOULD NOT USE IN AIRPORT AREA
  6. LUGGAGE STORAGE AREA
  7. THREE LETTER CODE FOR TAURANGA
  8. MANY AIRPORTS OFFER BOTH SHORT AND LONG TERM____
  9. NEED TO SHOW ______ AT THE PASSPORT CONTROL
Down
  1. THREE LETTER CODE FOR TIMARU
  2. AIRPORT OPERATES
  3. A MACHINE IN WHICH A CONVEYER BELTS MOVES THE ITEMS THROUGH THE MACHINE
  4. A AREA WHICH BAGS MUST NEVER BE LEFT UNATTENDED
  5. WHO HANDLE_____FOR A NUMBER OF AIRLINES
  6. A PLACE FOR PURCHASING GOODS ON AIRSIDE
  7. LIQUIDS, AEROSOLS AND GELS ARE KEPT INSIDE IT
  8. BEFORE GOING TO AIRSIDE YOU MUST PASS____
  9. A FAST FOOD RESTAURANT FOUND ON THE AIRSIDE OF THE AIRPORT
  10. AVIATION SECURITY
  11. A AIRPORT THAT HAS 15 MILLION PASSENGERS

20 Clues: RUNWAYSAIRPORT OPERATESAVIATION SECURITYLUGGAGE STORAGE AREATHREE LETTER CODE FOR TIMARUTHREE LETTER CODE FOR TAURANGAA AREA BEFORE DEPARTING PASSENGERSA AREA WHERE YOU GO THROUGH SECURITYWHO HANDLE_____FOR A NUMBER OF AIRLINESA PLACE FOR PURCHASING GOODS ON AIRSIDEA AIRPORT THAT HAS 15 MILLION PASSENGERSBEFORE GOING TO AIRSIDE YOU MUST PASS____...

CTF-CW-2S 2025-11-17

CTF-CW-2S crossword puzzle
Across
  1. Legal basis requiring explicit permission for data processing
  2. Special rights or access levels in a system
  3. Offensive security and threat-simulation platform at Tekion.
  4. Privacy principle restricting how long personal data can be kept
  5. Copying data for recovery after loss
  6. AI-powered platform at Tekion that finds and fixes app code vulnerabilities.
  7. Sequence of actions to achieve an outcome
  8. Tactics, Techniques, and Procedures acronym
  9. Self-replicating malware spreading through networks
Down
  1. Unplanned event threatening data or operations
  2. A company you hire to run your security monitoring remotely
  3. Verifying identity to access a system
  4. Canada's Personal Information Protection and Electronic Documents Act
  5. Recovery strategy for a detected issue
  6. Combining individual data points into statistical summaries to protect privacy
  7. Document tracking known risks
  8. Runtime application security platform deployed at Tekion.
  9. Bringing operations back after an incident
  10. International standards-setting organization
  11. Data Loss Prevention: protecting info from leaving the network

20 Clues: Document tracking known risksCopying data for recovery after lossVerifying identity to access a systemRecovery strategy for a detected issueSequence of actions to achieve an outcomeBringing operations back after an incidentSpecial rights or access levels in a systemTactics, Techniques, and Procedures acronym...

Code CrossWord 2016-02-08

Code CrossWord crossword puzzle
Across
  1. bully a bully over online
  2. a logic gate
  3. to identify or remove errors
  4. a command
  5. a file of information
  6. a programming
  7. getting mail from a computer
  8. a virus on a computer
Down
  1. when you dont receive messages from that person
  2. literacy process of teaching and learning and using technology
  3. a system
  4. health and wellness physical and psychological well-being in a digital technology world
  5. a error

13 Clues: a errora systema commanda logic gatea programminga file of informationa virus on a computerbully a bully over onlineto identify or remove errorsgetting mail from a computerwhen you dont receive messages from that personliteracy process of teaching and learning and using technology...

Puzzle #15 – “Social Security Fraud” 2025-06-29

Puzzle #15 – “Social Security Fraud” crossword puzzle
Across
  1. - Illegal use or abuse of Social Security information
  2. - Never give out your Social Security ______ over the phone
  3. - Email tactic scammers use to steal info
  4. - Scammers often use this to trick people
  5. - What you must do to your Social Security information
Down
  1. - Type of theft involving stolen personal information
  2. - Type of program scammers try to exploit
  3. - What you should do if you suspect fraud
  4. - A common scheme to steal your Social Security number
  5. - Agency that investigates Social Security fraud

10 Clues: - Type of program scammers try to exploit- What you should do if you suspect fraud- Email tactic scammers use to steal info- Scammers often use this to trick people- Agency that investigates Social Security fraud- Type of theft involving stolen personal information- Illegal use or abuse of Social Security information...

Unit 2 health crossword 2023-10-06

Unit 2 health crossword crossword puzzle
Across
  1. Saying nothing and doesn’t really care
  2. Someone who watches it happen
  3. Making someone feel included.
  4. People having more power than others n this situation.
  5. You respect everyone equally
Down
  1. Complete
  2. Does their own thing
  3. Someone targeting someone
  4. Prevents the bullying
  5. bullying. One line bullying
  6. Someone getting targeted

11 Clues: CompleteDoes their own thingPrevents the bullyingSomeone getting targetedSomeone targeting someonebullying. One line bullyingYou respect everyone equallySomeone who watches it happenMaking someone feel included.Saying nothing and doesn’t really carePeople having more power than others n this situation.

Farid Putra Wibawa/12F10/09 2024-09-14

Farid Putra Wibawa/12F10/09 crossword puzzle
Across
  1. interaksi yang terjalin dalam lot
  2. Kecerdasan buatan
  3. nilai kegunaan data
  4. Industri Cyber physical system
  5. Cloud software as a service
  6. kumpulan data yang bersifat besar
Down
  1. bagian utama dalam kecerdasan buatan
  2. sebuah akurasi pada melakukan pengumpulan data
  3. data Terstruktur dan tidak terstruktur
  4. berbagai macam perangkat
  5. layanan dalam saas

11 Clues: Kecerdasan buatanlayanan dalam saasnilai kegunaan databerbagai macam perangkatCloud software as a serviceIndustri Cyber physical systeminteraksi yang terjalin dalam lotkumpulan data yang bersifat besarbagian utama dalam kecerdasan buatandata Terstruktur dan tidak terstruktursebuah akurasi pada melakukan pengumpulan data

gaming 2024-11-11

gaming crossword puzzle
Across
  1. When game is slow
  2. Where you come back after dying
  3. A malfunction
  4. An inexperienced gamer
  5. A low-level character with good gear
  6. Revive a teammate.
Down
  1. A malicious cyber-attack
  2. When a neutral mob becomes hostile
  3. A player's character
  4. A gamer that takes all the damage
  5. A tough enemy

11 Clues: A malfunctionA tough enemyWhen game is slowRevive a teammate.A player's characterAn inexperienced gamerA malicious cyber-attackWhere you come back after dyingA gamer that takes all the damageWhen a neutral mob becomes hostileA low-level character with good gear

Social Security & Markets 2020-12-05

Social Security & Markets crossword puzzle
Across
  1. These enrollees must provide evidence of insurability if they enter the group plan after the open enrollment period.
  2. The acronym for the amount of monthly payment one receives once Social Security Benefits are activated and calculated by a formula into this amount.
  3. This type of ownership occurs when the applicant purchases a policy on the insured who is not themselves
  4. This type of plan is used when business partners purchase life insurance on one another so that in the event of one of their death the other business partner can purchase the shares of the deceased business partner.
  5. These groups are formed for a purpose other than to purchase insurance.
  6. The number of credits required to be considered eligible for the maximum amount of social security benefits.
  7. the minimum number of credits to qualify for disability insurance
  8. This is also is referred to as the minimum amount necessary to qualify for disability insurance.
  9. This type of group plan requires that 100% of eligible participants must participate and all premiums are paid by the employer.
  10. this is the number of credits a working individual receives for every year of work towards their social security
  11. Each group policy participant receives this as their proof of being part of the plan.
  12. Current full retirement age.
  13. The surviving spouse may continue to receive benefits until the youngest child reaches this age.
Down
  1. An individual who has succesfully received all of the credits necessary to receive the maximum amount of social security benefits.
  2. This plan is used so that the business can purchase life insurance on the partners and buy back the shares from the deceased partners' estate or family.
  3. This policy controls the group life insurance plan and must have the producers information and signature.
  4. almost every group life insurance policy is written as this type of insurance.
  5. The original name for social security
  6. The number of years required to work in order to qualify for the maximum benefit amount for social security benefits.
  7. This type of group plan requires that 75% of eligible participants must participate and some premiums are paid by the employer.
  8. This type of policy is purchased in order to protect the company from loss of an employee that is integral to the business.
  9. The minimum age at which someone could begin to receive social security benefits but would permanently reduce the benefits received.

