cyber security Crossword Puzzles
Chapter 5 - Application Security 2025-05-21
Across
- An iterative and flexible approach to software development and delivery.
- A condition where a program fails to release unused memory, reducing performance.
- A Windows feature that limits application privileges to prevent unauthorized changes.
- A condition where a calculation exceeds the max value of an integer type.
- A security feature that randomly arranges memory addresses to prevent exploits.
- Analyzing source code to find and fix security vulnerabilities.
- A vulnerability that allows attackers to run arbitrary code on a remote system.
- An attack technique that accesses restricted files by manipulating file paths.
- The process of planning, creating, testing, and deploying secure software.
- Best practices for writing software that avoids introducing security flaws.
- Testing software with full access to internal logic and source code.
Down
- An error that occurs when a program tries to access memory through a null pointer.
- A linear and sequential software development methodology.
- Identifying and evaluating potential security risks in an application.
- Testing software without knowing its internal code or logic.
- Checking and filtering user input to prevent malicious data processing.
- A method of handling software errors without crashing the system.
- An isolated environment used to run and test code safely.
- A type of Flash-based browser cookie stored locally on the user's device.
- A technique that tests software by inputting large amounts of random data.
20 Clues: A linear and sequential software development methodology. • An isolated environment used to run and test code safely. • Testing software without knowing its internal code or logic. • Analyzing source code to find and fix security vulnerabilities. • A method of handling software errors without crashing the system. • ...
Module 6 Vocabulary 2023-09-19
Across
- A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
- A device that monitors, logs, detects, and reacts to stop or prevent security breaches
- a type of IDS that uses behavior for decision making
- hardware firewall that protects the entire network
- combines several layers of security and networking services into one solution
- A buffer network that sits between the private network and an untrusted network
Down
- the main benefit of an ACL
- a type of IDS that uses patterns for decision making
- the type of computer that may be found inside a screened subnet
- A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules
- software firewall that protects a single device
- Firewalls use filtering rules, which are sometimes called access control lists, to identify allowed and blocked traffic.
12 Clues: the main benefit of an ACL • software firewall that protects a single device • hardware firewall that protects the entire network • a type of IDS that uses patterns for decision making • a type of IDS that uses behavior for decision making • the type of computer that may be found inside a screened subnet • ...
Test 2021-11-12
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company
- any malicious computer program which is used to hack into a computer by misleading users of its true intent
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- a local or restricted communications network, especially a private network created using World Wide Web software
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are small files that Web sites put on your computer hard disk drive when you first visit
- algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- a standalone malware computer program that replicates itself in order to spread to other computers
10 Clues: are small files that Web sites put on your computer hard disk drive when you first visit • a standalone malware computer program that replicates itself in order to spread to other computers • any malicious computer program which is used to hack into a computer by misleading users of its true intent • ...
Risk 2020-05-12
Across
- is the risk that failed business decisions, or lack thereof, may pose to a company.
- applies when you own foreign investments
- The risk of a loss in your purchasing power because the value of your investments does not keep up with
- risk as a subset of operational risk in 2003. This conception is based on a business perspective, recognizing that there are threats entailed in the business operating environment.
- is the risk of losses in positions arising from movements in market prices.
- cyber risk is any risk related to information technology.
- is a financial risk that for a certain period of time a given financial asset, security or commodity cannot be traded quickly enough in the market without impacting the market price.
- is the potential loss to financial capital, social capital and/or market share resulting from damage to a firm's reputation.
Down
- is any of various types of risk associated with financing
- is "the risk of a change in value caused by the fact that actual losses, incurred for inadequate or failed internal processes, people and systems, or from external events, differ from the expected losses
- the term covering an organization's approach across Compliance these three practices: Governance, risk management, and compliance.
- is the risk of loss resulting from using insufficiently accurate models to make decisions.
- applies to an investment in shares.
- is the risk of default on a debt that may arise from a borrower failing to make required payments.
- applies to debt investments such as bonds
- may be shortened because of an unforeseen event, for example, the loss of your job.
16 Clues: applies to an investment in shares. • applies when you own foreign investments • applies to debt investments such as bonds • is any of various types of risk associated with financing • cyber risk is any risk related to information technology. • is the risk of losses in positions arising from movements in market prices. • ...
Networking 2024-09-25
11 Clues: secure browsing • this is not a LAN • Malicious software • layout or structure • this is our community • you do not cook in this • better known as the handshake • Barrier against cyber threats • Unauthorized digital infiltration • can could not catch a fish with this • Unique identifier for a device on a network
BTW Cross word 2025-11-20
Across
- One of BTW Main Colors
- Booker T. Washington High Schools Mascot?
- Engines that power machines
- AI Software
Down
- Applying math & science to solve practical problems
- Another BTW Main Color
- Prefix meaning “digital” or “online”
- The name of Booker T. Robot
- The act of introducing something new
- UBEST ______ Competition
- Turning ideas into computer commands
11 Clues: AI Software • One of BTW Main Colors • Another BTW Main Color • UBEST ______ Competition • The name of Booker T. Robot • Engines that power machines • Prefix meaning “digital” or “online” • The act of introducing something new • Turning ideas into computer commands • Booker T. Washington High Schools Mascot? • Applying math & science to solve practical problems
Don't Travel Without 2022-01-21
Across
- your paper ticket
- the people who work in the plane with passengers
- when security checks your person
- what you pass through at security
- the official document that lets you travel
- the area you go to pick up your luggage
Down
- the person flying the airplane
- what your luggage goes through at security
- the luggage you personally take on a plane
- telling the airline you're here for your flight
- the area you pass through when traveling in a new country
- moving from one flight to another
- a square piece of luggage
- the cart used to carry luggage
14 Clues: your paper ticket • a square piece of luggage • the person flying the airplane • the cart used to carry luggage • when security checks your person • moving from one flight to another • what you pass through at security • the area you go to pick up your luggage • what your luggage goes through at security • the luggage you personally take on a plane • ...
People at school 2025-04-13
Airport 2017-09-11
Across
- How many Cargo terminals are located at Auckland International Airport
- Part of NZ custom - Ministry of Agriculture and Forestry
- What is the Airport name for the IATA code NSN?
- Number of baggage claim belts at Auckland International Airport
- City code of Rarotonga
- The area where security and screenings are taken place
- How many passenger terminals are located at Auckland International Airport
- Process of producing your boarding pass
- "The area before departing passengers pass through security and are also accessible by both travellers and non-travellers"
- This facility is only offered to departing and arriving international travellers
Down
- Free and used to carry your luggage throughout the terminals
- "For passesngers travelling business or first class on their airline or for passengers that have joined the airlines VIP club"
- "_________ is a company located in the check-in area which enables travellers to have their luggage sealed in recyclable, transparent polythene to protect it from scratches, moisture or any form of tampering"
- City code is SIN
- "Location with either paved, dirt, grass or gravel runways for aircraft to take off and/or land"
- What is the code for Customer Service Officer?
- "Area where you go through security and hand over your passport and departure card for inspection"
- IATA code for Kapiti Coast
- Once passengers are through immigration and _________ they are now airside
- The country of the busiest Airport
20 Clues: City code is SIN • City code of Rarotonga • IATA code for Kapiti Coast • The country of the busiest Airport • Process of producing your boarding pass • What is the code for Customer Service Officer? • What is the Airport name for the IATA code NSN? • The area where security and screenings are taken place • Part of NZ custom - Ministry of Agriculture and Forestry • ...
Cyber saftey Blake Biddell 2016-05-26
Across
- fun to play with
- to make a computer screen smaller
- downloadable fun
- random information sometimes not wanted
- site to gain information on the web
- people online who aren't nice
- person who helps at school
- appropriate level of content
- someone who looks after you
- makes your computer sick
Down
- to not be online
- one of Apples products
- scams games that aren't safe
- used to get online
- someone who helps at home
- cable needed to power a device
- provides power
- uses Electricity
- protect your online identity
19 Clues: provides power • to not be online • fun to play with • downloadable fun • uses Electricity • used to get online • one of Apples products • makes your computer sick • someone who helps at home • person who helps at school • someone who looks after you • scams games that aren't safe • appropriate level of content • protect your online identity • people online who aren't nice • ...
Escape the Cold Date Night 2023-02-02
Across
- The burninator
- Blows your heater fuse
- Has best friends and best Spani
- Mt. P eatery, with Max
- Scarce in Michigan Winters
- Good Mt. P sushi, near shops
- Mt. P Japanese near H. Depot
- Twilight character, or cat
- Ball, Bowl, or Monster
- World's worst songwriter
- Metal type, or fancy Mt. P cafe
Down
- This towards men, or a store
- Soaring Eagle mascot
- Kassia's favorite donut
- Mt. P cookie store, near goodwill
- Abundant in Michigan Winters
- Fancy Mt. P sushi, downtown
- Kid or Cyber, in Mt. P
- No, I don't want tooo!
19 Clues: The burninator • Soaring Eagle mascot • Blows your heater fuse • Mt. P eatery, with Max • Kid or Cyber, in Mt. P • No, I don't want tooo! • Ball, Bowl, or Monster • Kassia's favorite donut • World's worst songwriter • Scarce in Michigan Winters • Twilight character, or cat • Fancy Mt. P sushi, downtown • This towards men, or a store • Abundant in Michigan Winters • ...
Westhill Crossword 2024-03-10
Across
- are wearing this in protest
- favorite gym rat
- apply to college when you are a ______
- Study Resource
- in math class
- to the SAT
- write what you are reading
- of a class curriculum
- and purple
Down
- 300s and 400s are in the _____ building
- college for Westhill graduates
- Alswanger and Mr. Cooney
- Cyber Rams
- you get into college you develop _____
- in 1916
- for the head janitor at Westhill
- section of the school building
- past participle
- Playmakers
19 Clues: in 1916 • Cyber Rams • Playmakers • to the SAT • and purple • in math class • Study Resource • past participle • favorite gym rat • of a class curriculum • Alswanger and Mr. Cooney • write what you are reading • are wearing this in protest • college for Westhill graduates • section of the school building • for the head janitor at Westhill • you get into college you develop _____ • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- to act in the best interest of the client
- the cost for an investment adviser's services
- ticker symbol for Facebook
- a fixed income security
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- a firm that executes security transactions for itself and clients
- the oldest investor protection organization
- free from security registration
- the sunshine state
Down
- possession of client funds or securities
- provides continuous investment services for a fee
- competing personal and business plans
- recommended procedure or implementation
- a digital ledger for cryptocurrency transactions
- client and firm documents
- exempt sale of securities to accredited investors
- a written disclosure statement that must be provided to existing and prospective clients
- individuals with a history of disciplinary actions
- ticker symbol for Netflix
- a type of cryptocurrency
- ticker for Amazon
- wrongful or criminal deception intended to result in personal gain
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- ticker symbol for Facebook
- individuals with a history of disciplinary actions
- exempt sale of securities to accredited investors
- ticker for Amazon
- the cost for an investment adviser's services
- the oldest investor protection organization
- competing personal and business plans
- ticker symbol for Netflix
- recommended procedure or implementation
- a digital ledger for cryptocurrency transactions
- a firm that executes security transactions for itself and clients
- wrongful or criminal deception intended to result in personal gain
Down
- a fixed income security
- a method to raise funds for cryptocurrency
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- provides continuous investment services for a fee
- freedom to make investment decisions on behalf of the client
- a written disclosure statement that must be provided to existing and prospective clients
- to act in the best interest of the client
- client and firm documents
- possession of client funds or securities
- free from security registration
- a type of cryptocurrency
- the sunshine state
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
Acronyms part 4 2024-12-13
Across
- Internet Message Access Protocol
- Memorandum of Understanding
- Mobile Device Management
- Incident Response
- Local Area Network
- Internet Relay Chat
- Lightweight Extensible Authentication
- Master Service Agreement
- Initialization Vector
- Indicators of Compromise
- Mandatory Access Control
- Key Distribution Center
- Mean Time Between Failures
- Incident Response Plan
- Media Access Control
- Instant Messaging
- Internet Key Exchange
- Lightweight Directory Access Protocol
- Information Systems Security Officer
- Layer 2 Tunneling Protocol
- Microsoft Challenge Handshake
- Main Distribution Frame
- Managed Service Provider
- International Standards Organization
Down
- Protocol
- Master Boot Record
- Metropolitan Area Network
- Message Authentication Code
- Machine Learning
- Internet Service Provider
- Internet Protocol Security
- Key Encryption Key
- Internet of Things
- Managed Security Service Provider
- Multifunction Device
- Multifactor Authentication
- Intrusion Prevention System
- Institute of Electrical and Electronics
- Message Digest 5
- Multi-protocol Label Switching
- Mean Time to Failure
- Multimedia Message Service
- Internet Protocol
- Multifunction Printer
- Monitoring as a Service
- Memorandum of Agreement
46 Clues: Protocol • Machine Learning • Message Digest 5 • Incident Response • Instant Messaging • Internet Protocol • Master Boot Record • Local Area Network • Key Encryption Key • Internet of Things • Internet Relay Chat • Multifunction Device • Media Access Control • Mean Time to Failure • Initialization Vector • Internet Key Exchange • Multifunction Printer • Incident Response Plan • Key Distribution Center • ...
