cyber security Crossword Puzzles
CYBER ETHICS - 2 2025-05-24
Across
- is a type of phishing attacks
- is the combination of net and etiquette
- are defined as the legal rules
- refers to an illegal intrusion into a computer system or network.
- refers to the act of using or imitating the language
- refers to several computers loaded to the contrary licence terms
- refers to criminal activities that involve the use of computers
- is the criminal practice of using social influence
- is a malicious technique
Down
- refers to when someone copies a file and distribute them illegally
- refers to unwanted bulk emails that come from from unknown sources.
- is a practice which is a practice of sending bulk mails till the mail server gets full
- is a digital footprint
- is an integral part and parcel of our life.
- is a security system preventing unauthorised people to access your system
- is an equivalent term to hacking
- is the combination of voice and phishing
17 Clues: is a digital footprint • is a malicious technique • is a type of phishing attacks • are defined as the legal rules • is an equivalent term to hacking • is the combination of net and etiquette • is the combination of voice and phishing • is an integral part and parcel of our life. • is the criminal practice of using social influence • ...
Health 2023-09-01
10 Clues: mean person • leader of school • a choice you make • person who gets hurt • Person who teaches kids • person who saves the victim • The state of being protected • standing around and do nothing • The condition of being protected • bullying bullying someone online
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
weekly news 2025-01-09
10 Clues: resigned • truck explodes • carter dies at 100 • new 9 dollar tolls • storm across the U.S • catches fire on runway • la fire and 100 mph winds • wants greenland and canada • watching watch in the south • launches a new offense into russia
Explore the new ascendlearning.com 2023-08-24
Across
- Ascend value
- Ascend safety and security brand
- Ascend Learning tagline
- Ascend solution
- Ascend CFO
- Ascend healthcare brand
- Ascend CEO
- Company that recognized Ascend as a Great Workplace for Diversity
- Ascend inclusion learning program
- Ascend General Counsel
Down
- Ascend president of healthcare
- Ascend fitness and wellness brand
- Ascend value
- Ascend executive VP of corporate development
- Ascend Burlington community outreach group
- Ascend president of safety and security
- Healthcare vertical
- Ascend CHRO
- Ascend CTO
- Ascend Burlington address
20 Clues: Ascend CTO • Ascend CFO • Ascend CEO • Ascend CHRO • Ascend value • Ascend value • Ascend solution • Healthcare vertical • Ascend General Counsel • Ascend Learning tagline • Ascend healthcare brand • Ascend Burlington address • Ascend president of healthcare • Ascend safety and security brand • Ascend fitness and wellness brand • Ascend inclusion learning program • ...
Netiquette nintendo 2023-02-27
Across
- il nome del bullismo tramite rete
- caratteri grandi che sul web equivale ad URLARE
- il contrario di buona educazione
- rendere pubblico sul web
- in rete
- persona cortese verso gli altri
Down
- riservato e rispetto delle proprie informazioni
- termini offensivi da non usare
- mail pubblicitarie da non condividere
- galateo informatico
- atteggiamento di riguardo
- rispetto degli altri
12 Clues: in rete • galateo informatico • rispetto degli altri • rendere pubblico sul web • atteggiamento di riguardo • termini offensivi da non usare • persona cortese verso gli altri • il contrario di buona educazione • il nome del bullismo tramite rete • mail pubblicitarie da non condividere • riservato e rispetto delle proprie informazioni • ...
Vocab Qtr 2 - Personal Finance 2025-01-13
Across
- Ownership of a company
- Tax on imported goods
- Money earned from investment
- Using the internet
- One's gain is another's loss
- Cyber threat
Down
- IRS college investment
- Money received from interest or gift
- Employers and/or employees pay as you earn
- Measurement on a monopoly
- Profit or loss on investment
- Digital Money not issued by government
12 Clues: Cyber threat • Using the internet • Tax on imported goods • IRS college investment • Ownership of a company • Measurement on a monopoly • Money earned from investment • Profit or loss on investment • One's gain is another's loss • Money received from interest or gift • Digital Money not issued by government • Employers and/or employees pay as you earn
Thanksgiving 2024-11-25
Across
- A brand of turkey which has a customer hotline
- Thanksgiving side dish
- Thanksgiving pie
- Friday after Thanksgiving
- Thanksgiving day of the week
Down
- Sport many enjoy playing or watching on Thanksgiving
- Common activity after Thanksgiving dinner
- Thanksgiving parade
- An amino acid in turkey
- Reason for celebrating Thanksgiving
- Thanksgiving main dish
- Monday after Thanksgiving
12 Clues: Thanksgiving pie • Thanksgiving parade • Thanksgiving side dish • Thanksgiving main dish • An amino acid in turkey • Monday after Thanksgiving • Friday after Thanksgiving • Thanksgiving day of the week • Reason for celebrating Thanksgiving • Common activity after Thanksgiving dinner • A brand of turkey which has a customer hotline • ...
KEUANGAN DIGITAL 2026-01-29
Across
- digital milik Bank Indonesia | QRIS
- di dunia digital | CYBER
- transaksi elektronik | STRUK
- pembayaran menggunakan kartu chip | DEBIT
- uang digital berbasis server | SERVER
- perbankan berbasis ponsel | MBANKING
- pengatur sistem pembayaran | BI
- keuangan berbasis teknologi | FINTECH
Down
- pinjaman berbasis aplikasi | PINJOL
- untuk transfer dan pembayaran online | PAYMENT
- pengaman data digital | ENKRIPSI
- verifikasi dua langkah | OTP
- jual beli tanpa uang tunai | NONTUNAI
- menggunakan internet | ONLINE
- identitas rekening bank | REKENING
15 Clues: di dunia digital | CYBER • transaksi elektronik | STRUK • verifikasi dua langkah | OTP • menggunakan internet | ONLINE • pengatur sistem pembayaran | BI • pengaman data digital | ENKRIPSI • identitas rekening bank | REKENING • pinjaman berbasis aplikasi | PINJOL • digital milik Bank Indonesia | QRIS • perbankan berbasis ponsel | MBANKING • uang digital berbasis server | SERVER • ...
Allena L'Empatia 2025-03-11
Across
- Atto di discriminazione
- Offesa alla diversità
- Accettare tutte le persone
- Bullismo attraverso apparecchi elettronici
- Comprendere i sentimenti altrui
Down
- Coloro che sono fragili e subiscono atti di bullismo
- Aiutare chi è in difficoltà
- Voler bene a qualcuno
- Sostengono il bullo
- Considerare tutti uguali
- Cosa provoca il bullismo?
- Essere trattato nello stesso modo
- Persona non empatica e che provoca il bullismo
- Affrontare la situazione senza paura
14 Clues: Sostengono il bullo • Voler bene a qualcuno • Offesa alla diversità • Atto di discriminazione • Considerare tutti uguali • Cosa provoca il bullismo? • Accettare tutte le persone • Aiutare chi è in difficoltà • Comprendere i sentimenti altrui • Essere trattato nello stesso modo • Affrontare la situazione senza paura • Bullismo attraverso apparecchi elettronici • ...
Cyber Safety 2022-09-06
Across
- Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money.
- Set a ________________ password to keep your online accounts secure.
- Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
- Spam, phishing and scams are examples of cyber __________________.
Down
- A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
- ________________ suspicious attachments or links.
- Remember to ________ ________ of your accounts.
7 Clues: Remember to ________ ________ of your accounts. • ________________ suspicious attachments or links. • Spam, phishing and scams are examples of cyber __________________. • Set a ________________ password to keep your online accounts secure. • A cyber attack that uses emails or malicious websites to steal a person’s login and password details. • ...
Cyber Safety 2022-09-06
Across
- A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
- Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money.
- Remember to ________ ________ of your accounts.
Down
- Spam, phishing and scams are examples of cyber __________________.
- Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
- ________________ suspicious attachments or links.
- Set a ________________ password to keep your online accounts secure.
7 Clues: Remember to ________ ________ of your accounts. • ________________ suspicious attachments or links. • Spam, phishing and scams are examples of cyber __________________. • Set a ________________ password to keep your online accounts secure. • A cyber attack that uses emails or malicious websites to steal a person’s login and password details. • ...
Elle Severt- Types of bullying 2022-05-17
Across
- _____ Is the B of bullying,contains unequel power.
- ___ is the C of bullying, happens more than once.
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
- Layla spits on Jenny and laughs at her outfit, what is this?
Down
- Ms.Wilker is mean to Mrs.Black but apologizes, what is this considered?
- Cyber bullying can be someone texting or posting something __ photos of people.
- ___ is the D of bullying, it is a intention to harm.
- the A of bullying, physically, emotionally, or socially.
- Fred and Sammy are arguing and saying some mean things, but there's a solution to the problem. What is this called?
- Social bullying is spreading rumors,__ people from games and groups
- ___ has an unbalanced power and someone is getting harmed emotionally, socially,or physically.
- Jake threatened to beat up Marc after school, what is this?
- Jimmy and Timmy are calling each other names, but are laughing. What is this called?
15 Clues: ___ is the C of bullying, happens more than once. • _____ Is the B of bullying,contains unequel power. • ___ is the D of bullying, it is a intention to harm. • the A of bullying, physically, emotionally, or socially. • Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • ...
moneyy 2023-11-07
Across
- things we can post
- cyber
- when people convince you to buy things you dont need
- something you own
- people convice you to give them money thats not theirs
- money one doesnt spend
Down
- stealing
- the final amount of ones paycheck
- things we shouldnt post
- something you owe
- something one can live without
- something one cant live without
- whats most important to someone
- scams that target older people
- a profession that holds your money for you
- what do we spend
16 Clues: cyber • stealing • what do we spend • something you owe • something you own • things we can post • money one doesnt spend • things we shouldnt post • something one can live without • scams that target older people • something one cant live without • whats most important to someone • the final amount of ones paycheck • a profession that holds your money for you • ...
Black Friday Bonanza! 2024-11-28
Across
- A compound word that is criminal!