22 Clues: Current full retirement age.The original name for social securitythe minimum number of credits to qualify for disability insuranceThese groups are formed for a purpose other than to purchase insurance.almost every group life insurance policy is written as this type of insurance....

crossword 2025-02-16

crossword crossword puzzle
Across
  1. - A unit of digital storage equal to 1,024 gigabytes.
  2. - A reference in a document that connects to another location or file.
  3. - Increasing a computer component’s speed beyond its specifications.
  4. - A cryptographic technique that uses quantum mechanics.
  5. - An organized collection of structured information or data.
  6. - A global network connecting millions of devices.
  7. - A cyber attack that tricks users into revealing personal information.
  8. - The maximum rate of data transfer across a network.
  9. - A security system that monitors and controls network traffic.
  10. - A temporary storage area for frequently accessed data.
  11. - Software with publicly available source code.
  12. - A type of AI that mimics human intelligence.
  13. - Temporary memory used for quick access.
  14. - The process of replacing sensitive data with unique identifiers.
  15. - A digital storage space in the cloud.
  16. - Data that describes other data.
  17. - A device that connects networks.
  18. - A wireless networking technology.
  19. - A step-by-step procedure for solving a problem.
  20. - The delivery of computing services over the internet.
  21. - Unwanted or unsolicited messages, typically emails.
  22. - A self-replicating computer program.
  23. - The smallest unit of data in computing.
  24. - A secret code used for security.
  25. - The smallest unit of a digital image.
Down
  1. - A decentralized ledger technology used in cryptocurrencies.
  2. - A program that translates source code into machine code.
  3. - Permanent software programmed into a hardware device.
  4. - An error in programming.
  5. - The manipulation of matter on an atomic scale.
  6. - A software testing method to verify previous functionality.
  7. - A set of rules for data transmission.
  8. - Software that harms a system.
  9. - The simulation of human intelligence in machines.
  10. - The delay before data is transferred over a network.
  11. - A technology that overlays digital content on the real world.
  12. - A subset of machine learning using neural networks.
  13. - The process of creating a virtual version of computing resources, such as servers or storage.
  14. - The practice of protecting systems and networks from digital attacks.
  15. - The part of a system that users interact with.
  16. - The process of converting information into a secure format.
  17. - A type of malware that spreads across networks automatically.
  18. - A program that performs a specific task.
  19. - A memory management technique using disk storage.
  20. - The process of converting analog data to digital.
  21. - A common wired networking technology.
  22. - A tool used to test and fix errors in software.
  23. - The physical parts of a computer.
  24. - A collection of tools for software development.
  25. - The brain of a computer.

50 Clues: - An error in programming.- The brain of a computer.- Software that harms a system.- Data that describes other data.- A device that connects networks.- A secret code used for security.- A wireless networking technology.- The physical parts of a computer.- A self-replicating computer program.- A set of rules for data transmission....

CYBERCRIME 2021-07-10

CYBERCRIME crossword puzzle
Across
  1. measures promoting the safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
  2. is a form of bullying or harassment using electronic means
  3. Interception made by technical means without right
  4. It is when an individual or entity with malice or in bad faith
  5. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  6. is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access
  7. is data that describes other data.
  8. Intentional or reckless alteration, damaging, deletion of computer data
  9. protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  10. is a hacker who violates computer security for their own personal profit or out of malice.
  11. is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
  12. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
  13. a string of characters that allows access to a computer system or service.
  14. a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations
  15. sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
  16. of 2012 therefore and for other purposes
  17. act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes.
  18. It is offense against the confidentiality, integrity and availability of computer data and systems.
  19. is pornography that exploits children for sexual stimulation.
  20. information of an individual in any container for trash collection.
  21. is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
  22. what comes after terabyte
  23. It is when personal
  24. is a form of phishing that uses mobile phones as the attack platform to gather personal details, like SSN or credit card number.
  25. is a suspected, attempted, successful, or imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction of information; interference with information technology operations; or significant violation of responsible use policy
  26. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Down
  1. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  2. is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet.
  3. Intentional alteration or reckless interference with the functioning of a computer or computer network
  4. when individual handling personal information knowingly or negligently disposed, discard, or abandon in an area accessible to the public or has otherwise placed the
  5. includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life.
  6. It is when an individual handling personal information or intentional knowingly and unlawfully, or violating data confidentiality breach and security
  7. breach It is when an individual or entity who has knowledge of a security breach and of the obligation
  8. It is when an individual or entity discloses to third party personal information.
  9. is a concept describing a widespread interconnected digital technology.
  10. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
  11. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
  12. Prevention investigation, suppression and the imposition of penalties
  13. is a data storage device that includes flash memory with an integrated USB interface.
  14. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
  15. refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
  16. Act of 2012
  17. is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.
  18. Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
  19. Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering.
  20. global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  21. what comes after zettabyte.
  22. Access Access to the whole or any part of a computer system without right
  23. is a shortfall that comes from fragmented thinking, reactive acquisition, and unmanaged vulnerability against the known threats that violate confidentiality, integrity, availability, and privacy of information in the infrastructure, process, data, application, and agreements of service delivery.
  24. An act defining cybercrime, providing for the prevention,
  25. is an electronic data storage device used for storing digital information, typically using flash memory.

51 Clues: Act of 2012It is when personalwhat comes after terabytewhat comes after zettabyte.is data that describes other data.of 2012 therefore and for other purposesInterception made by technical means without rightAn act defining cybercrime, providing for the prevention,is a form of bullying or harassment using electronic means...

Time and Space 2025-03-16

Time and Space crossword puzzle
Across
  1. The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event?
  2. Which NASA mission was named after a Greek goddess?
  3. "Beyond the Light" includes a 26-minute cinematic experience divided into how many scenes?
  4. What is the primary tool used to study space, as highlighted in the exhibition?
  5. Jewel Box Sun" showcases the Sun in how many different wavelengths?
  6. What is the name of the art and technology studio that created "Beyond the Light"?
  7. Which Mars rover, represented in "Mars Rovers’ Dreams," was described as having a personality combining whimsy, wonder, and grit?
  8. Which space telescope’s discoveries are featured in "Beyond the Light"?
Down
  1. What type of orbit will Artemis missions use to help astronauts reach the Moon’s South Pole?
  2. What type of propulsion does the Artemis mission use for inclination control thrusters?
  3. The "Cyber Cocoon" installation explores the potential effects of which type of solar event?
  4. Which scientific institute curates the images from the James Webb Space Telescope?
  5. "Nature’s Pulse" visualizes Earth’s health using how many transparent OLED screens?
  6. What celestial body is the focus of NASA’s Artemis mission?
  7. What space agency collaborated with ARTECHOUSE to create "Beyond the Light"?

