cyber security Crossword Puzzles

Word of the Day Review 2020-10-21

Word of the Day Review crossword puzzle
Across
  1. luxurious or self-indulgent
  2. fake or man-made
  3. simulated or cyber-real
  4. approaching threateningly
  5. to chew for a long time
  6. delicate and pretty
Down
  1. in space or in the sky
  2. to plod or walk slowly
  3. lively, vivid or energetic
  4. very hot or baking

10 Clues: fake or man-madevery hot or bakingdelicate and prettyin space or in the skyto plod or walk slowlysimulated or cyber-realto chew for a long timeapproaching threateninglylively, vivid or energeticluxurious or self-indulgent

Computer e-safety 2025-03-11

Computer e-safety crossword puzzle
Across
  1. A secret code to protect accounts.
  2. Getting files from the internet (can be risky).
  3. Someone who tries to break into computers.
  4. A trick to steal money or information.
  5. The name you use to log into accounts.
  6. Bullying that happens online.
Down
  1. A harmful program that can damage a device.
  2. A security system that blocks threats.
  3. Keeping software current to fix security issues.
  4. Keeping personal information safe.
  5. To prevent someone from contacting you online.
  6. A scam to steal personal information.
  7. Telling an adult or authority about online dangers.
  8. Multi-Factor Authentication for extra security.
  9. Safe and protected from threats.

15 Clues: Bullying that happens online.Safe and protected from threats.Keeping personal information safe.A secret code to protect accounts.A scam to steal personal information.A security system that blocks threats.A trick to steal money or information.The name you use to log into accounts.Someone who tries to break into computers....

Stock Mint 2025-01-06

Stock Mint crossword puzzle
Across
  1. Buying and selling within a day
  2. Measure of stock volatility
  3. Automated trading using computer programs
  4. Company's first public stock sale
  5. Stock trading intermediary
  6. Individual investor
  7. Indian securities regulatory body
  8. Loss Order to limit losses
  9. Risk-reducing strategy
  10. Spread investments to reduce risk
Down
  1. Large organization investing
  2. Person buying and selling securities
  3. Contract to buy a security
  4. US stock market index
  5. Firm providing liquidity
  6. Collection of investments
  7. Professionally managed investment fund
  8. Making multiple small trades
  9. Measure of security price fluctuations
  10. US securities regulatory body

20 Clues: Individual investorUS stock market indexRisk-reducing strategyFirm providing liquidityCollection of investmentsContract to buy a securityStock trading intermediaryLoss Order to limit lossesMeasure of stock volatilityLarge organization investingMaking multiple small tradesUS securities regulatory bodyBuying and selling within a day...

bullying and online 2023-04-27

bullying and online crossword puzzle
Across
  1. not nice
  2. when your really sad
  3. sticking up for yourself
  4. nice oppisite of nice
Down
  1. doing to much
  2. bully not nice online
  3. getting walked over
  4. mental state

8 Clues: not nicemental statedoing to muchgetting walked overwhen your really sadnice oppisite of nicebully not nice onlinesticking up for yourself

The Cipher Grid 2025-09-18

The Cipher Grid crossword puzzle
Across
  1. Modern name for the foreign arm of the KGB
  2. Cyber tactic for stealing login credentials
  3. Spy who defects to another country
  4. Spy's false background story
  5. Method used to pass information
  6. Escape route
  7. Listening device
Down
  1. Technique for intercepting communications
  2. Official notice when an asset is unreliable
  3. Spy without diplomatic cover
  4. Double agent who betrayed the Soviets
  5. CIA's predecessor
  6. Cipher machine used in WWII

13 Clues: Escape routeListening deviceCIA's predecessorCipher machine used in WWIISpy without diplomatic coverSpy's false background storyMethod used to pass informationSpy who defects to another countryDouble agent who betrayed the SovietsTechnique for intercepting communicationsModern name for the foreign arm of the KGB...