- Confusion and disaster
- After Thanksgiving
- A large drop in wealth
- The sport associated with the real story of Black Friday
Down
- No compassion and all in a crooked house
- The city where it all began.
- Very cheerful and delightful
- To change
- A loss
- Disaster and confusion
- Profit
12 Clues: A loss • Profit • To change • After Thanksgiving • Confusion and disaster • Disaster and confusion • A large drop in wealth • The city where it all began. • Very cheerful and delightful • A compound word that is criminal! • No compassion and all in a crooked house • The sport associated with the real story of Black Friday
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
Elle Severt- Types of bullying 2022-05-17
Across
- _____ Is the B of bullying,contains unequel power.
- ___ is the C of bullying, happens more than once.
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
- Layla spits on Jenny and laughs at her outfit, what is this?
Down
- Ms.Wilker is mean to Mrs.Black but apologizes, what is this considered?
- Cyber bullying can be someone texting or posting something __ photos of people.
- ___ is the D of bullying, it is a intention to harm.
- the A of bullying, physically, emotionally, or socially.
- Fred and Sammy are arguing and saying some mean things, but there's a solution to the problem. What is this called?
- Social bullying is spreading rumors,__ people from games and groups
- ___ has an unbalanced power and someone is getting harmed emotionally, socially,or physically.
- Jake threatened to beat up Marc after school, what is this?
- Jimmy and Timmy are calling each other names, but are laughing. What is this called?
15 Clues: ___ is the C of bullying, happens more than once. • _____ Is the B of bullying,contains unequel power. • ___ is the D of bullying, it is a intention to harm. • the A of bullying, physically, emotionally, or socially. • Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • ...
Airports 2018-06-21
Across
- number of runways
- restrictions
- weight for a checked bag in economy class
- Gisborne three letter code
- animals for security
- perth
- Airport to Auckland city
- Airside
- landside
Down
- is not a dangerous good
- time
- me phonetic alphabet
- Wheelchair passengers
- 1 travel document
- the wall of an aircraft
- evacuating passengers from a stricken aircraft quickly and safely
- Number of Aviation security activities
- A passenger who does not turn up for their flight
- one entry level position
19 Clues: time • perth • Airside • landside • restrictions • number of runways • 1 travel document • me phonetic alphabet • animals for security • Wheelchair passengers • is not a dangerous good • the wall of an aircraft • Airport to Auckland city • one entry level position • Gisborne three letter code • Number of Aviation security activities • weight for a checked bag in economy class • ...
Air side and land side 2018-02-25
Across
- / Kapita Coast
- / Hokitika
- / Fill in gap... Air side is the area where you go through security & hand over your ..... and departure card for inspection.
- / How many restrictions does Auckland airport have from airfeild data.
- / Name of Blenheim airport.
- / Domestic flights involve passengers having to show there...
- / Name of Aucklands airport.
- / GDP stands for...
- / Can be accessed by both travellers and non-travellers.
- / Timaru
- / What must departing passengers pass through.
Down
- / Land side includes .... lots, public transports such as bus stations
- / What do you need to go through as well as passport control.
- / Any staff trying to access air side, must be wearing ther...
- / Land side is considered to be...
- / Which side would you find duty-free, shops, taxiways and aprons.
- / What must you be to get from land side to air side
- / Hamilton
- / Taupo
19 Clues: / GDP stands for... • / Taupo • / Timaru • / Hokitika • / Hamilton • / Name of Blenheim airport. • / Name of Aucklands airport. • / Kapita Coast • / Land side is considered to be... • / Any staff trying to access air side, must be wearing ther... • ...
Information Security 2022-11-14
Across
- When Some User Alters Data
- Impact to _______ Security
- A Principle Of Information Security Beginning With A
- A Principle Of Information Security Beginning With I
- What Is An Unauthorised Access To Data
Down
- A Principle Of Information Security Beginning With C
- Loss Of Data
- Intentional ___________ Of Data
- When Someone Access Data They Shouldn't
- What Happens After A Risk Is Exploited
10 Clues: Loss Of Data • When Some User Alters Data • Impact to _______ Security • Intentional ___________ Of Data • What Happens After A Risk Is Exploited • What Is An Unauthorised Access To Data • When Someone Access Data They Shouldn't • A Principle Of Information Security Beginning With C • A Principle Of Information Security Beginning With A • ...
Security Awareness 2013-05-01
Across
- (2 words) An employee security awareness program across the ESPN and Walt Disney company.
- Distracted Drivers Awareness Month
- See ____? Say ___!
- DON’T BE A DISTRACTED ______!
- “Up from the ____” is Global Security’s initiative to reinforce Community Watch safety tips and give employees a fun way to learn more about our teammates.
Down
- ________ is a member of the security community.
- Never ____ your ID to another employee
- Do not open ___________ to unsolicited emails
- A type of “social engineering” generally in the form of an email or phone call intended to get people to respond to the phishers request for personal information.
- Self-Awareness is ________ Awareness - you know what is normal and not normal in your workplace.
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain standing with the victim via phone, email, or text, based on information they have obtained from these social networks.
- Contact Brian ____, Associate Director of Facility Security to find out more on how you can get involved with the Community Watch Team.
12 Clues: See ____? Say ___! • DON’T BE A DISTRACTED ______! • Distracted Drivers Awareness Month • Never ____ your ID to another employee • Do not open ___________ to unsolicited emails • ________ is a member of the security community. • (2 words) An employee security awareness program across the ESPN and Walt Disney company. • ...
Security - Hard 2023-11-28
Across
- practice of intentionally and ethically hacking into systems to discover vulnerabilities
- cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
- security model emphasizing the importance of confidentiality, integrity, and availability of information
- type of attack involves capturing and analyzing network traffic to obtain sensitive information
- attack that employs multiple methods simultaneously
- type of malware changes its appearance and characteristics to evade detection
Down
- process of hiding information within another file or message
- cybersecurity principle ensuring that data is accurate, complete, and unaltered
- practice of disguising data traffic to make it look like normal traffic
- Linux user's favorite game
- cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
- type of malware disguises itself as legitimate software to trick users into installing it
12 Clues: Linux user's favorite game • attack that employs multiple methods simultaneously • process of hiding information within another file or message • practice of disguising data traffic to make it look like normal traffic • type of malware changes its appearance and characteristics to evade detection • ...
SECURITY DOMAIN 2023-11-03
Across
- / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access.
- / Means the program to increase the knowledge and improve the attitude that members of an organization possess regarding the protection of the physical, and especially informational, assets of an organization.
- / Responsible for managing and maintaining the security of computer systems, including user accounts, access controls, and system configurations.
- Issues / Refers to the ethical, legal, and social considerations related to technology and cybersecurity, including privacy and compliance issues.
- / Refer to the underlying software and hardware technologies that provide a foundation for building applications or services, like operating systems or cloud platforms.
Down
- / The study, planning and design of how people and computers work together so that a person’s need are satisfied in the most effective way.
- and Architecture / Addresses the security aspects of integrating different systems and designing secure system architectures.
- / Refers to physical security measures, such as securing data centers, facilities, and infrastructure from physical threats.
- / Centered on securing web applications, servers, and the communication between users and web services.
- / Refers to the practice of integrating different software components or systems to work together cohesively and efficiently.
- / Deals with the secure handling, storage, retrieval, and sharing of sensitive information and data within an organization.
- / Refers to the foundational principles and concepts in computer programming, such as data structures, algorithms, and coding basics.
12 Clues: / Centered on securing web applications, servers, and the communication between users and web services. • / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access. • ...
Security & Safeguards 2024-10-04
Across
- Security Officer
- Protection from potential harm
- You walk through it
- ADM163
Down
- Department of Health & Human Services
- DHHS owned or leased building
- Any device that performs computing functions
- The release of information
- Staff Members
- Protective measures or actions
- Work related instruction
- Protection of personal information
12 Clues: ADM163 • Staff Members • Security Officer • You walk through it • Work related instruction • The release of information • DHHS owned or leased building • Protection from potential harm • Protective measures or actions • Protection of personal information • Department of Health & Human Services • Any device that performs computing functions
Food security 2024-10-17
Across
- Staple food that includes wheat, rice, and corn
- Organisms harmful to crops
- Common cereal crop for bread and flour
- Fair distribution of resources
- Severe shortage of food in a region
Down
- Land area where food is grown
- Environmental factor impacting agriculture
- Physical well-being affected by nutrition
- Essential resource for irrigation and crop growth
- Foundation needed for planting crops
- State of needing food due to lack of access
- Exchange of goods between regions
12 Clues: Organisms harmful to crops • Land area where food is grown • Fair distribution of resources • Exchange of goods between regions • Severe shortage of food in a region • Foundation needed for planting crops • Common cereal crop for bread and flour • Physical well-being affected by nutrition • Environmental factor impacting agriculture • ...
Test Security 2025-10-09
Across
- Involves protecting ALL secure test content and student information
- No person may view, ____, or discuss the contents of any state assessment before, during, or after a test administration.
- One of the two areas of test security
- One of the two types of irregularities
- All staff members must sign one today
- Test Security Ensures all students’ testing opportunities are meaningful and ____.
Down
- Some of the most common types of testing irregularities, but the can be reduced with annual training.
- One penalty of violating test security includes _____ student test results
- No person may duplicate, print, record, write notes about, or _____ (electronically or by any other means) any portion of a secure assessment instrument (paper or online).
- A one stop shopping for users needing information about all aspects of testing
- If you catch a student using a telecommunication device during testing, contact ____ immediately.
- Where secure materials are stored on our campus
12 Clues: One of the two areas of test security • All staff members must sign one today • One of the two types of irregularities • Where secure materials are stored on our campus • Involves protecting ALL secure test content and student information • One penalty of violating test security includes _____ student test results • ...