Monitoring 2024-11-10
Across
- A notification system that warns administrators of potential security incidents (8 letters).
- The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
- Alerts generated by network devices to notify administrators of significant events (4 letters).
- A tool used to identify security weaknesses in systems and applications (20 letters).
- The act of examining systems or networks for vulnerabilities or threats (8 letters).
- The process of generating documents that summarize security findings and incidents (9 letters).
Down
- Software designed to detect and remove malicious programs from a computer system (9 letters).
- Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
- A network protocol that collects IP traffic information for analysis (7 letters).
- A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
- A standard for automating vulnerability management and compliance checks (4 letters).
- A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
- Long-term storage of logs and data for compliance and future reference (9 letters).
- Security standards or best practices used to evaluate the configuration of systems (10 letters).
14 Clues: A network protocol that collects IP traffic information for analysis (7 letters). • Long-term storage of logs and data for compliance and future reference (9 letters). • The act of examining systems or networks for vulnerabilities or threats (8 letters). • A standard for automating vulnerability management and compliance checks (4 letters). • ...
Technology Crossword 2018-10-23
Across
- Member of different groups
- the trail you leave behind as you use the internet, such as your comments on social media and the websites you visit
- viruses and spyware is categorized as ______
- Participating in your world in a responsible way.
- Being both proficient in the use of new technologies and comfortable in the atmosphere of cyberspace.
- relating to or involving an image, video, piece of information, that is circulated rapidly and widely from one internet user
- Participating in the cyber world
Down
- Play an important part in making today’s culture so interconnected.
- the ability to use information and communication technologies to find, evaluate, create, and communicate information
- taking responsibility for your role in cyberspace and engaging in positive and ethical decision-making to stay safe online.
- People who were born after the invention of digital technology and have grown up using it.
- a tool that helps someone sort through billions of websites to locate those that are specific to their search
- Online environment of the cyber world in which communications take place.
- Places that exist not in the real world but only online
- The modern world of computers, communications, and other digital technologies, such as mobile devices.
- a file written with the sole intention of doing harm
16 Clues: Member of different groups • Participating in the cyber world • viruses and spyware is categorized as ______ • Participating in your world in a responsible way. • a file written with the sole intention of doing harm • Places that exist not in the real world but only online • Play an important part in making today’s culture so interconnected. • ...
History 2021-04-06
Across
- reduce value of dollar
- money
- progress administration- headed by harry hopkins a new federal agency
- labor relations board- 5 members appointed by us president
- security act- provide security for elerds and unemployed
- basic
- business leade
- direct talks for held
- as a result of
- party
- important
- strike- workers did not work
- liberty league- business leaders and anit new deal politicians get together
- headed by harry hopkins a new
Down
- bills sent to congress
- policy-----made panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds worldwide panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds
- Roosevelt’s policies
- policy-----made Deficit spending- borrowed money to pay for programs
- arbitration-neutral party listen to both sides and decide
- provide security for elerds and unemployed
- clear
- borrowed money
- 5 members appointed by us
- down strike- workers did not work and protested
- collection of ideas
- closed banks
26 Clues: money • clear • basic • party • important • closed banks • business leade • borrowed money • as a result of • collection of ideas • Roosevelt’s policies • direct talks for held • bills sent to congress • reduce value of dollar • 5 members appointed by us • strike- workers did not work • headed by harry hopkins a new • provide security for elerds and unemployed • ...
Stock Exchange 2024-02-04
Across
- Market:A market in which stock prices are rising.
- Gain or Loss:Profit or loss resulting from the sale of certain assets classified under the federal income tax legislation as capital assets. This includes stocks and other investments such as investment property.
- Size:The aggregate size in board lots of the most recent bid to buy a particular security.
- measurement of the relationship between the price of a stock and the movement of the whole market.
- Transaction:An order to close out an existing open futures or options contract.
- securities firm is classified as an agent when it acts on behalf of its clients as buyer or seller of a security. The agent does not own the security at any time during the transaction.
- Day:Any business day on which the clearing corporation is open to effect trade clearing and settlement.
- an economist, capital means machinery, factories and inventory required to produce other products. To investors, capital means their cash plus the financial assets they have invested in securities, their home and other fixed assets.
- Day:Any day from Monday to Friday, excluding statutory holidays.
- notes issued by a corporation or government to its lenders, usually with a specified amount of interest for a specified length of time.
- physical document that shows ownership of a bond, stock or other security.
- Price:The price of the last board lot trade executed at the close of trading
- a company or person owns, including money, securities, equipment and real estate. Assets include everything that is owed to the company or person. Assets are listed on a company's balance sheet or an individual's net worth statement.
Down
- Order:An order from a retail customer of a Participating Organization.
- special term attached to an equity order that requires the trade to be settled either the same day or the following business day for cash.
- Number:The trading number of the clearing Participating Organization or Member.
- Chip Stocks:Stocks of leading and nationally known companies that offer a record of continuous dividend payments and other strong investment qualities.
- The simultaneous purchase of a security on one stock market and the sale of the same security on another stock market at prices which yield a profit.
- highest price a buyer is willing to pay for a stock. When combined with the ask price information, it forms the basis of a stock quote.
- Size:The aggregate size in board lots of the most recent ask to sell a particular security.
- Stock:All shares representing ownership of a company, including preferred and common shares
- or Offer:The lowest price at which someone is willing to sell the security. When combined with the bid price information, it forms the basis of a stock quote.
- fee charged by an investment advisor or broker for buying or selling securities as an agent on behalf of a client.
- Report:A publication, including financial statements and a report on operations, issued by a company to its shareholders at the company's fiscal year-end.
- Market:A market in which stock prices are falling.
- Dividend / Distribution:A dividend/distribution that is paid in cash.
26 Clues: Market:A market in which stock prices are rising. • Market:A market in which stock prices are falling. • Day:Any day from Monday to Friday, excluding statutory holidays. • Dividend / Distribution:A dividend/distribution that is paid in cash. • Order:An order from a retail customer of a Participating Organization. • ...
BCS reveiw noah 2015-11-13
Across
- a message sender thing that send messages to people
- a plan u pick that limits sertan thing
- being safe on thee interwebs
- bully bully on the internet
- proper technique
- computer screen
- micro soft excel
- something you can access the web on
Down
- web page maker
- asdfjkl;'
- publisher grating cards
- a group of computers
- ware stuff that makes up a computer
- something that you move and click stuff with
- a small slip of buttons at the top of a Microsoft thing
15 Clues: asdfjkl;' • web page maker • computer screen • proper technique • micro soft excel • a group of computers • publisher grating cards • bully bully on the internet • being safe on thee interwebs • ware stuff that makes up a computer • something you can access the web on • a plan u pick that limits sertan thing • something that you move and click stuff with • ...
Cyber Threat Crossword 2022-02-07
Across
- Never share your _________ with another person
- Also known as malicious software any; any program or file that is harmful to a computer user
- Passwords should should always be at least this many characters long.
- Choose a password that is easy for you _______________ but hard for you someone to guess.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A collection of information that is organized so that it can easily be accessed, managed and updated
- Email scam or attempt to trick you into giving your password or personal information
Down
- A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
- _________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
- Do not leave your laptop or computer ___________________
- The state of being free from danger and threat
- Always _______your computer when you leave your desk
- To protect personal information, avoid sending it via
- A _______ assessment is the process by which risks are identified and the impact of those risks determined
- A software that is designed and destroy computer viruses
- A ___________ is often an email that gets mailed in chain letter fashion describing something devastating.
16 Clues: Never share your _________ with another person • The state of being free from danger and threat • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Do not leave your laptop or computer ___________________ • A software that is designed and destroy computer viruses • ...
Cyber Ethics crossword 2025-05-28
Across
- Harmful software that
- secret code to access an account
- Theft Stealing someone's personal or confidential data
- online bullying or harassment
- Name used to log into websites or apps
- Fake emails to steal personal information
- Rules of right and wrong behavior online
Down
- Blocks unauthorized access to a network
- Breaking into a system without permission
- Software that secretly gathers your information
- Keeping your personal information safe
- Program that spreads and corrupts files
- systems
- Scrambling data to prevent unauthorized access
- Protects against harmful programs
- A trick to steal your data or money
16 Clues: systems • Harmful software that • online bullying or harassment • secret code to access an account • Protects against harmful programs • A trick to steal your data or money • Keeping your personal information safe • Name used to log into websites or apps • Blocks unauthorized access to a network • Program that spreads and corrupts files • ...
Friday Fun - Do you know your DOB Acronyms? 2022-02-04
Across
- The C in CPS
- The I in AISP
- The A in OPA
- The E in OBIE
- The G in GDPR
- The I in PISP
- The L in AML
- The T in TPP
- The first U in UUID
- The C in CDC
- The P in ERP
Down
- The A in QWAC
- The S in QTSP
- The C in DSCA
- The O in DSOP
- The N in JSON
- The Q in QSealC
- The B in CBPII
- The T in QTSP
- The L in OBL
- The I in DPIA
- The D in PSD2
- The first S in ASPSP
23 Clues: The C in CPS • The A in OPA • The L in OBL • The L in AML • The T in TPP • The C in CDC • The P in ERP • The A in QWAC • The S in QTSP • The C in DSCA • The I in AISP • The O in DSOP • The N in JSON • The E in OBIE • The T in QTSP • The G in GDPR • The I in PISP • The I in DPIA • The D in PSD2 • The B in CBPII • The Q in QSealC • The first U in UUID • The first S in ASPSP
Know Your Money - 2004 Style Notes 2024-12-11
Across
- Some security features are visible under this kind of light.
- FRNs designed before 1990 do not contain security threads or ______.
- This person's portrait is on the $50 note.
- This person's portrait is on the $20 note.
- $100 FRNs have a blue security _____ woven into the paper.
