cyber security Crossword Puzzles

Security Squares - Simple 2023-08-08

Security Squares - Simple crossword puzzle
Across
  1. Deceptive Text Messages
  2. Trained professional who specializes in IT infrastructure security
  3. Role-Based Access Control
  4. A digital form of payment
  5. A device that provides two-factor for users to prove their identity
  6. The art of protecting networks, devices and data from unauthorized access
  7. The use of a fabricated story to gain someone's trust
  8. National Institute of Standards and Technology
  9. The process of giving a user permission to access resources
  10. A Cybersecurity ----- is an attempt to gain unauthorized access to information
  11. A Cybersecurity -------- is a violation of computer security policies
Down
  1. Also know as MFA
  2. Security that manages digital identities and user access to data and systems
  3. Something you know, something you have, something you are
  4. Sets of documents describing guidelines, standards and best practices
  5. Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
  6. Illegal activity carried out on a digital network
  7. ----- coding, the process of designing code that adheres to best practices and safeguards
  8. The application of policies, technologies and procedures to reduce the overall impact and risk
  9. Voice Phishing

20 Clues: Voice PhishingAlso know as MFADeceptive Text MessagesRole-Based Access ControlA digital form of paymentNational Institute of Standards and TechnologyIllegal activity carried out on a digital networkThe use of a fabricated story to gain someone's trustSomething you know, something you have, something you are...

Security Squares - Advanced 2023-08-11

Security Squares - Advanced crossword puzzle
Across
  1. Software designed to monitor and record network traffic
  2. Specific training aimed at heightening knowledge within an organization
  3. Fake jobs, fake lottery, fake money scams are all examples
  4. Sizzle, Pork and MMM... or Junk E-mail
  5. The fraudulent practice of sending emails ostensibly to induce others to reveal confidential information
  6. What Spiderman spins during the night
  7. When an attacker sends an email to the CEO pretending to be a client
  8. A crime in which someone uses PII data to impersonate someone else
  9. One spider, one ant, or one cricket
  10. When you entice the fish with a worm
  11. A malicious application or script that can be used to take advantage of a computer's vulnerability
  12. Phishing with text
Down
  1. A "goodguy" cap
  2. The process of creating, communicating and maintaining policies and procedures within an organization
  3. Images and videos that appear real but are not
  4. When an authorized internal user poses a danger to an organization because they have authorized access to inside information
  5. A fix for a specific issue that is an emergency
  6. A blue monster who is obsessed with eating as many as possible of these
  7. An extreme coughing fit
  8. Often causes road rage

20 Clues: A "goodguy" capPhishing with textOften causes road rageAn extreme coughing fitOne spider, one ant, or one cricketWhen you entice the fish with a wormWhat Spiderman spins during the nightSizzle, Pork and MMM... or Junk E-mailImages and videos that appear real but are notA fix for a specific issue that is an emergency...

Aviation safety & security 2023-11-15

Aviation safety & security crossword puzzle
Across
  1. another term for passenger.
  2. travelling by air.
  3. only flight ticket holders can access this area.
  4. the letter d in the phonetic alphabet
  5. the letter h in the phonetic alphabet
  6. sheltered walkway onto the plane or terminal.
  7. something you need to travel internationally.
  8. where the checked luggage is stored.
  9. shortened down three letter words of an airport.
  10. you go through here after you land in a different country.
Down
  1. getting on the plane.
  2. general public area in the airport.
  3. some countries require you to have this to enter their country.
  4. travelling overseas.
  5. where your items are stored when travelling, you check this in.
  6. a child travelling alone.
  7. where aircrafts usually park.
  8. the term used for people needing extra assistance.
  9. when you travel within your country of origin.
  10. getting off the plane.

20 Clues: travelling by air.travelling overseas.getting on the plane.getting off the plane.a child travelling alone.another term for passenger.where aircrafts usually park.general public area in the airport.where the checked luggage is stored.the letter d in the phonetic alphabetthe letter h in the phonetic alphabet...

Information Security Crossword 2023-11-15

Information Security Crossword crossword puzzle
Across
  1. Malicious software that demands a ransom. (First Letter R, Last Letter E)
  2. This cloud-based platform acts as a guardian, inspecting and securing your internet traffic regardless of your location. What is the name of this protective service? (First Letter Z, Last Letter R)
  3. Practice of ensuring that information is disclosed only to authorized individuals. (First Letter C, Last Letter Y)
  4. This software serves as a secure vault for your digital keys. It not only stores passwords but also helps generate complex ones. What am I? (First Letter K, Last Letter S)
  5. In access control systems, this security feature prevents a person from using the same access card or credential to enter an area twice in quick succession. What is this measure known as? (First Letter A, Last Letter K)
  6. A secure, digital quarantine zone where suspicious files are brought for observation and testing, shielding your system from potential threats. (First Letter S, Last Letter X)
  7. This proactive evaluation method involves simulated attacks on computer systems or networks to assess vulnerabilities and weaknesses. (First Letter P, Last Letter G)
  8. This term refers to a software vulnerability that is exploited by hackers before the developers even know about it. (First Letter Z, Last Letter Y)
  9. This document serves as a comprehensive list detailing identified risks, their potential impacts, and planned responses. (First Letter R, Last Letter R)
  10. Acts as a barrier against unauthorized access in a network. (First Letter F, Last Letter L)
  11. Information falling into this classification is sensitive and requires a higher level of protection. Access is typically limited to authorized personnel. (First Letter R, Last Letter D)
  12. A deceptive practice where cybercriminals use fraudulent emails or websites to trick individuals into revealing sensitive information such as passwords or credit card numbers. (First Letter P, Last Letter G)
  13. This policy ensures that sensitive information is promptly removed from screens to prevent unauthorized viewing, helping maintain a secure and confidential workspace. (First Letter C, Last Letter N)
  14. This tactic relies on exploiting human psychology rather than technical vulnerabilities. What's the term for tricking individuals into divulging confidential information or performing actions they normally wouldn't? (First Letter S, Last Letter G)
Down
  1. This sneaky practice involves someone secretly observing your screen or keyboard to gain unauthorized access to sensitive information. (First Letter S, Last Letter G)
  2. Often referred to as the first line of defense, this alphanumeric key guards your digital identity. Choosing a strong and unique one is crucial for keeping your accounts secure. What is this critical piece of information? (First Letter P, Last Letter D)
  3. Name of an antivirus for securing endpoints. (First Letter C, Last Letter E)
  4. A technique where attackers try various combinations of passwords to gain unauthorized access. (First Letter B, Last Letter E)
  5. This security principle advocates for providing individuals or systems with only the minimum levels of access or permissions needed to perform their tasks. (First Letter L, Last Letter E)
  6. this social engineering technique involves sending deceptive text messages to trick individuals into divulging sensitive information. (First Letter S, Last Letter G)
  7. Overloading a network to make it unavailable. (First Letter D, Last Letter S)
  8. This deceptive trap lures in potential attackers, helping security professionals study their tactics and protect against real threats. What is this virtual decoy called? (First Letter H, Last Letter T)
  9. Type of malware disguising as legitimate software. (First Letter T, Last Letter E)
  10. Your unique physical or behavioral traits are your key to access. Whether it's your fingerprint, face, or even your voice, what authentication method relies on these distinct features? (First Letter B, Last Letter S)
  11. This essential cybersecurity practice involves updating and fixing vulnerabilities in software to ensure that systems are protected against known threats. (First Letter P, Last Letter G)
  12. This unauthorized entry technique involves someone closely following an authorized person to gain access to a secure area without proper authentication. (First Letter T, Last Letter G)
  13. Ensures secure communication over a computer network. (Last Letter N)
  14. When it comes to securely disposing of sensitive documents, this process involves reducing paper into tiny, unreadable pieces. (First Letter S, Last Letter G)
  15. This policy encourages a tidy and secure workspace by requiring employees to clear their desks of sensitive or confidential information when they are away. (First Letter C, Last Letter K)
  16. Method of verifying the integrity and authenticity of a message or software. (First Letter H, Last Letter G)

30 Clues: Ensures secure communication over a computer network. (Last Letter N)Malicious software that demands a ransom. (First Letter R, Last Letter E)Name of an antivirus for securing endpoints. (First Letter C, Last Letter E)Overloading a network to make it unavailable. (First Letter D, Last Letter S)...

Basic Virtual Security 2023-09-07

Basic Virtual Security crossword puzzle
Across
  1. an intermediary device that blocks unauthorized access to your network
  2. when a third party alters the communication between two sides
  3. form of attack that looks secure but is not
  4. Encoding something so certain people may be able to view it
  5. a copy of data stored away so it can be recovered if the original is damaged
  6. program which will help protect your customer's privacy
  7. a university connector
  8. when scammers send out a message with a company's email address
  9. Passcode to prove you are allowed access
Down
  1. asks for payment in return for solving the problem
  2. gaining sensitive information by looking over the target's shoulder
  3. Volatile memory
  4. attacking through a program or equipment thrown in the trash
  5. a method of resolving a problem
  6. Sign in once to get various service
  7. This program allows your network to be private
  8. an intermediary device that directs traffic
  9. is a key used to pass
  10. Frequent changes downloaded to keep your device secure from adaptive malware
  11. surpasses 100% voltage for a brief moment

20 Clues: Volatile memoryis a key used to passa university connectora method of resolving a problemSign in once to get various servicePasscode to prove you are allowed accesssurpasses 100% voltage for a brief momentform of attack that looks secure but is notan intermediary device that directs trafficThis program allows your network to be private...

Aviation and Security 2024-06-13

Aviation and Security crossword puzzle
Across
  1. What flying class lets you take up to 7kg carry on
  2. An are, usually adjacent to a terminal, where aircraft park.
  3. What color is the standard passport in NZ
  4. What is the IATA code for Auckland
  5. This type of visa is a travel document allowing you to pass through another country
  6. What letter is G in the phonetic alphabet
  7. What color is the official passport in NZ
  8. The side of the airport where anyone can go
  9. These are the ideal solution for evacuating passengers from aircraft quickly and safely.
  10. The side of the airport where only passengers can go
  11. What letter is N in the phonetic alphabet
Down
  1. What is E in the phonetic alphabet
  2. The cargo and luggage compartment of the plane
  3. A covered walkway which allows passengers protected access to the aircraft
  4. These are vehicles with moveable belts for unloading and loading baggage off aircraft.
  5. What flying class lets you take up to 10kg carry on
  6. What letter is T in the phonetic alphabet
  7. This type of visa lets people stay up to 6 months without working
  8. What is W in the phonetic alphabet
  9. What color is the diplomatic passport in NZ

20 Clues: What is E in the phonetic alphabetWhat is the IATA code for AucklandWhat is W in the phonetic alphabetWhat color is the standard passport in NZWhat letter is T in the phonetic alphabetWhat letter is G in the phonetic alphabetWhat color is the official passport in NZWhat letter is N in the phonetic alphabetThe side of the airport where anyone can go...

Security Crossword Puzzle 2025-01-03

Security Crossword Puzzle crossword puzzle
Across
  1. the name of the app store on iOS devices
  2. how to open an app on a mobile device
  3. when someone connects to your to your device without your knowledge
  4. mobile devices are much easier to ________ than desktop devices, so it's important to secure the device
  5. the acronym for the protocol used to download emails
  6. press your finger to the screen and then brush it in a direction
  7. used to enable two Bluetooth devices to communicate
  8. a technology that works great for short-range connectivity with devices like mice and keyboards
  9. the name of the app store on Android devices
  10. you pay for a certain amount of ________ each month, and if you go over that amount, you will be charged extra
  11. the type of cable used to charge mobile devices
Down
  1. this feature lets you interact with a mobile device
  2. to understand how mobile devices work, you need to know a bit about hardware, operating systems and?
  3. enabling this mode on a mobile device disconnects ir from all connections
  4. this feature helps you change screen orientation from portrait to landscape
  5. used to type on the screen of a mobile device
  6. instead of using a passcode, you can be authenticated with your __________ or thumbprint
  7. the acronym for the protocol used to send email
  8. networks with a __________ icon next to them are secured and require a password to join
  9. the correct information needed to access and use a mobile or computer device
  10. you need to be familiar with 3 of these to be able to set up certain types of email accounts

21 Clues: how to open an app on a mobile devicethe name of the app store on iOS devicesthe name of the app store on Android devicesused to type on the screen of a mobile devicethe acronym for the protocol used to send emailthe type of cable used to charge mobile devicesthis feature lets you interact with a mobile device...

Social Security squares 2025-01-28

Social Security squares crossword puzzle
Across
  1. A law passed by a legislative body
  2. Assistance given to someone in difficulty
  3. Activity involving mental or physical effort
  4. President Roosevelt's program to combat the Great Depression
  5. Advantages or profits gained from a program
  6. Regular payments made to people after retirement
  7. Worthiness of respect
  8. New Deal program employing young men to work on conservation projects
  9. New Deal program providing work relief through public work projects
  10. New Deal program providing direct financial aid to states
  11. Relating to society or its organization
Down
  1. Period of life after leaving full-time employment
  2. Insures bank deposits, protecting people's savings
  3. President during the Great Depression and New Deal
  4. Paid employment
  5. Protection against a possible loss or damage
  6. Help or support
  7. State of being extremely poor
  8. People who are old or in the later part of life
  9. Financial safety net provided by the New Deal

20 Clues: Paid employmentHelp or supportWorthiness of respectState of being extremely poorA law passed by a legislative bodyRelating to society or its organizationAssistance given to someone in difficultyAdvantages or profits gained from a programActivity involving mental or physical effortProtection against a possible loss or damage...

SAFETY AND SECURITY 2025-07-10

SAFETY AND SECURITY crossword puzzle
Across
  1. What rule limits liquids in carry on?
  2. What security tool detects metal on passengers?
  3. Where can family and friends wait to pick you up?
  4. Where do you go through security screening?
  5. What must passengers show at boarding?
  6. What vehicle moves aircraft backwards from the gate?
  7. What clearance is required before entering secure zones?
  8. What part of the airport coordinates safety on runway?
  9. What are you asked to remove at the checkpoint?
  10. What officer checks for prohibited foods or plants?
  11. What is checked at customs?
Down
  1. What area do only passengers with boarding passes enter?
  2. What must be locked for taxi, take off and landing?
  3. What must be turned off when take off and landing?
  4. Who gives passengers safety instructions on board?
  5. What area allows passengers to drop off bags?
  6. What connects the terminal to the aircraft for boarding?
  7. What must be declared at customs?
  8. What process scans your baggage for dangerous items?
  9. What’s required to board an international flight?

20 Clues: What is checked at customs?What must be declared at customs?What rule limits liquids in carry on?What must passengers show at boarding?Where do you go through security screening?What area allows passengers to drop off bags?What security tool detects metal on passengers?What are you asked to remove at the checkpoint?...

OSHA, HIPAA & Security 2025-09-29

OSHA, HIPAA & Security crossword puzzle
Across
  1. every patient must have a _____ ID
  2. must not be shared
  3. all ___ with PHI must be locked or shredded
  4. how to respond in the event of a fire
  5. autoclave is tested ______
  6. _______ plan should be known
  7. the color of biohazard
  8. Keeping records safe
  9. patients may _____ use of PHI
  10. all ____ with PHI must be secured
  11. may not be in areas with PHI
Down
  1. always log off of when stepping away
  2. how to use a fire extinguisher
  3. never plug a ____ device into a work computer
  4. Globally ________ System
  5. _______ & sharps injuries reported immediately
  6. occupational _____ & health administration
  7. employees may not access _____ records
  8. ______ to Know Station
  9. health insurance ____ & accountability act
  10. look up patient by _______
  11. _________ necessary PHI
  12. must be labeled with contents and hazards
  13. always verify _____ identifiers
  14. items to be ______ inches below ceiling
  15. ____ binders contain information on hazardous material

26 Clues: must not be sharedKeeping records safethe color of biohazard______ to Know Station_________ necessary PHIGlobally ________ Systemautoclave is tested ______look up patient by ______________ plan should be knownmay not be in areas with PHIpatients may _____ use of PHIhow to use a fire extinguisheralways verify _____ identifiers...

Security Level 3 2025-10-19

Security Level 3 crossword puzzle
Across
  1. Crime involving illegal arms
  2. Scientific analysis of crime evidence
  3. Physical attack
  4. Formal accusation issued by a grand jury
  5. Organized criminal activity
  6. Illicit transport of goods
  7. Theft involving force or intimidation
  8. Lawyer for the accused
  9. Person who helps commit a crime
  10. White-collar crime involving financial deceit
  11. Entering a building to commit theft
Down
  1. Illegal drug-related crime
  2. Abuse of vulnerable individuals
  3. Interfering with legal proceedings or investigations
  4. Taking hostages
  5. Deception for personal gain
  6. Crime involving intentional fire-setting
  7. Falsifying documents
  8. Crime scene analyst
  9. Hidden observation of suspects
  10. Lying under oath
  11. Illegal stock market manipulation
  12. Offering illicit incentives
  13. Interference with justice
  14. Harassment or obsessive following
  15. Crime committed via computer or internet
  16. Stealing someone’s identity
  17. Unlawful killing

28 Clues: Physical attackTaking hostagesLying under oathUnlawful killingCrime scene analystFalsifying documentsLawyer for the accusedInterference with justiceIllegal drug-related crimeIllicit transport of goodsDeception for personal gainOrganized criminal activityOffering illicit incentivesStealing someone’s identityCrime involving illegal arms...