15 Clues: Which NASA mission was named after a Greek goddess?What celestial body is the focus of NASA’s Artemis mission?Jewel Box Sun" showcases the Sun in how many different wavelengths?Which space telescope’s discoveries are featured in "Beyond the Light"?The 1859 solar storm, which inspired "Cyber Cocoon," is known as what event?...

Alerts 2022-12-09

Alerts crossword puzzle
Across
  1. An alert that is undetected incident has occurred
  2. Is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution.
  3. This analysis estimates the potential success of an exploit by estimating the likelihood that if one step in an exploit has successfully been completed that the next step will also be successful
  4. It is a packet capture application that is integrated into the Security Onion suit
  5. Are notification messages that are generated by NSM tools, systems, and security devices
  6. The alert has been verified to be an actual security incident
Down
  1. The meaning of M in NSM
  2. Is a network traffic analyzer that serves as a security monitor.
  3. This is a Network Intrusion Detection System (NIDS).
  4. It is an interactive dashboard interface to Elasticsearch data.
  5. This tool provides a high-level console for investigating security alerts from a wide variety of sources
  6. alert evaluation where all prior steps in the exploit must also be successful

12 Clues: The meaning of M in NSMAn alert that is undetected incident has occurredThis is a Network Intrusion Detection System (NIDS).The alert has been verified to be an actual security incidentIt is an interactive dashboard interface to Elasticsearch data.Is a network traffic analyzer that serves as a security monitor....

bullying crossword 2020-06-07

bullying crossword crossword puzzle
Across
  1. if you are being bullied tell the______
  2. getting hit
  3. getting item's through ________
  4. choosing to not include someone
  5. hurt through words.
Down
  1. hurting
  2. people who see the bullying
  3. the person doing the bullying.
  4. punches.
  5. this happens on the in the internet.

10 Clues: hurtingpunches.getting hithurt through words.people who see the bullyingthe person doing the bullying.getting item's through ________choosing to not include someonethis happens on the in the internet.if you are being bullied tell the______

U11 - Review Cyber Security Plan, Constraints & Test Plan 2025-11-17

U11 - Review Cyber Security Plan, Constraints & Test Plan crossword puzzle
Across
  1. (6,3,8) A type of testing ensures data can be restored.
  2. (11,7) Simulate attacks to find weaknesses.
  3. (5,3,16) as part of the CSP who manages security, audits, and response.
  4. This part of the CSP ensures confidentiality, integrity, and availability of information.
  5. (6,7) A type of testing that verifies permissions and authentication.
Down
  1. This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
  2. (13,8) Automated tools to detect flaws.
  3. These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
  4. (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
  5. (5,8,4) (CSP) This outlines how to protect systems, data, and networks
  6. Defines which systems, applications, and data are covered in the CSP.
  7. (4,4) This ensures the security measures work as intended.

12 Clues: (13,8) Automated tools to detect flaws.(11,7) Simulate attacks to find weaknesses.(6,3,8) A type of testing ensures data can be restored.(4,4) This ensures the security measures work as intended.Defines which systems, applications, and data are covered in the CSP.(6,7) A type of testing that verifies permissions and authentication....

Aiden Cybersecurity Crossword 2026-04-01

Aiden Cybersecurity Crossword crossword puzzle
Across
  1. A form of malware that is disguised as something in order to gain access from you.
  2. A form of security that helps detect and protect against intrusions.
  3. A form of security that encrypts your device from outside threats, can be used for public wifi.
  4. A person who infiltrates systems in order to help an organization fix flaws in security.
  5. A form of storage that is secured inside a highly guarded sever facility.
  6. A form of malware that infects networks by infiltrating security flaws.
  7. A form of persuasion that disguises itself as something it’s not.
  8. A form of malware that extorts money out of a person.
Down
  1. A person who infiltrates a digital device without authorization with malicious intent.
  2. A form of persuasion that causes a person to share information they shouldn’t.
  3. A form of storage that takes digital data and secures form short-term backup.
  4. A systems that controls traffic, what comes in and out of the system.
  5. A form of malware that is secretly installed on our device without your knowledge.
  6. A form of malware that infects files and programs that spreads by user interaction.
  7. A form of security that acts a defense wall.
  8. A malicious code that is destructive to digital devices.

16 Clues: A form of security that acts a defense wall.A form of malware that extorts money out of a person.A malicious code that is destructive to digital devices.A form of persuasion that disguises itself as something it’s not.A form of security that helps detect and protect against intrusions....

NHSScotland Security Questions and Advocates 2022-10-25

NHSScotland Security Questions and Advocates crossword puzzle
Across
  1. What is the reason for asking the Securityquestions, Full name, DOB, Postcode?
  2. What is the first security question?
  3. If you do not complete the security questions, what score will you receive from QA
  4. A child requires additional advocate details, what is it?
  5. If a citizen is unable to come to the phone to do security, what are the list of reasons called when an advocate can continue with the call
  6. When do you ask the Security questions for identification?
Down
  1. In addition to contact advocate details, what else needs to be included for adults
  2. Where do you include the advocates contact details
  3. What is the citizen called if they are calling on behalf of someone else?
  4. What is the reason for asking the covid security related questions?
  5. If speaking to an advocate, who completes the security questions?

11 Clues: What is the first security question?Where do you include the advocates contact detailsA child requires additional advocate details, what is it?When do you ask the Security questions for identification?If speaking to an advocate, who completes the security questions?What is the reason for asking the covid security related questions?...

Understanding Money Created By Sarah Dominguez 2024-05-09

Understanding Money Created By Sarah Dominguez crossword puzzle
Across
  1. money used in exchange for goods & services needed by individuals.
  2. mechanism a nation uses to provide & manage money for itself
  3. meaning money is a common measure worth or price of a good or service.
  4. transfer of money from one bank account to another.
  5. plastic card that allows the holder to make credit purchases up to an authorized amount.
  6. security that pays interest over terms of 10-30 years.
  7. another word for money.
  8. type of financial investment issued by a corporation, government, or other organizations.
  9. means it can be saved & used at a later date.
  10. anything of value that is accepted in return for goods or services.
Down
  1. process of transferring money from one individual or organization to another
  2. banks that are part of the Federal Reserve System.
  3. it can lose some of its purchasing power over time.
  4. security that pays interest over terms ranging from 2-10 years.
  5. type of document guaranteeing the payment for a specific amount of money.
  6. security that matures in a year or less.
  7. allows customers to pay for purchases directly from their checking account.
  8. action taken to manage the supply of money & interest rates in an economy
  9. the dollar is the official currency used for financial exchange.
  10. exchange one good or service for another good or service.

20 Clues: another word for money.security that matures in a year or less.means it can be saved & used at a later date.banks that are part of the Federal Reserve System.it can lose some of its purchasing power over time.transfer of money from one bank account to another.security that pays interest over terms of 10-30 years....

Physical Security 2023-11-12

Physical Security crossword puzzle
Across
  1. Body measurements and calculations related to human characteristics
  2. The process of risk assessment is risk ________
  3. One of the physical security framework component
  4. Physical security threat caused by natural
  5. Most common type of physical security surveillance
Down
  1. Moving people away from an area where they are in potential danger to a safer location
  2. Access control weakness and risk
  3. Situation involving exposure to danger
  4. One of physical security main objective is to protect this
  5. Physical security risk

10 Clues: Physical security riskAccess control weakness and riskSituation involving exposure to dangerPhysical security threat caused by naturalThe process of risk assessment is risk ________One of the physical security framework componentMost common type of physical security surveillanceOne of physical security main objective is to protect this...