- This person's portrait is on the $10 note.
Down
- All genuine FRNs except $1 and $2 have a clear _____ thread embedded.
- This person's portrait is on the $5 note.
- This person's portrait is on the $100 note.
- ____ Plate Number is found on the bottom right-hand corner of the back of the note.
- Currency paper has ____ and blue threads randomly disbursed throughout.
- visible from either side of the note when held to light.
- The first letter of this number on FRNs of each series year 1996 or later correspond to a series year.
- Currency paper consists of 25% linen and 75% _____.
- Color-shifting ___ is visible in the 2004 style $10, $20, $50 and $100 federal reserve notes.
15 Clues: This person's portrait is on the $5 note. • This person's portrait is on the $50 note. • This person's portrait is on the $20 note. • This person's portrait is on the $10 note. • This person's portrait is on the $100 note. • Currency paper consists of 25% linen and 75% _____. • visible from either side of the note when held to light. • ...
Papa Javi 6 weeks down, years to go... 2023-01-28
Across
- Your initial ideas about something
- Relative, uncle's child
- Awful, terrible
- Workers representation
- What Ukraine is receiving a lot of
- Pasta dish
- What you need to do to Matteo to comfort him
Down
- Something that causes discussion, debate, even outrage
- Go up
- The cyber group, also without identity
- Period of freezing weather (go crazy suddenly) 4,(4)
- The red stuff
12 Clues: Go up • Pasta dish • The red stuff • Awful, terrible • Workers representation • Relative, uncle's child • Your initial ideas about something • What Ukraine is receiving a lot of • The cyber group, also without identity • What you need to do to Matteo to comfort him • Period of freezing weather (go crazy suddenly) 4,(4) • Something that causes discussion, debate, even outrage
Cyber Security Crossword By AGUSTINA PETRACCA 2020-08-20
Across
- es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento.
- es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
- son pequeños archivos que algunos sitios web guardan en tu ordenador.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
- es un sistema diseñado para evitar el acceso no autorizado a una red privada.
7 Clues: son pequeños archivos que algunos sitios web guardan en tu ordenador. • es un sistema diseñado para evitar el acceso no autorizado a una red privada. • es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento. • ...
Norwegian Prison 2024-01-23
digital 2025-04-29
Chapter 7 2022-12-01
Across
- Global position systems
- 1928 supreme court case made wiretapping unconstitutional
- Freedom of speech and right to privacy
- 1974 law passed to regulate the goverments use of personal data
- Electronic communications act
- 1937 supreme court case banning message interception without the senders consent
- using different data bases to compare and compound information
- uses algorithms to hide data
- rules or boundaries that are enforced by laws
- understanding of positive and negative consequences of utility
- A philosopher who believed actions are unethical if they negatively affected others
Down
- ethic perspective that rules should apply universally
- security procedure that is searching for leaks and other security vulnerabilities
- created corporate rule, requiring companies to be transparent when sharing customers data
- social security number
- informed consent and regulations for secondary uses
- a deal of buying or selling for business
- analyzation of copious masses of data
- protects children with parental controls on websites
- a right and state of liberty of being disturbed and observed.
20 Clues: social security number • Global position systems • uses algorithms to hide data • Electronic communications act • analyzation of copious masses of data • Freedom of speech and right to privacy • a deal of buying or selling for business • rules or boundaries that are enforced by laws • informed consent and regulations for secondary uses • ...
a crossword by moon 2019-02-27
Across
- flight name for Emirates Airlines
- a school subject that tells you countries and things
- the word for getting on the plane
- photo ID specifically used for boarding a zoomy sky boy
- the first part of UM
- the good boy who finds drugs and big money
- the side of the airport you're on before going through security
- the area where aircraft park
- the side of the airport you're on after going through security
- the current aviation security service
Down
- alternative S
- used of evacuating passengers from a stricken aircraft
- the airline alphabet
- the people going on the metal bird
- the big man who protects the community from potential bad guys
- vehicles with movable belts used to load and unload baggage onto aircraft
- the place where you get cheap drinks and cigs
- international travel documents you need to go to lots of other places
- the items passengers bring in suitcases and stuff
- flight name for Virgin Australia
20 Clues: alternative S • the airline alphabet • the first part of UM • the area where aircraft park • flight name for Virgin Australia • flight name for Emirates Airlines • the word for getting on the plane • the people going on the metal bird • the current aviation security service • the good boy who finds drugs and big money • the place where you get cheap drinks and cigs • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- a digital ledger for cryptocurrency transactions
- the cost for an investment adviser's services
- to act in the best interest of the client
- provides continuous investment services for a fee
- wrongful or criminal deception intended to result in personal gain
- ticker for Amazon
- competing personal and business plans
- a firm that executes security transactions for itself and clients
Down
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- ticker symbol for Facebook
- the oldest investor protection organization
- a written disclosure statement that must be provided to existing and prospective clients
- client and firm documents
- a type of cryptocurrency
- ticker symbol for Netflix
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- recommended procedure or implementation
- exempt sale of securities to accredited investors
- free from security registration
- individuals with a history of disciplinary actions
- possession of client funds or securities
- a fixed income security
- the sunshine state
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- ticker symbol for Netflix
- to act in the best interest of the client
- a type of cryptocurrency
- client and firm documents
- a fixed income security
- a digital ledger for cryptocurrency transactions
- the sunshine state
- competing personal and business plans
- exempt sale of securities to accredited investors
- free from security registration
Down
- the oldest investor protection organization
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- recommended procedure or implementation
- provides continuous investment services for a fee
- possession of client funds or securities
- fraudulent investment operations where returns for older investors are paid through revenue from new investors
- a firm that executes security transactions for itself and clients
- the cost for an investment adviser's services
- a written disclosure statement that must be provided to existing and prospective clients
- wrongful or criminal deception intended to result in personal gain
- individuals with a history of disciplinary actions
- ticker symbol for Facebook
- ticker symbol for Amazon
24 Clues: the sunshine state • a fixed income security • a type of cryptocurrency • ticker symbol for Amazon • ticker symbol for Netflix • client and firm documents • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • ...
[KoCyber] - FamilyOnlineSafety 2025-07-13
Across
- Online trickery designed to steal money or information.
- Fake emails or messages tricking you into giving personal information.
- A secret word or phrase that secures your account.
- Practices and habits to stay secure online.
- Turning information into secret code for security.
- Making extra copies of data in case originals are lost.
- Software protecting your devices from viruses.
- Harmful software designed to damage your device.
- Extra security step requiring two ways to prove your identity.
- Software secretly installed to monitor your online activities.
- A person who tries to illegally access your accounts or devices.
- Misleading links designed to attract clicks and trap users.
Down
- Verifying that someone is who they claim to be.
- Protecting your personal information online.
- Malicious software that locks files and demands payment.
- Online harassment or bullying behavior.
- A digital barrier protecting your devices from harmful traffic.
- Internet connection freely accessible but risky to use.
- Posting too much personal information online.
- Regularly improving software to prevent security flaws.
20 Clues: Online harassment or bullying behavior. • Practices and habits to stay secure online. • Protecting your personal information online. • Posting too much personal information online. • Software protecting your devices from viruses. • Verifying that someone is who they claim to be. • Harmful software designed to damage your device. • ...
cyber 2024-11-16
GCSE Computer Science: Network Security 2018-02-17
Across
- A malicious program designed to gather information about the user or their system.
- A standard way of providing authentication.
- Software to control data going in and out of a network.
- A malicious program designed to damage a computer system.
- An activity performed by an ethical hacker to test a network's security. (2 words)
- A person who is employed by companies to try to break their network security. (2 words)
- Authentication system that requires more than one item to log in. (2 words)
- Proving your identity.
Down
- Protection of systems against theft, vandalism, etc. (2 words)
- Sending an email pretending to be from a bank, etc.
- A method of breaching security by tricking people. (2 words)
- A document that defines what users are (not) permitted to do on a system. (2 words)
- Ensuring data is within an acceptable range and format.
- An update to software to fix bugs - especially security bugs.
14 Clues: Proving your identity. • A standard way of providing authentication. • Sending an email pretending to be from a bank, etc. • Ensuring data is within an acceptable range and format. • Software to control data going in and out of a network. • A malicious program designed to damage a computer system. • A method of breaching security by tricking people. (2 words) • ...
Job and Occupation 2021-04-30
Across
- a person in charge of controlling the rudder of an aircraft during flight time.
- as a legal expert has the authority to provide advice on cases in court.
- health workers who are the main point of patients.
- people who cook
- people whose job is to dive.
- a person whose job is to write.
- engineer of a ship locomotive
- the most number of health workers.
- female attendant on long distance transport
- members of government agencies or state employees in charge of maintaining security.
- lascar or state soldiers.
Down
- people who cover the news.
- female health workers assigned to assist.
- people working on public transportation
- people whose job is to raise livestock
- the person whose job is to catch fish.
- people who are in charge of taking care of and saving the result of payments, especially money.
- people whose job is to drive cars.
- a man who cultivates cops
- people who provide knowledge to students.
- a group assigned by the agency to carry out security.
21 Clues: people who cook • a man who cultivates cops • lascar or state soldiers. • people who cover the news. • people whose job is to dive. • engineer of a ship locomotive • a person whose job is to write. • people whose job is to drive cars. • the most number of health workers. • people whose job is to raise livestock • the person whose job is to catch fish. • ...
NASAA IA Training After Lunch Crossword Challenge 2018-02-23
Across
- a type of cryptocurrency
- ticker symbol for Netflix
- to act in the best interest of the client
- a fixed income security
- the cost for an investment adviser's services
- exempt sale of securities to accredited investors
- competing personal and business plans
- provides continuous investment services for a fee
- client and firm documents
- a firm that executes security transactions for itself and clients
- a digital ledger for cryptocurrency transactions
- the oldest investor protection organization
Down
- ticker symbol for Amazon
- a fraudulent plan promising high returns for little risk
- wrongful or criminal deception intended to result in personal gain
- recommended procedure or implementation
- free from security registration
- individuals with a history of disciplinary actions
- freedom to make investment decisions on behalf of the client
- a method to raise funds for a cyrptocurrency
- a written disclosure statement that must be provided to existing and prospective clients
- ticker symbol for Facebook
- the sunshine state
- possession of client funds or securities
24 Clues: the sunshine state • a fixed income security • ticker symbol for Amazon • a type of cryptocurrency • ticker symbol for Netflix • client and firm documents • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • ...
a crossword by moon 2019-02-27
Across
- international travel documents you need to go to lots of other places
- the people going on the metal bird
- vehicles with movable belts used to load and unload baggage onto aircraft
- the current aviation security service
- the airline alphabet
- the place where you get cheap drinks and cigs
- the big man who protects the community from potential bad guys
- a school subject that tells you countries and things
- the items passengers bring in suitcases and stuff
- the side of the airport you're on before going through security
- the side of the airport you're on after going through security
Down
- alternative S
- the area where aircraft park
- used of evacuating passengers from a stricken aircraft
- the good boy who finds drugs and big money
- flight name for Virgin Australia
- the first part of UM
- flight name for Emirates Airlines
- photo ID specifically used for boarding a zoomy sky boy
- the word for getting on the plane
20 Clues: alternative S • the first part of UM • the airline alphabet • the area where aircraft park • flight name for Virgin Australia • flight name for Emirates Airlines • the word for getting on the plane • the people going on the metal bird • the current aviation security service • the good boy who finds drugs and big money • the place where you get cheap drinks and cigs • ...