Digital Security Risks 2025-01-22

Digital Security Risks crossword puzzle
Across
  1. spies on the activity of a computer without your knowledge
  2. an assault whose purpose is to disrupt computer access to an internet service, such as the web or email
  3. program designed to gain access to the "root" of a computer system
  4. programs that install themselves on your computer without your knowledge or consent and deliberately alter the computer's operations
  5. a website that uses encryption techniques to secure its data
  6. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  7. software that delivers ads, mainly in a banner or pop-ups, to your desktop
  8. online or internet-based illegal acts
  9. a private combination of characters associated with a user name that allows access to certain resources
  10. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
  11. someone who accesses a computer or network illegally
  12. type of hacker whose goal is to exploit the data and do harm
  13. a compromised device whose owner is unaware the device is being controlled remotely by an outsider
  14. program that can reproduce itself and spread from computer to computer through a file attachment
  15. crime any illegal act involving the use of a computer or related devices
  16. program that replicates itself and infects the entire network
  17. use of passwords to make sure people accessing information are who they claim to be
  18. a notice that guarantees a user or a website is legitimate
  19. type of hacker who works to find the security breaches to improved security
  20. someone who uses the internet or network to destroy or damage computers for political reasons
Down
  1. can be used to learn passwords, account numbers, etc
  2. someone who demands payment to stop an attack on an organization’s technology
  3. has the same intent as a cracker but does not have the technical skills and knowledge
  4. log on name, or sign in name
  5. hardware and/or software that protects a network’s resources from intrusion by users on another network
  6. decoding and reading encrypted data
  7. an attack whose goal ranges from disabling a government’s computer network to crippling a country
  8. any event or action that could cause a loss of or damage to a computer
  9. someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions
  10. a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  11. the destructive event or prank
  12. a program that performs a repetitive task on a network
  13. hides within a computer and looks like a legitimate program
  14. a numeric password, either assigned by a company or selected by a user
  15. practice of using email or a fake web site that appears to be from a legitimate company in an attempt to scam you for information
  16. program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money

36 Clues: log on name, or sign in namethe destructive event or prankdecoding and reading encrypted dataonline or internet-based illegal actscan be used to learn passwords, account numbers, etcsomeone who accesses a computer or network illegallya program that performs a repetitive task on a networkspies on the activity of a computer without your knowledge...

Computer Security & Management 2026-03-28

Computer Security & Management crossword puzzle
Across
  1. System that dynamically manages device files
  2. Technique that maps private IPs to a public IP
  3. Bootloader that loads the Linux kernel
  4. Signal that cannot be caught or ignored
  5. Remote source of software packages
  6. File that defines which users can run commands as root
  7. Central system logging service
  8. Filesystem technique that logs changes before writing to disk to prevent corruption
  9. Data structure that stores file metadata
  10. Technique of hiding data within another file
Down
  1. Software that interfaces between OS and hardware
  2. Directory permission restricting file deletion to owner
  3. Process that has finished but remains in process table
  4. Value that determines process scheduling priority
  5. Structure that organizes and stores files on disk
  6. Device type that reads/writes data in chunks
  7. Command used to detach a filesystem
  8. Encryption using a shared key
  9. Init system with PID 1 that manages services
  10. File storing encrypted user passwords
  11. Tool used to install local .deb packages
  12. System call that creates a new process
  13. US law expanding surveillance and intelligence powers
  14. Core of the OS that manages hardware and processes
  15. Background process running without user interaction
  16. Command used to change file ownership

26 Clues: Encryption using a shared keyCentral system logging serviceRemote source of software packagesCommand used to detach a filesystemFile storing encrypted user passwordsCommand used to change file ownershipBootloader that loads the Linux kernelSystem call that creates a new processSignal that cannot be caught or ignored...

Health 2023-09-01

Health crossword puzzle
Across
  1. standing around and do nothing
  2. mean person
  3. The state of being protected
  4. person who gets hurt
  5. a choice you make
Down
  1. The condition of being protected
  2. person who saves the victim
  3. bullying bullying someone online
  4. leader of school
  5. Person who teaches kids

10 Clues: mean personleader of schoola choice you makeperson who gets hurtPerson who teaches kidsperson who saves the victimThe state of being protectedstanding around and do nothingThe condition of being protectedbullying bullying someone online

Kornelia Zawalska 2c 2023-04-17

Kornelia Zawalska 2c crossword puzzle
Across
  1. forma pamiętnika prowadzonego w internecie
  2. oprogramowanie
  3. danych
  4. od internetu
  5. -manipulacja głosu
  6. atak
Down
  1. wiadomości
  2. rodzaj rozmowy prowadzonej w internecie
  3. w internecie
  4. prawny lub umowa

10 Clues: atakdanychwiadomościw internecieod internetuoprogramowanieprawny lub umowa-manipulacja głosurodzaj rozmowy prowadzonej w internecieforma pamiętnika prowadzonego w internecie

Black friday 2024-11-28

Black friday crossword puzzle
Across
  1. SWEET TREATS
  2. POPULAR ONLINE STORE
  3. PLAYED IN STORES ON BLACK FRIDAY
  4. A BIG SHOPPING SESSION
Down
  1. PLURAL OF A BARGAIN
  2. NIKE OR ADIDAS ARE EXAMPLES
  3. HOLDS YOUR CASH AND CARDS
  4. MONDAY'S ONLINE SHOPPING DAY
  5. WORN ON YOUR WRIST
  6. THINGS CHILDREN PLAY WITH

10 Clues: SWEET TREATSWORN ON YOUR WRISTPLURAL OF A BARGAINPOPULAR ONLINE STOREA BIG SHOPPING SESSIONHOLDS YOUR CASH AND CARDSTHINGS CHILDREN PLAY WITHNIKE OR ADIDAS ARE EXAMPLESMONDAY'S ONLINE SHOPPING DAYPLAYED IN STORES ON BLACK FRIDAY

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Type of malware that locates and saves data from users without them knowing about it
  2. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. Encrypts programs and data until ransome is paid
  5. Error in a program that prevents the program from running as expected
  6. Collection of captured bot computers
  7. Piece of code that is capable of copying itself and typically has a detrimental effect such as corruptin the system or destroying data
  8. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
Down
  1. A program that appears desirable but acctualy contains something harmful they can copy themselves steal info or harm the host computer
  2. Criminals promise a service in exchange for details - a common example is offering help with IT problems
  3. Software that shows adverts It can be harmless
  4. When someone deceives by pretending to be someone else in order to get personal data.
  5. Program that hides in a computer and allows someone from a remote location to take control
  6. Malware that allows cyber security attacker to take control of computer
  7. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

15 Clues: Collection of captured bot computersSoftware that shows adverts It can be harmlessEncrypts programs and data until ransome is paidError in a program that prevents the program from running as expectedMalware that allows cyber security attacker to take control of computer...

BENTUK KERJASAMA KERAJAAN PERSEKUTUAN DAN KERAJAAN NEGERI 2022-08-03

BENTUK KERJASAMA KERAJAAN PERSEKUTUAN DAN KERAJAAN NEGERI crossword puzzle
Across
  1. Tertumpu kepada pembukaan tanah baharu
  2. Diwartakan sejak 1994 di perairan Kedah, Terengganu, Pahang, Johor, Sabah
  3. Majlis Keselamatan Negara
  4. Merupakan perancangan strategik jangka panjang
  5. Kementerian Pertahanan
  6. Eastern Sabah Security Command
Down
  1. Pembangunan kawasan lebih luas di beberapa buah negeri untuk bangunkan wilayah baru
  2. Federal Land Development Authority (Lembaga Kemajuan Tanah Persekutuan)
  3. Kementerian Dalam Negeri
  4. Memastikan pembangunan dapat beri manfaat demi kesejahteraan rakyat
  5. Tanggungjawab bersama Persekutuan dan negeri
  6. Perbadanan Perumahan 1 Malaysia
  7. Rajang Area Security Commang
  8. Eastern Sabah Security Zone
  9. Federal Land Consolidation and Rehabilitation Authority (Lembaga Penyatuan dan Pemulihan Tanah Persekutuan)

15 Clues: Kementerian PertahananKementerian Dalam NegeriMajlis Keselamatan NegaraEastern Sabah Security ZoneRajang Area Security CommangEastern Sabah Security CommandPerbadanan Perumahan 1 MalaysiaTertumpu kepada pembukaan tanah baharuTanggungjawab bersama Persekutuan dan negeriMerupakan perancangan strategik jangka panjang...

Heard It Through the Grapevine: Common FFS Slang 2015-04-29

Heard It Through the Grapevine: Common FFS Slang crossword puzzle
Across
  1. Integral team in striking the NAV of the funds each night
  2. This system processes and reports most functions online in real-time, such as: posting all transactions, correcting all transactions, calculating net asset valuations, reporting cash management, and listing security pricing from multiple vendors
  3. The value investors believe a firm is worth—calculated by multiplying the number of shares outstanding by the current market price of a firm's shares
  4. Investment Book of Record​
  5. Maintain and support all equity security pricing activities and FX rate analysis required to create market value for the funds.
  6. Centralized source for enterprise investment data and supplies enterprise with investment date, manages processes administrator data and provides data.
  7. Nine digit unique identifier that is used in over 30 global markets, typically starts with an alphabetic
  8. IT team aligned towards fixing the daily production issues in the UI and enhancing currrent interfaces to meet data sourcing needs
  9. Accounting Book of Records
Down
  1. ​Big Hairy Aggressive Goals
  2. Nine digit identifier that is unique to each security and used only in the US and Canada
  3. Capture and distribute security changes caused by market activity
  4. Improve long-term returns for our shareholders by advocating for the effective governance of portfolio companies
  5. Seven digit identifier designated to securities that trade on smaller exchanges globally like the London Stock exchange
  6. Executes post trad compliance levels for all Vanguard funds and accounts globally
  7. Term for a forward settling MBS (mortgage-backed security) trade, due to the fact that the actual security or securities ​are not known at the time of the trade.
  8. Trade Date = when a order is placed in the market
  9. Flexible Outbound Messaging Interface​
  10. Responsible for sourcing, storing, validating, and distributing enterprise investment data.
  11. Provide oversight of fund accounting and fund administration services for internationally-domiciled funds
  12. 12 digit code used to aid in trading across borders
  13. Responsible for the creation of financial statements, communications of capital gains to shareholders and calculations of fees to external advisors

22 Clues: Investment Book of Record​Accounting Book of Records​Big Hairy Aggressive GoalsFlexible Outbound Messaging Interface​Trade Date = when a order is placed in the market12 digit code used to aid in trading across bordersIntegral team in striking the NAV of the funds each nightCapture and distribute security changes caused by market activity...

Cybersecurity Awareness 2024-11-06

Cybersecurity Awareness crossword puzzle
Across
  1. ERROR Unintentional actions by people that can compromise security systems.
  2. ___ your device before leaving your workplace is a good practice.
  3. Connecting your device to a free access public wi-fi can lead to ___ attack.
  4. A feature to switch off connections in mobile devices.
  5. One of the factors to check whether the website is official and safe.
  6. Always verify whether the website is ___ or not before entering any credentials.
  7. Passwords like “123456” and “password” is in this category.
  8. Best practice before downloading a software online. / Always ___ when you are calling someone.
  9. Download mobile applications from an ___ app store.
  10. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
  1. Never click on an ___ if you received an email from an unknown sender.
  2. Using an ___ version of software is like giving chances for hackers to hack.
  3. This tool can track your typing habits and log your passwords without your knowledge.
  4. ___ engineering is the art of manipulating humans in giving away all of your information.
  5. Best practice if an unknown device wants to connect to your device.
  6. Never share your sensitive information on ___.
  7. Using a ___ password for all accounts is not a good practice.
  8. An unauthorized individual who gains access to systems, often to modify or destroy data.
  9. This method enhances security by requiring two or more forms of verification during authentication.
  10. In an organization, who plays a role in ensuring data security?
  11. What security method uses two forms of verification, like a password and a code?
  12. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
  13. __ key + L is the shortcut to lock your screen.

23 Clues: Never share your sensitive information on ___.__ key + L is the shortcut to lock your screen.Download mobile applications from an ___ app store.A feature to switch off connections in mobile devices.Passwords like “123456” and “password” is in this category.Using a ___ password for all accounts is not a good practice....

Crossword 2021-06-16

Crossword crossword puzzle
Across
  1. to stay in ....
  2. to call the ....
  3. you can read books there
  4. You can listen to music with ....
  5. .... to face
Down
  1. I´ve done this a ... times before.
  2. you are a ....
  3. cyber ...... .
  4. to .... a friend.
  5. to be .... to (do sth)

10 Clues: .... to faceyou are a ....cyber ...... .to stay in ....to call the ....to .... a friend.to be .... to (do sth)you can read books thereYou can listen to music with ....I´ve done this a ... times before.

Cyber Secuirty 2021-05-26

Cyber Secuirty crossword puzzle
Across
  1. Getting into someone else’s computer or device without their permission.
  2. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking on a scam website.
  3. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge).
  4. A way to stop hackers getting into your accounts, even if they know your password.
  5. A sequence of characters (or words) used to stop criminals from accessing your accounts.
Down
  1. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of.
  2. You need to create one of these to access services on the internet (such as email and shopping).
  3. A copy of the information held on a device (such as photos and documents) which is stored somewhere else.
  4. Unwanted emails or messages that usually try to sell you something.
  5. A location on the internet where you can save your data (rather than on your computer or device).
  6. Nasty software that can have a bad impact on your device or computer.

11 Clues: Unwanted emails or messages that usually try to sell you something.Nasty software that can have a bad impact on your device or computer.Getting into someone else’s computer or device without their permission.A way to stop hackers getting into your accounts, even if they know your password....

Cyber Bullying 2022-04-19

Cyber Bullying crossword puzzle
Across
  1. Ability to have authority
  2. Understanding how someone feels
  3. Something that is true
  4. Assistance given
  5. Sustained repetitive hurting of someone
  6. People who care about you
Down
  1. An offence punishable by law
  2. Something mean you do to someone
  3. Deliberately causes pain
  4. Statement of intention to hurt
  5. Likely to cause harm

11 Clues: Assistance givenLikely to cause harmSomething that is trueDeliberately causes painAbility to have authorityPeople who care about youAn offence punishable by lawStatement of intention to hurtUnderstanding how someone feelsSomething mean you do to someoneSustained repetitive hurting of someone

Cyber Bullying 2013-11-05

Cyber Bullying crossword puzzle
Across
  1. Something that causes bodily or mental pain or suffering; to cause bodily or mental pain.
  2. Web sites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts:
  3. the intentional taking of one's own life; a person who intentionally takes his or her own life.
  4. happening or occurring at short intervals; constant, habitual, or regular
  5. to cause confusion and shame to; make uncomfortably self-conscious
  6. to give or impart knowledge of a fact or circumstance to;to supply (oneself) with knowledge
Down
  1. to be on the Internet
  2. to disturb persistently; bother continually; persecute.
  3. a person who perpetrates, or commits, an illegal, criminal, or evil act
  4. to cause of severe pain or anguish.
  5. the act of beating, whipping, or thrashing; physical assaults or verbal abuse against members of a specified group.

11 Clues: to be on the Internetto cause of severe pain or anguish.to disturb persistently; bother continually; persecute.to cause confusion and shame to; make uncomfortably self-consciousa person who perpetrates, or commits, an illegal, criminal, or evil acthappening or occurring at short intervals; constant, habitual, or regular...

Cyber Bullying 2013-11-05

Cyber Bullying crossword puzzle
Across
  1. constant, habitual, or regular
  2. to afflict with great bodily or mental suffering; pain: to be tormented with violent headaches; a state of great bodily or mental suffering; agony; misery.
  3. to give or impart knowledge of a fact or circumstance
  4. Web sites and other online means of communication
  5. the act of inflicting excruciating pain, as punishment or revenge; a method of inflicting such pain.
  6. to disturb persistently;bother continually; persecute.
Down
  1. a person who commits, an illegal, criminal, or evil act
  2. connected by computer to one or more other computers or the Internet.
  3. the intentional taking of one's own life.
  4. verbal abuse, as of a group or a nation.
  5. to cause confusion and shame; to make uncomfortably self-conscious

11 Clues: constant, habitual, or regularverbal abuse, as of a group or a nation.the intentional taking of one's own life.Web sites and other online means of communicationto give or impart knowledge of a fact or circumstanceto disturb persistently;bother continually; persecute.a person who commits, an illegal, criminal, or evil act...