Crossword 2021-05-12

Crossword crossword puzzle
Across
  1. I am a type of computer program that, when executed, replicates myself by modifying other computer programs and inserting its own code. I also have the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data and a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
  2. 9. I am a class of malware whose intention is to wipe the hard drive of the computer which infects and also involves wiping/overwriting/removing data from the victim. I can be used to cover the tracks of a separate data theft and are destructive in nature.
  3. I am a malware who misleads users of my true intent and can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing me on their systems. Once activated, I can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system
  4. I am a malicious software that infects your computer and also threatens to publish the victim's data or perpetually block access to it unless a ransom is paid and can be installed through deceptive links in an email message, instant message or website. I also have the ability to lock a computer screen or encrypt important, predetermined files with a password
  5. I am a malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software and also tricks computer users into visiting malware-infected websites.Once activated, I exposes data, deletes files, steals funds, or takes some other form of harmful action
Down
  1. I am a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent ; also gather information about a person or organization and send such information to another entity in a way that harms the user. I belong to the category of software which aims to steal personal or organisational information.
  2. I am a form of malicious software and internet fraud which misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer and also will threaten the user with ransomware if they do not pay up
  3. I am a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.I establishes a barrier between a trusted network and an untrusted network, such as the Internet.I am also a software program that prevents unauthorized access to or from a private network and can be used to enhance the security of computers connected to a network.
  4. I am a software that displays unwanted advertisements on your computer and also will tend to serve you pop-up ads, can change your browser’s homepage, add spyware and just bombard your device with advertisements. I can also generate revenue for the developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
  5. I am a type of malware that spreads copies of myself from computer to computer and can replicate myself without any human interaction, and does not need to attach myself to a software program in order to cause damage.I use a computer network to spread myself, relying on security failures on the target computer to access it. I does not usually infect computer files, but rather infects another computer on the network and also passes this ability on to replica, which allows it to infect other systems in the same way.

10 Clues: 9. I am a class of malware whose intention is to wipe the hard drive of the computer which infects and also involves wiping/overwriting/removing data from the victim. I can be used to cover the tracks of a separate data theft and are destructive in nature....

CISO Crossword Puzzle: 1324 2024-12-18

CISO Crossword Puzzle: 1324 crossword puzzle
Across
  1. A cyber crime in which image or recording that has been convincingly altered and manipulated by using technology to misrepresent someone as doing or saying something that was not actually done or said
  2. A Cyber crime committed through internet to conduct violent acts that result in, or threaten, the loss of life in order to achieve political or ideological gains
  3. A form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
  4. A type of Fraud where fraudsters impersonate law enforcement officials (police, CBI etc) and extort money from victim
  5. A cyber crime in which someone harasses/stalks a victim using electronic or digital means, such as social media, email etc.
Down
  1. The process of befriending a child online by someone (often an adult)and builds an emotional connection with an intention of sexual abuse, sexual exploitation or trafficking
  2. Encrypted parts of the internet that are not indexed by search engines, most notoriously used by criminals
  3. The act of gaining unauthorized access to data in a computer or network by exploiting weaknesses in the system or network
  4. When someone pretends to be someone else in an attempt to gain confidence, access to systems, steal data or money
  5. The practice of extorting money or sexual favours from someone by threatening to reveal their personal videos and photos

10 Clues: Encrypted parts of the internet that are not indexed by search engines, most notoriously used by criminalsWhen someone pretends to be someone else in an attempt to gain confidence, access to systems, steal data or moneyA type of Fraud where fraudsters impersonate law enforcement officials (police, CBI etc) and extort money from victim...

Puzzle #24 – “Social Security Myths” 2025-06-29

Puzzle #24 – “Social Security Myths” crossword puzzle
Across
  1. - Myth: Social Security funds are stored in this type of account
  2. - Myth: These individuals won’t receive benefits later
  3. - Myth: You must always claim your benefits this way
  4. - Many fear that Social Security will do this with money
Down
  1. - Myth: Only this kind of immigrant can’t qualify (answer is “illegal”)
  2. - A common misunderstanding or false belief
  3. - Some think this person can’t get benefits, but they can
  4. - Myth: You don’t pay these on Social Security income
  5. - False belief that Social Security is going completely ______
  6. - Myth: You can't do this while collecting Social Security

10 Clues: - A common misunderstanding or false belief- Myth: You must always claim your benefits this way- Myth: You don’t pay these on Social Security income- Myth: These individuals won’t receive benefits later- Many fear that Social Security will do this with money- Some think this person can’t get benefits, but they can...