Tech Refresh 2020-04-21

Tech Refresh crossword puzzle
Across
  1. Great design!
  2. Emanations
  3. 9001
  4. Blandford Gods
  5. record your time!
  6. Conveyor of light
  7. Air handling for NER
  8. I need me some info!
  9. CAT6a
  10. Big Delta-wing
  11. Serving a wider audience
  12. AC CODE (anag.)
  13. I want BIG prints
  14. X,Y,Z
  15. brighter training?
  16. Bomber
  17. No jail (anag.)
Down
  1. Linear artist
  2. 'This way if you please...'
  3. 8 legged communication?
  4. Local servery
  5. Normal business PM
  6. kubernētēs
  7. Set this to auto
  8. Always busy....
  9. Aircon for NER
  10. Down to earth
  11. 9001
  12. Shocking!
  13. Drafting tool

30 Clues: 90019001CAT6aX,Y,ZBomberShocking!EmanationskubernētēsGreat design!Linear artistLocal serveryDown to earthDrafting toolBlandford GodsBig Delta-wingAircon for NERAlways busy....AC CODE (anag.)No jail (anag.)Set this to autorecord your time!Conveyor of lightI want BIG printsNormal business PMbrighter training?Air handling for NERI need me some info!...

Holiday Puzzle 2020-11-20

Holiday Puzzle crossword puzzle
Across
  1. Something that gets bright when you turn them on at night
  2. Santa's pet
  3. Something Santa eats
  4. White fluffy stuff that falls from the sky
  5. What you send in the mail
  6. This holiday is celebrated for 8 days
  7. Frosty the ________
  8. A ______ in a pear tree
  9. Where you hang stockings
  10. What reindeer pull
Down
  1. Santa's helper
  2. What you put presents under
  3. Christmas ________
  4. red & white striped
  5. This African-American holiday is held from Dec 26 - Jan 1
  6. Something Santa drinks
  7. Cyber ________
  8. Santa's last name
  9. How many days in December
  10. Last month of the year

20 Clues: Santa's petSanta's helperCyber ________Santa's last nameChristmas ________What reindeer pullred & white stripedFrosty the ________Something Santa eatsSomething Santa drinksLast month of the yearA ______ in a pear treeWhere you hang stockingsHow many days in DecemberWhat you send in the mailWhat you put presents under...

Cybersecurity Crossword Puzzle - MP 2023-01-27

Cybersecurity Crossword Puzzle - MP crossword puzzle
Across
  1. transforms plaintext into ciphertext
  2. key used to decrypt
  3. trap for cyber criminals
  4. unsolicited emails
  5. tricked into clicking
  6. intrusive computer software
  7. key to encrypt and decrypt
  8. helps prevent hackers and viruses
  9. hidden horse surprise
  10. malware that collects personal data
  11. hides users location
Down
  1. unwanted pop up ads
  2. used to detect viruses network
  3. program that allows remote access
  4. person who harms your computer
  5. protects data by scrambling it
  6. error on software
  7. malware that reproduces itself
  8. ethical hacker
  9. form of internet communication
  10. peripherals connected as one entity.

21 Clues: ethical hackererror on softwareunsolicited emailsunwanted pop up adskey used to decrypthides users locationtricked into clickinghidden horse surprisetrap for cyber criminalskey to encrypt and decryptintrusive computer softwareused to detect viruses networkperson who harms your computerprotects data by scrambling itmalware that reproduces itself...

Values and behaviours 2013-05-19

Values and behaviours crossword puzzle
Across
  1. Could be structural or emotional etc
  2. A little of a dangerous thing.
  3. Lucidity in red wine!
  4. Cyber cod not quite camping!
  5. Fraternize professionally.
  6. Master of torment!
  7. Appropriately included.
  8. Not quite the Spanish Inquisition!
  9. Bond's boss wields this almost!
  10. A bit more than Brahms' buddy!
  11. See to put in order.
Down
  1. Almost a hotel for octuplets!
  2. Franklin sang it!
  3. Gauntlet down!
  4. Lack of similarity.
  5. No indoor direction.
  6. Represent one's country.(Giver of golden chocolates!)
  7. Answering Bailey's drink!
  8. Job of a midwife.
  9. Impart learning by carriage!
  10. Morph usefully!

21 Clues: Gauntlet down!Morph usefully!Franklin sang it!Job of a midwife.Master of torment!Lack of similarity.No indoor direction.See to put in order.Lucidity in red wine!Appropriately included.Answering Bailey's drink!Fraternize professionally.Cyber cod not quite camping!Impart learning by carriage!Almost a hotel for octuplets!A little of a dangerous thing....

Fairtrading Healthcentre and Cybersafety 2025-03-02

Fairtrading Healthcentre and Cybersafety crossword puzzle
Across
  1. -Online
  2. Signals Directorate's -Abbreviation is ASD.
  3. -Example computers, technology.
  4. -Safe/strong/reliable for passwords.
  5. -message claiming to be from someone official.
  6. -A copy of something to be stored and saved.
  7. -Criminals online.
  8. -Dishonesty and deception.
  9. -Expose something illegal.
Down
  1. -Guidance and advising.
  2. media -Any apps online/communication.
  3. -To be able to live in a house but not buy it.
  4. -Unknown/not likely.
  5. -An agreement that allows you to understand how the business works.
  6. -A trick.
  7. -Being safe online
  8. -Purchasing a product.
  9. -Getting your money back.
  10. -Short supply of something.
  11. -Renew.

20 Clues: -Online-Renew.-A trick.-Being safe online-Criminals online.-Unknown/not likely.-Purchasing a product.-Guidance and advising.-Getting your money back.-Dishonesty and deception.-Expose something illegal.-Short supply of something.-Example computers, technology.-Safe/strong/reliable for passwords.media -Any apps online/communication....

Koop 2022 2022-08-09

Koop 2022 crossword puzzle
Across
  1. főleg a mozgás szervrendszerrel foglalkoznak
  2. a leggazdagabb ember
  3. mindent tudnak a kalóriák rejtelmeiről
  4. ők mentenek meg baleset esetén
  5. ennek is tanulhatsz az ETK-n
  6. tavaly a legnépszerűbb közösségi médiai oldal
  7. az ÁOK hallgatói álomszakmája
Down
  1. az egészségügy méregkeverői
  2. a mai nap célja
  3. a PAKon végző emberek szakmája
  4. a tábor szervezői (lányfiú)
  5. bill gates alapította
  6. 2004-ben jött létre ez a közösségi oldal
  7. a tábor témája
  8. segítőitek a táborban

15 Clues: a tábor témájaa mai nap céljaa leggazdagabb emberbill gates alapítottasegítőitek a táborbanaz egészségügy méregkeverőia tábor szervezői (lányfiú)ennek is tanulhatsz az ETK-naz ÁOK hallgatói álomszakmájaa PAKon végző emberek szakmájaők mentenek meg baleset eseténmindent tudnak a kalóriák rejtelmeiről2004-ben jött létre ez a közösségi oldal...