Cyber Ethics 2025-06-12

Cyber Ethics crossword puzzle
Across
  1. all nodes are connected via central device
  2. criminal activities that include the use of computers
  3. network within city
  4. wireless fidelity
  5. sender transform data into unreadable code
Down
  1. illegal intrusion in a computer via internet
  2. fully connected network
  3. A program that disrupts the normal functioning of computer
  4. responsible behavior in social media
  5. legal right for original creator for his work
  6. wireless network

11 Clues: wireless networkwireless fidelitynetwork within cityfully connected networkresponsible behavior in social mediaall nodes are connected via central devicesender transform data into unreadable codeillegal intrusion in a computer via internetlegal right for original creator for his workcriminal activities that include the use of computers...

cyber Securities 2026-03-04

cyber Securities crossword puzzle
Across
  1. Email tidak diinginkan yang sering berisi iklan atau tautan berbahaya.
  2. Program berbahaya yang dapat merusak sistem komputer.
  3. Orang yang meretas sistem komputer.
  4. Proses mengubah data menjadi kode rahasia agar tidak mudah dibaca.
  5. Kata sandi rahasia untuk mengamankan akun.
Down
  1. Informasi yang harus dilindungi dalam sistem keamanan digital.
  2. Teknik penipuan online untuk mencuri data korban.
  3. Jaringan komputer terinfeksi yang dikendalikan untuk menyerang sistem lain.
  4. Sistem keamanan jaringan yang menyaring lalu lintas data.
  5. jaringan internet tanpa kabel.
  6. Orang yang menggunakan atau mengakses sistem.

11 Clues: jaringan internet tanpa kabel.Orang yang meretas sistem komputer.Kata sandi rahasia untuk mengamankan akun.Orang yang menggunakan atau mengakses sistem.Teknik penipuan online untuk mencuri data korban.Program berbahaya yang dapat merusak sistem komputer.Sistem keamanan jaringan yang menyaring lalu lintas data....

Foreign Policer 2023-06-01

Foreign Policer crossword puzzle
Across
  1. the president’s national security and foreign policy personnel. The NSC staff receives direction from the president via the national security advisor, provides expertise on issues and regions, and collaborates frequently with employees from other government departments and agencies to carry out the interagency policymaking process
  2. the group comprising the vice president of the United States and the heads of all fifteen federal executive departments, such as the secretaries of state, defense, commerce, labor, and education. Other officials may also have cabinet rank, depending on the administration
  3. one of the president’s chief economic advisors and head of the department of the treasury, which carries out policy on issues related to the U.S. and global economies and financial systems. The department is home to the U.S. Mint and Internal Revenue Service, among other agencies
  4. the highest-ranking member of the U.S. armed forces. The CJCS does not exercise command authority over U.S. troops, but instead works with the leaders of the U.S. military services to fulfill their function as the top military advisor to the president and other senior officials
  5. an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense
  6. a law signed by President Harry S. Truman in 1947 to reorganize the agencies and processes related to intelligence, foreign policy, and the military. Among its reforms, the act established the National Security Council (NSC) and the Central Intelligence Agency (CIA)
  7. undertaken between two entities, generally countries
  8. an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies. In 1962, President John F. Kennedy ordered a blockade of Cuba—calling it a “quarantine” to avoid the implication of declaring war—in response to Soviet missile activity on the island
  9. a tax on goods arriving from a foreign country, generally used as a tool of trade and foreign policy to penalize adversaries or favor allies or domestic producers
  10. the so-called honest broker of the national security policy process and the president’s principal advisor on national security issues. The NSA manages the National Security Council (NSC) staff, chairs the principals committee, and coordinates and manages policymaking with the goal of ensuring effective policy development and implementation
  11. individuals or groups that do not belong to or act on behalf of a state. This may refer to nongovernmental organizations such as Amnesty International, media outlets such as the New York Times, or terrorist groups such as al-Qaeda
  12. second-highest-ranking official of the U.S. government and first in line to assume the presidency if the president dies, resigns, or becomes unable to serve. Though given only one responsibility in the Constitution—to serve as president of the U.S. Senate, with the power to break ties—the vice presidency has become a visible part of the modern White House. Today’s vice presidents undertake a variety of functions, from serving as an all-purpose presidential advisor to carrying out diplomatic trips abroad. The personality of the individual who occupies this post and their relationship with the president define the scope of the role
Down
  1. undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations
  2. the principal defense policy advisor to the president and head of the Department of Defense, which oversees the formulation and execution of defense policy and manages U.S. military forces
  3. a type of presidential directive, or official order from the president, on matters related to national security. Called different names by different administrations, these documents may initiate a review of current policy, reorganize the structure of the national security policy apparatus, or lay out new strategies
  4. an interagency body that serves as the forum for the president to discuss and take action on the most critical national security issues facing the United States. Its membership has varied since its creation in 1947, and now includes the president, vice president, national security advisor, secretaries of state and defense, and a variety of other senior officials
  5. he ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system
  6. the president’s chief foreign affairs advisor, the country’s chief diplomat, and the head of the Department of State, which conducts the United States’ relationships with foreign countries and international organizations
  7. the president’s principal advisor for intelligence-related matters and the head of the intelligence community, a network of seventeen agencies and organizations, such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and Defense Intelligence Agency (DIA), that collect and analyze information to assist policymaking
  8. the head of the Department of Homeland Security since its creation after the attacks of September 11, 2001. This department works to protect U.S. security by implementing federal policy concerning terrorism prevention, border security, immigration, disaster response, and cybersecurity
  9. undertaken by only one entity, generally a country
  10. the head of the Department of Energy, which executes U.S. policy on energy, environmental, and nuclear issues and oversees seventeen national scientific research laboratories
  11. a decision issued by the president that carries the full force and effect of law. An executive order usually instructs government departments and agen
  12. defensive and offensive actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure. Specific actions include planting computer viruses, mounting denial-of-service attacks to disrupt internet and network activity, and conducting electronic surveillance
  13. a tool of statecraft, frequently involving economic measures such as asset freezes and trade restrictions, used to exact a certain behavior or outcome from another party. The U.S. and European Union sanctions against Russian companies and individuals that aim to encourage Russia to end its interference in Ukraine are an example
  14. head of the Department of Justice and chief lawyer of the U.S. government. Among other duties, they offer advice on the legal aspects of proposed policies to the president and other department heads.
  15. involving two or more agencies. The National Security Council (NSC), for example, is an interagency forum, not a forum internal to any one agency
  16. the intermediate-level setting, below the principals committee, for debating issues in the National Security Council (NSC) system. Chaired by the deputy national security advisor, it comprises the second- and third-ranking leaders of the departments and agencies represented on the National Security Council. It manages the interagency process up and down, answering to the principals committee and assigning and reviewing the work of interagency policy committees
  17. the lowest-level setting for debating issues in the National Security Council (NSC) system and the home of much of the day-to-day work needed to formulate and implement U.S. foreign policy. Often chaired by a senior director on the NSC staff, IPCs develop, coordinate, and carry out policy options in distinct regional and functional areas
  18. a country’s attitudes and actions in the international arena. Foreign policy includes two principal elements: goals or interests as the country defines them, such as peace with one’s neighbors, and the means pursued to advance these interests, such as diplomatic negotiations, trade agreements, and military alliances. A country carries out its foreign policy through its dealings with other countries, international organizations such as the United Nations (UN), and nonstate actors such as corporations and advocacy groups

30 Clues: undertaken by only one entity, generally a countryundertaken between two entities, generally countrieshe ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN systemundertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations...

International Security 6 (KCNS) 2021-10-18

International Security 6 (KCNS) crossword puzzle
Across
  1. The legislative body of the CSTO (abbraviation).
  2. Troops of the CSTO which formed or assembled by collection.
  3. It was established at the Council of Ministers of Defense of the Collective Security Treaty Organization.
  4. What is the English for "миротворчество".
  5. Task.
  6. The place where the Collective Security Treaty was signed on 15 May 1992.
  7. The Regional Anti-Drug Operation of the CSTO.
Down
  1. This country is a member of the CSTO.
  2. They organize the implementation of decisions and recommendations of the CSTO Collective Security Council.
  3. A union or association formed for mutual benefit, especially between countries or organizations.
  4. A month when the charter of the Collective Security Treaty Organization was signed in Moldova.
  5. An alliance or agreement to work together.
  6. It is a presidential republic which president is Lukashenko.
  7. Operations of the CSTO to counter crime on the common user network Internet.
  8. Actions taken to protect someone or something from attack.

15 Clues: Task.This country is a member of the CSTO.The Regional Anti-Drug Operation of the CSTO.What is the English for "миротворчество".An alliance or agreement to work together.Troops of the CSTO which formed or assembled by collection.It is a presidential republic which president is Lukashenko....

FNF Mod Songs 2021-11-02

FNF Mod Songs crossword puzzle
Across
  1. Cyrix's second song
  2. Little man's final song
  3. Selever's song
  4. sarvente's first song
  5. Sky's final song
  6. Tabi's third song
  7. Kapi's first song(Arcade Showdown)
  8. whitty's second song
  9. Neon's final song
  10. Anders's final song
  11. hex's bonus song
  12. Shaggy's second song
  13. Bob's final song
  14. Annie's fourth song
Down
  1. Filip's sixth song
  2. Taeyei's first song(FNF Cyber Sensation)
  3. Taki's first song(Friday night Fever)
  4. amor's song
  5. Updike's song
  6. Tricky's second song
  7. Zardy's first song
  8. Majin Sonic's song
  9. AGOTI's first song
  10. Garcello's first song
  11. KOU's second song

25 Clues: amor's songUpdike's songSelever's songSky's final songhex's bonus songBob's final songTabi's third songNeon's final songKOU's second songFilip's sixth songZardy's first songMajin Sonic's songAGOTI's first songCyrix's second songAnders's final songAnnie's fourth songTricky's second songwhitty's second songShaggy's second songsarvente's first song...

Test your cost basis knowledge 2017-07-06

Test your cost basis knowledge crossword puzzle
Across
  1. The original value of an asset; usually the purchase price of the security.
  2. Cost basis method where shares purchased first (the oldest shares in the account) are the first shares sold.
  3. A return of some or all of an investment in the stock of the company. Reduces cost basis.
  4. Examples include stock splits, mergers, and spin offs.
  5. This method calculates an Average Cost per share by dividing the total of all investments by the total number of shares in the account.
  6. Cost basis method where shares purchased at the highest price per share are the first shares sold.
  7. Shares that Vanguard is required to report to the IRS.
  8. shares purchased by a shareholder on or before December 31, 2011.
  9. Shares held for a year or more.
Down
  1. Occurs when an investor sells a security at a loss but then purchases the same (or a similar) security within 30 days of the sale.
  2. Separating covered from noncovered shares.
  3. Cost basis method where shares purchased last (the newest shares in the account) are the first shares sold.
  4. The person who receives the securities transferred from a deceased clients account.
  5. A bond is an example of a _____ Security.
  6. Entering missing cost basis information into wave upon the clients request.
  7. Adjusting the cost basis of a security to the market value on the date the account holder died.
  8. Cost basis method where shares are selected by the shareholder each time shares are sold.
  9. Shares held for less than a year.
  10. This type of account cannot be stepped up.
  11. A transfer of shares between spouses cannot be codded as a ____.

20 Clues: Shares held for a year or more.Shares held for less than a year.A bond is an example of a _____ Security.Separating covered from noncovered shares.This type of account cannot be stepped up.Examples include stock splits, mergers, and spin offs.Shares that Vanguard is required to report to the IRS....

Securities Vocabulary Review 2022-11-01

Securities Vocabulary Review crossword puzzle
Across
  1. Control exerted via something worth much money without much effort.
  2. This indicator tells you if the voulme of stocks bought and sold is outpacing their current value.
  3. Set of companies providing similar goods/services. (2 words)
  4. Disliking or being opposed to something.
  5. Financial contracts based on underlying assets.
  6. A compilation of securities
  7. Value at which an option is willing to be sold.
  8. Tpe of option reserving the right to sell at a certain price.
  9. Earnings per Share. (Abbr.)
  10. Unit of a securuity, such a stock.
  11. Mutual fund or ETF designed to mimic the performance of an exchange as a whole. (2 words)
  12. Person which facilitates investing, often for a fee.
  13. Uses patterns in market data to identify trends and opportunities which result from them. (2 words)
  14. Determines a security's true worth, AKA fair market value. (2 words)
  15. This indicator is used in the "Crossover Strategy". (2 words)
  16. Securities and Exchange Commission (Abbr.)
Down
  1. Every security traded on the market has one of these. (2 words)
  2. A tradeable financial asset.
  3. Exchange-traded Fund. (Abbr.)
  4. The ceiling of how high a stock has gone recently.
  5. The floor of how often a stock has gone recently.
  6. Type of security representing a piece of a company
  7. Quantity ; amount.
  8. No trend ; not up or down.
  9. Value at which an option is willing to be bought.
  10. Type of security often involving land and houses. (2 words)
  11. Debt security
  12. Useful in understanding how securities are behaving in the present.
  13. Type of option reserving the right to buy at a certain price.
  14. Moving Average - Convergence/Divergence. (Abbr.)
  15. Collection of securities organized by a manager. (2 words)
  16. The price on a call or put option. (2 words)

32 Clues: Debt securityQuantity ; amount.No trend ; not up or down.A compilation of securitiesA tradeable financial asset.Earnings per Share. (Abbr.)Exchange-traded Fund. (Abbr.)Unit of a securuity, such a stock.Disliking or being opposed to something.Securities and Exchange Commission (Abbr.)The price on a call or put option. (2 words)...

Types Of Threats 2019-01-09

Types Of Threats crossword puzzle
Across
  1. attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  2. Software that encrypts programs and data until a ransom is paid to remove it
  3. A type of Malware that locates and saves data from users without them knowing about it
  4. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  5. Criminals make a promise of goods in return for details, such as offering a free music download
  6. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
  7. Malware that allows a cyber-security attacker to take control of an infected computer
Down
  1. Advertising-supported Software
  2. When someone deceives by pretending to be someone else in order to get personal data
  3. A destructive computer program that bores its way through a computer's files or through a computer's network
  4. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  5. Unauthorized access, modification, or use of an electronic device or some element of a computer system
  6. An error in a program that prevents the program from running as expected
  7. Collection of captured bot computers
  8. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

15 Clues: Advertising-supported SoftwareCollection of captured bot computersAn error in a program that prevents the program from running as expectedSoftware that encrypts programs and data until a ransom is paid to remove itWhen someone deceives by pretending to be someone else in order to get personal data...

Equity Crossword 2022-07-18

Equity Crossword crossword puzzle
Across
  1. Function to view analysts expectation on key fundamental data points related to selected company
  2. Proxy for the price at which an investor can buy
  3. Function to view the capital structure of a company
  4. Function to view pending and recently announced mergers and acquisitions
  5. Function to view recent equity offerings
  6. Hybrid security with equity and debt characteristics
  7. Proxy for the price at which an investor can sell
Down
  1. Function to view a company's financial statements and ratios
  2. Function to screen for stocks suited to specific categories inputted by the user.
  3. Represents ownership in a publicly traded firm
  4. Function to view historical information about a selected security
  5. Function to see sell side analysts buy/sell/hold recommendations related to a specific company
  6. Bank-issued securities trading in markets outside of parent firm's country
  7. Basket security representing an economy, market, or industry
  8. Equity basket security consisting of other equity securities

15 Clues: Function to view recent equity offeringsRepresents ownership in a publicly traded firmProxy for the price at which an investor can buyProxy for the price at which an investor can sellFunction to view the capital structure of a companyHybrid security with equity and debt characteristicsFunction to view a company's financial statements and ratios...

Computer Holiday Homework 2025-06-15

Computer Holiday Homework crossword puzzle
Across
  1. A set of rules or standards for transmitting data.
  2. An career that deals with cybersecurity
  3. One type of cybersecurity theft
  4. What is one example of network security?
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  6. A device that converts digital signals to analog signals for transmission over phone lines.
Down
  1. One cybersecurity is related to...
  2. One benefit of computer security
  3. One cybersecurity threat vector
  4. A computer or device that requests resources or services from a server.
  5. A device that forwards data packets between computer networks.
  6. A network that spans a large geographic area, such as a country or the world.
  7. A unique numerical label assigned to each device connected to a network.
  8. One thing cybersecurity aim at
  9. The arrangement of computer and devices and connection in a network

15 Clues: One thing cybersecurity aim atOne cybersecurity threat vectorOne type of cybersecurity theftOne benefit of computer securityOne cybersecurity is related to...An career that deals with cybersecurityWhat is one example of network security?A set of rules or standards for transmitting data.A device that forwards data packets between computer networks....