NAFIS iPad mini raffle 2013-05-09
Across
- Market transparency directive dating to 2004
- European tax on interest income
- Swiss tax treaty with UK & Austria: “_____ Withholding”
- US regulation to combat offshore tax evasion
- No. times SIX named "Best Corp. Actions Data Provider"
- Swiss national security ID number
- How many global security ID schemes cross-referenced by SIX
- “Legal Entity __________”
- Managing Director of SIX Financial Information USA
- How many millions of securities in SIX Financial’s DB
- “Nothing is certain but death and _____” (Benjamin Franklin)
Down
- FACTA report and revenue collector
- Adherence to regulations
- Fund look through also a requirement for this regulation
- Set of directives allowing cross-border fund sales in the EU
- Requirement for FATCA compliance: “Fund ___________”
- Second country to introduce a financial transaction tax
- First country to introduce a financial transaction tax
- How many decades SIX has been in business
- Type of data that describes a security or issuer
- When the sum of 1 plus 1 might equal 3 securities?
- Provider of robust tax & compliance data
22 Clues: Adherence to regulations • “Legal Entity __________” • European tax on interest income • Swiss national security ID number • FACTA report and revenue collector • Provider of robust tax & compliance data • How many decades SIX has been in business • Market transparency directive dating to 2004 • US regulation to combat offshore tax evasion • ...
financial markets 2025-05-15
Across
- The total volume of trades in a given period
- Traders who expect prices to rise
- A participant in exchange trading
- The market price of a financial instrument
- Traders who expect prices to fall
- A price below the nominal value of a security
- An authority overseeing the financial market
- The degree of variation in trading prices
- The difference between bid and ask prices
- A person with access to non-public information
Down
- The amount of assets bought or sold
- A loan secured by real estate
- The process of putting securities into circulation
- A general term for a financial instrument
- Inclusion of a security in a stock exchange
- Relating to money, banking, or investments
- A representative acting on behalf of a client
- The difference between purchase and sale prices
- The transformation of assets into securities
- The process of studying the market for decision-making
- Use of borrowed funds for investment
21 Clues: A loan secured by real estate • Traders who expect prices to rise • A participant in exchange trading • Traders who expect prices to fall • The amount of assets bought or sold • Use of borrowed funds for investment • A general term for a financial instrument • The degree of variation in trading prices • The difference between bid and ask prices • ...
Computer Ethics 2022-08-15
Across
- words for protecting your account
- Another Word for Internet
- Words or images which can be clicked to visit other webpages
- not suitable or proper in the circumstances
- message sent through email
- moral values
- rules to punish against crime
- to illegally use others computer
Down
- your online identity
- activity punishable by Law
- crime of deceiving someone
- someone's identification
- another word for good behavior
- do damage to someone or something
14 Clues: moral values • your online identity • someone's identification • Another Word for Internet • activity punishable by Law • crime of deceiving someone • message sent through email • rules to punish against crime • another word for good behavior • to illegally use others computer • words for protecting your account • do damage to someone or something • ...
Network and Infrastructure Security (Medium) 2023-06-01
Across
- A network security device that monitors and controls incoming and outgoing network traffic.
- A security technology that monitors network traffic for suspicious activities or behavior.
- Control The practice of limiting and controlling who can access and use resources in a system or network.
- Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data.
- Segmentation The practice of dividing a network into smaller, isolated segments to enhance security and control access.
Down
- An attack that targets a vulnerability unknown to the software vendor, giving them zero days to fix it before it can be exploited.
- A security method that requires users to provide two forms of identification, typically a password and a unique code.
- The process of converting information into a secure code to prevent unauthorized access.
- A security technology that actively monitors and blocks malicious activities in a network.
- Manipulating individuals to divulge sensitive information or perform actions that may compromise security.
- A secure network connection that allows users to access a private network over the internet.
11 Clues: The process of converting information into a secure code to prevent unauthorized access. • A security technology that monitors network traffic for suspicious activities or behavior. • A security technology that actively monitors and blocks malicious activities in a network. • ...
Security Week 2021-02-22
Across
- the security classification used when the compromise of the information could cause damage to the national interest, organisations or individuals
- A security zone used to access and store top secret and code word material (acronym)
- A p_ _ _ _ _ _ _ _ _ _ m_ _ _ _ _ _ indicates the required level of protection to all users of the information
- the approved method of destroying hard copy security classified information.
- a physical storage place for security classified documents
- caveat that indicates only Australian citizens can access the information.
Down
- The overarching framework that mandates security requirements for the department
- The secretary has signed a clear desk and clear screen
- a method for securely transferring hard copy PROTECTED material and above
- who is the only person / area that can change the sensitivity or security classification applied to information?
10 Clues: The secretary has signed a clear desk and clear screen • a physical storage place for security classified documents • a method for securely transferring hard copy PROTECTED material and above • caveat that indicates only Australian citizens can access the information. • the approved method of destroying hard copy security classified information. • ...
crossword cyber alexy 2025-11-03
Across
- infiltrate an individual's computer systems
- device for carrying out malicious activities
- software updates
- cyber criminal
- code that can steal sensitive information
Down
- safely test software code
- protects your network and your device
- online scam similar to phishing
- malicious software capable of self-propagation
- malware attack
10 Clues: cyber criminal • malware attack • software updates • safely test software code • online scam similar to phishing • protects your network and your device • code that can steal sensitive information • infiltrate an individual's computer systems • device for carrying out malicious activities • malicious software capable of self-propagation
General insurance products 2020-11-23
Across
- Theft
- Damage caused to your own vehicle
- Losses due to piracy or jettison
- Fines or ransoms to restore data
- Losses following the inability to trade
- Spending a night in hospital
- Fire or storm damage to your place of business
- Damage caused to someone else's vehicle
Down
- Losses arising from failed debts
- Injury in the workplace
- Injury to oneself
- Redundancy
- Losses cause by malicious employees
- Fire or storm damage to your home
- Damage caused by faulty packaging
- Fire, explosion, terrorism
- Loss resulting from poor advice
- Injury or loss when someone is on your property
18 Clues: Theft • Redundancy • Injury to oneself • Injury in the workplace • Fire, explosion, terrorism • Spending a night in hospital • Loss resulting from poor advice • Losses arising from failed debts • Losses due to piracy or jettison • Fines or ransoms to restore data • Damage caused to your own vehicle • Fire or storm damage to your home • Damage caused by faulty packaging • ...
KELAS VII.4 RESKI FAREL RAMADHAN 2023-05-10
Across
- APILAKASI YG DICIP TAKAKAN PADA TH 2010
- YG MUNCUL PADA TH 2011
- BULIYNG DAMPAK PENGUNAAN TIK
- 2002
- KE INTERNET DITUNJUKKAN
- MAYA
- HP PERANG KATJARINGAN YG DIKEMBANGKAN AGAR BISA
- SITUS YG MENGKEM SEBAGAI SITUS MINCO BLOGGING
- LEBIH POPULER SBAGAI SUMBER INFORMASI CEPAT
- TUNAI
- SISTEM PEMBAYARAN ELEKTRONIK YG MEMUNGKINKAN
- MEDIA MENJADI AWAL LAHIRNYA MEDIA SOSIAL PADA
Down
- MYITY KEINGINAN UNTUK MENG RAHASIAKAN JATI DIRI
- KEBERADAAN
- SITUS JARINGAN SOSIAL YG BERFUNGSI PADA PETUKARAN
- SECARA UMUMNYA RUNG PERSONAL INDIVIDU SANGAT
- MENJUAL OLEN SHOP DAN BISNIS OLEN
- TAPAHARUS MENGUNAKAN CEK ATAUPUN
18 Clues: 2002 • MAYA • TUNAI • KEBERADAAN • YG MUNCUL PADA TH 2011 • KE INTERNET DITUNJUKKAN • BULIYNG DAMPAK PENGUNAAN TIK • TAPAHARUS MENGUNAKAN CEK ATAUPUN • MENJUAL OLEN SHOP DAN BISNIS OLEN • APILAKASI YG DICIP TAKAKAN PADA TH 2010 • LEBIH POPULER SBAGAI SUMBER INFORMASI CEPAT • SECARA UMUMNYA RUNG PERSONAL INDIVIDU SANGAT • SISTEM PEMBAYARAN ELEKTRONIK YG MEMUNGKINKAN • ...
Cyber Crossword (CIA 1) 2021-09-05
Across
- A current challenge in cyber space, where your identity lies under the wraps, but your activities are visible to everyone.
- The simulation of movement created by a series of pictures.
- Conversion of analog data into digital form.
- The fact of being alone so that you can do things without being seen or disturbed.
- Proponent of Cyber Paternalism.
Down
- The action of receiving electronic transmissions before they reach the intended recipient.
- Electronic form of legally enforceable promise, and every set of promises, forming the consideration for each other.
- A belief that individuals acting in whatever capacity, should be at liberty to pursue their own tastes and interests online.
- A virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure.
- Software that enables photo editing, image creation and graphic design.
10 Clues: Proponent of Cyber Paternalism. • Conversion of analog data into digital form. • The simulation of movement created by a series of pictures. • Software that enables photo editing, image creation and graphic design. • The fact of being alone so that you can do things without being seen or disturbed. • ...
cyber world crossworld 2021-12-16
Across
- The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity." Netizen has the same meaning.
- Electronic media are media that use electronics or electromechanical means for the audience to access the content.
- the notional environment in which communication over computer networks occurs.
- Cyber citizenship is the rights, privileges and responsibilities required of internet and cellular network users.
- a person born or brought up during the age of digital technology and therefore familiar with computers and the internet from an early age.
Down
- A real or virtual world of information in cyberspace
- the position or status of being a citizen of a particular country.
- not physically existing as such but made by software to appear to do so
- an inhabitant of a particular town or city.
- By definition, Cyber Literacy means the ability to use computer technologie
10 Clues: an inhabitant of a particular town or city. • A real or virtual world of information in cyberspace • the position or status of being a citizen of a particular country. • not physically existing as such but made by software to appear to do so • By definition, Cyber Literacy means the ability to use computer technologie • ...
Crossword puzzle 2024-04-30
Across
- Online moral principles.
- Tech-enabled capability.
- Online harassment.
- Tech proficiency.
- Digital image.
- Tech competency.
- Personal info fraud.
- Network security barrier.
- Online self-representation.
- Digital illegal activities.
- Personal recognition.
- Digital data secrecy.
- Data protection.
- Personal info protection.
- Malicious program blocker.
- Protection measures.
- Access authentication code.
- Data transfer to web.
- Harmful software.
- Global web network.
- Responsible online behavior.
- Fraudulent schemes.
- Effective digital info use.
- Online conduct regulations.
- Secure data encoding.
- Digital threat knowledge.
Down
- Personal online journals.
- Analytical reasoning.
- Secure web browsing.
- Malicious digital assault.
- Digital threat protection.
- Digital education.
- Identity verification.
- Digital threat potential.
- Digital security measures.
- Online activity traces.
- Web navigation software.
- Digital education platform.
- Info safeguarding measures.
- Tech access gap.
- Unauthorized info access.
- thinking: Logical analysis.
- Malicious intrusion.
- Personal info protection.
- Internet precaution.
- Defense against digital threats.
- Online data secrecy.
- Digital safety practices.
- Deceptive data theft tactics.
- Digital communication.
50 Clues: Digital image. • Tech competency. • Tech access gap. • Data protection. • Tech proficiency. • Harmful software. • Online harassment. • Digital education. • Global web network. • Fraudulent schemes. • Secure web browsing. • Personal info fraud. • Malicious intrusion. • Protection measures. • Internet precaution. • Online data secrecy. • Analytical reasoning. • Personal recognition. • ...