IT Quiz_SET-4 2026-01-03

IT Quiz_SET-4 crossword puzzle
Across
  1. Database management system example
  2. Process scheduling unit
  3. Program used to write code
  4. Collection of related files
  5. Software without cost
  6. Visual representation of an algorithm
  7. Key used to reference another table
Down
  1. Error due to wrong syntax
  2. Logical part of the computer
  3. Operating system example
  4. Cyber attack using fake emails
  5. Web page structure language
  6. Software testing technique
  7. Network protocol for file transfer
  8. Device that converts digital to analog signals

15 Clues: Software without costProcess scheduling unitOperating system exampleError due to wrong syntaxProgram used to write codeSoftware testing techniqueWeb page structure languageCollection of related filesLogical part of the computerCyber attack using fake emailsDatabase management system exampleNetwork protocol for file transfer...

advanced comp security 2015-03-18

advanced comp security crossword puzzle
Across
  1. malicious software
  2. is a type of display used in mobile phone
  3. android version 1.5
  4. alternative to iptables discussed in the paper
  5. the name of mobile app to steal confidential data
  6. barcode in matrix form
  7. type of malware that prevents or limits users from accessing their system and forces victim to pay money
  8. it refers to connecting one device to another
  9. is a daemon whose goal is to launch Apps(parent process for all apps)
  10. an organization set up by Sony in 2003 that determines a universal set of rules and guidelines so devices can share digital media.
Down
  1. block cipher used in GSM/UMTS
  2. a piece of code which performs bad activities when certain conditions are met
  3. a type of phishing attacks that target to specific victims
  4. using the internet to harass, intimidate, embarrass or demean others
  5. is a filename extension for android apps
  6. gzip and bzip2 uses this for data integrity
  7. key used to reset pin in 3gpp phones
  8. Temporary storage area for data that a user wants to copy from one place to another
  9. The theft of information from a wireless device through a Bluetooth connection
  10. type of spam targeting users of instant messaging services
  11. is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and blocks communications to and from sources you don't permit.
  12. state of android phone when you cannot succeed in rooting and gets halted
  13. A set of protocols to support secure exchange of packets at the network layer
  14. An extension of an enterprise's private intranet
  15. technique used to take screenshots /backups

25 Clues: malicious softwareandroid version 1.5barcode in matrix formblock cipher used in GSM/UMTSkey used to reset pin in 3gpp phonesis a filename extension for android appsis a type of display used in mobile phonegzip and bzip2 uses this for data integritytechnique used to take screenshots /backupsit refers to connecting one device to another...

Security Awareness 101 2016-03-27

Security Awareness 101 crossword puzzle
Across
  1. An essential part of data protection and should be performed regularly
  2. Someone else's computer
  3. Use this to stay safe on public wifi
  4. Phishing that targets specific people or job functions
  5. Software that can record and transmit every keystroke
  6. Dangerous physical delivery mode of malicious software
  7. When you should report things
  8. Self-replicating software
  9. The single most important thing you can do to improve security here at work is use this.
  10. You might receive a spoofed email coming from your boss or a higher up executive
  11. Having systems & information when needed
  12. Three areas of information security.
  13. Following policy for remotely and securely connecting to work computers and networks is more important than ever
  14. Never let technology out of your control when doing this
  15. Strong, unique, private.
  16. Compliance mandate in the healthcare sector
  17. Personal information that criminals can use to commit identity theft
  18. Compliance mandate in the education sector
  19. Non-technical identification and authentication
  20. Percentage of Americans who have their identity stolen before then age of 18.
Down
  1. A Trojan that provides unauthorized access to a system
  2. Compliance mandate in the retail space
  3. Accuracy
  4. Keeping secrets a secret
  5. Phishing through text messages
  6. Not the spy agency.
  7. Sneaking in a door or other type of entrance along with you if you are required to use a badge or code.
  8. Warns you that you have been locked out of your computer, or the data has been encrypted until you pay a fine or other fee
  9. Compliance mandate in the financial sector
  10. Phishing over the phone
  11. Pretends to be a good program to remove Malware infections, but it is actually the Malware itself
  12. Phishing that targets high profile employees, such as senior executives

32 Clues: AccuracyNot the spy agency.Someone else's computerPhishing over the phoneKeeping secrets a secretStrong, unique, private.Self-replicating softwareWhen you should report thingsPhishing through text messagesUse this to stay safe on public wifiThree areas of information security.Compliance mandate in the retail space...

Security Trade Lingo 2018-03-16

Security Trade Lingo crossword puzzle
Across
  1. something causing unavoidable danger, peril, risk, or difficulty
  2. exposure to the chance of injury or loss
  3. interchange of goods or commodities
  4. regulation and control of a community, especially for the maintenance of public order, safety
  5. an official examination and verification of accounts and records
  6. the ability, right, or permission to approach, enter, speak with, or use
  7. capable of being wounded or hurt
  8. any general business activity or commercial enterprise
  9. to determine the worth or value of
  10. set fire intentionally
  11. resistance against attack
  12. philosophy of what is morally right or wrong
  13. property of a person, corporation or estate
Down
  1. to pay little or no attention to
  2. statistical study of human populaitons
  3. a wrongful entry
  4. something disadvantageous
  5. forceful action
  6. concealed, secret, disguised
  7. difference, variety, unlikeness
  8. concealment or distortion of the truth
  9. evaluate
  10. process concept that all should be treated fairly

23 Clues: evaluateforceful actiona wrongful entryset fire intentionallysomething disadvantageousresistance against attackconcealed, secret, disguiseddifference, variety, unlikenessto pay little or no attention tocapable of being wounded or hurtto determine the worth or value ofinterchange of goods or commoditiesstatistical study of human populaitons...

IT Security 1 2017-05-19

IT Security 1 crossword puzzle
Across
  1. This involves the illegal copying of information from the magnetic strip of a credit card.
  2. is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
  3. A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
  4. is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
  5. consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
  6. is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
  7. is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
  8. is another type of malware that is activated each time a computer system boots (loads) up.
  9. involves gaining access to a computer or network with authorization from a company or organisation.
  10. is the processed output of data making it meaningful to the person who receives it.
  11. This involves gaining personal information through deception.
  12. involves gaining access to a computer or network without authorization.
  13. is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
  1. is the conversion of data into a form that cannot be easily understood by unauthorized people.
  2. also known as zombie is a group of computers connected together for malicious purposes.
  3. is a software application that automatically displays advertising banners while the program is running.
  4. This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
  5. occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
  6. is a secret way to access a computer without passing security mechanisms.
  7. is a program that secretly installs itself on computers and collects information about users without their knowledge.
  8. refers to any crime that involves a computer and a network.
  9. is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
  10. involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
  11. is raw unorganized facts that need to be processed.
  12. is malicious software designed to install itself on a computer without the owner’s knowledge.
  13. The practice of recovering sensitive information from discarded material.
  14. is a system designed to prevent unauthorized access to or from a private network (LAN).
  15. is sequences of instructions that make a computer program perform a specific task.
  16. it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.

29 Clues: is raw unorganized facts that need to be processed.refers to any crime that involves a computer and a network.This involves gaining personal information through deception.involves gaining access to a computer or network without authorization.is a secret way to access a computer without passing security mechanisms....

Biometric Security - Crossword 2017-11-18

Biometric Security - Crossword crossword puzzle
Across
  1. In texture edge extraction using set of 1-D Gabor filters, the bank of 1-D Gabor filters gives ______ image.
  2. ROC curve plots _ _ _ against _ _ _.
  3. The number of leaf nodes in a second level graphical representation of Haar Wavelet decomposition.
  4. The Hough transform can be described as a transformation of a point in the x,y-plane to the _______ space.
  5. One of the disadvantages of UNI-MODAL Biometric system.
  6. Matching module uses this to distinguish between genuine and imposter range.
  7. Gabor filters satisfy ________ principle.
  8. Second-order gray-level statistics is described by ________matrix.
  9. In a texture the _________ distribution stays the same.
  10. Gabor filters are the products of a Gaussian filter with _______Sinusoids.
  11. ______ points are used to calculate the region of interest in Pre-Processing of Palm print verification system.
  12. ↓is a _________ operator in Gaussian pyramid.
Down
  1. In the gaussian filter representation P denotes the phase of ________ carrier.
  2. DOG (Difference of Gaussian) uses the approximation of _____ of Gaussian.
  3. The preprocessing module first transforms the true color into _____ image.
  4. The Gaussian function (1-D) of the Gabor filter will not affect the edge information in the ________direction.
  5. One of the essential biometric characteristics.
  6. A ________ graph is used in ear localization.
  7. In texture discrimination we divide intensities to ________ ranges.
  8. In _______ filters the output of one filter is independent of others.