Sarah Cybersecurity Password 2026-04-01

Sarah Cybersecurity Password crossword puzzle
Across
  1. Horse A download disguised as a program.
  2. A code that is capable of corrupting the system or destroying data.
  3. 1 The duplication of data files to at least 2 hard drives simultaneously.
  4. Hardening Making a computer system more secure by fixing weaknesses so attackers cant get in.
  5. Security Keeps software and apps from being attacked.
  6. Unwanted software that secretly installs and puts pop ups on your device.
  7. Spreads across devices while replicating within a network.
  8. Backup A backup of daily changed or new files.
Down
  1. Footprint The collection of data stored online, created while an individual is using the internet.
  2. Security Protects how data is handled and shared.
  3. Security Protects data from being changed or stolen.
  4. Recovery Plans how to restore data after being attacked.
  5. Backup A complete copy of all data files.
  6. Security Protects computer networks from hackers and unauthorized access.
  7. Freedom from being observed or disturbed.

15 Clues: Freedom from being observed or disturbed.Horse A download disguised as a program.Backup A backup of daily changed or new files.Security Protects how data is handled and shared.Backup A complete copy of all data files.Security Protects data from being changed or stolen.Security Keeps software and apps from being attacked....

Cyber Puzzle 2022-09-20

Cyber Puzzle crossword puzzle
Across
  1. The form of encryption that requires a single key
  2. An important process that verifies a user is really who they are; many different ways this can be done.
  3. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  4. The _________ is used to verify that data is not modified, tampered with, or corrupted
  5. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
Down
  1. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  2. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. unique address that identifies a device on the internet or a local network.
  4. Special virus that moves from computer to computer without human interaction.
  5. An ________ is a program or code that makes use of the vulnerability in an application or system.
  6. a person who uses computers to gain unauthorized access to data.

11 Clues: The form of encryption that requires a single keya person who uses computers to gain unauthorized access to data.unique address that identifies a device on the internet or a local network.Special virus that moves from computer to computer without human interaction....

Cyber Thursday 2021-02-11

Cyber Thursday crossword puzzle
Across
  1. Used to identify specific users
  2. Capable of copying itself
  3. Data protection
  4. Theft stealing information
  5. Detect and remove viruses
Down
  1. Converting information or data into a code
  2. Protect from unauthorised access
  3. Uses computers to gain unauthorised access
  4. Computer programs
  5. Network protection
  6. Sent to a large number of recipients

11 Clues: Data protectionComputer programsNetwork protectionCapable of copying itselfDetect and remove virusesTheft stealing informationUsed to identify specific usersProtect from unauthorised accessSent to a large number of recipientsConverting information or data into a codeUses computers to gain unauthorised access

cyber-bulling 2018-07-05

cyber-bulling crossword puzzle
Across
  1. ΤΟΥΣ ΚΩΔΙΚΟΥΣ ΜΟΥ ΤΟΥΣ ΜΟΙΡΑΖΟΜΑΙ ΜΟΝΟ ΜΕ ΤΟΥΣ ... ΜΟΥ
  2. ΤΟ...ΔΕΝ ΠΡΕΠΕΙ ΝΑ ΦΑΝΕΡΩΝΕΙ ΤΗΝ ΗΛΙΚΙΑ & ΤΟ ΟΝΟΜΑ ΣΟΥ
  3. ΚΑΠΟΙΟΣ ΣΕ ΑΠΕΙΛΕΙ ΔΙΑΔΙΚΤΥΑΚΑ.ΓΙΑ ΝΑ ΜΗΝ ΚΙΝΔΥΝΕΨΕΙΣ ΠΑΤΑ ΤΟ ΚΟΥΜΠΙ ΤΗΣ..
  4. ΜΕΣΩ ΤΟΥ ΔΙΑΔΙΚΤΥΟΥ ΔΕΝ ΜΠΟΡΩ ΝΑ ΑΝΑΠΤΥΞΩ ΔΕΣΜΟΥΣ ΠΡΑΓΜΑΤΙΚΗΣ ...
  5. ΟΤΑΝ ΚΑΠΟΙΟΣ ΔΕΝ ΜΠΟΡΕΙ ΝΑ ΞΕΚΟΛΛΗΣΕΙ ΑΠΟ ΤΟΝ Η/Υ ΛΕΜΕ ΟΤΙ ΈΧΕΙ
  6. ΑΝ ΜΙΛΑΩ ΜΕ ΞΕΝΟΥΣ ΣΤΟ ΔΙΑΔΙΚΤΥΟ ΔΕ ΔΙΝΩ ... ΠΛΗΡΟΦΟΡΙΕΣ
  7. ΟΤΑΝ ΜΟΥ ΚΑΝΟΥΝ ΔΙΑΔΙΚΤΥΑΚΟ ΕΚΦΟΒΙΣΜΟ ΠΡΕΠΕΙ ΝΑ ΖΗΤΗΣΩ...
Down
  1. ΠΟΤΕ ΔΕ ΣΤΕΛΝΩ ΜΣΩ ΔΙΑΔΙΚΤΥΟΥ ΣΕ ΑΛΛΟΥΣ
  2. ΠΡΕΠΕΙ ΝΑ ΠΡΟΣΕΧΟΥΜΕ ΠΟΙΕΣ ΕΠΙΣΚΕΠΤΟΜΑΣΤΕ
  3. ΛΕΓΕΤΑΙ ΤΟ BULLYNING ΣΤΑ ΕΛΛΗΝΙΚΑ
  4. ΜΠΟΡΕΙ ΝΑ ΑΠΟΚΤΗΣΕΙ ΠΡΟΒΑΣΗ ΣΤΟΝ ΥΠΟΛΟΓΙΣΤΗ ΜΑΣ ΚΑΙ ΝΑ ΜΑΣ ΚΛΕΨΕΙ ΠΡΟΣΩΠΙΚΑ ΑΡΧΕΙΑ

11 Clues: ΛΕΓΕΤΑΙ ΤΟ BULLYNING ΣΤΑ ΕΛΛΗΝΙΚΑΠΟΤΕ ΔΕ ΣΤΕΛΝΩ ΜΣΩ ΔΙΑΔΙΚΤΥΟΥ ΣΕ ΑΛΛΟΥΣΠΡΕΠΕΙ ΝΑ ΠΡΟΣΕΧΟΥΜΕ ΠΟΙΕΣ ΕΠΙΣΚΕΠΤΟΜΑΣΤΕΤΟΥΣ ΚΩΔΙΚΟΥΣ ΜΟΥ ΤΟΥΣ ΜΟΙΡΑΖΟΜΑΙ ΜΟΝΟ ΜΕ ΤΟΥΣ ... ΜΟΥΤΟ...ΔΕΝ ΠΡΕΠΕΙ ΝΑ ΦΑΝΕΡΩΝΕΙ ΤΗΝ ΗΛΙΚΙΑ & ΤΟ ΟΝΟΜΑ ΣΟΥΑΝ ΜΙΛΑΩ ΜΕ ΞΕΝΟΥΣ ΣΤΟ ΔΙΑΔΙΚΤΥΟ ΔΕ ΔΙΝΩ ... ΠΛΗΡΟΦΟΡΙΕΣΟΤΑΝ ΜΟΥ ΚΑΝΟΥΝ ΔΙΑΔΙΚΤΥΑΚΟ ΕΚΦΟΒΙΣΜΟ ΠΡΕΠΕΙ ΝΑ ΖΗΤΗΣΩ......

Cyber Safety 2024-10-06

Cyber Safety crossword puzzle
Across
  1. Having the ability to access the internet without limitations, such as time restrictions or content filters, often without parental supervision
  2. A mobile electronic device (like a smartphone, tablet, or wearable) that can connect to the internet and run applications
  3. The process by which platforms like social media apps monitor and regulate what is shared, often aiming to remove inappropriate or harmful material
  4. The ability to use digital technology, communicate online, and find, evaluate, and create information responsibly
  5. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
Down
  1. Personal profiles created on social media platforms (e.g., Instagram, Snapchat, TikTok), used for sharing content and connecting with others
  2. Responsible and respectful behavior when using technology and engaging in the online world, including adhering to ethical practices
  3. The trail of data one leaves behind when using the internet, including social media interactions, browsing history, and online purchases
  4. Options provided by online platforms that allow users to control who can see their information and how their data is used
  5. The technology behind platforms like TikTok and YouTube that suggest content based on a user’s preferences and past behavior, sometimes leading to exposure to harmful content
  6. Features offered by software or devices to help parents restrict or monitor their children’s online activities, ensuring safe usage

11 Clues: The ability to use digital technology, communicate online, and find, evaluate, and create information responsiblyOptions provided by online platforms that allow users to control who can see their information and how their data is used...

Cyber Safety 2024-06-13

Cyber Safety crossword puzzle
Across
  1. What is a method you can use to let people know that bullying is happening in games?
  2. When someone steals your identity online. (2 words)
  3. Mini graphics that you can use in place of phrases or letters.
  4. What is the best pet? dogs or cats?
  5. What could this be? b13Ndln@
Down
  1. What should you install right away when you get a new computer? (3 words)
  2. Who can see your profile picture?
  3. A method cyber criminals use to get you to give them personal information
  4. When someone says mean things to you online.
  5. A word for something that you can get sick with as well as your computer.
  6. Who should you tell if someone is bulling you online? (two words)

11 Clues: What could this be? b13Ndln@Who can see your profile picture?What is the best pet? dogs or cats?When someone says mean things to you online.When someone steals your identity online. (2 words)Mini graphics that you can use in place of phrases or letters.Who should you tell if someone is bulling you online? (two words)...

Scooby-Doo Crossword 2026-03-17

Scooby-Doo Crossword crossword puzzle
Across
  1. Marci's Nickname
  2. Daphne Blake Original Eye Color
  3. Scooby-Doo and the Cyber Chase x Baudrillard
  4. A Velma Love Interest
  5. First Name of Serial Killer from Zombie Island
  6. Reoccurring Wizard
  7. Velma's Sister
  8. Scooby-Doo's Youngest Sibling
  9. Not Daphne, Daisy, Dawn, or Delilah Blake
  10. First Ever Scooby-Doo Villain
Down
  1. Scooby's cousin from "Wedding Bell Boos" Episode
  2. Pterodactyl Ghost
  3. Shaggy Real Name
  4. Disguise Name of the Perfumed Ghoul from Mystery Incorporated
  5. Aloha! Scooby-Doo Villain
  6. Unreleased Scooby-Doo Movie
  7. Theme Park Sabotager; NOT Manticore
  8. Common Superhero Team-Up

18 Clues: Velma's SisterMarci's NicknameShaggy Real NamePterodactyl GhostReoccurring WizardA Velma Love InterestCommon Superhero Team-UpAloha! Scooby-Doo VillainUnreleased Scooby-Doo MovieScooby-Doo's Youngest SiblingFirst Ever Scooby-Doo VillainDaphne Blake Original Eye ColorTheme Park Sabotager; NOT ManticoreNot Daphne, Daisy, Dawn, or Delilah Blake...

Corrections Vocabulary List 2025-11-10

Corrections Vocabulary List crossword puzzle
Across
  1. and Unusual Punishment - Treatment prohibited by the Eighth Amendment that is considered inhumane, degrading, or disproportionate to the crime committed.
  2. Officer - A professional who monitors and supervises individuals released from prison on parole to help them successfully reintegrate into society.
  3. Corpus - A legal action filed by a single offender claiming unlawful imprisonment based on violations of constitutional rights.
  4. - A short-term, multipurpose holding facility that serves as the gateway to the criminal justice system, typically housing people awaiting trial or serving sentences of less than one year.
  5. Security - The lowest level of prison security with few physical barriers to escape and more programs available for offenders.
  6. - The act of confining someone in a jail or prison as punishment for a crime.
  7. - Programs and treatments designed to help offenders change their behavior and successfully reintegrate into society.
  8. State Penitentiary - A revolutionary prison built in 1829 that emphasized individual cells, reflection, and the "silent system" for prisoner rehabilitation.
  9. Street Jail - An early American prison (1790) that introduced humane reforms including adequate food, separation of different populations, and paid prisoner labor.
  10. Lease System - A post-Civil War practice in the South where prisoners were leased to private companies for labor, often under harsh conditions.
  11. - The tendency of former inmates to commit new crimes and return to prison after their release.
Down
  1. - The supervised early release of a prisoner before their full sentence is completed, based on good behavior and meeting certain requirements.
  2. 1983 - A federal civil rights law that allows class action lawsuits against prison systems for unfavorable conditions, seeking monetary damages.
  3. - An alternative to incarceration where offenders serve their sentence in the community under supervision and specific conditions.
  4. Confinement - The practice of isolating prisoners in closed cells for extended periods with minimal human contact or environmental stimulation.
  5. - The system of agencies and programs responsible for supervising individuals who have been arrested, convicted, or sentenced for criminal offenses.
  6. Segregation - A form of solitary confinement where inmates are kept in single cells for 23 hours a day, typically for disciplinary or safety reasons.
  7. - A long-term correctional institution designed to house individuals convicted of felonies and serving sentences longer than one year.
  8. Security - The highest level of prison security designed for dangerous or violent offenders, housed in fortress-like facilities with extensive security measures.
  9. - A correctional institution based on the concept that inmates could change their criminal behavior through reflection, penitence, and rehabilitation.
  10. Officer - A professional who supervises offenders serving probation sentences in the community and ensures compliance with court-ordered conditions.
  11. System - A prison model featuring congregate work during the day, individual cells at night, and strict enforcement of silence among inmates.
  12. Security - A moderate level of prison security featuring self-contained, walled facilities that offer vocational, educational, and rehabilitation programs.

23 Clues: - The act of confining someone in a jail or prison as punishment for a crime.- The tendency of former inmates to commit new crimes and return to prison after their release.- Programs and treatments designed to help offenders change their behavior and successfully reintegrate into society....

HZ 2023-04-04

HZ crossword puzzle
Across
  1. - Field of study that applies psychology to understanding financial decision-making
  2. - Return on an investment in excess of the risk-free rate of return
  3. - Certificates representing ownership of foreign stocks traded on US exchanges
  4. - Method used to sell securities to investors at a set price
  5. - Risk that changes in interest rates will affect the value of a security
  6. - Sale of a security that the seller does not own, with the hope of buying it back at a lower price in the future
  7. - Phenomenon where stock prices tend to rise in January
  8. - Financial instrument used to hedge against credit risk
  9. - Securities that do not pay periodic interest
  10. - Market where large institutional investors trade securities with each other
  11. - Type of account where funds can be withdrawn at any time
  12. - Interest rate used to discount future cash flows to their present value
  13. - Legal agreement outlining the terms and conditions of a bond issue
  14. - Sale of securities directly to a specific investor or group of investors
  15. - Equity securities with a preference for dividends and a claim on assets ahead of common stock
  16. - Interest rate on a security for immediate delivery
Down
  1. - Market with high trading volume and many participants, resulting in easy buying and selling
  2. - Formula used to value a stock based on expected dividends
  3. - Equity securities representing ownership in a corporation
  4. - High-risk, high-yield bonds issued by companies with poor credit ratings
  5. - Ratio of a stock's price to its earnings per share
  6. - Annual income generated by a security, expressed as a percentage of its current market price
  7. - Predicted interest rate on a security at some point in the future
  8. - Strategy of buying and selling securities to take advantage of price discrepancies
  9. - Method used to sell securities to investors at the lowest possible cost
  10. - Measure of a security's sensitivity to changes in interest rates, taking into account the shape of the price-yield curve
  11. - Formula used to value a stock based on expected growth and dividends
  12. - Theory that asset prices reflect all available information
  13. - Promise by a third party to assume responsibility for a debtor's payment obligation
  14. - Stock exchange focused on technology companies
  15. - First sale of a company's shares to the public
  16. - Interest rate paid on a bond's face value
  17. - Short-term securities backed by a pool of assets
  18. - Payment made to shareholders by a corporation out of its profits
  19. - Measure of a security's sensitivity to changes in interest rates
  20. - Security with a specified maturity date
  21. - Amount paid above the face value of a security
  22. - Separate Trading of Registered Interest and Principal of Securities
  23. - Phenomenon where the price of a security becomes detached from its underlying value

39 Clues: - Security with a specified maturity date- Interest rate paid on a bond's face value- Securities that do not pay periodic interest- Stock exchange focused on technology companies- First sale of a company's shares to the public- Amount paid above the face value of a security- Short-term securities backed by a pool of assets...