CM-BCMS 2025-04-04
Across
- Analysis Evaluating potential digital threats to ensure safety.
- Assessment Analyzing threats to minimize potential vulnerabilities.
- Management Routine updates to close security gaps in software.
- Deceptive techniques using fake messages to steal sensitive information.
- Testing Simulated attack to uncover security system flaws.
- An attack demanding payment to unlock encrypted data.
- Backup plan prepared for unexpected disruptions.
- A voice-based scam to extract personal information over the phone.
- Management Planning to ensure survival during emergencies.
- Malicious software created to disrupt or damage systems.
- Ability to recover operations during or after a crisis.
- Continuity Plan (BCP) Framework ensuring operations continue despite challenges.
- Cyberattack via text messages designed to deceive users.
Down
- State of readiness to effectively respond to issues.
- Process of restoring crucial business functions post-disruption.
- Weakness in a system exploitable by attackers.
- Process of verifying a user’s identity for security purposes.
- Secures information by converting it into unreadable code.
- A system barrier preventing unauthorized access to networks.
19 Clues: Weakness in a system exploitable by attackers. • Backup plan prepared for unexpected disruptions. • State of readiness to effectively respond to issues. • An attack demanding payment to unlock encrypted data. • Ability to recover operations during or after a crisis. • Malicious software created to disrupt or damage systems. • ...
Once Upon a Time A 2021-09-28
Across
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- Residents ? their fears of criminals by installing sophisticated security devices.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Hearing the ? of the car alarm for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- Obviously, the family was suspicious of the ? of strangers wandering in the neighbourhood.
- After many false alarms, the family wondered about the ? of the security system.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s red wagon with the supplies for phys. Ed.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards residents can take at home.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Nervously, the resident noticed the ? of a figure below the street light.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
- The ? gardener was willing to travel to different places where there was work.
- When slicing bread or tomato, it is easier using a knife with ?.
- The bulkiness of the cameras around the house ruined its ?, creating quite the eyesore.
- As usual, the father was ? from his sleep by the beeping of his phone.
- For their safety, they ? to the Neighbourhood Watch program.
- During the robbery, the bedroom had been ?, leaving quite the mess for the owners.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
28 Clues: For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? from his sleep by the beeping of his phone. • Nervously, the resident noticed the ? of a figure below the street light. • The ? gardener was willing to travel to different places where there was work. • ...
CYBER LAW- CROSSWORD (CIA 1) 2021-09-05
Across
- There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
- The conversion of texts, pictures, or sound into a digital form.
- The act of persistent and unwanted contact from someone online.
- He is one of the famous scholar in cyber paternalism.
Down
- It is often viewed as the act of sending unsolicited email.
- These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
- The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
- It is a common file format used to combine and compress data for easy downloading.
- This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
- Most popular search engine.
10 Clues: Most popular search engine. • He is one of the famous scholar in cyber paternalism. • It is often viewed as the act of sending unsolicited email. • The act of persistent and unwanted contact from someone online. • The conversion of texts, pictures, or sound into a digital form. • It is a common file format used to combine and compress data for easy downloading. • ...
CYBER LAW- CROSSWORD (CIA 1) 2021-09-15
Across
- There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
- It is a common file format used to combine and compress data for easy downloading.
- This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
- These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
- Most popular search engine
Down
- He is one of the famous scholar in cyber paternalism.
- The conversion of texts, pictures, or sound into a digital form.
- It is often viewed as the act of sending unsolicited email.
- __________ resources is one major problem in cyberspace.
- The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
10 Clues: Most popular search engine • He is one of the famous scholar in cyber paternalism. • __________ resources is one major problem in cyberspace. • The conversion of texts, pictures, or sound into a digital form. • It is often viewed as the act of sending unsolicited email. • It is a common file format used to combine and compress data for easy downloading. • ...
test 2024-03-27
5 Clues: What kind of puzzle is this • What company do we work for • Fiserv Cyber Information Center • What section of the company are we in • Common form of hacking beginning with a P
Internet crossword questions 2013-05-16
10 Clues: web adress • a online bully • bits per second • broswing the web • A software program • board tool used to type • Place where you can send emails • tool used to click on the computer • Text that is usally in the color blue • Place on the internet where you can communicate
Crossword-2 2019-06-30
Across
- initiative for Multi-lingual Internet
- smarter banking alternatives
- Regional Internet Registry
- reason for being
- Key ICANN focus area
Down
- UNICEF Report on IG and Child rights
- Cyber Hygiene initiative by ISOC...Chapter?
- category of top level domains
- Internet Governance Academy
- ISOC Palestine initiative on online sexual harassment
10 Clues: reason for being • Key ICANN focus area • Regional Internet Registry • Internet Governance Academy • smarter banking alternatives • category of top level domains • UNICEF Report on IG and Child rights • initiative for Multi-lingual Internet • Cyber Hygiene initiative by ISOC...Chapter? • ISOC Palestine initiative on online sexual harassment
Quality 2023-04-03
10 Clues: Catch forty winks • Greenish blue hue • CAT scan alternative • A golf course has 18 • what 5280 feet equals • Basic unit of all forms of life • Interruptions during TV programs • Final letter in the Greek alphabet • Board games has it in black and white • prefix involving computers or computer networks
Traylan Lockett, Breia.Varnado 2017-01-26
Across
- Slapping is harassing someone
- or trolling is bullying, cyber bullying
- is to be endangered
- Shopping is making two photos and mixing them together
- is frightening them
- Treats is treats that involves some safety
- Spreading is gossiping
Down
- is various rituals involving harassment
- Theft is taking over someone's identity
- is revenge
- is making someone feel bad
- is stalking someone
12 Clues: is revenge • is to be endangered • is frightening them • is stalking someone • Spreading is gossiping • is making someone feel bad • Slapping is harassing someone • is various rituals involving harassment • or trolling is bullying, cyber bullying • Theft is taking over someone's identity • Treats is treats that involves some safety • ...
Traylan Lockett, Breia.Varnado 2017-01-26
Across
- is various rituals involving harassment
- Spreading is gossiping
- Slapping is harassing someone
- is making someone feel bad
- is frightening them
- or trolling is bullying, cyber bullying
Down
- is stalking someone
- is revenge
- Treats is treats that involves some safety
- Theft is taking over someone's identity
- is to be endangered
- Shopping is making two photos and mixing them together
12 Clues: is revenge • is stalking someone • is to be endangered • is frightening them • Spreading is gossiping • is making someone feel bad • Slapping is harassing someone • is various rituals involving harassment • Theft is taking over someone's identity • or trolling is bullying, cyber bullying • Treats is treats that involves some safety • ...
Security x Word 2022-06-01
Across
- Maori war dance? Illegal computing more like
- more than just a number cruncher
- Shhhh don't tell anyone it's a
- Malicious deception
- Works like a?
Down
- It's all about me
- Of conduct maybe?
- Sideways on, or online cv
- To unlock this answer...
- Man, scary robots from Dr Who
- Railway, Mud and Fire e.g.
- Was fixed, now its more mobile
12 Clues: Works like a? • It's all about me • Of conduct maybe? • Malicious deception • To unlock this answer... • Sideways on, or online cv • Railway, Mud and Fire e.g. • Man, scary robots from Dr Who • Shhhh don't tell anyone it's a • Was fixed, now its more mobile • more than just a number cruncher • Maori war dance? Illegal computing more like
ΑΣΦΑΛΕΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟ 2024-02-12
10 Clues: ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜIKO • NEWS ΨΕΥΔΕΙΣ ΕΙΔΗΣΕΙΣ • ΔΙΑΔΙΚΤΥΑΚΟΣ ΕΚΦΟΒΙΣΜΟΣ • SCAMS ΗΛΕΚΤΡΟΝΙΚΕΣ ΑΠΑΤΕΣ • PASSWORD ΚΩΔΙΚΟΙ ΠΡΟΣΒΑΣΗΣ • REPUTATION ΔΙΑΔΙΚΤΥΑΚΗ ΦΗΜΗ • PRIVACY ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ • GAMING ΠΑΙΧΝΙΔΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟ • ADDICTION ΕΘΙΣΜΟΣ ΣΤΟ ΔΙΑΔΥΚΤΙΟ • ADVERTISMENT ΣΤΟΧΕΥΜΕΝΕΣ ΔΙΑΦΗΜΙΣΕΙΣ
Cyber - Annabelle Schmierer 2016-05-25
Across
- Can be hacked
- something that tricks you into clicking it
- breaking the law on a computer
- watching someone online without them knowing
- a virus that pretends to be something good
- Someone pretending to be someone else
- software on people's computer that steals your information without them knowing
- a type of virus that repeats itself
- Destroys data
Down
- damages the computer network system
- Someone who can steal information
- used to track down a server
- being rude online
- unwanted emails from strangers
- a stranger who tries to make friends with you
- a plan to trick you
16 Clues: Can be hacked • Destroys data • being rude online • a plan to trick you • used to track down a server • breaking the law on a computer • unwanted emails from strangers • Someone who can steal information • damages the computer network system • a type of virus that repeats itself • Someone pretending to be someone else • something that tricks you into clicking it • ...
Angus cyber safety 2016-06-08
Across
- of unsafe
- that no one can see
- details
- way to contact people
- way you read fast
- use a keyboard to type words onto it
- protects your computer
- who bully's you online
- device people use to text
- a cold for your computer
Down
- you type in to log onto a computer
- who you don't know that emails you heaps of times
- you can search stuff up
- that no one can see
- people use to send stuff to anyone who has it
- front of your computer
- who goes into your account and steals stuff
17 Clues: details • of unsafe • way you read fast • that no one can see • that no one can see • way to contact people • front of your computer • protects your computer • who bully's you online • you can search stuff up • a cold for your computer • device people use to text • you type in to log onto a computer • use a keyboard to type words onto it • who goes into your account and steals stuff • ...
cyber ops crossword 2022-11-22
Across
- transition of packets from one mission to another
- used to connect two or more networks
- tells connections you computer currently has
- different type of networks communication
- open system interconnection model
Down
- unique address for a nic
- millions of individual computer sending
- tells you if packet got to its destination
- commonly used command to send test packet
- small box shaped electronic device
- device used to boost signals
- a connection point
- data divided into small chunks
- abbreviation for name server lookup
- classless interdomain routing
- lookback address written as 128
16 Clues: a connection point • unique address for a nic • device used to boost signals • classless interdomain routing • data divided into small chunks • lookback address written as 128 • open system interconnection model • small box shaped electronic device • abbreviation for name server lookup • used to connect two or more networks • millions of individual computer sending • ...
TTS INFORMATIKA QIRANI 2025-03-11
10 Clues: cyber crime • contoh media digital • ciri ciri media digital • jenis jenis media digital • etika dalam konten digital • tujuan konten media digital • hak cipta konten digital adalah • pilihan platform konten media digital • siapakah target audiens dalam konten digital • tahapan awalan dalam produksi konten digital
tts informatika (zahra) 2025-03-11
Across
- Hak cipta dalam konten digital?
- tahapan produksi konten digital
- Menjaga privasi dalam konten digital?
- apa ciri media digital
Down
- apa perbedaan media digital dan tradisional
- Cyber crime dalam konten digital?
- Plagiarisme dalam konten digital?
- Hoaks dalam konten digital?