Black friday 2024-11-28
10 Clues: SWEET TREATS • WORN ON YOUR WRIST • PLURAL OF A BARGAIN • POPULAR ONLINE STORE • A BIG SHOPPING SESSION • HOLDS YOUR CASH AND CARDS • THINGS CHILDREN PLAY WITH • NIKE OR ADIDAS ARE EXAMPLES • MONDAY'S ONLINE SHOPPING DAY • PLAYED IN STORES ON BLACK FRIDAY
Security Quiz 2021-12-07
Across
- Risk identified for the project should be documented and tracked in
- Phishing is a form of
- The major ransomeware trojan targeting windows in 2014
- This gives the contact numbers of all stakeholders
- this attack can be deployed by infusing a malicious code in website's comment section(abbreviation)
Down
- lack of access control policy is a
- Technology to hide information inside a picture
- Using this for doing competitive information gathering is a crime
- Compromising confidential information comes under
- This automates an action or attack so that repetitive tasks are done at a faster rate
- A malicious program do not replicate automatically
- Attackers could steal this to achieve illegitimate accessing to online accounts and disturbs the personal information
12 Clues: Phishing is a form of • lack of access control policy is a • Technology to hide information inside a picture • Compromising confidential information comes under • A malicious program do not replicate automatically • This gives the contact numbers of all stakeholders • The major ransomeware trojan targeting windows in 2014 • ...
Food Security 2022-01-21
Across
- The cultivation of a single crop in a given area.
- The rearing of aquatic animals or the cultivation of aquatic plants for food.
- A destructive insect or other animal that attacks crops, food, or livestock.
- A form of growth failure that causes both physical and cognitive delays in growth and development.
- The state of having reliable access to a sufficient quantity of affordable, nutritious food.
- The salt content in the soil; the process of increasing the salt content is known as salinization.
- The state of being without reliable access to a sufficient quantity of affordable, nutritious food.
Down
- Products that are produced from chemical alteration.
- A form of malnutrition arising from excessive intake of nutrients.
- A sum of money granted by the government or a public body to assist an industry or business so that the price of a commodity or service may remain low or competitive.
- The top layer of soil.
- The simultaneous cultivation or exploitation of several crops or kinds of animals.
12 Clues: The top layer of soil. • The cultivation of a single crop in a given area. • Products that are produced from chemical alteration. • A form of malnutrition arising from excessive intake of nutrients. • A destructive insect or other animal that attacks crops, food, or livestock. • The rearing of aquatic animals or the cultivation of aquatic plants for food. • ...
Food Security 2022-01-21
Across
- The cultivation of a single crop in a given area.
- The rearing of aquatic animals or the cultivation of aquatic plants for food.
- A destructive insect or other animal that attacks crops, food, or livestock.
- A form of growth failure that causes both physical and cognitive delays in growth and development.
- The state of having reliable access to a sufficient quantity of affordable, nutritious food.
- The salt content in the soil; the process of increasing the salt content is known as salinization.
- The state of being without reliable access to a sufficient quantity of affordable, nutritious food.
Down
- Products that are produced from chemical alteration.
- A form of malnutrition arising from excessive intake of nutrients.
- A sum of money granted by the government or a public body to assist an industry or business so that the price of a commodity or service may remain low or competitive.
- The top layer of soil.
- The simultaneous cultivation or exploitation of several crops or kinds of animals.
12 Clues: The top layer of soil. • The cultivation of a single crop in a given area. • Products that are produced from chemical alteration. • A form of malnutrition arising from excessive intake of nutrients. • A destructive insect or other animal that attacks crops, food, or livestock. • The rearing of aquatic animals or the cultivation of aquatic plants for food. • ...
Food Security 2021-09-24
Across
- Recommendations from this organization influenced the dietary guidelines.
- When a country has enough food to meet the nutritional requirements of all persons this is considered ________ food security.
- When food is appropriate it means that it is ___________ acceptable for the region or community.
- Affordable food means persons are able to purchase at ____________ prices.
- This is when food is fit for human consumption.
Down
- This can improve household food security (2words)
- This is a contributor to malnutrition in the Caribbean.
- This means that food can be easily physically accessed.
- This type of food choice can lead to malnutrition
- Food security is all about __________ to food.
- For food to be considered adequate it must meet the __________________ needs of all persons.
- This is caused by household food insecurity.
12 Clues: This is caused by household food insecurity. • Food security is all about __________ to food. • This is when food is fit for human consumption. • This can improve household food security (2words) • This type of food choice can lead to malnutrition • This is a contributor to malnutrition in the Caribbean. • This means that food can be easily physically accessed. • ...
EIR Security 2021-09-18
Across
- Acronym that summarizes EIR employee security responsibilities
- The minimum number of characters for all passwords (include dash)
- Must be used when transmitting all client & company data
- EIR certification is for what standard (includes numbers)
- EIR tool used for monitoring security logs
- Motivation for disgruntled employee to sabotage data
Down
- Required tool used for password management
- Technique used by malware and ransomware to gain access
- Worst possible outcome for EIR breach
- EIR security requirements can be found at \\fs01\CompanyPublic\??
- Two factor is the most effective form for
- Ransomware motivates company payments to the bad guy through
12 Clues: Worst possible outcome for EIR breach • Two factor is the most effective form for • Required tool used for password management • EIR tool used for monitoring security logs • Motivation for disgruntled employee to sabotage data • Technique used by malware and ransomware to gain access • Must be used when transmitting all client & company data • ...
Safety & Security 2013-04-23
Across
- This Brazillian band came to the ESPN Campus and preformed in the Cafe Annex.
- Ford, Chevrolet and Toyota were examples of the three ____ vehicles brought to campus.
- This NASCAR driver signed autographs for ESPN employees in the Cafe Annex (last name only).
- A 3D TV was set up across from the pizza bar in the cafe to help highlight 3D coverage of what golf event?
- An event, usually held in the KidsCenter, which allows employees to learn about departmental updates and happenings.
- The Wellness Center provided this medication free of charge to employees and their dependents to prevent sickness.
- ESPN hosts a guest athlete or other individual for an employee Q & A session.
Down
- Corp Outreach highlights one employee who logs the most volunteer hours during this event, held in the Cafe Annex
- This trophy was on display in the Cafe Annex and available for picture opportunities with employees.
- The Wellness Center and our Sustainability team got together during to help celebrate ___ week.
- 12 women gathered at the ESPN campus to determine their athletic futures.
- Departments can request to fly one of these on the Cafe flag pole to help raise awareness about a specific cause, event, advertiser, etc.
12 Clues: 12 women gathered at the ESPN campus to determine their athletic futures. • This Brazillian band came to the ESPN Campus and preformed in the Cafe Annex. • ESPN hosts a guest athlete or other individual for an employee Q & A session. • Ford, Chevrolet and Toyota were examples of the three ____ vehicles brought to campus. • ...
Load Security 2014-07-25
Across
- Straps hanging from the roof of a curtain sided vehicle are to .... (9) the load
- Strap Used to secure a load (7, 4)
- The purpose of (8) is to keep loads clean and dry
- Person responsible for load security (6)
- If you brake hard resulting in load shift, the load will probably be at the ..... (5) of the vehicle
- Hundred Percentage for securing load to prevent forward movement (3, 7)
Down
- Fit A load which fills the trailer front to back and side to side is described as a (8, 3)
- Overloading a vehicle is (9)
- Stop A round bridge height sign means the driver ..... (4, 4)
- Years Maximum prison sentance for death by dangerous driving (9, 5)
- Consumption Overloading a vehicle results in higher .... (4, 11)
- way to weighbridge A defecnce for overloading (2, 3, 2, 11)
12 Clues: Overloading a vehicle is (9) • Strap Used to secure a load (7, 4) • Person responsible for load security (6) • The purpose of (8) is to keep loads clean and dry • way to weighbridge A defecnce for overloading (2, 3, 2, 11) • Stop A round bridge height sign means the driver ..... (4, 4) • ...
Privacy & Security 2016-06-05
Across
- To break or rupture. An infraction.
- The baby never goes without his ____ blanket.
- The patient must give ____ consent to access his data.
- Dedicated $27 billion dollars to adopt EHR's.
- Admitting the passage of light. Obvious.
- An individual's right to control access.
Down
- Is the conversion of data into unreadable format.
- The chance something bad will happen, to ___ it all.
- In 2011 ____ is the top target of cyberattacks.
- A secret. Protected information.
- There is a ____ of lightning in the forecast.
- Federal legislation dedicated to privacy.
12 Clues: A secret. Protected information. • To break or rupture. An infraction. • Admitting the passage of light. Obvious. • An individual's right to control access. • Federal legislation dedicated to privacy. • The baby never goes without his ____ blanket. • There is a ____ of lightning in the forecast. • Dedicated $27 billion dollars to adopt EHR's. • ...
Security Terminology 2023-03-29
Across
- This is a privilege to have this over others
- We use these to work accurately
- When a situation gets worse this will happen
- These make handy communication tools
- I cannot speak of any of this
- Follow the rules and your actions will be...in any situation
- We document routines and incidents to ensure a good..
Down
- The outside circle
- The alarm is ringing. Time to..
- I carry this with me and always check others for it
- These helps follow our policies better
- On the lookout for dangerous..
12 Clues: The outside circle • I cannot speak of any of this • On the lookout for dangerous.. • We use these to work accurately • The alarm is ringing. Time to.. • These make handy communication tools • These helps follow our policies better • This is a privilege to have this over others • When a situation gets worse this will happen • ...
General security 2022-10-07
Across
- any unsolicited email, text message or phone call
- Data that gives information about the data
- This software can slow down your computer & watch everywhere you go on the internet
- your company can ____ your internet activity
- if you see something, say something! Report it to ____
- Knows all about & is used in place of search frequently
Down
- software designed to protect your system from malwares
- This horse can stampede your security defenses for the bad guys and make you look sheepish too!