Security and Net 2024-07-24

Security and Net crossword puzzle
Across
  1. fundamental building block for the storage, retrieval, and analysis of a company’s data
  2. type of malware that self-replicates and spreads through computers and networks
  3. used to prevent attenuation when packets are traveling long distances
  4. logical layout of the cables and devices that connect the nodes of the network
  5. weakness that has not been protected against threats
  6. is anything that can cause harm
  7. most widely-used standard for local area networks
Down
  1. malicious computer programs that are created to harm computer systems
  2. is a node on a network that serves as an entrance to another network
  3. allows users to communicate and share information between computers
  4. contains only the company’s private information
  5. wireless access point
  6. wide area network (acronym)
  7. may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams
  8. can be used to share some of a company’s intranet resources with people outside the organization
  9. similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
  10. device that connects two LANs or two segments of the same LAN
  11. type of malware that is attached to a host file and has the ability to replicate, or copy, itself
  12. local area network (acronym)
  13. provides multiple ports for connecting nodes

20 Clues: wireless access pointwide area network (acronym)local area network (acronym)is anything that can cause harmprovides multiple ports for connecting nodescontains only the company’s private informationmost widely-used standard for local area networksweakness that has not been protected against threats...

1.4 Network Security 2025-04-09

1.4 Network Security crossword puzzle
Across
  1. Malware that encrypts files and demands payment for decryption.
  2. A self-replicating malware that spreads itself across networks, without user action.
  3. Observing someone's action, such as watching them enter their password.
  4. A type of malware that secretly monitors a user.
  5. Software or hardware that filters and blocks unauthorised access to a network.
  6. Unauthorised access of data as it is being transmitted over a network.
  7. A form of social engineering that involves maintaining a conversation.
  8. Should be at least 8 characters long with upper and lowercase letters.
  9. A form of testing designed to find any weaknesses in a system.
  10. A technique that exploits vulnerabilities in databases by injecting malicious code.
Down
  1. Attempting to guess passwords by trying every possible combination.
  2. Manipulating people into sharing sensitive/confidential information.
  3. Overloading a network or website with traffic to make it unavailable.
  4. Permissions assigned to a user defining what resources they can access.
  5. The process of scrambling data so it can only be read by authorised users.
  6. A malicious program that disguises itself as legitimate software.
  7. A term for malicious software.
  8. A malicious program that replicates itself and attaches itself to files.
  9. A form of social engineering that involves tricking people into sharing information through fake emails or websites.

19 Clues: A term for malicious software.A type of malware that secretly monitors a user.A form of testing designed to find any weaknesses in a system.Malware that encrypts files and demands payment for decryption.A malicious program that disguises itself as legitimate software.Attempting to guess passwords by trying every possible combination....

ANTI-BULLYING :) 2021-11-22

ANTI-BULLYING :) crossword puzzle
Across
  1. Someone who bullies someone is called a ________.
  2. When the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
  3. When rumors are spread or embarrassing photos of you it is called _____-bullying
  4. A person who watches someone get bullied and doesn't do anything is called a _________.
Down
  1. When being punched kicked other every day it is called ______ -bullying.
  2. When you are being called mean names daily it is called _______-bullying.
  3. There are 4 types of it such as verbal social physical and cyber _________.
  4. When a bully has a target its usually called a ______.
  5. Bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
  6. When a bully bullies someone is probably because they are ______ of something they have that they don't.
  7. When being bullied online it is called ______-bullying.
  8. When being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.

12 Clues: Someone who bullies someone is called a ________.When a bully has a target its usually called a ______.When being bullied online it is called ______-bullying.When being punched kicked other every day it is called ______ -bullying.When you are being called mean names daily it is called _______-bullying....

B&W Security 2012-10-19

B&W Security crossword puzzle
Across
  1. go obama!
  2. our little hairy boy
  3. the best security supervisor in b&w history
  4. the man you go to with all your questions
Down
  1. go yankees!
  2. booshaw!
  3. last security officer on site, usually
  4. loves a good beer from time to time
  5. go hokies!
  6. a master huntsman
  7. b&w security environmentalist

11 Clues: booshaw!go obama!go hokies!go yankees!a master huntsmanour little hairy boyb&w security environmentalistloves a good beer from time to timelast security officer on site, usuallythe man you go to with all your questionsthe best security supervisor in b&w history

Govt jobs vs private jobs 2024-09-20

Govt jobs vs private jobs crossword puzzle
Across
  1. employee benefit
  2. govt job category
  3. govt job application process
  4. career growth opportunity
  5. private company's priority
  6. job search platform
  7. job satisfaction factor
Down
  1. professional network
  2. work life balance aspect
  3. govt job advantage
  4. sector offering rapid career growth
  5. skill required for private sector success
  6. govt job requirement
  7. benefit often associated with govt jobs
  8. job security feature
  9. resume building tool
  10. type of job known for stability
  11. private sector job risk
  12. career advancement path
  13. industry with private and govt sector presence

20 Clues: employee benefitgovt job categorygovt job advantagejob search platformprofessional networkgovt job requirementjob security featureresume building toolprivate sector job riskcareer advancement pathjob satisfaction factorwork life balance aspectcareer growth opportunityprivate company's prioritygovt job application process...