- bagaimana memilih media digital
- apa media digital
10 Clues: apa media digital • apa ciri media digital • Hoaks dalam konten digital? • Hak cipta dalam konten digital? • tahapan produksi konten digital • bagaimana memilih media digital • Cyber crime dalam konten digital? • Plagiarisme dalam konten digital? • Menjaga privasi dalam konten digital? • apa perbedaan media digital dan tradisional
U11 - Technical Language used in reports 2025-12-15
Across
- Significant damage requiring substantial resources to resolve. (Risk severity)
- International standard for managing information security. (compliance framework)
- (8,6) A trustworthy origin of information or evidence. (Reliability)
- Formal rules and guidelines for secure system use and behaviour. (Administrative controls)
- A potential event or action that could cause harm to systems, data, or operations. (Risk Assessment)
- A weakness in a system or process that can be exploited by a threat. (Risk Assessment)
- Video surveillance used to monitor and record physical activity. (Physical control)
- Noticeable disruption but recoverable without major cost. (Risk severity)
- (8,9) Assurance that evidence remains unchanged and reliable. (Forensic Analysis)
- (6,6,4) A locked and restricted area for housing critical hardware. (Physical control)
- Verification that data or evidence is genuine. (Reliability)
- (5,2,7) Documentation showing who handled evidence and when. (Forensic Analysis)
- (9,6) Authentication using unique biological traits like fingerprints. (Physical control)
- (4,10,3,4) UK law that governs the collection, processing, and use of personal data; works with UK GDPR and grants individuals rights over their data. (compliance framework)
- EU regulation governing personal data protection and privacy. (compliance framework)
- The level of damage or disruption that a successful attack or incident would cause. (Risk Assessment)
- (3,4) A record of system events and activities for analysis. (Forensic Analysis)
Down
- (8,8) A structured approach to detect, contain, and recover from security incidents. (Administrative controls)
- (5-6,14) A login method requiring two or more verification factors. (Technical control)
- Actions taken to reduce the impact of a threat. (Incident Review & Security Report)
- The probability that a threat will exploit a vulnerability. (Risk Assessment)
- (10,8) Steps implemented to stop incidents before they occur. (Incident Review & Security Report)
- Critical impact causing severe operational or financial loss. (Risk severity)
- (8,6,3,4) UK law criminalizing unauthorized access and misuse of computer systems.(compliance framework)
- (8,4) The remaining risk after controls have been applied. (Incident Review & Security Report)
- The process of converting data into a coded format to prevent unauthorized reading. (Technical control)
- control Procedures that define who can view or use resources.(Administrative controls)
- (6-5)Designed to prevent unauthorized alteration. (Reliability)
- A network security device that filters traffic to block unauthorized access. (Technical control)
- A date and time marker showing when an event occurred. (Forensic Analysis)
- Minimal impact on operations; easily managed. (Risk severity)
31 Clues: Verification that data or evidence is genuine. (Reliability) • Minimal impact on operations; easily managed. (Risk severity) • (6-5)Designed to prevent unauthorized alteration. (Reliability) • (8,6) A trustworthy origin of information or evidence. (Reliability) • Noticeable disruption but recoverable without major cost. (Risk severity) • ...
CYBER LAW- CROSSWORD (CIA 1) 2021-09-05
Across
- This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
- The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
- It is often viewed as the act of sending unsolicited email.
- It is a common file format used to combine and compress data for easy downloading.
- Most popular search engine.
- These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
Down
- The act of persistent and unwanted contact from someone online.
- He is one of the famous scholar in cyber paternalism.
- There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
- The conversion of texts, pictures, or sound into a digital form.
10 Clues: Most popular search engine. • He is one of the famous scholar in cyber paternalism. • It is often viewed as the act of sending unsolicited email. • The act of persistent and unwanted contact from someone online. • The conversion of texts, pictures, or sound into a digital form. • It is a common file format used to combine and compress data for easy downloading. • ...
EXTREME SPORTS 2021-09-24
Across
- what happens each sport
- is main in all sports
- It's a winged suit used for gliding
- used in canyoning sport
- flying is skydiving that consists of flying using an airsuit
- occurs in all sports
- sports security means
- is a movement in which a living being propels through the air along a ballistic trajectory
Down
- ideal for all sports especially for wingsuit security is taken into account in all extreme sports
- consiste principalmente en el descenso de barrancos
- important security means
- board on snow
- it is the technique of launching human beings
13 Clues: board on snow • occurs in all sports • is main in all sports • sports security means • what happens each sport • used in canyoning sport • important security means • It's a winged suit used for gliding • it is the technique of launching human beings • consiste principalmente en el descenso de barrancos • flying is skydiving that consists of flying using an airsuit • ...
Unit 7-8 2019-06-03
Across
- Device used at airport security
- Piece of plastic you pay with
- When two people have different skills that work together
- Number to use your card
- Software to protect your computer
Down
- Company started by two other companies
- Serious problem with security
- Person working in security
- Win-win situation
- Thing which interests both sides
- Close circuit camera system (abbreviation)
- Somebody who works well with others
12 Clues: Win-win situation • Number to use your card • Person working in security • Serious problem with security • Piece of plastic you pay with • Device used at airport security • Thing which interests both sides • Software to protect your computer • Somebody who works well with others • Company started by two other companies • Close circuit camera system (abbreviation) • ...
5-3 B, C 2023-04-20
Across
- The objective of this step is the closing of security gaps.
- The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.
- are software packages used on information systems or networks to scan looking for weaknesses like open port exploitations, weak passwords, and security configuration errors leading to potential misuse and abuse.
- It performs configuration scans of servers, network devices and databases to test for specific policy settings and can check internal security policy compliance. Nessus® can perform scans of ports, firewall configurations, network devices (i.e. routers, switches, etc.), and provides reports back to the system administrator.
- The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.
- Monitors the network in real-time, continuously looking for new hosts, applications and new vulnerabilities without requiring the need for active scanning.
- The objective of this step is the prioritizing of vulnerabilities
- provides network administrators and security personnel with mechanisms to prevent, detect, track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks and information systems.
Down
- The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.
- The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one.
- The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.
- tool automatically identifies configuration vulnerabilities threatening the security of the DoD's computer systems
- is designed to support a faster pace of system updating and patch management for our network connected Windows devices. Quick and efficient delivery of high and critical security updates will ensure that you meet your compliance deadlines for TCNO and MTO’s.
- Single console access used by ACAS managing Nessus® scans at the enterprise network level. Security Center provides real-time detection of network anomalies and is scalable, meaning it can grow to accommodate as many scanners as needed to cover the entire network
- A DoD information system used to record, track, and disseminate critical vulnerability information throughout the DoD Enterprise network.
- The objective of this step is to draft a comprehensive list of an application’s vulnerabilities.
16 Clues: The objective of this step is the closing of security gaps. • The objective of this step is the prioritizing of vulnerabilities • The objective of this step is to draft a comprehensive list of an application’s vulnerabilities. • The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one. • ...
CLOUD AND DATA SECURITY 2025-02-15
Across
- The practice of defining who can access what in cloud services
- The process of giving permissions to users in cloud environments
- A system that manages users’ access to cloud services
- The main reason organizations use IAM
- A key component of IAM that ensures secure user authentication
- The practice of defining and managing user roles and privileges
Down
- The boundary that separates trusted and untrusted systems
- A key challenge in IAM that involves controlling multiple access points
- A security mechanism that verifies the identity of a user before granting access
- A security method ensuring that only authorized individuals can access data
- A widely used authentication standard for cloud services
- The process of verifying a user's identity before granting access
- The act of reducing risks related to data breaches
- The organization responsible for cloud security
14 Clues: The main reason organizations use IAM • The organization responsible for cloud security • The act of reducing risks related to data breaches • A system that manages users’ access to cloud services • A widely used authentication standard for cloud services • The boundary that separates trusted and untrusted systems • ...
Web Security p212-214, 252 2021-07-15
Across
- bad hacker, evil
- outdated & unreliable - untrustworthy technology
- Person --> "known knowns, ...know we don't know, ...don't know we don't know"
- criminal scamming & harvesting info often by gaining illegitimate access
- software attack, also what birds eat
- hacking methods may cross legal or ethical lines
- take advantage of vulnerability (a weakness) in software
- Chief Information security officer
- denial of service
- plan to prevent, detect and respond to any attempts to breach security
- a combination of confidentiality, integrity and availability
Down
- motivated by ideology to undertake maximum disruption to computer systems
- 'malicious software' infiltrating /damaging computer systems, without authorisation
- ethical hacker
- attacks that leave no time to prepare for or defend against an attack
- employee attacking company from the inside
- taking of data, physical assets or IP (intellectual property)
- espionage targets specific computer installations to steal data without being detected
18 Clues: ethical hacker • bad hacker, evil • denial of service • Chief Information security officer • software attack, also what birds eat • employee attacking company from the inside • outdated & unreliable - untrustworthy technology • hacking methods may cross legal or ethical lines • take advantage of vulnerability (a weakness) in software • ...
CryotoMaze 2 2024-12-09
Across
- Standard for information security management systems.
- Malware that demands payment to restore access.
- Strategies to prevent data loss or misuse.
- Secret key used for decryption in asymmetric encryption.
- Process of converting data into a fixed-size string of characters for integrity verification.
- Device that monitors and controls network traffic.
- Testing to identify vulnerabilities in a system.
- To verify the identity of a user or system.
- Reverse process of converting ciphertext back to plaintext.
- Protocol ensuring secure communications over networks.
- Centralized unit managing security operations.
- Security mechanism requiring multiple forms of verification.
Down
- Assurance that one cannot deny the validity of their actions.
- Key used in asymmetric encryption, shared publicly.
- Decentralized ledger technology for secure transactions.
- A weakness in a system that can be exploited.
- Handling cryptographic keys throughout their lifecycle.
- Process of converting plaintext into ciphertext.
18 Clues: Strategies to prevent data loss or misuse. • To verify the identity of a user or system. • A weakness in a system that can be exploited. • Centralized unit managing security operations. • Malware that demands payment to restore access. • Testing to identify vulnerabilities in a system. • Process of converting plaintext into ciphertext. • ...
Chapter 2 2014-10-19
Across
- A security principle that makes sure that information and systems are not modified maliciously or accidentally.
- An instance of being exposed to losses from a threat. A weakness or vul-nerability can cause an organization to be exposed to possible damages.
- The reliability and accessibility of data and resources to authorized individuals in a timely manner.
- Two or more people working together to carry out a fraudulent activity. More than one person would need to work together to cause some type of destruction or fraud; this drastically reduces its probability.
- Detailed step-by-step instructions to achieve a certain task, which are used by users, IT staff, operations staff, security members, and others.
- A security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.
- The act of tricking another person into providing confidential information by posing as an individual who is authorized to receive that information.
- High level document that outlines senior managemetn security directives
- A group decision method used to ensure that each member of a group gives an honest and anonymous opinion pertaining to the company’s risks.
- When a safeguard is not implemented, an organization is faced with the total risk of that particular vulnerability.
- Rellying on the secrecy or complexity of an item as its security instead of practicing instead of proacticing solid securyty practices
- An assessment that is performed to ensure that the cost of a safeguard does not outweigh the benefit of the safeguard. Spending more to protect an asset than the asset is actually worth does not make good business sense. All possible safeguards must be evaluated to ensure that the most security-effective and cost-effective choice is made.
- When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner.
- A risk analysis method that attempts to use percentages in damage estimations and assigns real numbers to the costs of countermeasures for particular risks and the amount of damage that could result from the risk. Compare to qualitative risk analysis.