20 Clues: ROC curve plots _ _ _ against _ _ _.Gabor filters satisfy ________ principle.A ________ graph is used in ear localization.↓is a _________ operator in Gaussian pyramid.One of the essential biometric characteristics.One of the disadvantages of UNI-MODAL Biometric system.In a texture the _________ distribution stays the same....

Basic Virtual Security 2023-09-07

Basic Virtual Security crossword puzzle
Across
  1. an intermediary device that blocks unauthorized access to your network
  2. when a third party alters the communication between two sides
  3. form of attack that looks secure but is not
  4. Encoding something so certain people may be able to view it
  5. a copy of data stored away so it can be recovered if the original is damaged
  6. program which will help protect your customer's privacy
  7. a university connector
  8. when scammers send out a message with a company's email address
  9. Passcode to prove you are allowed access
Down
  1. asks for payment in return for solving the problem
  2. gaining sensitive information by looking over the target's shoulder
  3. Volatile memory
  4. attacking through a program or equipment thrown in the trash
  5. a method of resolving a problem
  6. Sign in once to get various service
  7. This program allows your network to be private
  8. an intermediary device that directs traffic
  9. is a key used to pass
  10. Frequent changes downloaded to keep your device secure from adaptive malware
  11. surpasses 100% voltage for a brief moment

20 Clues: Volatile memoryis a key used to passa university connectora method of resolving a problemSign in once to get various servicePasscode to prove you are allowed accesssurpasses 100% voltage for a brief momentform of attack that looks secure but is notan intermediary device that directs trafficThis program allows your network to be private...

Aviation safety & Security 2023-11-15

Aviation safety & Security crossword puzzle
Across
  1. another term for passenger.
  2. getting off the plane.
  3. travelling within your home country
  4. sheltered walkway onto the flight or terminal.
  5. only flight ticket holders can access this area.
  6. something you need to travel internationally.
  7. a child travelling alone.
Down
  1. general public can access this area in an airport.
  2. shorted down 3 letter words of an airport.
  3. something your clothes belong in when travelling.
  4. you go through here after landing in a country.
  5. the letter d in the phonetic alphabet.
  6. where the luggage is stored.
  7. travelling overseas.
  8. some countries require this prior to entry.
  9. getting on the plane.
  10. where aircrafts usually parked.
  11. travelling by air.
  12. the term used for those who need extra assistance.
  13. the letter H in the phonetic alphabet.

20 Clues: travelling by air.travelling overseas.getting on the plane.getting off the plane.a child travelling alone.another term for passenger.where the luggage is stored.where aircrafts usually parked.travelling within your home countrythe letter d in the phonetic alphabet.the letter H in the phonetic alphabet.shorted down 3 letter words of an airport....

Network and Security 2024-07-24

Network and Security crossword puzzle
Across
  1. Refers to several types of malicious computer programs that are created to harm computer systems and their users.
  2. A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
  3. Any step you take to ward off a threat is called a
  4. The capacity to provide increasing amounts of computing power, storage, and/or software.
  5. A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
  6. Involves luring individuals into entering personal information into a website controlled by the hacker.
  7. Used to share some of a company’s intranet resources with people outside the organization
  8. A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
  9. A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
  10. Speed of data that can be transmitted over a given amount of time.
Down
  1. Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
  2. A type of malware that self-replicates and spreads through computers and networks.
  3. Weakness that has not been protected against threats.
  4. Fundamental building block for the storage, retrieval, and analysis of a company’s data.
  5. The most widely-used standard for local area networks.
  6. Layout of the cables and devices that connect the nodes of the network
  7. designed to report activity on your computer to another party.
  8. Anything that can cause harm.
  9. Internal version of the internet containing a company's private information
  10. Communication system physically connected using cables or wireless media.

20 Clues: Anything that can cause harm.Any step you take to ward off a threat is called aWeakness that has not been protected against threats.The most widely-used standard for local area networks.designed to report activity on your computer to another party.Speed of data that can be transmitted over a given amount of time....

Security and Networking 2024-07-24

Security and Networking crossword puzzle
Across
  1. Mining New patterns or relationships between data.
  2. A scam that threatens to delete or expose victims stolen data for money.
  3. provides multiple port for connecting nodes.
  4. Term for many types of malicious computer programs that is created to harm users and their computer systems.
  5. Some information sytems are called.
  6. A node on a network that serves as an entrance to another network.
  7. Is a type of computer that is able to continue when problems are present.
  8. Any step taken to ward off a threat.
  9. Allows sharing and communication between devices.
  10. A weakness that's not protected against threats.
Down
  1. system The complex system for acquiring, storing, organizing, using, and sharing data and information.
  2. Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
  3. Information System Software tools that allows managers to gather, organize, and evaluate information.
  4. Is term for infected computers that under control of a hacker.
  5. warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
  6. Assessment Used to identify and examine possible threats.
  7. Anything that causes harm.
  8. The act of gaining someones trust by pretending you are someone else.
  9. Structures that data moves through networks.
  10. Is used to share company resources with individuals not in the organization.
  11. Designed to report activity on your computer to another party.
  12. The most widely used standard for local area networks.

22 Clues: Anything that causes harm.Some information sytems are called.Any step taken to ward off a threat.provides multiple port for connecting nodes.Structures that data moves through networks.A weakness that's not protected against threats.Allows sharing and communication between devices.Mining New patterns or relationships between data....

Edgeworth Security Terminology 2023-04-24

Edgeworth Security Terminology crossword puzzle
Across
  1. No response from camera ping
  2. The phone system used in the EMC
  3. Use to closeout an alarm quickly
  4. Utilizing the speakers with the camera to deter
  5. Used to alert the site of issues
  6. Watching a site in real time in its VMS
  7. An second set of eyes
  8. EP
  9. Edgeworth's principal philosophy
  10. Review a site without an alarm
Down
  1. NVR
  2. Used to inform agent & supervisors about an event
  3. EMC
  4. ACC
  5. Software system used to open gates in ACC
  6. The EMC primary alarm processing application
  7. PER
  8. Timeframe the EMC receives alarms for a particular site
  9. VMS - Ex. ACC,IVMS,OpenEye
  10. Gatehouse Software Company used to remotely operate gates
  11. The service that the EMC provides

21 Clues: EPNVREMCACCPERAn second set of eyesVMS - Ex. ACC,IVMS,OpenEyeNo response from camera pingReview a site without an alarmThe phone system used in the EMCUse to closeout an alarm quicklyUsed to alert the site of issuesEdgeworth's principal philosophyThe service that the EMC providesWatching a site in real time in its VMS...

Physical Security Policy 2025-02-11

Physical Security Policy crossword puzzle
Across
  1. No one shall ______ or allow access to any building or room to anyone who is not known to them to be a trusted workforce members member.
  2. Users shall secure media (such as hard copy, diskettes, etc.), which contain __________ information in a locked desk, cabinet, or room.
  3. Copying of confidential documents will be only __________ by appropriate department manager
  4. Terminated workforce members will be regarded as __________ to Crane Memorial facilities.
  5. Workstations/terminals will be positioned or __________ so that screens are not visible to the general public or unauthorized workforce members.
  6. and that only the __________ scope of disclosure needed to accomplish the intended purpose is copied.
  7. If PHI or other confidential information needs to be shielded from a visitor while the workforce member is at the workstation, pressing the Ctrl Alt and Delete keys __________ will display a Security Screen.
  8. Users shall either __________ or lock workstations/terminals when not in use or when leaving the work area for breaks.
  9. At the end of the day, users will sign off of all __________.
Down
  1. Computers will be located in a normally __________(or at least occupied) office where appropriate.
  2. Workforce members should __________ documents only when necessary and as part of their job function.
  3. Workforce members are encouraged to _________, in a non-offensive manner, anyone in Crane Memorial building or in a room who they do not know.
  4. Crane Memorial will document the security plan to safeguard its facilities from __________ physical access and to safeguard the equipment therein from unauthorized physical access, tampering, and theft.
  5. Any electronic media being discarded or replaced (including hard drives in workstations) shall be written over, degaussed, or irrecoverably __________ to ensure proper erasure of confidential or proprietary data.
  6. Each Department Manager will ensure the outside entrance from their __________ is locked when they leave.
  7. All authentication mechanisms such as physical security tokens, smart cards or keys must each be assigned to an individual account and __________ logged.
  8. Any person who appears _________ or cannot provide workforce members identification must be reported.
  9. Crane Memorial will have a document the facility security plan to safeguard the premises and buildings, exterior and interior from unauthorized physical access and to safeguard the equipment therein from unauthorized physical access, __________ and theft.
  10. Third Party activities will be __________ to assure that they do not compromise security.
  11. Dismissed workforce members will be removed from the computing and physical environment __________.