- should be unique and separate to each accounts to help thwarft cybercriminals
- released everymonth to fix vulnerabilities
- allows 2 operating system to run at the same time
- abbreviation relating to company policy where employees bring their own devices to work
12 Clues: Data that gives information about the data • released everymonth to fix vulnerabilities • your company can ____ your internet activity • any unsolicited email, text message or phone call • allows 2 operating system to run at the same time • software designed to protect your system from malwares • if you see something, say something! Report it to ____ • ...
Food Security 2024-12-17
Across
- what fruit has a crown on top and is yellow inside?
- What need the plant for Photosynthesis?
- Can you name a fruit that has seeds on the outside?
- what vegetable do Rabbits love to eat?
- What is the process of growing crops called?
- what vegetable do we use to make french fries?
- What vegetable looks like a small green tree?
Down
- What protects crops from pests?
- what Fruit is round and green on the outside but red inside?
- What is the main food crop in most of Asia?
- what is the National Fruit of India?
- What fruit is sour and yellow?
12 Clues: What fruit is sour and yellow? • What protects crops from pests? • what is the National Fruit of India? • what vegetable do Rabbits love to eat? • What need the plant for Photosynthesis? • What is the main food crop in most of Asia? • What is the process of growing crops called? • What vegetable looks like a small green tree? • ...
types of threats 2019-01-09
Across
- A type of Malware that locates and saves data from users without them knowing about it
- Software that encrypts programs and data until a ransom is paid to remove it.
- Collection of captured bot computers
- Criminals promise a service in exchange for details - a common example is offering help with IT problems
- When someone deceives by pretending to be someone else in order to get personal data.
- An error in a program that prevents the program from running as expected.
- Criminals make a promise of goods in return for details, such as offering a free music download
Down
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
13 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
New Terminology 2017-08-06
Across
- Adult member
- Auto Payment
- When TD interest is paid to another account at maturity
- Refers to Internet, telephone and Agency banking
- Child member
- Used to restrict a card
- Arrears
- Fixed Rate
- Corporate Cheque
- Drawer 99/Treasury
Down
- Statement
- Security eg. residential property
- Property security ie. house or unit
- A monetary hold placed on a members account
- Lost or stolen card
- Start
- Penalty Interest
- Inform-let someone else know something
- Find
19 Clues: Find • Start • Arrears • Statement • Fixed Rate • Adult member • Auto Payment • Child member • Penalty Interest • Corporate Cheque • Drawer 99/Treasury • Lost or stolen card • Used to restrict a card • Security eg. residential property • Property security ie. house or unit • Inform-let someone else know something • A monetary hold placed on a members account • ...
The Eye Of Minds 2019-04-17
Across
- Michael’s boy best friend
- Victim of Kaine
- What Kaine does to people
- Where they met Cutter
- Security of the black and blue
- Agent of the VirtNet Security
- Master coder
- Title of the book
- Michael’s girl best friend
Down
- What Tanya Jumped off
- Place where Ronika died
- Main Character
- Where they live
- Where Michael and his friends like to eat.
- Where their real bodies are
- What Tanya tore out
- Victim of the Beast
- Yellow Beast
- Michael’s Nanny
19 Clues: Yellow Beast • Master coder • Main Character • Where they live • Victim of Kaine • Michael’s Nanny • Title of the book • What Tanya tore out • Victim of the Beast • What Tanya Jumped off • Where they met Cutter • Place where Ronika died • Michael’s boy best friend • What Kaine does to people • Michael’s girl best friend • Where their real bodies are • Agent of the VirtNet Security • ...
Foreign Policy Crossword 2023-05-18
Across
- What is called when a country stays out of world affairs?
- another word for spies or subversion?
- What's the name of the free trade zone between Canada and Mexico?
- Who handles public security?
- Which branch declares war?
- Who chooses the US ambassador?
- What is the opposite of isolationism?
Down
- What's foreign policy position that opposes European colonialism in the western hemisphere?
- Who conforms the ambassador pick?
- Who interprets treaties?
- Who advises president ambassadors?
- Service Who carries out US policy and assists US citizens overseas?
- War fought indirectly is-
- Who handles security issues in US?
- Who handles security internationally?
15 Clues: Who interprets treaties? • War fought indirectly is- • Which branch declares war? • Who handles public security? • Who chooses the US ambassador? • Who conforms the ambassador pick? • Who advises president ambassadors? • Who handles security issues in US? • another word for spies or subversion? • Who handles security internationally? • What is the opposite of isolationism? • ...
Security Awareness Month 2025 2025-10-07
Across
- the credit card security audit we do
- Fastpass uses ____ to authenticate me to Okta.
- passwords should ____ be stored in plaintext
- the button to report a suspicious email
- the wiki code for the AI Knowledge Base
- our password manager tool
- phiches use ___ to pressure people to click or reply.
- Crowd____ is our AV software.
Down
- a pass____ is more memorable than a password
- the data classification for pii and credit card data
- ___@kayak.com where support tickets can be emailed
- ask-kayak-____ is the Slack channel for cybersecurity questions.
- our remote access tool
- ai tool to search all of kayak
- The Acceptable ____ Policy sets employee security rules
15 Clues: our remote access tool • our password manager tool • Crowd____ is our AV software. • ai tool to search all of kayak • the credit card security audit we do • the button to report a suspicious email • the wiki code for the AI Knowledge Base • a pass____ is more memorable than a password • passwords should ____ be stored in plaintext • ...
Cyberpiracy 2022-05-19
bullying 2023-03-21
9 Clues: afraid • head games • constantly • intent to hurt • scared to walk alone • affect of being bullied • using words to hurt someone • using the internet to contsnatlly harass • using manipulation to change people on someone
bullying 2021-08-31
Across
- effect on the bystander
- effect on the bully
- bullying that happens over social media
- effects on bullying
- bullying that includes manipulation
- speaking up about bullying
- an effect on the victim
Down
- witness of the bullying
- bullying that includes punching someone
- something someone does to make them feel bigger than someone else.
- bullying that includes lies being spread
- person doing the bullying
- person getting bullied
- something an upstander does
- bullying that includes abuse
- a severe effect on bullying
16 Clues: effect on the bully • effects on bullying • person getting bullied • witness of the bullying • effect on the bystander • an effect on the victim • person doing the bullying • speaking up about bullying • something an upstander does • a severe effect on bullying • bullying that includes abuse • bullying that includes manipulation • bullying that includes punching someone • ...
Digital Conscience 2014-11-12
Across
- everything you post is permanent and ________
- you you you
- used for spying on your computer
- what we love more than God
- you don't have it you don't want it
Down
- used to figure out your personal info
- Cyber Exploiter of Life
- slows your computer down
- nude pictures
- a type of blackmail
- World Wide Web
- are not fool proof
- taken for granted
13 Clues: you you you • nude pictures • World Wide Web • taken for granted • are not fool proof • a type of blackmail • Cyber Exploiter of Life • slows your computer down • what we love more than God • used for spying on your computer • you don't have it you don't want it • used to figure out your personal info • everything you post is permanent and ________
Cybersecurity Crossword Puzzle 2023-07-26
Across
- Prevents unauthorized access.
- Unauthorized alteration of data.
- (Common Vulnerabilities and Exposures) Software vulnerability database.
- Flaws Software vulnerabilities.
- Breach Stealing sensitive data.
- Misleading email attacks.
- Malware with a harmful payload.
- Unauthorized access to data.
- Common entry point for attacks.
- Malware that hides within legitimate software.
- Engineering Attacks exploiting human behavior.
Down
- Encrypting communication data.
- Control Access rights limitation.
- Insecure code exploit.
- Scrambling data for security.
- Protects from viruses.
- Removing sensitive data.
- Malicious self-replicating code.
- Protects data from unauthorized changes.
- Malware that spreads via networks.
20 Clues: Insecure code exploit. • Protects from viruses. • Removing sensitive data. • Misleading email attacks. • Unauthorized access to data. • Prevents unauthorized access. • Scrambling data for security. • Encrypting communication data. • Flaws Software vulnerabilities. • Breach Stealing sensitive data. • Malware with a harmful payload. • Common entry point for attacks. • ...
types of threats 2019-01-09
Across
- A type of Malware that locates and saves data from users without them knowing about it
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- Malware that allows a cyber-security attacker to take control of an infected computer.
- When someone deceives by pretending to be someone else in order to get personal data.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- Collection of captured bot computers
- Software that encrypts programs and data until a ransom is paid to remove it.
Down
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Criminals promise a service in exchange for details - a common example is offering help with IT problems
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- An error in a program that prevents the program from running as expected.
- Criminals make a promise of goods in return for details, such as offering a free music download
13 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Information Security 2022-11-14
Across
- When Some User Alters Data
- Impact to _______ Security
- A Principle Of Information Security Beginning With A
- A Principle Of Information Security Beginning With I
- What Is An Unauthorised Access To Data
Down
- A Principle Of Information Security Beginning With C
- Loss Of Data
- Intentional ___________ Of Data
- When Someone Access Data They Shouldn't
- What Happens After A Risk Is Exploited
10 Clues: Loss Of Data • When Some User Alters Data • Impact to _______ Security • Intentional ___________ Of Data • What Happens After A Risk Is Exploited • What Is An Unauthorised Access To Data • When Someone Access Data They Shouldn't • A Principle Of Information Security Beginning With C • A Principle Of Information Security Beginning With A • ...
Test 2022-11-25
Across
- System must be ________ when you are away from your desk.
- ABC does not allow usage of _________ system though customer has BYOD policy.
- Project documents must not be _________ to external internet sites.
- Customer VDI cannot be used to navigate unwanted websites which are ________ in ABC.
- If there is conflict between ABC security policy and customer security policy then ABC associate has to follow _______ of the two.
- Sending email to personal mail ID from business email (ABC or ABC' customer email) is strictly ________.
- It is _______ responsibility to check the own system compliance regularly.
- All third party/customer provided information must be treated as __________ until and unless specified otherwise by the third party/customer.
Down
- User must be always responsible for the act perform by his own _________.
- It is always better to ______ security violation internally rather escalated by customer.
- Always check recipient email address before click on send button to ensure data _________.