- An individual who is responsible for the maintenance and protection of the data. This role is usually filled by the IT department (usually the network administrator). The duties include performing regular backups of the data, implementing security mechanisms, periodically validating the integrity of the data, restoring data from backup media, and fulfilling the requirements specified in the company’s security policy, standards, and guidelines that pertain to information security and data protection.
Down
- Any potential danger that a vulnerability will be exploited by a threat agent.
- An entity that can exploit a vulnerability.
- Detective/administrative control used to uncover potential fraudulet activities
- Organizational, Issue specific, and system specific are _____ (2 words)
- A risk analysis method that uses intuition and experience to judge an organization’s exposure to risks. It uses scenarios and ratings systems. Compare to quantitative risk analysis.
- A dollar amount that is assigned to a single event that represents the company’s potential loss amount if a specific threat were to take place.
- A dollar amount that estimates the loss potential from a risk in a span of a year.
- Rules indicating how hardware and software should be implemented, used, and maintained. Standards provide a means to ensure that specific technologies, asset value × exposure factor = SLE applications, parameters, and procedures are carried out in a uniform way across the organization. They are compulsory.
- Safeguard that is put in place to reduce risk. Also called a countermeasure.
- Regulatory, Advisory, Informative are ____ (3 words)
- analysis Assigning confidence level values to data elements
- Individual respponsible for the protection and classification of a specific data set
- The remaining risk after the security controls have been applied. The conceptual formulas that explain the difference between total and residual risk are threats × vulnerability × asset value = total risk(threats × vulnerability × asset value) × controls gap = residual risk
- The absence or weakness of a safeguard that could be exploited.
- The likelihood of a threat agent taking advantage of a vulnerability and the resulting business impact. A risk is the loss potential, or probability, that a threat will exploit a vulnerability.
- A security principle that works to ensure that information is not disclosed to unauthorized subjects.
- Recommended actions and operational guides for users, IT staff, operations staff, and others when a specific standard does not apply.
- accept, transfer, mitigate, avoid are ways to _____ (2 words)
33 Clues: An entity that can exploit a vulnerability. • Regulatory, Advisory, Informative are ____ (3 words) • analysis Assigning confidence level values to data elements • accept, transfer, mitigate, avoid are ways to _____ (2 words) • The absence or weakness of a safeguard that could be exploited. • Organizational, Issue specific, and system specific are _____ (2 words) • ...
BFCM Crossword 2023-11-13
Across
- Count of Transylvania
- 007 loves it dry
- The opposite of hot
- German automotive manufacturer
- Gotta catch them all
- She is having the Eras Tour
- 25th of December
- It goes with Plushes in the MVD
Down
- Gotham is a safe place with him
- She decides when it's tiiiime to celebrate Christmas
- Please provide your ... what marketing team is always asking for
- These ... are made for walking
- Familiar to Loch Ness
- It's Cyber the 27th
14 Clues: 007 loves it dry • 25th of December • The opposite of hot • It's Cyber the 27th • Gotta catch them all • Count of Transylvania • Familiar to Loch Ness • She is having the Eras Tour • German automotive manufacturer • These ... are made for walking • Gotham is a safe place with him • It goes with Plushes in the MVD • She decides when it's tiiiime to celebrate Christmas • ...
Community Safety Crossword 2025-09-16
Across
- Always close and lock all _ _ _ _ _ _ _ when you leave your home.
- Always wear your _ _ _ _ _ _ when biking.
- Always lock your _ _ _ when parked.
- Never open emails from _ _ _ _ _ _ _ senders.
- Install a smoke _ _ _ _ _ in every room.
- Residents can use the _ _ _ _ _ _ it portal on the Town's website to report any issues or concerns.
- Community outreach services _ _ _ _ _ _ _ people to appropriate support services.
- Never share personal _ _ _ _ _ _ _ _ _ _ _ with strangers.
- Install _ _ _ _ _ _ _ _ devices for added home safety.
- You can report anonymously to _ _ _ _ _ stoppers on 1800 333 000.
Down
- Over 1,000 community responses shaped The Safer _ _ _ _ _ _ _ _ _ _ _ _ _ Plan at the Town.
- Remove all _ _ _ _ _ _ _ _ _ from your car.
- Did you know you can get rebates for security devices through the Town's Security _ _ _ _ _ _ _ _ _ Scheme?
- Do not answer the door to _ _ _ _ _ _ _ _ _.
- Walk with a _ _ _ _ _ _ at night.
- Report all suspicious activity to the _ _ _ _ _ _ on 131 444.
- In an emergency, stay _ _ _ _ and call for help.
- The Town provides rebates for _ _ _ _ through the CCTV Partnership Program.
18 Clues: Walk with a _ _ _ _ _ _ at night. • Always lock your _ _ _ when parked. • Install a smoke _ _ _ _ _ in every room. • Always wear your _ _ _ _ _ _ when biking. • Remove all _ _ _ _ _ _ _ _ _ from your car. • Do not answer the door to _ _ _ _ _ _ _ _ _. • Never open emails from _ _ _ _ _ _ _ senders. • In an emergency, stay _ _ _ _ and call for help. • ...
Australia's Defence 2016-05-03
Across
- Provides land operations that include surveillance and special recovery.
- The principle security forum in the Asia-Pacific region, this fosters dialogue on political and security issues of common concern.
- For military training.
- For humanitarian relief to people affected by conflict.
- This is an informal agreement entered into with New Zealand during the 1990's to emphasize intelligence sharing and joint exercises between the two countries.
- The international use or threat of violence against civilians or civilian targets in order to achieve political ends.
- These served in China during the Boxer Rebellion, in South Africa during the Boer War and in both World Wars.
- An NGO that provides support for families that have lost someone from serving in the army.
- An NGO which presents information to parliament on defence and security issues.
- Three services that enable Australians to live in one of the most secure countries in the world.
- For people smuggling and terrorism.
- Provides maritime forces that operates ships, guided missile destroyers, patrol boats and submarines.
- This force is trained for unconventional warfare and counter-terrorism.
- For boarder protection.
Down
- Play a role in air surveillance and intelligence gathering.
- eight humanitarian development goals to be achieved by 2015
- This group is trained to conduct counter-terrorism activities including the recovery of hostages.
- For gathering information about criminal activity or security threats.
- This arrangement between the United Kingdom, Australia, New Zealand, Malaysia and Singapore was adopted in 1971. It involves consulting each other if there is a threat to attack Malaysia or Singapore.
- This regiment responds to chemical, biological, radiological, nuclear and explosive incidents.
- Intergovernmental organisation that promotes equity, human rights, peace and ecologically sustainable environments.
- Beginning in 1952, this treaty promotes regional(Australia, New Zealand and United States) security through peaceful means.
22 Clues: For military training. • For boarder protection. • For people smuggling and terrorism. • For humanitarian relief to people affected by conflict. • Play a role in air surveillance and intelligence gathering. • eight humanitarian development goals to be achieved by 2015 • For gathering information about criminal activity or security threats. • ...
Crossword - Voltedge 2019-09-05
Across
- Portal to view security emergency contact and other security info
- Which technology is used; searching from 41+ million tags?
- System that makes automated calls from security
- CDA application is hosted here
- Re-tag in TCT can be done by?
Down
- What is the SOX Compliant application under EHS
- 50th percentile
- Library in Python that helps exceute Deep Learning
- Source data ($) for deriving $ Thresholds?
- Security model used by most of the ERP applications
10 Clues: 50th percentile • Re-tag in TCT can be done by? • CDA application is hosted here • Source data ($) for deriving $ Thresholds? • What is the SOX Compliant application under EHS • System that makes automated calls from security • Library in Python that helps exceute Deep Learning • Security model used by most of the ERP applications • ...
Cybersecurity puzzle 2023-12-04
Across
- A common tactic in scams, creating a sense of immediate action needed.
- Online harassment that can breach your mental health
- Malware that encrypts files, demanding payment for decryption.
- A scam method using emails to trick users into revealing personal information
- The process of confirming a user's identity in a security system.
- A general term for deceitful practices to gain financial or personal gain.
- adding a unique string to a password before hashing it for added security.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A safer payment method for online purchases due to fraud protection.
- A type of malware that attaches itself to programs and corrupts or modifies files.
- Data-tracking files that should be disabled to enhance online privacy
- Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
- A method where hardware is used to record keystrokes and steal passwords.
- Malware that secretly observes the user's actions.
- Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
- Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
- Everything you do on the internet that stays with you, even when you turn off your devices
- Harmful software that scammers might install through tech support scams.
- Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
- Autonomous malware that replicates and spreads through network vulnerabilities.
- Software designed to detect and remove malicious software like viruses and malware.
- A popular brand of antivirus software.
- Using more than one method of authentication for enhanced security.
- When personal information is accessed and stolen by unauthorized individuals
- The method of converting passwords into gibberish to protect them in password files.
- A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.
26 Clues: A popular brand of antivirus software. • Malware that secretly observes the user's actions. • Online harassment that can breach your mental health • Malware that encrypts files, demanding payment for decryption. • The process of confirming a user's identity in a security system. • Using more than one method of authentication for enhanced security. • ...
trial1-rm 2022-08-22
Across
- This aerospace manufacturer announced that open source, hybrid cloud and AI technologies from IBM and Red Hat are part of its second mission.
- Form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
- An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
- First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was ___
- A Person who uses technology to gain unauthorized access to data is called a ___ .
- To avoid ____________, user input should not be put directly into a database.
- IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers.
- A group of protocols used to encrypt data between two communication points.
- A protocol used for directory services authentication that was first developed in 1993.
- The _____________ ransomware group recently hacked a networking giant by compromising an employee’s personal google account.
- “Never trust, always verify” is the first defining principle of which model
Down
- I have a dual role in MaaS Architecture –CDN and WAF. Which vendor are we talking about?
- For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships.
- This IBM Research tool allows scientists and businesses to search mountains of unstructured data
- Cross-site scripting standing in front of amirror
- Vast Strides –I help in identifying Security Vulnerabilities
- One-way street to persisting top secrets
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
- IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
- Recent IBM security acquisition of an endpoint security company.
20 Clues: One-way street to persisting top secrets • Cross-site scripting standing in front of amirror • Vast Strides –I help in identifying Security Vulnerabilities • Recent IBM security acquisition of an endpoint security company. • A group of protocols used to encrypt data between two communication points. • ...
TEKA-TEKI silang 2025-06-03
Across
- pencurian hak cipta (11 h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- menjaga keamanan data pribadi di internet (13h)
- penyebaran informasi palsu yang meluas (4 huruf)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
Down
- aturan dan norma berperilaku baik di media sosial (11 h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- peraturan yang melindungi data pribadi (16h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
TEKA-TEKI silang 2025-06-03
Across
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- peraturan yang melindungi data pribadi (16h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- aturan dan norma berperilaku baik di media sosial (11 h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
Down
- menjaga keamanan data pribadi di internet (13h)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- penyebaran informasi palsu yang meluas (4 huruf)
- pencurian hak cipta (11 h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
EXTREME SPORTS 2021-09-24
Across
- what happens each sport
- is main in all sports
- It's a winged suit used for gliding
- used in canyoning sport
- flying is skydiving that consists of flying using an airsuit
- occurs in all sports
- sports security means
- is a movement in which a living being propels through the air along a ballistic trajectory
Down
- ideal for all sports especially for wingsuit security is taken into account in all extreme sports
- consiste principalmente en el descenso de barrancos
- important security means
- board on snow
- it is the technique of launching human beings
13 Clues: board on snow • occurs in all sports • is main in all sports • sports security means • what happens each sport • used in canyoning sport • important security means • It's a winged suit used for gliding • it is the technique of launching human beings • consiste principalmente en el descenso de barrancos • flying is skydiving that consists of flying using an airsuit • ...
dudes 2023-01-30
Across
- People you don't know that are watching you
- selected or organized knowledge
- keeping things to yourself
- Lasting a long time
- stealing someones identity
- online feet
Down
- info leading to your identity
- Sharing stuff you will regret
- flag feeling a bad feeling about something
- a trick to steal peoples money
- bully an online bully
- somone trying to steal your identity
- out chosing not to do something
13 Clues: online feet • Lasting a long time • bully an online bully • keeping things to yourself • stealing someones identity • info leading to your identity • Sharing stuff you will regret • a trick to steal peoples money • selected or organized knowledge • out chosing not to do something • somone trying to steal your identity • flag feeling a bad feeling about something • ...