Cybersecurity terms 2025-02-10

Cybersecurity terms crossword puzzle
Across
  1. - Malicious software designed to damage a system.
  2. - A hidden method of bypassing security.
  3. - Gathering personal information using deceptive emails.
  4. - Coding used to protect information.
  5. Address - Identifies the connection between a computer and the network provide
  6. - Hardware that allows communication between a network and the Internet.
  7. - A network of infected devices controlled by malware.
Down
  1. - A security system that prevents intrusions.
  2. - A system update that covers security vulnerabilities.
  3. - A process that confirms a user’s identity.
  4. - Someone who tries to gain unauthorized access.
  5. - Distributed Denial of Service attack.
  6. - Software that blocks access until money is paid.
  7. - Virtual Private Network.
  8. - Malware designed to remain hidden.
  9. - A decoy system to attract attackers.
  10. - Taking advantage of a computer’s vulnerability.
  11. Breach - When information is stolen from a system.

18 Clues: - Virtual Private Network.- Malware designed to remain hidden.- Coding used to protect information.- A decoy system to attract attackers.- Distributed Denial of Service attack.- A hidden method of bypassing security.- A process that confirms a user’s identity.- A security system that prevents intrusions....

6.5 Social Security and Medicare 2022-02-01

6.5 Social Security and Medicare crossword puzzle
Across
  1. number of digits in your social security number
  2. can you change your social security number if you want?
  3. a ____ of each worker's salary is taken out of each paycheck
  4. nation's largest health insurance program.
  5. Social Security tax and Medicare tax fall under this category
Down
  1. social security provides ____ for people after they retire
  2. the money that you and your employer contribute to social security and Medicare is use to pay the ____ benefits to someone else
  3. this president started social security
  4. does the amount of social security tax you pay depends on your employer?

9 Clues: this president started social securitynation's largest health insurance program.number of digits in your social security numbercan you change your social security number if you want?social security provides ____ for people after they retirea ____ of each worker's salary is taken out of each paycheck...

Chapter 2: Securities 2025-01-10

Chapter 2: Securities crossword puzzle
Across
  1. The lowest amount of money someone is willing to sell their security for.
  2. Type of share that is held by investors.
  3. Someone who buys and sells stocks on behalf of a client.
  4. The amount a security is actually sold for.
  5. Market where stock is sold after it has already been issued and bought.
  6. Type of share that a company can sell.
  7. Largest organized Stock Exchange in the U.S.
  8. Market where stock is first sold.
  9. A type of exchange that is used to trade securities that are not listed on organized exchanges.
Down
  1. Location that states how many shares a company can sell.
  2. Resources like raw materials.
  3. Type of share that has already been sold in the market/
  4. The highest amount of money a customer is willing to pay for a security.
  5. When a company issues stock for the first time.
  6. The price a customer pays to actually buy a security.

15 Clues: Resources like raw materials.Market where stock is first sold.Type of share that a company can sell.Type of share that is held by investors.The amount a security is actually sold for.Largest organized Stock Exchange in the U.S.When a company issues stock for the first time.The price a customer pays to actually buy a security....

Chapter 4 - Information Security Governance Principles 2026-01-12

Chapter 4 - Information Security Governance Principles crossword puzzle
Across
  1. Authentication method that uses fingerprints or facial features
  2. Method of giving different access rights to different users
  3. Authentication method that requires more than one verification factor
  4. Security method that limits access to files or folders
  5. Secret combination used to verify a user’s identity
  6. A set of step-by-step actions to ensure security rules are followed
  7. Process of assigning value or sensitivity levels to information
Down
  1. Unauthorized increase of access rights by a user
  2. Process of tracking user activities for security purposes
  3. A formal document that defines rules and expectations for information security
  4. Unique name used by a user to access a system
  5. Technique used to protect data by converting it into unreadable form
  6. Collection of users with similar access rights
  7. Small physical device used to generate secure login codes
  8. Login system that allows access to multiple services using one account

15 Clues: Unique name used by a user to access a systemCollection of users with similar access rightsUnauthorized increase of access rights by a userSecret combination used to verify a user’s identitySecurity method that limits access to files or foldersProcess of tracking user activities for security purposes...

Types Of Threats 2019-01-09

Types Of Threats crossword puzzle
Across
  1. Unauthorized access, modification, or use of an electronic device or some element of a computer system
  2. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  3. Advertising-supported Software
  4. A type of Malware that locates and saves data from users without them knowing about it
  5. Malware that allows a cyber-security attacker to take control of an infected computer
  6. When someone deceives by pretending to be someone else in order to get personal data
  7. attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Down
  1. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  2. An error in a program that prevents the program from running as expected
  3. Software that encrypts programs and data until a ransom is paid to remove it
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  5. Criminals make a promise of goods in return for details, such as offering a free music download
  6. A destructive computer program that bores its way through a computer's files or through a computer's network
  7. Collection of captured bot computers
  8. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer

15 Clues: Advertising-supported SoftwareCollection of captured bot computersAn error in a program that prevents the program from running as expectedSoftware that encrypts programs and data until a ransom is paid to remove itWhen someone deceives by pretending to be someone else in order to get personal data...

Information Security General Awareness Challenge 2014-08-25

Information Security General Awareness Challenge crossword puzzle
Across
  1. Information security matters because it helps CIBC ensure that information and information assets do not fall into the wrong hands, become lost, or get ________ in any way
  2. Information Security General Awareness helps protect the __________ and public image of CIBC
  3. ________ protection – be careful about data you accept and from whom / don’t open any unexpected email attachments
  4. Report lost or stolen _____ cards
  5. Information security is about ensuring that info is _________ only to those authorized to have access to such information, protecting the accuracy and completeness of information and the systems use to process it
  6. All employees are accountable for the actions they take when using or _________ sensitive info on CIBC computer systems
  7. _______ customer info
Down
  1. Always lock _______
  2. Information Security ensures that CIBC info and computer systems are available to _______ users.
  3. Information security is about protecting CIBC’s information assets from potential loss, destruction, damage, misuse, theft, or abuse of _________ assets
  4. Keep your ________ confidential
  5. all software on CIBC computing resources must be tested, approved and installed by CIBC tech team / unauthorized __________ is not permitted
  6. Safeguard CIBC ___________, blackberry when in transit
  7. Securely dispose of _______ – grey bin and SHRED-it consoles
  8. ______ desk

15 Clues: ______ deskAlways lock ______________ customer infoKeep your ________ confidentialReport lost or stolen _____ cardsSafeguard CIBC ___________, blackberry when in transitSecurely dispose of _______ – grey bin and SHRED-it consolesInformation Security General Awareness helps protect the __________ and public image of CIBC...

The Life of Kaming & Ben 03.24.17 2017-10-12

The Life of Kaming & Ben 03.24.17 crossword puzzle
Across
  1. Couple's favorite underwater pastime
  2. Fragrant harbour
  3. Ben likes to buy these at the bar
  4. Ben's jersey number
  5. Ben's college
  6. Best dressed feline
  7. Kaming's school of nerds
  8. Ben's handle
  9. Their first date
  10. When Ben's not from NJ, he's from here
  11. Groom had this pierced
Down
  1. This anniversary year
  2. Ithaca is ____
  3. Kaming was a band geek and played this
  4. Wedding #
  5. Kaming's college degree
  6. Kaming's favorite food
  7. The version where you play with your hands, not your feet
  8. Ben proposed on this
  9. Homegirl's home state
  10. A little posh corps
  11. Best dressed canine

22 Clues: Wedding #Ben's handleBen's collegeIthaca is ____Fragrant harbourTheir first dateBen's jersey numberBest dressed felineA little posh corpsBest dressed canineBen proposed on thisThis anniversary yearHomegirl's home stateKaming's favorite foodGroom had this piercedKaming's college degreeKaming's school of nerdsBen likes to buy these at the bar...

QBE 2020-04-01

QBE crossword puzzle
Across
  1. Head of BA
  2. System used for policy premium transactions
  3. Principle of Insurance
  4. QBE CEO
  5. Diverse Hashtag
  6. London based Insurer
  7. P&C Product
  8. #together
  9. Stafford Team
  10. E-Trade Platform
  11. Insured vehicles must be logged on
  12. Offshore Office
  13. QBE Headquarters
Down
  1. Fleet Product
  2. Minibus Product
  3. Employee Assistance
  4. A vehicle which is off the road must be declared
  5. Data Protection
  6. Complaints are logged on
  7. QBE’s E-Trade Platform
  8. Large broker for Minibus
  9. Minibus has been trading for how many years
  10. Annual Staff Survey
  11. Partner Charity
  12. Large broker for Minibus
  13. Newest SME Product

26 Clues: QBE CEO#togetherHead of BAP&C ProductFleet ProductStafford TeamMinibus ProductData ProtectionDiverse HashtagPartner CharityOffshore OfficeE-Trade PlatformQBE HeadquartersNewest SME ProductEmployee AssistanceAnnual Staff SurveyLondon based InsurerPrinciple of InsuranceQBE’s E-Trade PlatformComplaints are logged onLarge broker for Minibus...

Model Diplomacy 2023-04-26

Model Diplomacy crossword puzzle
Across
  1. the president’s chief foreign affairs advisor, the country’s chief diplomat, and the head of the Department of State, which conducts the United States’ relationships with foreign countries and international organizations.
  2. one of the president’s chief economic advisors and head of the department of the treasury, which carries out policy on issues related to the U.S. and global economies and financial systems. The department is home to the U.S. Mint and Internal Revenue Service, among other agencies.
  3. the head of the Department of Energy, which executes U.S. policy on energy, environmental, and nuclear issues and oversees seventeen national scientific research laboratories.
  4. a country’s attitudes and actions in the international arena. Foreign policy includes two principal elements: goals or interests as the country defines them, such as peace with one’s neighbors, and the means pursued to advance these interests, such as diplomatic negotiations, trade agreements, and military alliances. A country carries out its foreign policy through its dealings with other countries, international organizations such as the United Nations (UN), and nonstate actors such as corporations and advocacy groups.
  5. undertaken between two entities, generally countries.
  6. the group comprising the vice president of the United States and the heads of all fifteen federal executive departments, such as the secretaries of state, defense, commerce, labor, and education. Other officials may also have cabinet rank, depending on the administration.
  7. the so-called honest broker of the national security policy process and the president’s principal advisor on national security issues. The NSA manages the National Security Council (NSC) staff, chairs the principals committee, and coordinates and manages policymaking with the goal of ensuring effective policy development and implementation.
  8. the principal defense policy advisor to the president and head of the Department of Defense, which oversees the formulation and execution of defense policy and manages U.S. military forces.
  9. the ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system.
  10. head of the Department of Justice and chief lawyer of the U.S. government. Among other duties, they offer advice on the legal aspects of proposed policies to the president and other department heads.
  11. a type of presidential directive, or official order from the president, on matters related to national security. Called different names by different administrations, these documents may initiate a review of current policy, reorganize the structure of the national security policy apparatus, or lay out new strategies.
  12. a decision issued by the president that carries the full force and effect of law. An executive order usually instructs government departments and agencies to implement or modify particular policies or procedures.
  13. the president’s principal advisor for intelligence-related matters and the head of the intelligence community, a network of seventeen agencies and organizations, such as the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and Defense Intelligence Agency (DIA), that collect and analyze information to assist policymaking.
Down
  1. an act of war wherein a foreign military cuts off access to a specific location, usually a port, to impede deliveries of supplies. In 1962, President John F. Kennedy ordered a blockade of Cuba—calling it a “quarantine” to avoid the implication of declaring war—in response to Soviet missile activity on the island.
  2. the highest-ranking member of the U.S. armed forces. The CJCS does not exercise command authority over U.S. troops, but instead works with the leaders of the U.S. military services to fulfill their function as the top military advisor to the president and other senior officials.
  3. defensive and offensive actions taken by a government or nonstate actor in the realm of information network systems and digital infrastructure. Specific actions include planting computer viruses, mounting denial-of-service attacks to disrupt internet and network activity, and conducting electronic surveillance.
  4. an official partnership between two or more parties based on cooperation in pursuit of a common goal, generally involving security or defense.
  5. undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations.
  6. the head of the Department of Homeland Security since its creation after the attacks of September 11, 2001. This department works to protect U.S. security by implementing federal policy concerning terrorism prevention, border security, immigration, disaster response, and cybersecurity.
  7. the second-highest-ranking official of the U.S. government and first in line to assume the presidency if the president dies, resigns, or becomes unable to serve. Though given only one responsibility in the Constitution—to serve as president of the U.S. Senate, with the power to break ties—the vice presidency has become a visible part of the modern White House. Today’s vice presidents undertake a variety of functions, from serving as an all-purpose presidential advisor to carrying out diplomatic trips abroad. The personality of the individual who occupies this post and their relationship with the president define the scope of the role.
  8. a law signed by President Harry S. Truman in 1947 to reorganize the agencies and processes related to intelligence, foreign policy, and the military. Among its reforms, the act established the National Security Council (NSC) and the Central Intelligence Agency (CIA).
  9. the president’s national security and foreign policy personnel. The NSC staff receives direction from the president via the national security advisor, provides expertise on issues and regions, and collaborates frequently with employees from other government departments and agencies to carry out the interagency policymaking process.
  10. a tool of statecraft, frequently involving economic measures such as asset freezes and trade restrictions, used to exact a certain behavior or outcome from another party. The U.S. and European Union sanctions against Russian companies and individuals that aim to encourage Russia to end its interference in Ukraine are an example.
  11. the intermediate-level setting, below the principals committee, for debating issues in the National Security Council (NSC) system. Chaired by the deputy national security advisor, it comprises the second- and third-ranking leaders of the departments and agencies represented on the National Security Council. It manages the interagency process up and down, answering to the principals committee and assigning and reviewing the work of interagency policy committees.
  12. individuals or groups that do not belong to or act on behalf of a state. This may refer to nongovernmental organizations such as Amnesty International, media outlets such as the New York Times, or terrorist groups such as al-Qaeda.
  13. involving two or more agencies. The National Security Council (NSC), for example, is an interagency forum, not a forum internal to any one agency.
  14. the lowest-level setting for debating issues in the National Security Council (NSC) system and the home of much of the day-to-day work needed to formulate and implement U.S. foreign policy. Often chaired by a senior director on the NSC staff, IPCs develop, coordinate, and carry out policy options in distinct regional and functional areas.
  15. a tax on goods arriving from a foreign country, generally used as a tool of trade and foreign policy to penalize adversaries or favor allies or domestic producers.
  16. undertaken by only one entity, generally a country.
  17. an interagency body that serves as the forum for the president to discuss and take action on the most critical national security issues facing the United States. Its membership has varied since its creation in 1947, and now includes the president, vice president, national security advisor, secretaries of state and defense, and a variety of other senior officials.

30 Clues: undertaken by only one entity, generally a country.undertaken between two entities, generally countries.the ambassador-level official who advances U.S. foreign policy interests in the bodies and forums of the UN system.undertaken among three or more entities, usually countries. The term frequently describes organizations such as the United Nations....

CYBERSECURITY 2021-01-15

CYBERSECURITY crossword puzzle
Across
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. a defense technology designed to keep the malicious attacks out.
  3. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
  6. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  7. all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  4. internet version of a home address for your computer.
  5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  6. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.

17 Clues: internet version of a home address for your computer.a defense technology designed to keep the malicious attacks out.A group of computers, printers and devices that are interconnected and governed as a whole.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

cyber bulling! 2023-05-22

cyber bulling! crossword puzzle
Across
  1. - pretending to be some else
  2. Bulling online.
  3. stalking online.
Down
  1. - The may include trolling, bullying, hate speech and doxing.
  2. - you don't let someone join you

5 Clues: Bulling online.stalking online.- pretending to be some else- you don't let someone join you- The may include trolling, bullying, hate speech and doxing.

Cybersecurity Crossword 2024-04-23

Cybersecurity Crossword crossword puzzle
Across
  1. The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
  2. Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
  3. A person who uses computers to gain unauthorized access to data.
  4. Any malicious computer program which misleads users of its true intent.
  5. Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
  6. A collection of software tools that enable unauthorized access to a computer or areas of its software.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. A piece of data that is used in network communications to identify a session.
  9. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  10. A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  11. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  12. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  13. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  14. A type of surveillance technology used to record keystrokes made by a user.
  15. The art of manipulating people so they give up confidential information.
  16. Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  17. Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
  18. A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
  1. Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
  2. Malicious software designed to harm or exploit any programmable device or network.
  3. The study of analyzing information systems in order to study the hidden aspects of the systems.
  4. Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  5. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  6. Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
  7. The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. An algorithm for performing encryption or decryption.
  9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  10. Exfiltration The unauthorized transfer of data from a computer or server.
  11. Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
  12. Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
  13. Response The methodology an organization uses to respond to and manage a cyberattack.
  14. Operations Center A centralized unit that deals with security issues on an organizational and technical level.
  15. Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  16. Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
  17. The method by which information is converted into secret code that hides the information's true meaning.