20 Clues: At the end of the day, users will sign off of all __________.Terminated workforce members will be regarded as __________ to Crane Memorial facilities.Third Party activities will be __________ to assure that they do not compromise security.Copying of confidential documents will be only __________ by appropriate department manager...

11 Digital Security 2025-02-20

11 Digital Security crossword puzzle
Across
  1. A hidden way to bypass security measures
  2. The trail of data left by online activity
  3. A large-scale attack using multiple compromised devices to disrupt a service
  4. A tool that encrypts internet traffic and hides the user’s IP address
  5. A program that spreads by inserting copies of itself into other files
  6. Harassment or bullying that occurs online
  7. Configurations that specify which network traffic is allowed or blocked
  8. Any illegal act involving the use of a computer or related devices
  9. A tool that stores and generates secure passwords
  10. A process of verifying the identity of a user or device
  11. A legal doctrine allowing limited use of copyrighted material
  12. A cyberattack targeting computer networks
  13. Software used to detect and remove malware
  14. A self-replicating program that spreads through networks
  15. An attack that overloads a server to make it unavailable
  16. Manipulating people into revealing confidential information
Down
  1. Unauthorized access to a computer system or network
  2. A group of compromised computers controlled by a hacker
  3. An event that could cause loss or damage to computer hardware, software, or data
  4. A plan to restore data and systems after a failure
  5. How a person presents themselves online
  6. A potential security risk due to lack of encryption
  7. The process of converting data into a code to prevent unauthorized access
  8. An update that fixes security vulnerabilities in software
  9. A backup power device that provides electricity during an outage
  10. A licensing system that allows content sharing with conditions
  11. A type of malware disguised as a legitimate program
  12. The rules of conduct for interacting online
  13. Malicious software designed to harm or exploit any computing device
  14. A device that protects electronics from power surges
  15. A technique used to trick users into revealing personal information
  16. An authentication method that requires two forms of verification
  17. A type of malware that locks files and demands payment to unlock them
  18. Software that secretly collects user information without consent
  19. A security system that controls incoming and outgoing network traffic

35 Clues: How a person presents themselves onlineA hidden way to bypass security measuresThe trail of data left by online activityHarassment or bullying that occurs onlineA cyberattack targeting computer networksSoftware used to detect and remove malwareThe rules of conduct for interacting onlineA tool that stores and generates secure passwords...

Network Security Crossword 2024-11-14

Network Security Crossword crossword puzzle
Across
  1. A network comprised of clients all connected to the same server.
  2. What IAM stands for
  3. A program that disguises itself as something else to let malicious users access your system.
  4. What ZTNA stands for
  5. Also known as the "group chat" network type
  6. "Intrusion Prevention Systems"
  7. Applications / workloads that are hosted on a cloud / not locally
  8. Prevents exposure of sensitive information outside of an organization.
  9. The thing that sends the signal to the clients to connect to the server.
  10. Keeps out unfriendly network traffic, and controls incoming and outgoing traffic.
  11. What WAN stands for
  12. What DoS stands for
  13. Processes, products, and services designed to protect email accounts.
Down
  1. A network comprised of local machines all connected to each other
  2. A user / device on a network
  3. What "A" stands for in WAN
  4. What RBAC stands for
  5. Virus that gather info about a person or organization without them knowing
  6. A way a network is setup, such that if one client sends a message, then NOT EVERYONE gets it
  7. "Eats" bandwidth, slows networks. Is a standalone malware.
  8. What the "W" stands for in WLAN
  9. What VPN stands for
  10. Defines the people or groups & devices that have access to network applications and systems.
  11. Customized ads show up because of data they collected on you.
  12. What FWaaS stands for
  13. Ability of an architecture to scale appropriately as more things are added to the system or network.
  14. "Wireless local area network"
  15. Malware that is designed to hold someone / an organization's data on "ransom"
  16. Running code / opening files in a safe, isolated environment.
  17. Any program that is intentionally designed with malicious intent
  18. A downloadable malicious file that replicates itself, much like the real life version of this does.
  19. "Personally Identifiable Information"
  20. Defines boundaries between parts of a network where clients have common aspects.
  21. Digital space where data is stored non-locally

34 Clues: What IAM stands forWhat VPN stands forWhat WAN stands forWhat DoS stands forWhat RBAC stands forWhat ZTNA stands forWhat FWaaS stands forWhat "A" stands for in WANA user / device on a network"Wireless local area network""Intrusion Prevention Systems"What the "W" stands for in WLAN"Personally Identifiable Information"...

FNAF Security Breach 2025-04-29

FNAF Security Breach crossword puzzle
Across
  1. The animatronic that helps you
  2. What do you get from chica
  3. Who is theorized to have destroyed Bonnie
  4. The alligator animatronic
  5. The fox animatronic
  6. Aftons animatronic
  7. what do you get from Roxy
  8. The day time daycare attendant
  9. Ruin Sun and Moondrop
  10. The nickname of these animatronics
  11. The DDLC
  12. The night guard
Down
  1. Who you play as
  2. The killer rabbit
  3. The missing animatronic
  4. The night time daycare attendant
  5. Who you play as in the DDLC
  6. how many endings are there
  7. What do you get from Monty
  8. Where the animatronics charge
  9. The villian of the DDLC
  10. The chicken animatronic

22 Clues: The DDLCWho you play asThe night guardThe killer rabbitAftons animatronicThe fox animatronicRuin Sun and MoondropThe missing animatronicThe villian of the DDLCThe chicken animatronicThe alligator animatronicwhat do you get from RoxyWhat do you get from chicahow many endings are thereWhat do you get from MontyWho you play as in the DDLC...

Network Security & Protection 2025-05-14

Network Security & Protection crossword puzzle
Across
  1. Unique mark indicating authenticity or approval.
  2. Assurance that a party cannot deny their actions.
  3. Temporary credential for secure access.
  4. Reverting encrypted data back to its original form.
  5. Verifying user identity or access rights.
  6. Malicious software that secretly monitors user activity.
  7. Fraudulent attempts to obtain sensitive information online.
  8. Analyzing patterns in user actions for security.
  9. Converting data into a secure format.
  10. Luring victims with false promises or goods.
  11. Ensuring data remains accurate and unaltered.
  12. Software designed to detect and eliminate malware.
  13. Decentralized ledger technology for secure transactions.
Down
  1. Encrypted data that is unreadable without decryption.
  2. Readable data before encryption.
  3. Identifying individuals or objects based on characteristics.
  4. Secretly listening to private communications or data.
  5. Software that displays unwanted advertisements on devices.
  6. Unauthorized access to computer systems or networks.
  7. Malware that encrypts files for ransom payment.
  8. Secret word or phrase for user authentication.
  9. Identifying individuals using biological traits.
  10. Protecting personal information from unauthorized access.

23 Clues: Readable data before encryption.Converting data into a secure format.Temporary credential for secure access.Verifying user identity or access rights.Luring victims with false promises or goods.Ensuring data remains accurate and unaltered.Secret word or phrase for user authentication.Malware that encrypts files for ransom payment....