Security 2021-08-10
Across
- General term for malicious software that changes the target system's behavior, destroys data, or spies on the user. Can also propagate across a network.
- Trying multiple combinations of credentials against a target system
- Hidding malicious software inside seemingly legitimate software
- An email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion
Down
- An attack where the victim is asked to pay a ransom to do not have their data publicly shared, or to unlock a system that is being held by malicious software (and thus, rendered useless)
- Intercepting network traffic in an attempt to find sensitive information (Hint: it's the same name as if you were listening to your neighbors having a private conversation)
- one of the most important things you should do on your system to prevent attacks. The sysadmin and security teams will appreciate if you do this
7 Clues: Hidding malicious software inside seemingly legitimate software • Trying multiple combinations of credentials against a target system • An email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion • ...
security 2024-02-06
7 Clues: Secure Communications • Official and Sensitive • Computer and Internet Related • “You’re a Winner!’ email, often • Fake email, looking for your data • Two Factor, Let’s make sure it’s you • Key to a lock, you should never write this down
bullying- luana 2023-03-21
8 Clues: stalking • Online Bullying • spreading rumors • Witnesses bullying • Long term effect from bullying • when someone says negative words • someone who is affected by bullying • a person or group repeatedly hurts or intimidates
bullying- Loretta 2023-11-28
8 Clues: online • hurt by a bully • repetitive abuse • punch or physical • a friend of a victim • fighting between parties • someone who teases others • he shows _______ when he punched the wall.
Ασφαλές Διαδίκτυο 2024-02-12
Across
- scams ηλεκτρονικές απάτες
- addiction εθισμός στο διαδίκτυο
- positive εικόνα σώματος και κοινωνικά δίκτυα
- news ψευδείς ειδήσεις
- on the internet άγνωστοι στο διαδίκτυο
- reputation διαδικτυακή φήμη
Down
- διαδικτυακός εκφοβισμός
- κακόβουλο λογισμικό
- piracy πειρατεία λογισμικού
- privacy προστασία προσωπικών δεδομένων
10 Clues: κακόβουλο λογισμικό • news ψευδείς ειδήσεις • διαδικτυακός εκφοβισμός • scams ηλεκτρονικές απάτες • piracy πειρατεία λογισμικού • reputation διαδικτυακή φήμη • addiction εθισμός στο διαδίκτυο • privacy προστασία προσωπικών δεδομένων • on the internet άγνωστοι στο διαδίκτυο • positive εικόνα σώματος και κοινωνικά δίκτυα
GDPR 2023-02-13
11 Clues: omission • penalty fee • confidential • personal data • privacy filter • security breach • privacy statement • basis of processing • professional secrecy • information security • data protection authority
IPO 2021-06-10
Across
- opinion (Plato)
- a three-tier complex world (Nye)
- author of an offensive or provocative post
- acquisition of relatively stable PO
- democratic theory(active citizens)
- a type of power that affects identities
Down
- society governed by the wealthy
- power in direct interactions
- a symptom of state erosion (Dasgupta)
- the biggest cyber crime offender (country)
- a contextual message about the information
- Friedman's definition of interdependent wo
- int users that don't contribute any content
- reiterative information (confirmation bias)
- a kind of manipulated political talk
15 Clues: opinion (Plato) • power in direct interactions • society governed by the wealthy • a three-tier complex world (Nye) • democratic theory(active citizens) • acquisition of relatively stable PO • a kind of manipulated political talk • a symptom of state erosion (Dasgupta) • a type of power that affects identities • the biggest cyber crime offender (country) • ...
pastbin 2020-12-22
Across
- Points on a star
- Kind of car
- The Spanish word for open
- Put something on top of
- 3d image formed by light from a laser
- Everybody has 2
- In a car
- The state you live in
Down
- Not physically existing but appears to do so
- Inormation technology
- Text files with small pieces of data
- The Spanish word for green
- High social class
- How many spent years in high school
- A fact of being who or what a person is
15 Clues: In a car • Kind of car • Everybody has 2 • Points on a star • High social class • Inormation technology • The state you live in • Put something on top of • The Spanish word for open • The Spanish word for green • How many spent years in high school • Text files with small pieces of data • 3d image formed by light from a laser • A fact of being who or what a person is • ...
multimedia 2013-10-20
Across
- used to represent the shots planned for a film or television production
- a layout/ template used for designing
- according or agreeing
- photographs, pictures
- a program used to design multimedia
- a cyber ‘portal’
- 6 words, rhymes with clear
- anywhere on a paper which has no picture or text
- opposite of internal link
Down
- sound
- changing from one slide to another
- used for presentations
- I can record _ _ _ _ _
- text that when clicked on opens a new page
- images which are rapidly shown
15 Clues: sound • a cyber ‘portal’ • according or agreeing • photographs, pictures • used for presentations • I can record _ _ _ _ _ • opposite of internal link • 6 words, rhymes with clear • images which are rapidly shown • changing from one slide to another • a program used to design multimedia • a layout/ template used for designing • text that when clicked on opens a new page • ...
BCS reveiw noah 2015-11-13
Across
- computer screen
- something that you move and click stuff with
- proper technique
- being safe on thee interwebs
- a message sender thing that send messages to people
- something you can access the web on
- micro soft excel
- a group of computers
Down
- a plan u pick that limits sertan thing
- web page maker
- ware stuff that makes up a computer
- asdfjkl;'
- bully bully on the internet
- publisher greating cards
- a small slip of buttons at the top of a Microsoft thing
15 Clues: asdfjkl;' • web page maker • computer screen • proper technique • micro soft excel • a group of computers • publisher greating cards • bully bully on the internet • being safe on thee interwebs • ware stuff that makes up a computer • something you can access the web on • a plan u pick that limits sertan thing • something that you move and click stuff with • ...
Cyberbezpieczeństwo 2025-04-09
Across
- Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
- Proces szyfrowania danych .
- Kopia zapasowa danych .
- Program,który chroni komputer przed wirusami .
- Nazwa użytkownika potrzebna do zalogowania się .
- forma złośliwego oprogramowania, które żąda okupu.
Down
- Złośliwe oprogramowanie podszywające się pod coś użytycznego .
- Może zawierać litery, cyfry i znaki specjalne .
- Zabezpieczenie dostępu np.login.
- Chroni tożsamość w internecie .
- Ogólna nazwa dla złośliwego orpogramowania .
- Fałszywa wiadomość podszywająca się pod zaufane żródłó.
- Sieć WI-FI bez hasła .
- DDoS Cyber atak polegający na zalaniu serwera.
- Krótkie potwierdzenie logowania .
15 Clues: Sieć WI-FI bez hasła . • Kopia zapasowa danych . • Proces szyfrowania danych . • Chroni tożsamość w internecie . • Zabezpieczenie dostępu np.login. • Krótkie potwierdzenie logowania . • Ogólna nazwa dla złośliwego orpogramowania . • Program,który chroni komputer przed wirusami . • Może zawierać litery, cyfry i znaki specjalne . • ...
Juni 1 2024-06-13
Across
- Thank you for always coming with me
- We still don't know what it means
- The reason we whisper
- Rice Krispies...
- Doha Fried Chicken
- The tree I actually know
- If she can do cyber, so can you
Down
- My favourite orange vegetable
- I make it well, you make it even better
- Watchuwannamanna
- Swiss brand
- Food fit for BC
- The highest restaurant in Africa
- The best ice cream I've ever had
- Your fav Hyatt staff member
15 Clues: Swiss brand • Food fit for BC • Watchuwannamanna • Rice Krispies... • Doha Fried Chicken • The reason we whisper • The tree I actually know • Your fav Hyatt staff member • My favourite orange vegetable • If she can do cyber, so can you • The highest restaurant in Africa • The best ice cream I've ever had • We still don't know what it means • Thank you for always coming with me • ...
United Nation Councils 2025-05-24
Across
- These missions are sent by the Security Council to help calm conflicts.
- Group that works on issues like health, education, and equality
- One of the five permanent members of the Security Council. (Hint: large country in Asia)
- The number of permanent members on the Security Council
Down
- The General Assembly gives every country one of these.
- The group where all countries meet to discuss global problems
- The council that focuses on money, jobs, and reducing poverty
- This word means all countries have one equal say in voting
- The United Nations group that works to keep peace around the world.
- A way the Security Council can pressure countries, like stopping trade
10 Clues: The General Assembly gives every country one of these. • The number of permanent members on the Security Council • This word means all countries have one equal say in voting • The group where all countries meet to discuss global problems • The council that focuses on money, jobs, and reducing poverty • ...
It's Fall Y'all 2021-10-12
Across
- Delicious when roasted
- Given in November
- ___ Monday
- Turning and falling
- Major autumn sport
- Sign of candy availability
- The other part of a classic choice
- For lattes or carving
- Fall weather type
- Traditional last-minute costume
- Cooler autumn sport
- Adult warm-up beverage
- Parade sponsor
Down
- Roasted over fires
- Preferable type of house
- Door-knock outcome
- The star of the dinner
- Canned or homemade
- Spooky season pinnacle
- Winter, Spring, Summer, ___
- Popular picking destination
- Predominant fall color
- Door decoration
- One part of a classic choice
- Beloved pie
- October movie genre
- Ideal fall food
27 Clues: ___ Monday • Beloved pie • Parade sponsor • Door decoration • Ideal fall food • Given in November • Fall weather type • Roasted over fires • Door-knock outcome • Canned or homemade • Major autumn sport • Turning and falling • October movie genre • Cooler autumn sport • For lattes or carving • Delicious when roasted • The star of the dinner • Spooky season pinnacle • Predominant fall color • ...
Friday Fun - Do you know your Acronyms? 2022-02-03
Across
- The T in TPP
- The I in DPIA
- The C in DSCA
- The Q in QSealC
- The L in OBL
- The G in GDPR
- The A in OPA
- The D in PSD2
- The T in QTSP
- The I in PISP
- The C in CPS
Down
- The I in AISP
- The P in ERP
- The A in QWAC
- The first U in UUID
- The first S in ASPSP
- The O in DSOP
- The L in AML
- The E in OBIE
- The C in CDC
- The S in QTSP
- The N in JSON
- The B in CBPII
23 Clues: The T in TPP • The P in ERP • The L in OBL • The L in AML • The C in CDC • The A in OPA • The C in CPS • The I in AISP • The A in QWAC • The I in DPIA • The O in DSOP • The C in DSCA • The G in GDPR • The E in OBIE • The S in QTSP • The N in JSON • The D in PSD2 • The T in QTSP • The I in PISP • The B in CBPII • The Q in QSealC • The first U in UUID • The first S in ASPSP