35 Clues: An algorithm for performing encryption or decryption.A person who uses computers to gain unauthorized access to data.Any malicious computer program which misleads users of its true intent.The art of manipulating people so they give up confidential information.Exfiltration The unauthorized transfer of data from a computer or server....

cyber bullying 2015-11-10

cyber bullying crossword puzzle
Across
  1. to pevent
  2. on the internet
  3. making someone feel uncomfortable
  4. a website
  5. taking gods name in vain
  6. someone who gains access to information on an organisation computer
  7. on internet
Down
  1. bullying more than one person
  2. for everyone to use. socialise
  3. gaining access to info on an organisation computer
  4. being rude

11 Clues: to peventa websitebeing rudeon interneton the internettaking gods name in vainbullying more than one personfor everyone to use. socialisemaking someone feel uncomfortablegaining access to info on an organisation computersomeone who gains access to information on an organisation computer

CompTIA Cloud+ Ch. 10 2025-01-06

CompTIA Cloud+ Ch. 10 crossword puzzle
Across
  1. Keeping cloud workloads separated for security.
  2. Giving users only the access they need.
  3. Unauthorized access to a system.
  4. Dividing networks to improve security.
  5. Security extensions for DNS.
Down
  1. Duplicate data stored for recovery.
  2. Recording events in a system.
  3. Web Application Firewall.
  4. Watching for suspicious activity.
  5. Rights granted to a user or role.
  6. Permissions to use resources.
  7. Isolated environment for testing.

12 Clues: Web Application Firewall.Security extensions for DNS.Recording events in a system.Permissions to use resources.Unauthorized access to a system.Watching for suspicious activity.Rights granted to a user or role.Isolated environment for testing.Duplicate data stored for recovery.Dividing networks to improve security....

CYBERSECURITY 2021-01-05

CYBERSECURITY crossword puzzle
Across
  1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. a defense technology designed to keep the malicious attacks out.
  3. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic
  6. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
  7. all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  8. Short for “penetration testing,” this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  4. internet version of a home address for your computer.
  5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  6. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. a tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.

17 Clues: internet version of a home address for your computer.a defense technology designed to keep the malicious attacks out.A group of computers, printers and devices that are interconnected and governed as a whole.The process of encoding data to prevent theft by ensuring the data can only be accessed with a key....

Sean Internet Crossword 2015-04-30

Sean Internet Crossword crossword puzzle
Across
  1. Blocks access from hackers or unwanted access
  2. A hack that infects files
  3. A website about a specific topic
  4. to renew
  5. Law granting no use of Something without permission
  6. Bully a bully online
  7. Something you use for internet
Down
  1. To cite Someone
  2. Someone who gets on computer remotely without permission
  3. Full link name
  4. Engine Google
  5. Global Network

12 Clues: to renewEngine GoogleFull link nameGlobal NetworkTo cite SomeoneBully a bully onlineA hack that infects filesSomething you use for internetA website about a specific topicBlocks access from hackers or unwanted accessLaw granting no use of Something without permissionSomeone who gets on computer remotely without permission

Security Renewal Course 2013-11-14

Security Renewal Course crossword puzzle
Across
  1. Roll call
  2. The highest security level
  3. Coffee making course
  4. Possibility that something may happen to cause injury
  5. Code 718
  6. A person who has committed a crime
  7. Punishment for breaking a rule
  8. Someone who escapes from custody
  9. Classified and restricted access
  10. Becoming lenient
  11. A place that houses offenders
Down
  1. Reoffending
  2. Illegal items or substances
  3. Board of Studies
  4. Having responsibility or care for an individual
  5. Coercing someone to do something they don't want to do
  6. Not sentenced
  7. Something that requires immediate action
  8. TAFE roll book record
  9. Institute Juvenile Justice Liaison Officer
  10. Taking contraband into a juvenile or correctional centre
  11. Inmates are to return to their cells
  12. Being kept from harm
  13. A person who is sentenced of a crime

24 Clues: Code 718Roll callReoffendingNot sentencedBoard of StudiesBecoming lenientCoffee making courseBeing kept from harmTAFE roll book recordThe highest security levelIllegal items or substancesA place that houses offendersPunishment for breaking a ruleSomeone who escapes from custodyClassified and restricted accessA person who has committed a crime...

Biometric Security - Crossword 2017-11-18

Biometric Security - Crossword crossword puzzle
Across
  1. In texture discrimination we divide intensities to ________ ranges.
  2. Gabor filters are the products of a Gaussian filter with _______
  3. Second-order gray-level statistics is described by ________matrix.
  4. One of the essential biometric characteristics.
  5. In the gaussian filter representation P denotes the phase of ________ carrier.
  6. ______ points are used to calculate the region of interest in Pre-Processing of Palm print verification system.
  7. ↓is a _________ operator in Gaussian pyramid.
  8. One of the disadvantages of UNI-MODAL Biometric system.
  9. In a texture the _________ distribution stays the same.
  10. One of the essential levels in fusion.
  11. Matching module uses this to distinguish between genuine and imposter range.
Down
  1. The Hough transform can be described as a transformation of a point in the x,y-plane to the _______ space.
  2. Gabor filters satisfy ________ principle.
  3. A ________ graph is used in ear localization.
  4. The Gaussian function (1-D) of the Gabor filter will not affect the edge information in the ________direction.
  5. DOG (Difference of Gaussian) uses the approximation of _____ of Gaussian.
  6. The number of leaf nodes in a second level graphical representation of Haar Wavelet decomposition.
  7. The preprocessing module first transforms the true color into _____ image.
  8. ROC curve plots _ _ _ against _ _ _.
  9. In texture edge extraction using set of 1-D Gabor filters, the bank of 1-D Gabor filters gives ______ image.
  10. In _______ filters the output of one filter is independent of others.
  11. FAR and FRR values are calculated based upon this matrix.

22 Clues: ROC curve plots _ _ _ against _ _ _.One of the essential levels in fusion.Gabor filters satisfy ________ principle.A ________ graph is used in ear localization.↓is a _________ operator in Gaussian pyramid.One of the essential biometric characteristics.One of the disadvantages of UNI-MODAL Biometric system....

Security crossword challenge 2018-09-01

Security crossword challenge crossword puzzle
Across
  1. TULLI
  2. VARTIJAKORTTI
  3. SUMUTE
  4. TASKULAMPPU
  5. VARUSTEVYÖ
  6. TYÖASU
  7. HUOMIOIDA/TARKKAILLA
  8. HANSKAT
  9. PARTIOIDA
Down
  1. SOPIVA
  2. KIINTEISTÖ/OMAISUUS
  3. NÄKYVÄ
  4. HENKKARIT
  5. LIIVI
  6. HÄLYTYSJÄRJESTELMÄ
  7. KÄSIRAUDAT
  8. HÄLYTYSAJONEUVO
  9. TAPAHTUMA/VÄLIKOHTAUS
  10. PATUKKA
  11. LAILLINEN

20 Clues: TULLILIIVISOPIVANÄKYVÄSUMUTETYÖASUPATUKKAHANSKATHENKKARITLAILLINENPARTIOIDAKÄSIRAUDATVARUSTEVYÖTASKULAMPPUVARTIJAKORTTIHÄLYTYSAJONEUVOHÄLYTYSJÄRJESTELMÄKIINTEISTÖ/OMAISUUSHUOMIOIDA/TARKKAILLATAPAHTUMA/VÄLIKOHTAUS

Network Security Fundamentals 2022-04-25

Network Security Fundamentals crossword puzzle
Across
  1. This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
  2. A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
  3. This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
  4. A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
  5. Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
  6. The degree of weakness in a network or a device.
  7. An infected host.
  8. Short for "malicious software".
  9. A network of zombies.
  10. A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
  11. Similar to a DoS attack, but it originates from multiple, coordinated sources.
  12. A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
  13. This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
  14. This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
  1. This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
  2. A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
  3. A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
  4. Prevents or allows access by specific application types based on port numbers.
  5. A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
  6. This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
  7. Prevents or allows access based on IP or MAC addresses.
  8. An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
  9. Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
  10. This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
  11. Also called a host. It is an individual computer system or devices that acts as a network client.
  12. A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
  13. A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
  14. Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
  15. Prevents or allows access to websites based on specific URLs or keywords.
  16. Enables a network administrator to apply specific policies for hosts connected to that network.

30 Clues: An infected host.A network of zombies.Short for "malicious software".The degree of weakness in a network or a device.Prevents or allows access based on IP or MAC addresses.Prevents or allows access to websites based on specific URLs or keywords.Prevents or allows access by specific application types based on port numbers....

Computer Security Crossword 2022-05-17

Computer Security Crossword crossword puzzle
Across
  1. A PC with a lid
  2. Begins with A but you don't wear it
  3. Tricking people into sharing their personal data
  4. Another word for computer programs
  5. How to keep your software secure
  6. Leaking data
  7. You connect to this when playing Minecraft
  8. Something about infrastructure
Down
  1. Begins with M but you don't wear it
  2. Usually the first step in virus protection
  3. Rules for employees to follow
  4. A horse
  5. Hopefully not pirated
  6. Like DOS but worse
  7. Is it hot in here?
  8. The opposite of secure
  9. What we need to protect
  10. The internet is made up of these
  11. Begins with S but you don't wear it
  12. What's that in your pocket?
  13. The bad guys

21 Clues: A horseLeaking dataThe bad guysA PC with a lidLike DOS but worseIs it hot in here?Hopefully not piratedThe opposite of secureWhat we need to protectWhat's that in your pocket?Rules for employees to followSomething about infrastructureThe internet is made up of theseHow to keep your software secureAnother word for computer programs...

Safety & Security Crossword 2024-05-15

Safety & Security Crossword crossword puzzle
Across
  1. REGULATORY AUTHORITY FOR AVIATION SECURITY IN INDIA IS KNOWN AS ____
  2. Confidential Reports are mailed to ______@airvistara.com
  3. A condition, object, activity or event with the potential of causing injuries to personnel, damage to equipment or structures, loss of material, or reduction of the ability to perform a prescribed function is a ______
  4. A culture in which personnel are not punished for actions, omissions or decisions taken by them which are to commensurate with their experience and training, but where gross negligence, willful violations and destructive acts are not tolerated is known as ____
  5. A management tool for the management of safety by an organisation is
  6. Safety policies & objectives, Safety Risk Management, Safety Assurance and Safety Promotion are all ____ of SMS
  7. A Hazard Report is generally closed in __ days
  8. FOR LEGITIMATE REASON OF ACCESS TO AIRPORT / AIRCARFT AN EMPLOYEE NEEDS TO DISPLAY _____ALWAYS.
  9. RDX IS AN EXAMPLE OF ______
  10. WHICH WEAPON HAS EXEMPTION TO BE CARRIED ON BOARD BY SIKH PASSENGERS IN DOMESTIC FLIGHT ONLY?
  11. ANNEX 17 CONTAINS STANDARD AND RECOMMENDED PRACTICES FOR ____
Down
  1. Regulatory aviation authority of India.
  2. An in house publication released quarterly by the Safety division is __
  3. An application wherein we can raise a Hazard Report.
  4. PHONETIC ALPHABET FOR LETTER L?
  5. An ICAO model of human factors that clarifies the scope of aviation human factors and assist in understanding the human factor relationships between aviation system resources/environment and the human component in aviation
  6. A PASSENGER WITH VALID LICENSE CAN CARRY ________ NUMBER OF WEAPONS AND FIFTY AMMUNITIONS/BULLET IN HOLD BAGGAGE.
  7. ___ fuel contributes in reducing emissions needed by aviation to reach net zero CO2 emissions by 2050.
  8. HEAD OF AIRLINES SECURITY.
  9. A Hazard Report is a ______ hazard identification strategy.

20 Clues: HEAD OF AIRLINES SECURITY.RDX IS AN EXAMPLE OF ______PHONETIC ALPHABET FOR LETTER L?Regulatory aviation authority of India.A Hazard Report is generally closed in __ daysAn application wherein we can raise a Hazard Report.Confidential Reports are mailed to ______@airvistara.comA Hazard Report is a ______ hazard identification strategy....

CO1 Aviation Security 2024-06-12

CO1 Aviation Security crossword puzzle
Across
  1. Abbreviation of the Civil Aviation Authority
  2. The 3 Digit IATA code for Gold Coast Airport
  3. The Area where planes park and is usually in line with the terminal
  4. The 3 Digit IATA Code for Dubai Airport
  5. Abbreviation of The Ministry of Primary Industries
  6. What Word is created using these Phonetic Alphabet words Tango, Romeo,Alpha, Victor,Echo,Lima
  7. Abbreviation for Passenger
  8. Abbreviation of Aviation Security
  9. The 3 Digit IATA Code for Houston Airport
  10. The 2 Digit flight code for Singapore Airlines
  11. The 3 Digit IATA Code for Hong Kong Airport
Down
  1. An Airline
  2. The area you must pass through before going through security
  3. The 2 Digit Flight Code for Air New Zealand
  4. Exiting or leaving the aircraft
  5. the type of permit you must get to leave certain countries
  6. What is the national carrier of Australia
  7. What word is created using these phonetic alphabet words Victor,India,Sierra,Alpha
  8. Abbreviation for air traffic control
  9. Abbreviation for Liquid, Aerosols and Gels

20 Clues: An AirlineAbbreviation for PassengerExiting or leaving the aircraftAbbreviation of Aviation SecurityAbbreviation for air traffic controlThe 3 Digit IATA Code for Dubai AirportWhat is the national carrier of AustraliaThe 3 Digit IATA Code for Houston AirportAbbreviation for Liquid, Aerosols and GelsThe 2 Digit Flight Code for Air New Zealand...

4. Computer security 2024-06-18

4. Computer security crossword puzzle
Across
  1. The process of making data in a computer system unintelligible.
  2. Any software which has been written with the intent to cause disruption, damage or inconvenience.
  3. A form of identification and authentication which relies on comparing scans of e.g. your face, fingerprints, eye retina etc with a stored set of information."
  4. Any system which periodically checks and downloads / updates software to make sure it always has the latest bug fixes and enhancements.
  5. The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
  6. that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  7. A program that appears harmless, but is, in fact, malicious."
  8. A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
  9. A group of software policies and written procedures which together help to enhance and maintain the security of data held on a computer network.
  10. Sending emails purporting to be from reputable companies to induce people to reveal personal information.
  11. A cyber attack intended to redirect a website's traffic to another, fake site.
  12. The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Down
  1. Testing designed to check the security and vulnerabilities of a system.
  2. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
  3. The process by which a user logging into a system can be checked and verified before being given access.
  4. Allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.
  5. A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites."
  6. that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
  7. Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
  8. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data."
  9. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
  10. Observing a person's private information over their shoulder eg cashpoint machine PIN numbers.
  11. Any storage media which can easily be removed from a computer thus allowing the transport of data away e.g. Optical Disk, flash / USB pen etc.
  12. A secret word or phrase that must be used to gain access to a computer / program / interface / system.

24 Clues: A program that appears harmless, but is, in fact, malicious."The process of making data in a computer system unintelligible.Testing designed to check the security and vulnerabilities of a system.A cyber attack intended to redirect a website's traffic to another, fake site....

Safety/Security 2025 2025-11-13

Safety/Security 2025 crossword puzzle
Across
  1. A violent confrontation
  2. Our work location
  3. law enforcement officer
  4. Insurance Company
  5. SCOE's intercom system
  6. You do this to exercise
  7. Security Coordinator
  8. Round container with emergency supplies
  9. Chair with wheels
  10. Training, practicing exercises
  11. A cylinder with a wick, never leave unattended
Down
  1. Don't connect more than ___extension cords
  2. The action of emptying a building
  3. Underwriters Laboratories
  4. Use this to fight Bob the intruder
  5. Knowledge of surroundings
  6. Who to call when injured
  7. safety specialist
  8. A state of restricted movement and talking
  9. Use these when using stairs
  10. SCOE's guard
  11. Device that converts signals into sound waves
  12. Kids game, keep out of sight
  13. Trespasser
  14. Risk Manager

25 Clues: TrespasserSCOE's guardRisk ManagerOur work locationInsurance Companysafety specialistChair with wheelsSecurity CoordinatorSCOE's intercom systemA violent confrontationlaw enforcement officerYou do this to exerciseWho to call when injuredUnderwriters LaboratoriesKnowledge of surroundingsUse these when using stairsKids game, keep out of sight...