- Always check sender's email ID before clicking on any email attachment or link to prevent from ________ attack.
- Security requirement for project or account must be governed by _______.
- Document signed by associate to protect ABC or ABC' customer confidential business information.(NDA)
- Unauthorized ___________ device must not be connected to ABC or client asset in any circumstances.
- The_________ of information is responsible for classifying the information, created in any form (electronic or non-electronic), and restricting access to the information.
- For any deviation from contractual agreement ________ approval must be obtained.
- When you are doing planning or at design state, you must consider ________ requirement as well.
- For any release or separation from account, access to customer environment must be revoked within _____ day(s).
19 Clues: System must be ________ when you are away from your desk. • Project documents must not be _________ to external internet sites. • Security requirement for project or account must be governed by _______. • User must be always responsible for the act perform by his own _________. • It is _______ responsibility to check the own system compliance regularly. • ...
1.4 Network Security 2025-04-23
Across
- Permissions assigned to a user defining what resources they can access.
- Attempting to guess passwords by trying every possible combination.
- A term for malicious software.
- A self-replicating malware that spreads itself across networks, without user action.
- A form of social engineering that involves maintaining a conversation.
- Unauthorised access of data as it is being transmitted over a network.
- A technique that exploits vulnerabilities in databases by injecting malicious code.
- A type of malware that secretly monitors a user.
- A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- A form of testing designed to find any weaknesses in a system.
Down
- Observing someone's action, such as watching them enter their password.
- Manipulating people into sharing sensitive/confidential information.
- The process of scrambling data so it can only be read by authorised users.
- A malicious program that replicates itself and attaches itself to files.
- Overloading a network or website with traffic to make it unavailable.
- A malicious program that disguises itself as legitimate software.
- Malware that encrypts files and demands payment for decryption.
- Should be at least 8 characters long with upper and lowercase letters.
- Software or hardware that filters and blocks unauthorised access to a network.
19 Clues: A term for malicious software. • A type of malware that secretly monitors a user. • A form of testing designed to find any weaknesses in a system. • Malware that encrypts files and demands payment for decryption. • A malicious program that disguises itself as legitimate software. • Attempting to guess passwords by trying every possible combination. • ...
1.4 Network Security 2025-04-23
Across
- A type of malware that secretly monitors a user.
- Malware that encrypts files and demands payment for decryption.
- The process of scrambling data so it can only be read by authorised users.
- Unauthorised access of data as it is being transmitted over a network.
- A form of testing designed to find any weaknesses in a system.
- Overloading a network or website with traffic to make it unavailable.
- A malicious program that disguises itself as legitimate software.
- A technique that exploits vulnerabilities in databases by injecting malicious code.
- Should be at least 8 characters long with upper and lowercase letters.
Down
- A form of social engineering that involves maintaining a conversation.
- Manipulating people into sharing sensitive/confidential information.
- A malicious program that replicates itself and attaches itself to files.
- Permissions assigned to a user defining what resources they can access.
- A self-replicating malware that spreads itself across networks, without user action.
- A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- Attempting to guess passwords by trying every possible combination.
- A term for malicious software.
- Observing someone's action, such as watching them enter their password.
- Software or hardware that filters and blocks unauthorised access to a network.
19 Clues: A term for malicious software. • A type of malware that secretly monitors a user. • A form of testing designed to find any weaknesses in a system. • Malware that encrypts files and demands payment for decryption. • A malicious program that disguises itself as legitimate software. • Attempting to guess passwords by trying every possible combination. • ...
Safety and Security 2026-03-02
Across
- Object that can be used to inform people of a hazard
- A safe place to go to during a dangerous event
- A person that protects others from danger
- Care taken to avoid danger
- To help a person in need
- Looking to see if something is safe
- A potention source of harm
- A practice to help people know what to do in dangerous situations
- A more official person that protects others from danger
Down
- being protected from danger
- Something a person does to inform people of something
- To leave a dangerous area
- Unexpected event
- Tool that unlocks doors
- Object that allows people to capture something on film
- The act of keeping people safe
- To make it easier for a person to do something
- A loud noise to alert people of danger
- Chance of danger
19 Clues: Unexpected event • Chance of danger • Tool that unlocks doors • To help a person in need • To leave a dangerous area • Care taken to avoid danger • A potention source of harm • being protected from danger • The act of keeping people safe • Looking to see if something is safe • A loud noise to alert people of danger • A person that protects others from danger • ...
SEP2 Crossword 2025-05-08
Across
- Automated sequence of response actions triggered by specific alerts
- The process of linking disparate security events to identify threats
- Fraudulent attempt to obtain sensitive information via deceptive emails
- The process of converting encrypted data back to its original form
- The act of adding contextual information to raw security data
- Network of compromised devices controlled by an attacker
Down
- Device such as a laptop or mobile phone connected to a network
- Regular communication from compromised endpoints to a command-and-control server
- Coordinated automation of security tools and processes
- Continuous data stream collected for threat analysis and system health
- Decoy system set up to attract and study attackers
- Isolated environment for safely analysing suspicious files or code
- Centralised team responsible for monitoring and responding to security incidents
- Prioritising alerts based on severity and potential impact
14 Clues: Decoy system set up to attract and study attackers • Coordinated automation of security tools and processes • Network of compromised devices controlled by an attacker • Prioritising alerts based on severity and potential impact • The act of adding contextual information to raw security data • Device such as a laptop or mobile phone connected to a network • ...
Living with Modern Tech 4 2021-05-10
ARI Acronyms Fun 2020-08-25
14 Clues: in • up • out • of use • of loss • address • to vacate • responsible • notice of loss • approval amount • security deposit • pay authorization • deposit agreement • air transportation association
Airport 2024-11-26
Food Security Vocabulary 2020-06-04
Across
- Refers to how the body uses the various nutrients in food. It entails cooking, storage and hygiene practices, individuals’ health, water and sanitations, feeding and sharing practices within the household.
- A map that shows changes data or characteristics across an area by using shades of the same colour.
- This refers to people’s ability to regularly acquire adequate quantities of food, through purchase, home production, barter, gifts, borrowing or food aid.
- Refers to how resources, activities, and human demographic features of landscapes are arranged across the eartn
- Term used to describe a lack of sufficient water to meet the demands of an area or population.
- the study of the shape and features of land surfaces
- The science or practice of farming, including cultivation of the soil for the growing of crops and the rearing of animals to provide food, wool, and other products.
- This refers to being food secure at all times.
- Irrigation is the application of controlled amounts of water to plants at needed intervals. Irrigation helps grow agricultural crops, maintain landscapes, and revegetate disturbed soils in dry areas and during periods of less than average rainfall.
- A change in global or regional climate patterns, attributed largely to the increased levels of atmospheric carbon dioxide produced using fossil fuels.
- The weather conditions prevailing in an area in general or over a long period.
- Soil fertility refers to the ability of a soil to sustain agricultural plant growth, i.e. to provide plant habitat and result in sustained and consistent yields of high quality.
Down
- A long-term or persistent inability to meet minimum food consumption requirements
- a large region of Earth that has a certain climate and certain types of living things (i.e. plants and animals)
- supplied with less than the minimum amount of the nutrients or foods essential for sound health and growth
- A short-term or temporary food deficit (shortage).
- Term used to describe a condition in which all people, at all times, have access to enough safe nutritious food to sustain a healthy life.
- This term refers to sufficient quantities of food supply and trade. It considers stock and production in a given area and the capacity to bring in food from elsewhere, through trade or aid.
- The ongoing capacity of earth to maintain all life.
19 Clues: This refers to being food secure at all times. • A short-term or temporary food deficit (shortage). • The ongoing capacity of earth to maintain all life. • the study of the shape and features of land surfaces • The weather conditions prevailing in an area in general or over a long period. • ...
Branch Security - March 2022-02-28
Across
- who you should call in the event of a robbery
- to inspect or study especially with intent to rob
- U.S. financial institutions are required to file for cash transactions over $10k
- theft or misappropriation of funds placed in one's trust or belonging to one's employer
- pretend to be another person in order to deceive someone
- type of robbery where employees are confronted while they are opening first thing in the morning
- persuade (someone) to act in one's favor, typically illegally or dishonestly, by a gift of money or other inducement
- made falsely especially with intent to deceive (false signature on false document)
- you should try to preserve this in the event of a robbery
- a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information
- when a thief parks outside of a bank and watches patiently as customers go in and out
Down
- you should check for this each morning before entering the branch
- fraudulent acquisition and use of a person's private identifying information, usually for financial gain
- process of changing large amounts of money obtained from crimes into origination from a legitimate source
- the practice of obtaining something, especially money, through force or threats
- made in exact imitation with the intention to deceive or defraud
- the action of taking property unlawfully from a person or place by force or threat of force
- this is the department you should refer all media inquiries to
- wrongful or criminal deception intended to result in financial or personal gain
19 Clues: who you should call in the event of a robbery • to inspect or study especially with intent to rob • pretend to be another person in order to deceive someone • you should try to preserve this in the event of a robbery • this is the department you should refer all media inquiries to • made in exact imitation with the intention to deceive or defraud • ...
Security Awareness Puzzle 2014-10-20
Across
- Every operating system and plugin needs these for good health.
- All of this material must be locked up when there is no one in the room
- When somebody sends an email with a link to a bogus website it's called.
- An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- If you unlock a room, what must you take off the door and either hold onto or pass to another program accessed person until the room is locked again.
- You can share your alarm code with this many people at the facility
- One thing you should never do with any of your passwords(3 words)
- A __________ stick, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain. These under no circumstance should ever be brought into a work lab.
Down
- Before entering a secure room you must check your pockets for any ________ devices and place them in the bins
- All visitors must check in with _________ before they can access our facility.
- A __________ is a program and/or device that monitors data traveling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network.
- If you are holding a classified meeting in one of the conference rooms, these must be posted on the doors that state there is a classified meeting in progress.