How well do you know ISO Standards? - Dr. Sriram Rajagopalan 2024-05-08

How well do you know ISO Standards? - Dr. Sriram Rajagopalan crossword puzzle
Across
  1. Social Responsibility
  2. IT Services
  3. Privacy Extension
  4. Risk Management for Medical Devices
  5. Information Security
  6. Medical Devices
  7. Electronic Port Clearance
  8. Sustainable Events
  9. Risk Management
  10. Aircraft Equipment
  11. Agriculture Tractors and Machinery
  12. Business Continuity
  13. Energy Management Services
  14. Occupational Health & Safety: Psychosocial Risks
Down
  1. Food Safety & Farming
  2. Quality Management
  3. Anti-bribery Management Services
  4. Mobile Financial Services
  5. Traceability in the Feed and Food Chains
  6. Environment
  7. Testing and Calibration Laboratories
  8. Certificate Management
  9. Banking Security
  10. Occupational Health & Safety: Physical Risks
  11. Food & Safety Management

25 Clues: IT ServicesEnvironmentMedical DevicesRisk ManagementBanking SecurityPrivacy ExtensionQuality ManagementSustainable EventsAircraft EquipmentBusiness ContinuityInformation SecuritySocial ResponsibilityFood Safety & FarmingCertificate ManagementFood & Safety ManagementMobile Financial ServicesElectronic Port ClearanceEnergy Management Services...

34 2024-08-08

34 crossword puzzle
Across
  1. Tech database request
  2. Tech wireless internet
  3. Tech access site
  4. Tech access point
  5. Tech automated program
  6. Tech information
  7. Tech core system
  8. Tech server
  9. Tech video call
  10. Tech local network
  11. Tech network cable
  12. Tech web address
  13. Tech online world
Down
  1. Tech computer system
  2. Tech harmful program
  3. Tech internet address
  4. Tech video blog
  5. Tech security measure
  6. Tech programming language
  7. Tech security code
  8. Tech online storage
  9. Tech internet device
  10. Tech markup language
  11. Tech connected devices
  12. Tech network device

25 Clues: Tech serverTech video blogTech video callTech access siteTech informationTech core systemTech web addressTech access pointTech online worldTech security codeTech local networkTech network cableTech online storageTech network deviceTech computer systemTech harmful programTech internet deviceTech markup languageTech database request...

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ 2024-03-05

ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ crossword puzzle
Across
  1. Εκφοβισμός με λόγια
  2. Το βαπτιστικό όνομα της καθαρίστριας
  3. Το χωριό του Δημητράκη
  4. Έτσι ονομάζονταν το χωριό μας παλιά
  5. Ηγέτης της Νότιας Αφρικής
  6. Μπορεί να συμβεί και κατά την ώρα του....
  7. Το επίθετο της κ Χρύσας
  8. Έβγαινε τα βραδια με πανσέληνο
  9. Στα ελληνικά το τέννις
Down
  1. Στα ελληνικά το cyber bullying
  2. Ασκεί τον εκφοβισμό
  3. Όνομα του τραγουδιού που ακούσαμε
  4. Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές
  5. Δέχεται τον εκφοβισμό
  6. Το επίθετο της κ Μαρίνας

15 Clues: Ασκεί τον εκφοβισμόΕκφοβισμός με λόγιαΔέχεται τον εκφοβισμόΤο χωριό του ΔημητράκηΣτα ελληνικά το τέννιςΤο επίθετο της κ ΧρύσαςΤο επίθετο της κ ΜαρίναςΗγέτης της Νότιας ΑφρικήςΣτα ελληνικά το cyber bullyingΈβγαινε τα βραδια με πανσέληνοΌνομα του τραγουδιού που ακούσαμεΈτσι ονομάζονταν το χωριό μας παλιάΤο βαπτιστικό όνομα της καθαρίστριας...