Security and Safety 2025-11-10

Security and Safety crossword puzzle
Across
  1. Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
  2. Malicious computer code that reproduces itself on the same computer. Almost all viruses “infect” by inserting themselves into a computer file. When the file is opened, the virus is activated.
  3. Malware that hides inside another program, often one downloaded from the web.
  4. A type of malware that prevents a user’s device from properly and fully functioning until a fee is paid.
  5. A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
  6. Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
  7. Attackers who are strongly motivated by principles or beliefs.
  8. The process of sifting through big data to find the important questions that will yield fruitful results.
  9. Bullying that takes place on technology devices using online social media platforms, public online forums, gaming sites, text messaging, or email
  10. The security threat to a company that comes from its own employees, contractors, and business partners.
  11. A technology used to verify a user’s identity and key that has been “signed” by a trusted third party
  12. A program that helps you create and store multiple strong passwords in single user “vault” file that is protected by one strong master password.
  13. Involves using someone’s personal information to commit financial fraud
Down
  1. An individual who attacks a nation’s computer networks to cause disruption and panic among citizens.
  2. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie
  3. A false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department.
  4. An individual who wants to attack computers but lacks the knowledge of computers and networks needed to do so.
  5. A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
  6. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
  7. Longer combination of letters, numbers, symbols
  8. The process of “scrambling” information so it cannot be read unless the user possesses the “key” to unlock it (decryption)

21 Clues: Longer combination of letters, numbers, symbolsAttackers who are strongly motivated by principles or beliefs.Involves using someone’s personal information to commit financial fraudMalware that hides inside another program, often one downloaded from the web....

Industrial Security Concepts 2025-09-23

Industrial Security Concepts crossword puzzle
Across
  1. sound and good judgment to arrive at wise and timely decisions
  2. information is discovered and develops
  3. always in a condition to render effective service even under the most strenuous conditions
  4. being watchful in spotting violator, a person, a vehicle or an incident
  5. ability to deal with others successfully without offending;
  6. ability to take hold of oneself regardless of a provoking situation.
  7. a metallic container used for the safekeeping of document or small items in an office or installation.
  8. distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person.
  9. uprightness in character, soundness of moral principle, freedom from moral delinquencies.
  10. the ability or tendency to act or to decide with prudence, the habit of wise judgment
Down
  1. inability to withstand the effects of a hostile environment-measure of how open an establishment to intrusion, attack or injury.
  2. opinion or estimation in which one is generally held. It is what a person is reported to be whereas character is what a person is.
  3. faith in oneself and his abilities;
  4. faithful allegiance to the Philippine government and its duly constitutional authorities
  5. is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). probability of an event to happen that will lead to loss.
  6. A chance of being injured or harmed;
  7. a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside
  8. An indication of impending danger or harm;
  9. heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, document and negotiable instruments. Vaults are bigger than safe but smaller than a file room.
  10. the sum of traits that have been impresses by nature, education and habit upon the individual

20 Clues: faith in oneself and his abilities;A chance of being injured or harmed;information is discovered and developsAn indication of impending danger or harm;ability to deal with others successfully without offending;sound and good judgment to arrive at wise and timely decisionsability to take hold of oneself regardless of a provoking situation....

Aviation Security & Safety 2025-07-20

Aviation Security & Safety crossword puzzle
Across
  1. The heart of hospitality in aviation, ensuring passengers needs are met with care and efficiency
  2. A type of flight that takes you beyond your home country's borders
  3. A situation requiring immediate action, often triggering special airport procedures
  4. Planes need this long, clear path to lift off or touch down safely
  5. A protective shelter where aircraft rest, get maintained, and prepare for their next flight
  6. The invisible line separating nations, often requiring passports and security checks to cross
  7. Where travelers declared goods are checked before entering the country
  8. Any potential risk to affect safety, including unauthorized access over security borders
  9. Where passports are checked before travelers' cross international borders
  10. Suitcases and bags you take with you when travelling
  11. Controlling who can enter restricted airport zones to protect unauthorized personal from reaching restricted areas
Down
  1. The hub where passengers arrive, depart, and connect across the states
  2. The process of inspecting passengers, luggage and cargo to detect prohibited or dangerous items
  3. Type of flight that keeps you within your home country's borders
  4. The key to sharing information clearly, whether in aviation or daily life
  5. Someone who travels by plane, train or car but doesn't operate the vehicle
  6. A place where passengers check in, board flights, and retrieve luggage
  7. The secured part of the airport you reach after clearing security, where boarding begins
  8. The public area of an airport, accessible without passing through security
  9. The top priority in aviation, guiding procedures to protect passengers and crew

20 Clues: Suitcases and bags you take with you when travellingType of flight that keeps you within your home country's bordersA type of flight that takes you beyond your home country's bordersPlanes need this long, clear path to lift off or touch down safelyThe hub where passengers arrive, depart, and connect across the states...

SAFETY AND SECURITY 2025-07-10

SAFETY AND SECURITY crossword puzzle
Across
  1. What part of the airport coordinates safety on runway?
  2. What officer checks for prohibited foods or plants?
  3. Where can family and friends wait to pick you up?
  4. What process scans your baggage for dangerous items?
  5. What must be locked for taxi, take off and landing?
  6. What’s required to board an international flight?
  7. What security tool detects metal on passengers?
  8. What vehicle moves aircraft backwards from the gate?
  9. What area allows passengers to drop off bags?
Down
  1. Where do you go through security screening?
  2. What connects the terminal to the aircraft for boarding?
  3. What rule limits liquids in carry on?
  4. What must be declared at customs?
  5. What area do only passengers with boarding passes enter?
  6. Who gives passengers safety instructions on board?
  7. What are you asked to remove at the checkpoint?
  8. What is checked at customs?
  9. What must passengers show at boarding?
  10. What clearance is required before entering secure zones?
  11. What must be turned off when take off and landing?

20 Clues: What is checked at customs?What must be declared at customs?What rule limits liquids in carry on?What must passengers show at boarding?Where do you go through security screening?What area allows passengers to drop off bags?What are you asked to remove at the checkpoint?What security tool detects metal on passengers?...

InfoSec Puzzles - Crossword #01 2014-07-17

InfoSec Puzzles - Crossword #01 crossword puzzle
Across
  1. No Compromise. Just ___________
  2. Any event that affects Confidentiality, Integrity and Availability of Information
  3. All the employees should complete the mandatory _________
  4. Information Security is Everyone's _____________
  5. ________ any security incidents immediately
Down
  1. The most important asset of the organisation to safeguard first from any disaster
  2. You should logon to ___________ to report any security incidents
  3. The principle of InfoSec that is applicable for taking regular back up of Information
  4. The principle of InfoSec to prevent information from unauthorized access
  5. The principle of InfoSec to protect information from unauthorized modification
  6. An important business asset to secure always
  7. The International Standard for Information Security Management System

12 Clues: No Compromise. Just ___________________ any security incidents immediatelyAn important business asset to secure alwaysInformation Security is Everyone's _____________All the employees should complete the mandatory _________You should logon to ___________ to report any security incidents...

Cybersecurity 2023-01-25

Cybersecurity crossword puzzle
Across
  1. changing ip addresses
  2. malware that collects personal data
  3. applications that direct computers
  4. program that allows remote access
  5. "UI redress attack"
  6. network of computers for attacks
  7. short for malicious software
  8. an attack that wants ransom
  9. means to attack a system
  10. connected items that represent one
Down
  1. protects data by scrambling it
  2. protects your location
  3. using media manipulation to scam
  4. cyber attack that is disguised
  5. filters network traffic
  6. used to detect viruses
  7. being bullied using the internet
  8. where users store data
  9. using your own device
  10. malware that reproduces itself

20 Clues: "UI redress attack"changing ip addressesusing your own deviceprotects your locationused to detect viruseswhere users store datafilters network trafficmeans to attack a systeman attack that wants ransomshort for malicious softwareprotects data by scrambling itcyber attack that is disguisedmalware that reproduces itself...

The Happy Class of 6B! The 6B crossword that makes you truly know your friends! 2022-11-14

The Happy Class of 6B! The 6B crossword that makes you truly know your friends! crossword puzzle
Across
  1. The one who is on her way to success.
  2. Marvel fan
  3. His name ends with a hero's name.
  4. He plays black and white on a green field.
  5. He's our habibi
  6. The New Member of 6B
  7. Our French amie
  8. Our future lawyer
  9. The one who speaks with love
  10. The deep voice actor
Down
  1. She can paint Pennywise on a cloth
  2. Always happy
  3. Tennis master
  4. The tallest, yet the youngest.
  5. Cooking Queen
  6. His last name rhymes with his first
  7. The Cheetah of our class
  8. The Class Artist.
  9. Gymnastics pro
  10. Cyber Star

20 Clues: Marvel fanCyber StarAlways happyTennis masterCooking QueenGymnastics proHe's our habibiOur French amieThe Class Artist.Our future lawyerThe New Member of 6BThe deep voice actorThe Cheetah of our classThe one who speaks with loveThe tallest, yet the youngest.His name ends with a hero's name.She can paint Pennywise on a cloth...

3 2024-06-12

3 crossword puzzle
Across
  1. Security that gives the right to buy a stock at a specific price by a certain date
  2. Firm that facilitates buying and selling of securities
  3. Visual representation of a stock's price history
  4. (Initial Public Offering)** See above (already used)
  5. RATIO** Measure of a company's financial leverage
  6. ANALYSIS** Study of price charts and indicators to predict future price movements
  7. Number of shares traded in a specific period
  8. (Earnings Per Share)** Company's profit divided by the number of outstanding shares
  9. ANALYSIS** Evaluation of a company's financial health and future prospects
Down
  1. Combining multiple shares of a company's stock into fewer shares
  2. Offer to sell a security at a specific price
  3. Division of a company's stock into a larger number of shares
  4. Difference between the buy and sell price of a security
  5. Offer to buy a security at a specific price
  6. CALL** Broker's demand for additional funds to maintain a margin position
  7. Completion of a buy or sell order

16 Clues: Completion of a buy or sell orderOffer to buy a security at a specific priceOffer to sell a security at a specific priceNumber of shares traded in a specific periodVisual representation of a stock's price historyRATIO** Measure of a company's financial leverage(Initial Public Offering)** See above (already used)...

Nate k. 2021-03-04

Nate k. crossword puzzle
Across
  1. When there is intent hurt or harm
  2. Writing mean messages on some elses social media
  3. what type of cyber bullying consist of, Online arguments using electronic messages with aggressive or abusive language
  4. An attack physically,emotionally, socially
  5. Some thing that happen more than once in a period of time
  6. what type of cyberbullying consist of, Disclosing someone else’s secrets or embarrassing information online without their consent
  7. to seek to harm, intimidate
  8. what type of cyberbullying consist of, pretending to be someone else and sending or posting material
Down
  1. what type of cyberbullying consist of, Spreading gossip, lies or rumours about someone to damage their reputation or friendships
  2. intentionally excluding someone from an online group is what type of cyberbullying
  3. what type of cyberbullying consist of, talking someone into revealing secrets or embarrassing information, then publishing it online
  4. What type of bullying is this an example of punching, kicking,spiting
  5. what type of cyberbullying consist of, repeatedly sending abusive, insulting, or unwanted messages
  6. Name calling, threatening is what type of bullying
  7. repeated, intense harassment and denigration that includes threats or creates significant fear what type of cyberbullying is this

15 Clues: to seek to harm, intimidateWhen there is intent hurt or harmAn attack physically,emotionally, sociallyWriting mean messages on some elses social mediaName calling, threatening is what type of bullyingSome thing that happen more than once in a period of timeWhat type of bullying is this an example of punching, kicking,spiting...

CWiCS Cybersecurity Crossword Event 2021-02-25

CWiCS Cybersecurity Crossword Event crossword puzzle
Across
  1. A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  2. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  5. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  6. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  7. Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
  8. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  9. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  10. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  11. Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
  1. -- based cyber attacks rose 630% between January and April 2020
  2. Trojan functioning as a downloader or dropper of other malwares
  3. Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  4. __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  5. Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  7. Hackers are now using this Google service to bypass web security and steal credit cards
  8. Hackers hit Nebraska Medical Center with --------------- and stole patient data
  9. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  10. Malicious code was sneaked into updates to this SolarWinds software
  11. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  12. Since -------, the US FBI reported a 300% increase in reported cybercrimes
  13. LodaRAT Windows Malware Now Also Targets ______ Devices
  14. Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher

25 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwares-- based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

Privacy and Security 2022-06-04

Privacy and Security crossword puzzle
Across
  1. 1996; made up of the privacy, security and breach notification rules
  2. securing digital data with a password or key
  3. acquiring PHI in a manner that compromises the security or privacy of PHI
  4. keeping patient records from unwarranted view
  5. automated processes used to protect data and control access
  6. electronic protected health information
Down
  1. includes risk analysis, risk management and information security activities
  2. fine paid for breaking the law
  3. used to obtain sensitive information, primarily via email
  4. measures that protect electronic systems, equipment and data they hold
  5. control user access to safeguard ePHI from erroneous leaks
  6. covered entity

12 Clues: covered entityfine paid for breaking the lawelectronic protected health informationsecuring digital data with a password or keykeeping patient records from unwarranted viewused to obtain sensitive information, primarily via emailcontrol user access to safeguard ePHI from erroneous leaksautomated processes used to protect data and control access...

Health crossword 2023-10-06

Health crossword crossword puzzle
Across
  1. pressures
  2. mentality
  3. mindset
Down
  1. stander
  2. mindset
  3. bullying
  4. footprint

7 Clues: standermindsetmindsetbullyingpressuresmentalityfootprint

Mortal Kombat Kharacters 2023-08-17

Mortal Kombat Kharacters crossword puzzle
Across
  1. Guest Kharacter who hunts species across the galaxy
  2. Artificial construct of Time
  3. Guest Kharacter from "the Boys"
  4. Fallen Eldergod with an Amulet
  5. Martial Arts master of drunken boxing
  6. New Princess of Outworld created from her sister
  7. Hanzo Hasashi's Apprentice
  8. New timeline Cyber Lin Kuei member
  9. Amalgamation of Souls created by Quan Chi
  10. Skinned flesh monster from the fleshpits
  11. Shirai Ryu Wraith
  12. Shaolin Archer
  13. SubZero's apprentice
  14. Ninja Mine
  15. Member of the New Black Dragon
  16. Oni demon partnered with Drahmin
  17. Netherrealm demon using a Kriss to cleanse her soul
  18. Former Outworld King turned into an Oni
  19. Guest Kharacter, exclusive to Playstation
  20. The Osh-Tekk leader of Outworld
  21. Centaur who hates the Shokan
  22. Symbiotic Warriors from Outworld
  23. Demon under control of Quan Chi, who falls in love with SubZero
  24. Bodyguard of Princess Kitana
  25. Female Shokan Warrior who guards the Edenian Queen
  26. Guest Kharacter played by Arnold Schwartzenegger
  27. Mercenary for hire, originally from Earthrealm now lives in Outworld
  28. Blind Swordsman
  29. Earthrealm's Champion
  30. Elemental created to monitor the realms
  31. Palette Swap ninja whi uses the moves of other male ninjas
  32. Leader of the Black Dragon
  33. Edenian Demi-God who has become an outcast
  34. The Dragon King
  35. Lieutenant (later commander) of the Special Forces
  36. Shokan Prince
  37. Warrior created through Blood Magic
  38. Lin Kuei warrior created by a cult
  39. Matoka Warrior with green tomahawks
  40. Tarkatan Warrior
  41. Princess of Edenia and Outworld
Down
  1. High-ranking Red Dragon Member
  2. Guest Kharacter with a cape
  3. Orderrealm Mercenary
  4. Red Lin Kuei Warrior who heads the cyber initiative
  5. Guest Kharacter with a Chainsaw
  6. Queen of Edenia
  7. Special Forces member with gauntlets
  8. Shokan killed by Sonya Blade
  9. God of Thunder
  10. Kytinn warrior loyal to Shinnok and Kronika
  11. The Guardsman of the Orderrealm
  12. Motion Capture actor
  13. Cyber Lin Kuei Warrior drafted against his will
  14. Guest Kharacter from "the Boys"
  15. Brown Ninja who joined the Black Dragon
  16. Leader of Outworld
  17. The new identity of the undead spirit of the original Sub-Zero
  18. Naknadan Warrior
  19. General who serves both Shinnok and Shao Kahn
  20. God of Wind
  21. Elder Goddess of Life and Virtue
  22. Guest Kharacter from Suicide Squad
  23. Lin Kuei Assassin, later grandmaster
  24. Former Black Dragon member, helped to reform the New Black Dragon
  25. Guest Kharacter played by Sylvester Stallone
  26. Kombat Kid that leads a division of the special forces
  27. The Cleric of Chaos
  28. Saurian servant of Shang Tsung
  29. Argus's good son
  30. NYPD Police Officer
  31. Sorcerer from the Netherrealm
  32. Outworld Sorcerer
  33. Guest Kharacter from the Dreamrealm
  34. Guest Kharacter with a machete
  35. Special Forces Major
  36. Leader of the resistence in the Orderrealm
  37. Time Titan, Mother of two Elder Gods
  38. Guest Kharacter who is a police officer from the future
  39. Shaolin Monk on a path to enlightenment
  40. Cyber Lin Kuei Amalgamation of three other warriors
  41. Member of the Red Dragon
  42. Member of the Black Dragon
  43. He collected the Kamidogu
  44. Guest Kharacter seeking a place to repopulate
  45. Outworlder who defects to aid Earthrealm
  46. Last female Zaterran
  47. The Edenian Traitor
  48. Descendant of a the first mortal kombat champion
  49. Member of the New Black Dragon
  50. Vampire from the realm of Vaeternus
  51. Argus' s evil son

92 Clues: Ninja MineGod of WindShokan PrinceGod of ThunderShaolin ArcherQueen of EdeniaBlind SwordsmanThe Dragon KingNaknadan WarriorArgus's good sonTarkatan WarriorShirai Ryu WraithOutworld SorcererArgus' s evil sonLeader of OutworldThe Cleric of ChaosNYPD Police OfficerThe Edenian TraitorOrderrealm MercenaryMotion Capture actorSubZero's apprentice...