- Even if someone is cleared at the highest level, they still need this to access a classified program. (3 words)
- True:False: It is good practice to wear your badge around outside the facility to show good company spirit.
- Other than locking the door when you are finished using a secure lab, you must also set this
- The strongest password is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca, This_P^zz1e!
- This must be worn at all times while in the facility with no exceptions
- _________ Is required to take the yearly security training
- Before you throw something in the __________, ask yourself,"Is this something I would give to an unauthorized person or want to become publicly available?"
19 Clues: _________ Is required to take the yearly security training • Every operating system and plugin needs these for good health. • One thing you should never do with any of your passwords(3 words) • You can share your alarm code with this many people at the facility • All of this material must be locked up when there is no one in the room • ...
Amazon Security CrossWord 2025-07-03
Across
- Set of rules and expectations for an assignment
- 3 minutes to respond
- alarm will go off in 20 seconds
- Grace period allowed to call off before sos
- Registry of visitors, Workers,
- Daily audit(1x daily)
- Global security operations center
- Designated walk way in warehouse
- point of contact for client
Down
- Training courses to be completed for compliance
- AA badge color
- items must be tagged and dated
- co workers
- Channel 1. (Radio)
- Alarm monitoring system
- Respect,Vigiliance,Trust
- Authorized to be onsite without badge access
- color of contractor loaner badge
- # number of tabs employee folder must have
19 Clues: co workers • AA badge color • Channel 1. (Radio) • 3 minutes to respond • Daily audit(1x daily) • Alarm monitoring system • Respect,Vigiliance,Trust • point of contact for client • items must be tagged and dated • Registry of visitors, Workers, • alarm will go off in 20 seconds • color of contractor loaner badge • Designated walk way in warehouse • Global security operations center • ...
The Secrets of Jabari Manor 2024-09-03
Across
- Action taken by Jabari to safeguard his siblings
- Jabari's older sister who assists him in the investigation
- Time when the figure was spotted in the garden
- Action Jabari and his siblings take to uncover the truth
- Type of journal Jazmin finds
- Mysterious group referenced in Jabari's parents' files
- Type of system Jabari checks for security footage
- Family gathering that occurs despite the tragedy
- Relative who is often suspicious
- Character who is a family friend and businessman
- Overarching theme of the story related to family connections
Down
- Person who discovered the encrypted messages
- Atmosphere in Jabari Manor after the disappearance
- Device Jabari uses to access the security footage
- Name of Jabari's brother who often feels frustrated
- Emotion Jabari feels upon seeing the mysterious figure
- Type of messages found in the journal
- Last name of Jabari's family
- Feeling Jabari experiences following his parents' disappearance
- Hidden place where secrets are kept
20 Clues: Last name of Jabari's family • Type of journal Jazmin finds • Relative who is often suspicious • Hidden place where secrets are kept • Type of messages found in the journal • Person who discovered the encrypted messages • Time when the figure was spotted in the garden • Action taken by Jabari to safeguard his siblings • Family gathering that occurs despite the tragedy • ...
ANTI-BULLYING :) 2021-11-21
Across
- when a bully has a target its usually called a ______.
- when being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- when being punched kicked other every day it is called ______ -bullying.
- a person who watches someone get bullied and doesn't do anything is called a _________.
- there are 4 types of it such as verbal social physical and cyber _________.
- when rumors are spread or embarrassing photos of you it is called _____-bullying
Down
- when the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- when a bully bullies someone is probably because they are ______ of something they have that they don't.
- when being bullied online it is called ______-bullying.
- bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- when you are being called mean names daily it is called _______-bullying.
- someone who bullies someone is called a ________.
12 Clues: someone who bullies someone is called a ________. • when a bully has a target its usually called a ______. • when being bullied online it is called ______-bullying. • when being punched kicked other every day it is called ______ -bullying. • when you are being called mean names daily it is called _______-bullying. • ...
ANTI-BULLYING :) 2021-11-21
Across
- there are 4 types of it such as verbal social physical and cyber _________.
- bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- a person who watches someone get bullied and doesn't do anything is called a _________.
- when the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- when being punched kicked other every day it is called ______ -bullying.
- when a bully has a target its usually called a ______.
Down
- someone who bullies someone is called a ________.
- when being bullied online it is called ______-bullying.
- when a bully bullies someone is probably because they are ______ of something they have that they don't.
- when rumors are spread or embarrassing photos of you it is called _____-bullying
- when being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- when you are being called mean names daily it is called _______-bullying.
12 Clues: someone who bullies someone is called a ________. • when a bully has a target its usually called a ______. • when being bullied online it is called ______-bullying. • when you are being called mean names daily it is called _______-bullying. • when being punched kicked other every day it is called ______ -bullying. • ...
ANTI-BULLYING :) 2021-11-21
Across
- when a bully bullies someone is probably because they are ______ of something they have that they don't.
- when rumors are spread or embarrassing photos of you it is called _____-bullying
- when you are being called mean names daily it is called _______-bullying.
- when being punched kicked other every day it is called ______ -bullying.
- when the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
Down
- a person who watches someone get bullied and doesn't do anything is called a _________.
- there are 4 types of it such as verbal social physical and cyber _________.
- bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- when a bully has a target its usually called a ______.
- when being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- when being bullied online it is called ______-bullying.
- someone who bullies someone is called a ________.
12 Clues: someone who bullies someone is called a ________. • when a bully has a target its usually called a ______. • when being bullied online it is called ______-bullying. • when you are being called mean names daily it is called _______-bullying. • when being punched kicked other every day it is called ______ -bullying. • ...
ANTI-BULLYING :) 2021-11-22
Across
- When being punched kicked other every day it is called ______ -bullying.
- When the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- When being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- Someone who bullies someone is called a ________.
- When being bullied online it is called ______-bullying.
- Bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
Down
- When a bully bullies someone is probably because they are ______ of something they have that they don't.
- There are 4 types of it such as verbal social physical and cyber _________.
- A person who watches someone get bullied and doesn't do anything is called a _________.
- When a bully has a target its usually called a ______.
- When rumors are spread or embarrassing photos of you it is called _____-bullying
- When you are being called mean names daily it is called _______-bullying.
12 Clues: Someone who bullies someone is called a ________. • When a bully has a target its usually called a ______. • When being bullied online it is called ______-bullying. • When being punched kicked other every day it is called ______ -bullying. • When you are being called mean names daily it is called _______-bullying. • ...
ANTI-BULLYING :) 2021-11-22
Across
- When being bullied online it is called ______-bullying.
- When rumors are spread or embarrassing photos of you it is called _____-bullying
- A person who watches someone get bullied and doesn't do anything is called a _________.
- When you are being called mean names daily it is called _______-bullying.
- When the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- When a bully bullies someone is probably because they are ______ of something they have that they don't.
Down
- When a bully has a target its usually called a ______.
- When being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- There are 4 types of it such as verbal social physical and cyber _________.
- Bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- When being punched kicked other every day it is called ______ -bullying.
- Someone who bullies someone is called a ________.
12 Clues: Someone who bullies someone is called a ________. • When a bully has a target its usually called a ______. • When being bullied online it is called ______-bullying. • When being punched kicked other every day it is called ______ -bullying. • When you are being called mean names daily it is called _______-bullying. • ...
Chapter 8 and Relevant Vocab 2025-02-25
Across
- A measure of how well an organization's Azure environment aligns with industry standards.
- A security feature that filters network traffic to and from Azure resources.
- A dedicated instance of Microsoft Entra ID (formerly Azure AD) for managing users and authentication.
- Metadata labels applied to Azure resources to categorize and track costs, ownership, and usage.
- The division of security responsibilities between Microsoft and the customer in cloud environments.
Down
- A unified data governance service that enables data discovery, classification, and compliance monitoring.
- Predefined sets of governance and compliance configurations that automate resource deployment.
- Security controls that prevent accidental deletion or modification of Azure resources.
- The stages of Azure service development, from preview to general availability and retirement.
- Logs that record changes and activities within Azure resources for security and compliance monitoring.
- A service that enforces rules and compliance across Azure resources to ensure governance.
- Microsoft's centralized hub for security, privacy, and compliance information.
- A system for managing permissions based on assigned roles.
13 Clues: A system for managing permissions based on assigned roles. • A security feature that filters network traffic to and from Azure resources. • Microsoft's centralized hub for security, privacy, and compliance information. • Security controls that prevent accidental deletion or modification of Azure resources. • ...
Unit 3 2024-08-12
SIEM Activity 2024-12-04
Across
- describes the product capabilities of gathering, analyzing and presenting information from network and security devices.
- Security teams respond to alerts by investigating and mitigating threats
- is a process, not a product.
- comprises an approach to dealing with large volumes of computer-generated log messages.
- SIEM systems gather log and event data from various sources such as network devices, servers, applications, and security systems
Down
- boosts network security by processing millions of events simultaneously to detect anomalous events on the network.
- must be presented in a very intuitive and user-friendly manner.
- is the rate at which your IT infrastructure sends events.
- provides outsourced monitoring and management of security devices and systems.
- is the core of every SIEM solution.
10 Clues: is a process, not a product. • is the core of every SIEM solution. • is the rate at which your IT infrastructure sends events. • must be presented in a very intuitive and user-friendly manner. • Security teams respond to alerts by investigating and mitigating threats • provides outsourced monitoring and management of security devices and systems. • ...