TTS TOLERANSI DAN EMPATI RIKO 2025-03-13

TTS TOLERANSI DAN EMPATI RIKO crossword puzzle
Across
  1. CONTOH PERUNDUNGAN DI SEKOLAHAN
  2. APA DAMPAK CYBER BULLYING
  3. APA CONTOH EMPATI
  4. APA CONTOH TOLERANSI DI SEKOLAHAN
  5. CONTOH TOLERANSI DI LINGKUNGAN KELUARGA
  6. JENIS JENIS BULLYING
  7. APA CONTOH TOLERANSI
Down
  1. APA CONTOH EMPATI DI SEKOLAH
  2. APA CONTOH BULLYING DI MEDIA SOSIAL
  3. CONTOH EMPATI DI LINGKUNGAN KELUARGA

10 Clues: APA CONTOH EMPATIJENIS JENIS BULLYINGAPA CONTOH TOLERANSIAPA DAMPAK CYBER BULLYINGAPA CONTOH EMPATI DI SEKOLAHCONTOH PERUNDUNGAN DI SEKOLAHANAPA CONTOH TOLERANSI DI SEKOLAHANAPA CONTOH BULLYING DI MEDIA SOSIALCONTOH EMPATI DI LINGKUNGAN KELUARGACONTOH TOLERANSI DI LINGKUNGAN KELUARGA

Cyberbullying 2024-11-01

Cyberbullying crossword puzzle
Across
  1. Type of cyberbullying.
  2. Type of cyber bullying (h)
  3. Where Cyberbullying occurs.
  4. How cyberbullying can make someoen feel.
Down
  1. Platforms for cyberbullying.
  2. What a cyberbully thrives behind
  3. Online Bullying
  4. What you should do when cyberbullying occurs
  5. How cyberbullying

9 Clues: Online BullyingHow cyberbullyingType of cyberbullying.Type of cyber bullying (h)Where Cyberbullying occurs.Platforms for cyberbullying.What a cyberbully thrives behindHow cyberbullying can make someoen feel.What you should do when cyberbullying occurs

Bullying 2018-11-22

Bullying crossword puzzle
Across
  1. bully arguments on internet
  2. having and expressing strong feelings
  3. different skin colour
  4. people in college
Down
  1. around you
  2. causing feeling of sadness
  3. someone who is treated badly
  4. the way in which one acts or conducts oneself towards others
  5. not good at anything
  6. someone who picks on or teases others
  7. different orientation

11 Clues: around youpeople in collegenot good at anythingdifferent skin colourdifferent orientationcausing feeling of sadnessbully arguments on internetsomeone who is treated badlyhaving and expressing strong feelingssomeone who picks on or teases othersthe way in which one acts or conducts oneself towards others

Networking 2024-09-25

Networking crossword puzzle
Across
  1. Barrier against cyber threats
  2. can could not catch a fish with this
  3. secure browsing
  4. better known as the handshake
  5. Unauthorized digital infiltration
Down
  1. this is not a LAN
  2. layout or structure
  3. Unique identifier for a device on a network
  4. Malicious software
  5. this is our community
  6. you do not cook in this

11 Clues: secure browsingthis is not a LANMalicious softwarelayout or structurethis is our communityyou do not cook in thisBarrier against cyber threatsbetter known as the handshakeUnauthorized digital infiltrationcan could not catch a fish with thisUnique identifier for a device on a network

Ky and Mattie 2014-10-10

Ky and Mattie crossword puzzle
Across
  1. a file used to organize files into groups
  2. Mail- Commonly known as email. System designed to send messages and attachments electronically.
  3. A word or phrase pursued be a hash or a pound sign (#) and used to identify messages on a specific topic
  4. To make changes to a document or presentation
  5. Drive- A device for storing info in a fixed location within your computer. Like filling a cabinet in your computer
  6. To send the margins, fonts, tabs, line spacing, layout of document
  7. Name- The part in the left is the most specific , and the part on the right is most in general, these are in numbers
  8. File- A set of rules that allow computers to “talk” to one another while transferring files from one to one. This is a protocol computer across the Internet
Down
  1. A place in a database record where a category of info can be located
  2. Boot- Start up computer from a powered down state, when there is no electrical current
  3. Hardware or software that separates a local area to a network into 2 or more parts for security purposes
  4. Interchange Format- an method for storing graphics. Takes up a small amount of disks space and can be transmitted quickly
  5. The process of transferring software/info from the Internet to your computer
  6. Publishing- using features of word processor/DTP software to format and produce documents, letters, reports, flyers and newsletter with graphics
  7. Bully- The electronic way to make fun or humiliate somebody, or mean comments about somebody
  8. Involving questions of right and wrong behavior, following accepted rules of behavior: morally right good. What is moral when using technology.
  9. This is a coding language used to create sites on the WWW.
  10. Name System- This is a service that stores, translates and retrieves the numeral address equivalent of familiar names that you use everyday
  11. Base- A type of computer application (program) used storing, organizing and retrieving information