Security/Safety Terminology 2024-03-09

Security/Safety Terminology crossword puzzle
Across
  1. Verifying identity of a user
  2. Term for fraudulent business
  3. (2words) P2P network used by criminals
  4. Used to access the internet
  5. Unauthorized intrusion into a computer
  6. Identifies a network address
  7. (2 words)Simulation of human intelligence
  8. Allows to connect to Internet
  9. Junk e-mail
  10. High-speed data transmission system
  11. Wireless technology for exchanging data
  12. Programs used on digital devices
Down
  1. special high-speed storage mechanism
  2. Decides Computers and Humans Apart
  3. Malicious software program on computer
  4. Malware that replicates to spread
  5. Capacity of a communication channel
  6. Converting data into secret code
  7. Malicious software developed by hackers
  8. Small files stored on computer
  9. Network resources to lure hackers
  10. Virtual perimeter around a network
  11. cryptographic algorithm for encryption

23 Clues: Junk e-mailUsed to access the internetVerifying identity of a userTerm for fraudulent businessIdentifies a network addressAllows to connect to InternetSmall files stored on computerConverting data into secret codePrograms used on digital devicesMalware that replicates to spreadNetwork resources to lure hackersDecides Computers and Humans Apart...

Safety and security 2025-07-17

Safety and security crossword puzzle
Across
  1. The act of removing a passenger from a flight
  2. An item that can cause harm on board
  3. Machines used to scan luggage for dangerous items
  4. A plan for what to do in an emergency
  5. A report written about any safety incident
  6. staff who check travel documents before boarding
  7. Part of the airport open to the public, like check-in and arrivals
  8. Items passengers must declare to customs
  9. staff who help passengers check-in and board
  10. Person who checks passengers and luggage for prohibited items
  11. System that alerts security to danger
Down
  1. Area of an airport only accessible to passengers with a boarding pass
  2. Security pass used to enter airside areas
  3. Room where suspicious passengers are questioned
  4. To look inside someones bag carefully
  5. The process of checking passengers identities
  6. The security check area you pass through before the boarding gate
  7. International document needed to travel abroad
  8. Another word for baggage claim area.
  9. The action of stopping someone for questioning
  10. Hidden items found in luggage
  11. The process of protecting passengers and crew
  12. A special check for dangerous items on passengers
  13. A sudden risk or danger
  14. Restricted area where aircraft are parked, loaded and refueled

25 Clues: A sudden risk or dangerHidden items found in luggageAn item that can cause harm on boardAnother word for baggage claim area.To look inside someones bag carefullyA plan for what to do in an emergencySystem that alerts security to dangerItems passengers must declare to customsSecurity pass used to enter airside areas...

Online security crossword 2025-08-27

Online security crossword crossword puzzle
Across
  1. Fake emails for info
  2. Monitors user activity
  3. Adds extra login security
  4. Locks files for ransom
  5. Fakes identity online
  6. Records keystrokes secretly
  7. Protects account access
  8. Store browsing information
Down
  1. Secure internet connection
  2. Scrambles data securely
  3. Network of infected computers
  4. Hidden unauthorized access
  5. Harmful software program
  6. Software to stop malware
  7. Unwanted bulk emails
  8. Blocks unauthorized access
  9. Malware hidden inside
  10. Unauthorized system intruder
  11. Fixes software vulnerability
  12. Self-replicating malware

20 Clues: Fake emails for infoUnwanted bulk emailsFakes identity onlineMalware hidden insideMonitors user activityLocks files for ransomScrambles data securelyProtects account accessHarmful software programSoftware to stop malwareSelf-replicating malwareAdds extra login securitySecure internet connectionHidden unauthorized accessBlocks unauthorized access...

National Security - VOCABULARY 2025-09-22

National Security - VOCABULARY crossword puzzle
Across
  1. – To weaken something or make it less strong.
  2. – Trouble or fighting in a group or country.
  3. - To end or break up something.
  4. – To make peace with someone or calm them down.
  5. – Not tight or firmly fixed.
  6. – Not understanding something correctly.
  7. – An agreement where both sides give up something.
  8. – To talk to reach an agreement.
  9. – Easy to see; not hidden.
  10. – In the past; relating to history.
  11. – A punishment for breaking rules or laws.
  12. – To help two sides agree or solve a problem.
  13. – Another choice or option.
  14. – A way to help or adjust to a situation.
  15. – In a legal or court-related way.
  16. – A hard choice between two things.
  17. – Information used to influence people’s opinions.
  18. – To become worse or more serious.
  19. – Being open to harm or attack.
  20. – Fighting in a war or battle.
Down
  1. – A place to talk about ideas or problems.
  2. – Entering a place or group secretly.
  3. – A serious argument or disagreement.
  4. – A group of countries working together.
  5. – When people must join the army by law.
  6. – Someone who acts for another person or group.
  7. – An agreement between groups or countries.
  8. – The act of becoming bigger or spreading out.
  9. – The quality of being steady and not changing.
  10. – To do something as a final option.
  11. – Not real; made to look real.
  12. – Hidden or secret.
  13. - A mix of different types.
  14. – What is real or actually exists.
  15. – To damage something on purpose.
  16. – To take part in something.
  17. – Something you must do.
  18. – A situation where no one can win or move forward.

38 Clues: – Hidden or secret.– Something you must do.– Easy to see; not hidden.- A mix of different types.– Another choice or option.– Not tight or firmly fixed.– To take part in something.– Not real; made to look real.– Fighting in a war or battle.- To end or break up something.– Being open to harm or attack.– To talk to reach an agreement....

Health 2023-09-01

Health crossword puzzle
Across
  1. standing around and do nothing
  2. mean person
  3. The state of being protected
  4. person who gets hurt
  5. a choice you make
Down
  1. The condition of being protected
  2. person who saves the victim
  3. bullying bullying someone online
  4. leader of school
  5. Person who teaches kids

10 Clues: mean personleader of schoola choice you makeperson who gets hurtPerson who teaches kidsperson who saves the victimThe state of being protectedstanding around and do nothingThe condition of being protectedbullying bullying someone online

Kornelia Zawalska 2c 2023-04-17

Kornelia Zawalska 2c crossword puzzle
Across
  1. forma pamiętnika prowadzonego w internecie
  2. oprogramowanie
  3. danych
  4. od internetu
  5. -manipulacja głosu
  6. atak
Down
  1. wiadomości
  2. rodzaj rozmowy prowadzonej w internecie
  3. w internecie
  4. prawny lub umowa

10 Clues: atakdanychwiadomościw internecieod internetuoprogramowanieprawny lub umowa-manipulacja głosurodzaj rozmowy prowadzonej w internecieforma pamiętnika prowadzonego w internecie

Black friday 2024-11-28

Black friday crossword puzzle
Across
  1. SWEET TREATS
  2. POPULAR ONLINE STORE
  3. PLAYED IN STORES ON BLACK FRIDAY
  4. A BIG SHOPPING SESSION
Down
  1. PLURAL OF A BARGAIN
  2. NIKE OR ADIDAS ARE EXAMPLES
  3. HOLDS YOUR CASH AND CARDS
  4. MONDAY'S ONLINE SHOPPING DAY
  5. WORN ON YOUR WRIST
  6. THINGS CHILDREN PLAY WITH

10 Clues: SWEET TREATSWORN ON YOUR WRISTPLURAL OF A BARGAINPOPULAR ONLINE STOREA BIG SHOPPING SESSIONHOLDS YOUR CASH AND CARDSTHINGS CHILDREN PLAY WITHNIKE OR ADIDAS ARE EXAMPLESMONDAY'S ONLINE SHOPPING DAYPLAYED IN STORES ON BLACK FRIDAY