Cisco 4 2024-09-11
Across
- A type of software that records keystrokes on a computer, often used for malicious purposes
- A security approach that assumes breach and verifies each request as though it originates from an open network
- A comprehensive security solution that provides a defense against a variety of threats for endpoints
Down
- A strategy for ensuring that only trusted software can run on systems
- A security measure that involves checking the health of endpoints before allowing access to a network
- A type of attack that involves injecting malicious code into a program or system to compromise it
- A security incident in which sensitive, protected, or confidential data is copied, transmitted, or used by an individual unauthorized to do so
- A type of malware that is designed to take advantage of a security hole before it is known
- A type of software designed to protect endpoints from malicious activity
- A type of security threat in which an attacker seeks to damage or destroy a computer network or system
- A type of security software designed to detect and prevent unauthorized use and transmission of confidential information
11 Clues: A strategy for ensuring that only trusted software can run on systems • A type of software designed to protect endpoints from malicious activity • A type of malware that is designed to take advantage of a security hole before it is known • A type of software that records keystrokes on a computer, often used for malicious purposes • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Load Security 2014-07-25
Across
- Overloading a vehicle is (9)
- If you brake hard resulting in load shift, the load will probably be at the ..... (5) of the vehicle
- Hundred Percentage for securing load to prevent forward movement
- Person resonsible for load security (6)
- Straps hanging from the roof of a curtain sided vehicle are to (9) the load
Down
- Used to secure a load (7, 4)
- Consumption Overloading a vehicle results in higher ... (4, 11)
- Stop A round bridge height sign means the driver .... (4, 4)
- The purpose of (8) is to keep loads clean and dry
- Fit A load which fills the trailer front to back and side to side is decribed as a (8, 3)
- Years Maximum prison sentance for death by dangerous driving (9, 5)
- way to weighbridge A defence for overloading (2, 3, 2, 11)
12 Clues: Used to secure a load (7, 4) • Overloading a vehicle is (9) • Person resonsible for load security (6) • The purpose of (8) is to keep loads clean and dry • way to weighbridge A defence for overloading (2, 3, 2, 11) • Stop A round bridge height sign means the driver .... (4, 4) • Consumption Overloading a vehicle results in higher ... (4, 11) • ...
IT-Security 2016-01-29
Across
- unerwünschte Werbemail
- Übergriff für unerwünschte, schädliche Software
- Diebstahl von Daten, die unachtsam einfach weggeworfen werden
- Virus, der sich direkt über Netze (Internet) verbreitet
- versteckt in einem scheinbar nützlichen Programm
- Personen die illegal in Computersysteme eindringen und Sicherheitssysteme überwinden
- Programme, die Tastatureingaben mitprotokollieren
Down
- Mobbing mit Hilfe von elektronischen Medien
- chatten
- gezieltes Ansprechen von Minderjährigen im Internet mit dem Ziel der Anbahnung sexueller Kontakte
- forschen das Nutzerverhalten aus und senden die Daten an Hersteller
- Datenverarbeitungsregisternummer, damit die Herkunft von Daten nachvollzogen werden kann
12 Clues: chatten • unerwünschte Werbemail • Mobbing mit Hilfe von elektronischen Medien • Übergriff für unerwünschte, schädliche Software • versteckt in einem scheinbar nützlichen Programm • Programme, die Tastatureingaben mitprotokollieren • Virus, der sich direkt über Netze (Internet) verbreitet • Diebstahl von Daten, die unachtsam einfach weggeworfen werden • ...
security equipment 2025-02-19
Across
- An accessory worn to hold tools like keys and radios
- helps you to talk to others
- Used to make an alarm sound
- Confirm your arrival and give your details
- Used to idenfify you
Down
- A sign worn to show the person is a guard
- worn for visibility
- helps to see in the dark
- Protects your feet
- A card used to identify the person as a member of the SENA
- A small book used to write down information
- A weapon used for protection
12 Clues: Protects your feet • worn for visibility • Used to idenfify you • helps to see in the dark • helps you to talk to others • Used to make an alarm sound • A weapon used for protection • A sign worn to show the person is a guard • Confirm your arrival and give your details • A small book used to write down information • An accessory worn to hold tools like keys and radios • ...
Food Security 2024-10-17
Across
- A food source that includes fruits and vegetables.
- A type of farming that does not harm the environment.
- Farming of aquatic species ed seaweed, fish, shellfish.
- Where most of the world's undernourished people live.
- The most common staple food in the world.
- The process of planting seeds in the ground.
Down
- A person who grows crops or raises animals.
- One way of preventing malnutrition.
- Not enough food to eat.
- When there is a shortage of food, prices_.
- The nutrients our bodies need to grow and stay healthy.
- A food that comes from cows, goats or sheep.
12 Clues: Not enough food to eat. • One way of preventing malnutrition. • The most common staple food in the world. • When there is a shortage of food, prices_. • A person who grows crops or raises animals. • A food that comes from cows, goats or sheep. • The process of planting seeds in the ground. • A food source that includes fruits and vegetables. • ...
Food Security 2022-12-19
Across
- Cultivating the soil & growing crops
- The scientific method of handling, preparing and storing food to prevents foodborne illness
- Demand exceeds the supply
- Healthy food
- Sufficient quantities of appropriate food
- Lack of food/a strong desire or need for food
Down
- The process of gathering ripe crops from the field
- Inaccessible, raised by chronic children
- Excess body fat accumulated to a level that can negatively affect health.
- A state or condition in which a person or community lacks the financial resources
- Food may be available and accessible to people who are able to utilise it effectively
- Agriculture requires large quantities of it
12 Clues: Healthy food • Demand exceeds the supply • Cultivating the soil & growing crops • Inaccessible, raised by chronic children • Sufficient quantities of appropriate food • Agriculture requires large quantities of it • Lack of food/a strong desire or need for food • The process of gathering ripe crops from the field • ...
. 2021-10-01
Across
- When someone or a cyber-criminal take advantage of you by using information commonly available through social media, information sharing, or a conversation.
- Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- Fake messages from a seemingly trusted or reputable source designed to convince you to reveal information, give unauthorized access to a system, commit financial transactions, or click on a link.
- A type of program used for automating tasks on the internet.
Down
- To properly secure systems, cellphones, tablets, computers, data, information, and passwords is to S____G_____ your device.
- Any software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
- Happens when someone uses another person's name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- If not careful, giving up name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, or passwords can lead to loss of what?
- Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms.
9 Clues: A type of program used for automating tasks on the internet. • Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. • Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms. • ...
Router Security 2022-02-10
Across
- This filter blocks cookies, which are data stored on your computer and used by websites when you interact with them.
- This filter keeps port 113 from being scanned by devices from the Internet.
- This filter blocks the use of Internet proxy servers.
- This filter blocks Internet requests from unknown sources, such as ping requests.
- This filter blocks multicasting, which allows a single transmission to simultaneously reach specific recipients within your local network.
- This filter blocks Java, so you may not be able to access Java content on websites.
- The VPN client(s) on the local network can establish a PPTP VPN tunnel through the Router.
Down
- This filter prevents a local computer from using a URL or Internet IP address to access the local server.
- SPI firewall protection helps protect your local network from the Internet.
- The VPN client(s) on the local network can establish an IPSec VPN tunnel through the Router.
- This filter blocks ActiveX, so you may not be able to access ActiveX content on websites.
- The VPN client(s) on the local network can establish an L2TP VPN tunnel through the Router.
12 Clues: This filter blocks the use of Internet proxy servers. • SPI firewall protection helps protect your local network from the Internet. • This filter keeps port 113 from being scanned by devices from the Internet. • This filter blocks Internet requests from unknown sources, such as ping requests. • ...
IT-Security 2015-01-26
Across
- schützt WLAN
- ermöglicht sicheren E-Mail-Verkehr
- Netzwerk über größere Distanzen
- kriminielle Handlung mittels Internet
- räumlich begrenztes Netzwerk
Down
- Bloßstellen oder verleumden von Personen
- Verbindung zweier LAN's mittels sicherem Tunnel
- gezielt eingerichtete Identitäten für betrügerische Zwecke
- unerwünschtes Werbemail
- gezielte Anfeindung und Belästigung im Internet
- schutz des WLAN durch Passwort
- Datein, die am Computer abgespeichert werden
12 Clues: schützt WLAN • unerwünschtes Werbemail • räumlich begrenztes Netzwerk • schutz des WLAN durch Passwort • Netzwerk über größere Distanzen • ermöglicht sicheren E-Mail-Verkehr • kriminielle Handlung mittels Internet • Bloßstellen oder verleumden von Personen • Datein, die am Computer abgespeichert werden • Verbindung zweier LAN's mittels sicherem Tunnel • ...
COMPUTER SECURITY 2023-03-13
Across
- a check________ is used for error detection in stored data
- a type of malware which takes control of another computer and uses it to launch attacks
- the term given to any type of entry check which assures that data is of the correct type of format
- a type of backup strategy where data is stored simultaneously on 2 identical disk systems
- an example of a _______ check is when the month entry can only be indicated from 1 to 12
- a type of malware which replaces all or part of a functioning programme
Down
- a requirement for data to be accurate and up to date
- a type of malware that stays inactive until a condition is met
- a type of malware which collects data and transmits it to another system
- a check _______ is used for error detection in transmitted data
- the practice of setting up bogus websites
- the name given to an alternative computer system which can be brought into action if the main one fails, as part of a disaster recovery plan
12 Clues: the practice of setting up bogus websites • a requirement for data to be accurate and up to date • a check________ is used for error detection in stored data • a type of malware that stays inactive until a condition is met • a check _______ is used for error detection in transmitted data • a type of malware which replaces all or part of a functioning programme • ...
Event security 2022-10-06
Data Security 2025-11-19
Across
- A measure taken to protect data
- Ensuring data is accessible when needed
- Technological tools like firewalls or encryption
- Malware that locks data until a ransom is paid
- Tangible security measures like locks or badges
- Keeping information private and accessible only to authorized users
Down
- When data is accessed or leaked without permission
- Building products that respect user privacy and data rights
- Relating to actions people take (like turning off location sharing)
- The right to control who sees or uses your personal information
- an individual or group that intentionally attempts to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes
- Ensuring data remains accurate and unaltered
12 Clues: A measure taken to protect data • Ensuring data is accessible when needed • Ensuring data remains accurate and unaltered • Malware that locks data until a ransom is paid • Tangible security measures like locks or badges • Technological tools like firewalls or encryption • When data is accessed or leaked without permission • ...