19 Clues: a file used to organize files into groupsTo make changes to a document or presentationThis is a coding language used to create sites on the WWW.To send the margins, fonts, tabs, line spacing, layout of documentA place in a database record where a category of info can be located...

Ready Player One 2023-04-24

Ready Player One crossword puzzle
Across
  1. The main character
  2. Class he was taking when he made a connection to the keys
  3. Organization's name that wants to control the OASIS
  4. Which parent died first
  5. Wades best friend
  6. Wade's aunt's name
  7. What year is it
Down
  1. Wade's mom's name
  2. Wade's cyber-crush
  3. OASIS creator
  4. Wades OASIS character
  5. The key that Wade has found so far
  6. The place Wade lives
  7. Nickname for people searching for the keys
  8. James Halliday's avatar

15 Clues: OASIS creatorWhat year is itWade's mom's nameWades best friendWade's cyber-crushThe main characterWade's aunt's nameThe place Wade livesWades OASIS characterWhich parent died firstJames Halliday's avatarThe key that Wade has found so farNickname for people searching for the keysOrganization's name that wants to control the OASIS...

Zajedno za Bolji Internet 2023-03-01

Zajedno za Bolji Internet crossword puzzle
Across
  1. nose se na dan protiv nasilja
  2. prividna stvarnost nastala pomoću računala
  3. nasilničko ponašanje
  4. mogućnost slanja pošte preko interneta
  5. tragovi koji nikog ne ugrožavaju
  6. tragovi koje bez namjere plasiramo na internet
  7. cyberbullying
  8. pošta koju šaljemo internetom i ostavljamo digitalne tragove
  9. skup znakova koji imaju neko značenje
Down
  1. tragovi koji vrijeđaju ili ugrožavaju nekog
  2. otisci koje ostavljamo na internetu
  3. neželjena pošta
  4. tragovi koje namjerno ostavljamo na internetu
  5. digitalna mapa
  6. male datoteke

15 Clues: cyberbullyingmale datotekedigitalna mapaneželjena poštanasilničko ponašanjenose se na dan protiv nasiljatragovi koji nikog ne ugrožavajuotisci koje ostavljamo na internetuskup znakova koji imaju neko značenjemogućnost slanja pošte preko internetaprividna stvarnost nastala pomoću računalatragovi koji vrijeđaju ili ugrožavaju nekog...

Cyber safety 2015-02-22

Cyber safety crossword puzzle
Across
  1. when you keep something secret and you don't tell anyone else
  2. when you are being safe on the Internet
  3. when people go on other peoples profiles and pretend to be them
Down
  1. someone sends or posts people rude things to make them upset
  2. helps someone to protect there profile so no one can hack into it
  3. when you communicate over computer network, especially the Internet
  4. when you get an email on your computer and it gives it a virus

7 Clues: when you are being safe on the Internetsomeone sends or posts people rude things to make them upsetwhen you keep something secret and you don't tell anyone elsewhen you get an email on your computer and it gives it a viruswhen people go on other peoples profiles and pretend to be themhelps someone to protect there profile so no one can hack into it...

Cyber Safety 2022-09-07

Cyber Safety crossword puzzle
Across
  1. Remember to ________ ________ of your accounts.
  2. ________________ suspicious attachments or links.
  3. A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
Down
  1. Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
  2. Spam, phishing and scams are examples of cyber __________________.
  3. Set a ________________ password to keep your online accounts secure.
  4. Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money

7 Clues: Remember to ________ ________ of your accounts.________________ suspicious attachments or links.Spam, phishing and scams are examples of cyber __________________.Set a ________________ password to keep your online accounts secure.A cyber attack that uses emails or malicious websites to steal a person’s login and password details....