Black Friday Mania!!! 2021-11-26

Black Friday Mania!!! crossword puzzle
Across
  1. they usually have long lines
  2. devices for kids and adults
  3. Kids favorites for Christmas
  4. the reason for the day
  5. goods sold at reduced prices
Down
  1. celebrated the day before
  2. everyone gets these for Christmas
  3. Major retailer
  4. Monday, celebrated the day after
  5. Most wonderful time of the year
  6. gift option
  7. a device or piece of equipment

12 Clues: gift optionMajor retailerthe reason for the daycelebrated the day beforedevices for kids and adultsthey usually have long linesKids favorites for Christmasgoods sold at reduced pricesa device or piece of equipmentMost wonderful time of the yearMonday, celebrated the day aftereveryone gets these for Christmas

Information Security Crossword Puzzle 2018-07-16

Information Security Crossword Puzzle crossword puzzle
Across
  1. Type of information that requires protection
  2. Threats to Information Security
  3. An unauthorised programme, which replicates itself and spreads onto various data storage media and/or across a network
  4. One of the three basic components of information security
  5. One way that information security ensures trust and privacy
Down
  1. Considered one of the threats to your information security policy
  2. An essential company asset
  3. A goal of information security
  4. One of the high Level information security principles

9 Clues: An essential company assetA goal of information securityThreats to Information SecurityType of information that requires protectionOne of the high Level information security principlesOne of the three basic components of information securityOne way that information security ensures trust and privacy...

Bully By Allira 2023-11-28

Bully  By Allira crossword puzzle
Across
  1. She was the _____ of bullying.
  2. person who is repetitively rude
  3. The girl was about to ____ someone.
  4. Respect with dis
Down
  1. She continued to ______ her.
  2. Someone who stands and watches
  3. Another word for mocking.
  4. She was really ______.
  5. online
  6. another word for upstander

10 Clues: onlineRespect with disShe was really ______.Another word for mocking.another word for upstanderShe continued to ______ her.Someone who stands and watchesShe was the _____ of bullying.person who is repetitively rudeThe girl was about to ____ someone.

Black friday 2024-11-28

Black friday crossword puzzle
Across
  1. SWEET TREATS
  2. POPULAR ONLINE STORE
  3. PLAYED IN STORES ON BLACK FRIDAY
  4. A BIG SHOPPING SESSION
Down
  1. PLURAL OF A BARGAIN
  2. NIKE OR ADIDAS ARE EXAMPLES
  3. HOLDS YOUR CASH AND CARDS
  4. MONDAY'S ONLINE SHOPPING DAY
  5. WORN ON YOUR WRIST
  6. THINGS CHILDREN PLAY WITH

10 Clues: SWEET TREATSWORN ON YOUR WRISTPLURAL OF A BARGAINPOPULAR ONLINE STOREA BIG SHOPPING SESSIONHOLDS YOUR CASH AND CARDSTHINGS CHILDREN PLAY WITHNIKE OR ADIDAS ARE EXAMPLESMONDAY'S ONLINE SHOPPING DAYPLAYED IN STORES ON BLACK FRIDAY

IT Stuff 2024-05-30

IT Stuff crossword puzzle
Across
  1. Your ID on the computer
  2. Extra login security
  3. What you type on
  4. People who program
  5. Can wear black or white hats
  6. What computers run
  7. Secret word or phrase
  8. What we work with
Down
  1. What you look at
  2. Bad software, demands money
  3. Connects computers
  4. For safety
  5. A computer or program that serves users
  6. Brain of the computer
  7. The plural of DATUM
  8. Pointer controller
  9. Wireless
  10. The singular of DATA
  11. Where you can store data

19 Clues: WirelessFor safetyWhat you look atWhat you type onWhat we work withConnects computersPeople who programWhat computers runPointer controllerThe plural of DATUMExtra login securityThe singular of DATABrain of the computerSecret word or phraseYour ID on the computerWhere you can store dataBad software, demands moneyCan wear black or white hats...

Cybersecurity crossword 2025-06-07

Cybersecurity crossword crossword puzzle
Across
  1. Overwhelms servers with traffic
  2. Scrambling data for security
  3. Fraudulent attempt to steal data
  4. Stealthy malware with deep access
  5. Secures internet connections
  6. Popular cryptocurrency
  7. Malware that demands payment
  8. Malware disguised as legitimate
  9. Breaches systems illegally
Down
  1. Remote data storage
  2. Tracks keystrokes secretly
  3. Network of infected devices
  4. Uses fingerprints or face ID
  5. Artificial intelligence
  6. Software update fixing flaws
  7. Software that spies on users
  8. Harmful software like viruses
  9. Network security barrier
  10. Secret code for access

19 Clues: Remote data storageSecret code for accessPopular cryptocurrencyArtificial intelligenceNetwork security barrierTracks keystrokes secretlyBreaches systems illegallyNetwork of infected devicesUses fingerprints or face IDScrambling data for securitySoftware update fixing flawsSoftware that spies on usersSecures internet connections...

GENERASI TANGGUH ANTI BULLY 2024-09-09

GENERASI TANGGUH ANTI BULLY crossword puzzle
Across
  1. PERUNDUNGAN DENGAN MEMUKUL DAN MENENDANG
  2. DAMPAK DIANCAM
  3. PERUNDUNGAN DENGAN MENGUCILKAN ORANG LAIN
  4. JIKA TERJADI PERUNDUNGAN
  5. BERANI BERKATA ... PADA PELAKU PERUNDUNGAN
  6. SALAH SATU CARA MENGAJAK ORANG LAIN MENCEGAH PERUNDUNGAN
Down
  1. MEMBANGUN ... ANTARA ANAK DAN ORANGTUA
  2. SALAH SATU AKIBAT PERUNDUNGAN
  3. PERUNDUNGAN MELALUI MEDIA SOSIAL
  4. PERILAKU TIDAK MENYENANGKAN
  5. SALAH SATU CARA MENGHADAPI PERUNDUNGAN
  6. TIM PENCEGAHAN DAN PENANGANAN TINDAKAN KEKERASAN
  7. DAMPAK DIEJEK
  8. PERUNDUNGAN DENGAN MEMANGGIL JULUKAN TERTENTU

14 Clues: DAMPAK DIEJEKDAMPAK DIANCAMJIKA TERJADI PERUNDUNGANPERILAKU TIDAK MENYENANGKANSALAH SATU AKIBAT PERUNDUNGANPERUNDUNGAN MELALUI MEDIA SOSIALMEMBANGUN ... ANTARA ANAK DAN ORANGTUASALAH SATU CARA MENGHADAPI PERUNDUNGANPERUNDUNGAN DENGAN MEMUKUL DAN MENENDANGPERUNDUNGAN DENGAN MENGUCILKAN ORANG LAINBERANI BERKATA ... PADA PELAKU PERUNDUNGAN...

cyber safety 2024-07-25

cyber safety crossword puzzle
Across
  1. good guy
  2. encourages us to be not gay
  3. weird
  4. upstander
  5. people lucien is not weird
  6. garbeage
Down
  1. calls to make you do something
  2. bystander
  3. the bully
  4. people screamed
  5. toxic players

11 Clues: weirdgood guygarbeagebystanderthe bullyupstandertoxic playerspeople screamedpeople lucien is not weirdencourages us to be not gaycalls to make you do something

Cyber ethics 2025-06-12

Cyber ethics crossword puzzle
Across
  1. Combining of word phishing and voice
  2. Combining of word net and etiquette
  3. footprints. Is an impression or information about a person that exists on the internet
  4. hacking. Hacking which is done for the good cause
  5. theft. Illegally stoles someone's identity and use it for bad practices
  6. Refers to unwanted bulk emails
Down
  1. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. piracy. When software is copied and distributed illegally
  3. Illigal activity on internet
  4. Effects and damage the computer device
  5. Refers to an illegal intrusion into a computer system

11 Clues: Illigal activity on internetRefers to unwanted bulk emailsCombining of word net and etiquetteCombining of word phishing and voiceEffects and damage the computer devicehacking. Hacking which is done for the good causeRefers to an illegal intrusion into a computer systempiracy. When software is copied and distributed illegally...

Cyber Ethics 2025-06-12

Cyber Ethics crossword puzzle
Across
  1. all nodes are connected via central device
  2. criminal activities that include the use of computers
  3. network within city
  4. wireless fidelity
  5. sender transform data into unreadable code
Down
  1. illegal intrusion in a computer via internet
  2. fully connected network
  3. A program that disrupts the normal functioning of computer
  4. responsible behavior in social media
  5. legal right for original creator for his work
  6. wireless network

11 Clues: wireless networkwireless fidelitynetwork within cityfully connected networkresponsible behavior in social mediaall nodes are connected via central devicesender transform data into unreadable codeillegal intrusion in a computer via internetlegal right for original creator for his workcriminal activities that include the use of computers...

Cyber Sprinters 2026-02-13

Cyber Sprinters crossword puzzle
Across
  1. The program you use to access the Internet (such as Chrome, Safari, Firefox).
  2. Nasty software that can have a bad impact on your device or computer.
  3. A location on the internet where you can save your data.
  4. Unwanted emails or messages that usually try to sell you something.
  5. A message that tries to trick you into doing something that could cause you harm.
  6. You need to create one of these to access services on the internet.
  7. Getting into someone else's computer or device without their permission.
Down
  1. A way to stop hackers getting into your accounts, even if they know your password.
  2. A sequence of characters used to stop criminals from accessing your accounts.
  3. Information about you held on computers that you wouldn't want others to get hold of.
  4. A copy of the information held on a device which is stored somewhere else.

11 Clues: A location on the internet where you can save your data.Unwanted emails or messages that usually try to sell you something.You need to create one of these to access services on the internet.Nasty software that can have a bad impact on your device or computer.Getting into someone else's computer or device without their permission....

Computer Systems Crossword 2014-09-10

Computer Systems Crossword crossword puzzle
Across
  1. popular social networking site
  2. proof for a point/argument
  3. patent so that it is inaccessible
  4. trustworthy, dependable
  5. being secure, having a firewall
  6. security precaution applied to a computer
  7. communicating with various other people on line
Down
  1. disguarding to be used as something else
  2. the act of accessing another's computer from an external source
  3. not using a computer in the right way
  4. having security, being private
  5. computer system with a dedicated function within a larger mechanical or electrical system
  6. protecting data
  7. able to access, not closed

14 Clues: protecting datatrustworthy, dependableproof for a point/argumentable to access, not closedpopular social networking sitehaving security, being privatebeing secure, having a firewallpatent so that it is inaccessiblenot using a computer in the right waydisguarding to be used as something elsesecurity precaution applied to a computer...

compliance 2016-06-09

compliance crossword puzzle
Across
  1. business continuity abbreviation
  2. where you dispose of confidential documents
  3. 2nd information security principle
  4. way to communicate directly with a member of management
  5. 3rd information security principle
  6. proper disposal of consumer information act
Down
  1. 1st information security principle
  2. provides education,tools, and resources to reduce risk from injuries
  3. you plug your cell phone into your SF equipment
  4. either purposeful or willingly let unauthorized person pass through
  5. ataccidentally or inadvertently let unauthorized person pass through
  6. information retention abbreviation
  7. must display on your person above the waist
  8. days to file an expense report

14 Clues: days to file an expense reportbusiness continuity abbreviation1st information security principle2nd information security principle3rd information security principleinformation retention abbreviationwhere you dispose of confidential documentsmust display on your person above the waistproper disposal of consumer information act...

December 2024 APCP Crossword 2024-12-02

December 2024 APCP Crossword crossword puzzle
Across
  1. drone delivery company
  2. repeat meal
  3. abbreviation for another live action remake
  4. self-driving car company
  5. (blank) Monday
  6. Monty (blank)
  7. ones and zeros
  8. this team will pay you to shovel snow
  9. also known as a custom block in Scratch
Down
  1. from Broadway to the screen
  2. game where you jump and avoid obstacles
  3. programming language
  4. you watched movies on this before DVDs
  5. you watched movies on this before streaming
  6. least populous US state
  7. Paul vs (blank)
  8. is this the future?
  9. a whole number

18 Clues: repeat mealMonty (blank)(blank) Mondayones and zerosa whole numberPaul vs (blank)is this the future?programming languagedrone delivery companyleast populous US stateself-driving car companyfrom Broadway to the screenthis team will pay you to shovel snowyou watched movies on this before DVDsgame where you jump and avoid obstacles...

cyber bulling! 2023-05-22

cyber bulling! crossword puzzle
Across
  1. - pretending to be some else
  2. Bulling online.
  3. stalking online.
Down
  1. - The may include trolling, bullying, hate speech and doxing.
  2. - you don't let someone join you

5 Clues: Bulling online.stalking online.- pretending to be some else- you don't let someone join you- The may include trolling, bullying, hate speech and doxing.

Security Guard Crossword 2021-11-11

Security Guard Crossword crossword puzzle
Across
  1. accomplished primarily by non-verbal communication
  2. when using a fire extinguisher you should sweep at what part of the fire
  3. shape of sign that should be displayed showing the type of hazardous material
  4. lowest level of the Use of Force Continuum
  5. security services contractor can provide security patrol services to a business on a
  6. crime that carries the most punishment
Down
  1. person that is responsible for the day to day operations for a security company
  2. a pocket card is the property of
  3. the Private Security Bureau has the authority to license who as a peace officer
  4. a security officer must always have this on his person while on duty
  5. what crime is committed when a person breaks into a car shop and steals a set of tires
  6. should be checked before your shift starts

12 Clues: a pocket card is the property ofcrime that carries the most punishmentlowest level of the Use of Force Continuumshould be checked before your shift startsaccomplished primarily by non-verbal communicationa security officer must always have this on his person while on dutywhen using a fire extinguisher you should sweep at what part of the fire...

FMI1 2020-08-18

FMI1 crossword puzzle
Across
  1. – number of shares that are available for public to trade
  2. – B in CBLO
  3. – Settlement T+2
  4. - Governor
  5. – Exchanging one for another
  6. – Repurchase Option
  7. – 1969 Bank….
Down
  1. – Call and Put
  2. – Same income taxed twice
  3. – Person providing both bid and ask quotes for same security so as to enable trading in that security
  4. – 1992 Big Bull
  5. – Govt security typically of less than 1 year duration

12 Clues: - Governor– B in CBLO– 1969 Bank….– Call and Put– 1992 Big Bull– Settlement T+2– Repurchase Option– Same income taxed twice– Exchanging one for another– Govt security typically of less than 1 year duration– number of shares that are available for public to trade...

ACE: Cyber-Crime 2013-03-03

ACE: Cyber-Crime crossword puzzle
Across
  1. / coins or paper notes
  2. / dishonest or illegal behaviour, especially of people in authority
  3. / the act of harassing someone online by sending or posting mean messages, usually anonymously
  4. / the act of making illegal copies of video tapes, computer programs, books, etc.
  5. / a person who tries to get secret information about a country, organization, or person
  6. / the practice of sending mail, especially advertising material, through the Internet to a large number of people, who have not asked for it
  7. / instructions that are hidden within a computer program and are designed to cause faults or destroy data
  8. / the crime of deceiving somebody in order to get money or goods illegally
  9. / a machine which holds cash
  10. / not allowed by the law
Down
  1. / the rules of correct or polite behaviour among people using the Internet
  2. / books, videos, etc. that describe or show naked people and sexual acts in order to make people feel sexually excited, especially in a way that many other people find offensive
  3. / criminal activity or a crime that involves the Internet, a computer system, or computer technology
  4. / a system of trying to meet and talk to other people who may be useful to ou in your work
  5. / a person who spends a lot of time using computers for a hobby, especiallt to look at data without permission
  6. / the activities involved in protecting a country, building or person against attack, danger, etc.
  7. / a clever and dishonest plan for making money

17 Clues: / coins or paper notes/ not allowed by the law/ a machine which holds cash/ a clever and dishonest plan for making money/ dishonest or illegal behaviour, especially of people in authority/ the rules of correct or polite behaviour among people using the Internet/ the crime of deceiving somebody in order to get money or goods illegally...