Airport terminology 2023-11-15
Across
- where you might go to pray before your flight
- before security and customs
- where the plane lands and takes off
- displays all flights departing and arriving
- where they check your passport and boarding pass
- somewhere to go if you have questions
- the area after customs and security
- The airports main building
Down
- where you might empty your bladder
- where you board the plane
- Somewhere to get something to eat
- Where you go when you first arrive at the airport
- where the plane sits when waiting
- where you will find your bags if you lose them
- where you park your cart
- free Where you might buy some stuff with tax removed
- somewhere to get a alcoholic beverage
- where you bags get scanned and checked by a x-ray
- the people who control the movement of planes and ground vehicle's
19 Clues: where you park your cart • where you board the plane • The airports main building • before security and customs • Somewhere to get something to eat • where the plane sits when waiting • where you might empty your bladder • where the plane lands and takes off • the area after customs and security • somewhere to get a alcoholic beverage • somewhere to go if you have questions • ...
Capitalisation 1 2023-11-13
Across
- an instrument of investment in the form of a document providing evidence of its ownership
- a person who owns something
- a portion of priprietorship element of one or more companies
- the entire property of a person, association, corporation, or estate applicable or subject to the payment of debts
- the right of purchasing before others
- a share in a pro rata distribution (as of profits) to stockholders
- an interest in property granted as security for a loan
- an interest-bearing certificate of public or private indebtedness
Down
- accumulated possessions calculated to bring in income
- a corporate security other than an equity security
- the total liabilities of a business including both ownership capital and borrowed capital
- to give up, to reject
- money lent at interest
- the thing or the whole quantity of things given out at one time
14 Clues: to give up, to reject • money lent at interest • a person who owns something • the right of purchasing before others • a corporate security other than an equity security • accumulated possessions calculated to bring in income • an interest in property granted as security for a loan • a portion of priprietorship element of one or more companies • ...
Acronym Review 1 2021-03-24
Across
- Transportation Workers Identification Credential
- Transportation Security Officer
- TSA PreCheck Application Program
- Redress Control Number
- Hazardous Materials Endorsement
Down
- Lead Transportation Security Officer
- Customs and Border Protection
- Known Traveler Number
- Transportation Security Administration
- Customer Support Manager
10 Clues: Known Traveler Number • Redress Control Number • Customer Support Manager • Customs and Border Protection • Transportation Security Officer • Hazardous Materials Endorsement • TSA PreCheck Application Program • Lead Transportation Security Officer • Transportation Security Administration • Transportation Workers Identification Credential
CCJS100 2025-03-05
10 Clues: Misconduct in policing • Monitoring for security • Reaction to emergencies • Legal authority of police • Routine police observation • Essential security systems • Threat to national security • Judgment in law enforcement • Intelligence-sharing centers • Physical coercion by officers
Hope squad 2024-04-09
Investments 3 & 4 2026-02-24
Across
- investment bankers who market public offerings
- investment pool not available to public, more secretive
- equity fund that concentrates on a particular industry
- order specifying price to trade
- description of the firm and security it is issuing
- fund that tries to match performance of a broad market index
- information not yet made public
- assets minus liabilities divided by number of shares
- teacher's favorite investment company
Down
- sales commission charged on a mutual fund
- price at which dealer is willing to purchase a security
- sale of shares not owned by the investor
- like a mutual fund, trades throughout day
- fund that invests in securities worldwide, including the U.S.
- market for trading existing securities
- market for newly issued securities
- fund that issues or redeems shares at NAV
- difference (spread) between the bid and asked prices
- price at which dealer is willing to sell a security
19 Clues: order specifying price to trade • information not yet made public • market for newly issued securities • teacher's favorite investment company • market for trading existing securities • sale of shares not owned by the investor • sales commission charged on a mutual fund • like a mutual fund, trades throughout day • fund that issues or redeems shares at NAV • ...
ANTI-BULLYING :) 2021-11-21
Across
- someone who bullies someone is called a ________.
- when the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- when rumors are spread or embarrassing photos of you it is called _____-bullying
- a person who watches someone get bullied and doesn't do anything is called a _________.
Down
- when being punched kicked other every day it is called ______ -bullying.
- when you are being called mean names daily it is called _______-bullying.
- there are 4 types of it such as verbal social physical and cyber _________.
- when a bully has a target its usually called a ______.
- bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- when a bully bullies someone is probably because they are ______ of something they have that they don't.
- when being bullied online it is called ______-bullying.
- when being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
12 Clues: someone who bullies someone is called a ________. • when a bully has a target its usually called a ______. • when being bullied online it is called ______-bullying. • when being punched kicked other every day it is called ______ -bullying. • when you are being called mean names daily it is called _______-bullying. • ...
ANTI-BULLYING :) 2021-11-22
Across
- When a bully bullies someone is probably because they are ______ of something they have that they don't.
- When rumors are spread or embarrassing photos of you it is called _____-bullying
- When you are being called mean names daily it is called _______-bullying.
- When being punched kicked other every day it is called ______ -bullying.
- When the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
Down
- A person who watches someone get bullied and doesn't do anything is called a _________.
- There are 4 types of it such as verbal social physical and cyber _________.
- Bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- When a bully has a target its usually called a ______.
- When being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
- When being bullied online it is called ______-bullying.
- Someone who bullies someone is called a ________.
12 Clues: Someone who bullies someone is called a ________. • When a bully has a target its usually called a ______. • When being bullied online it is called ______-bullying. • When you are being called mean names daily it is called _______-bullying. • When being punched kicked other every day it is called ______ -bullying. • ...
Living Together crossword 2025-06-16
Across
- Mental
- Not the majority
- Where cyber bullying happens
- The person who is bullied
- What you can do if someone is being harrassed
- Adj- someone who is part of the group
Down
- Groups of friends which exclude people
- A prejudiced attitude or actions
- Giving assistance
- Someone who intimidates others by making them afraid
- A number of people
- Brutality
- Make sure everyone is integrated
13 Clues: Mental • Brutality • Not the majority • Giving assistance • A number of people • The person who is bullied • Where cyber bullying happens • A prejudiced attitude or actions • Make sure everyone is integrated • Adj- someone who is part of the group • Groups of friends which exclude people • What you can do if someone is being harrassed • ...
Chronicles 2021-02-23
14 Clues: Change • Relocate • Security • Personal • Vcenter7.0 • need a break • Golden Record • Tracking Tool • Tick Tock Tick • Check your phone • Storage Array Balancing • MFA (Multifactor Authentication) • Computer security system against online attack • Someone who was kicked out from all the major browsers on 31st Dec 2020
INTERNATIONAL OPERATIONS & CYBERSECURITY RISK 2024-10-27
Across
- Risk associated with possible financial or operational harm from cyber attacks.
- Risk involving transportation of goods internationally.
- Risk associated with Monetary components.
- Protects against exchange rate losses.
Down
- After encrypting the victim's files, the attacker demands a ransom in return for releasing the decryption key or for the victims to regaining access to the infected systems.
- Type of risk arising from government changes or civil unrest.
- Risk involving challenges that arise from differences in language, values, customs, and business practices.
7 Clues: Protects against exchange rate losses. • Risk associated with Monetary components. • Risk involving transportation of goods internationally. • Type of risk arising from government changes or civil unrest. • Risk associated with possible financial or operational harm from cyber attacks. • ...
Eye Of Minds 2019-04-17
Across
- Where the human body is
- Main Character
- Agent of the VirtNet Security
- Title of the book
- Master coder
- What Tanya Jumped off
- Yellow Beast
- What Kaine does to people
- Security of the black and blue
Down
- Where the VNS is
- Where Michael and his friends like to eat.
- What Tanya tore out
- Where they live
- Where they met Cutter
- Place where Ronika died
- Victim of the Beast
- Michael’s Nanny
- Michael’s boy best friend
- Victim of Kaine
- Michael’s girl best friend
20 Clues: Master coder • Yellow Beast • Main Character • Where they live • Michael’s Nanny • Victim of Kaine • Where the VNS is • Title of the book • What Tanya tore out • Victim of the Beast • Where they met Cutter • What Tanya Jumped off • Where the human body is • Place where Ronika died • Michael’s boy best friend • What Kaine does to people • Michael’s girl best friend • Agent of the VirtNet Security • ...
Cybersecurity Awareness Month Crossword Puzzle 2021-10-01
Across
- When someone or a cyber-criminal take advantage of you by using information commonly available through social media, information sharing, or a conversation.
- Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.
- Fake messages from a seemingly trusted or reputable source designed to convince you to reveal information, give unauthorized access to a system, commit financial transactions, or click on a link.
- A type of program used for automating tasks on the internet.
Down
- To properly secure systems, cellphones, tablets, computers, data, information, and passwords is to S____G_____ your device.
- Any software intended to damage, disable, or give someone unauthorized access to your computer or other internet-connected device.
- Happens when someone uses another person's name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- If not careful, giving up name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, or passwords can lead to loss of what?
- Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms.
9 Clues: A type of program used for automating tasks on the internet. • Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. • Intentionally instigating conflict or arguments by leaving insulting messages on the internet or other media platforms. • ...
IT 2026-02-20
Bab 2 Etika Pemanfaatan TIK 2022-11-11
Across
- hukum cyber
- undang undang hak cipta
- kegiatan menerobos program komputer milik orang lain
- perdagangan elektronik
- perangkat lunak bebas tanpa pemodifikasian
- program komputer
Down
- kejahatan dunia maya
- mengakses sistem komputer tanpa izin dari pemiliknya
- Hak Atas Kekayaan Intelektual
- Undang Undang Informasi dan transaksi elektronik
10 Clues: hukum cyber • program komputer • kejahatan dunia maya • perdagangan elektronik • undang undang hak cipta • Hak Atas Kekayaan Intelektual • perangkat lunak bebas tanpa pemodifikasian • Undang Undang Informasi dan transaksi elektronik • mengakses sistem komputer tanpa izin dari pemiliknya • kegiatan menerobos program komputer milik orang lain