Physical security 2021-05-04

Physical security crossword puzzle
Across
  1. somethings without understand
  2. wall for protection
  3. uses biological characteristics for authentication and identification.
  4. theft of data
  5. many row and column
Down
  1. use finger to access
  2. list for user authorization
  3. house, department
  4. is one of control prodedures
  5. code to identify
  6. privacy network
  7. distance work
  8. is one of control prodedures

13 Clues: theft of datadistance workprivacy networkcode to identifyhouse, departmentwall for protectionmany row and columnuse finger to accesslist for user authorizationis one of control prodeduresis one of control prodeduressomethings without understanduses biological characteristics for authentication and identification.

General security 2022-10-07

General security crossword puzzle
Across
  1. abbreviation relating to company policy where employees bring their own devices to work
  2. if you see something, say something! Report it to ____
  3. Knows all about & is used in place of search frequently
  4. released everymonth to fix vulnerabilities
  5. Data that gives information about the data
  6. allows 2 operating system to run at the same time
  7. should be unique and separate to each accounts to help thwarft cybercriminals
Down
  1. This software can slow down your computer & watch everywhere you go on the internet
  2. This horse can stampede your security defenses for the bad guys and make you look sheepish too!
  3. your company can ____ your internet activity
  4. software designed to protect your system from malwares
  5. any unsolicited email, text message or phone call

12 Clues: released everymonth to fix vulnerabilitiesData that gives information about the datayour company can ____ your internet activityany unsolicited email, text message or phone callallows 2 operating system to run at the same timeif you see something, say something! Report it to ____software designed to protect your system from malwares...

Airport security 2022-10-20

Airport security crossword puzzle
Across
  1. lodging a place to sleep
  2. being in another country
  3. a person who takes luggage to your room
  4. person who operates a vehicle
  5. a mark a document with an official sign
  6. cab
  7. timetable
Down
  1. baggage
  2. a document to that allowed you to travel though a country
  3. the best option or the highest quality
  4. not allowed
  5. to work at something carefully

12 Clues: cabbaggagetimetablenot allowedlodging a place to sleepbeing in another countryperson who operates a vehicleto work at something carefullythe best option or the highest qualitya person who takes luggage to your rooma mark a document with an official signa document to that allowed you to travel though a country

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Datensicherung auf externen Speicher
  2. Gezieltes Ansprechen von Minderjährigen mit sexuellem hintergrund
  3. Internetvirus
  4. Befehlssequenzen
  5. Websiten merken sich die gesuchten Artikel mit...
  6. Begriff für ilegales eindringen von fremden Personen in den Computer
  7. Scheinbar nützliches Programm mit gefährlichem Hintergrund
Down
  1. Wie können Daten nachvollzogen werden (Hint: mit -)
  2. Eindringen in fremde Computer ohne kriminelle Absichten
  3. Was schützt unseren Computer vor dem Zugriff von anderen durch das Internet
  4. Ordner in den Mails welche gewisse E-Mails mit negativen Werbeinhalt enthalten
  5. Umleitung auf gefälschte Seiten

12 Clues: InternetvirusBefehlssequenzenUmleitung auf gefälschte SeitenDatensicherung auf externen SpeicherWebsiten merken sich die gesuchten Artikel mit...Wie können Daten nachvollzogen werden (Hint: mit -)Eindringen in fremde Computer ohne kriminelle AbsichtenScheinbar nützliches Programm mit gefährlichem Hintergrund...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Begriff für ilegales eindringen von fremden Personen in den Computer
  2. Scheinbar nützliches Programm mit gefährlichem Hintergrund
  3. Eindringen in fremde Computer ohne kriminelle Absichten
  4. Umleitung auf gefälschte Seiten
  5. Wie können Daten nachvollzogen werden (Hint: mit -)
  6. Befehlssequenzen
  7. Ordner in den Mails welche gewisse E-Mails mit negativen Werbeinhalt enthalten
Down
  1. Was schützt unseren Computer vor dem Zugriff von anderen durch das Internet
  2. Internetvirus
  3. Datensicherung auf externen Speicher
  4. Gezieltes Ansprechen von Minderjährigen mit sexuellem hintergrund
  5. Websiten merken sich die gesuchten Artikel mit...

12 Clues: InternetvirusBefehlssequenzenUmleitung auf gefälschte SeitenDatensicherung auf externen SpeicherWebsiten merken sich die gesuchten Artikel mit...Wie können Daten nachvollzogen werden (Hint: mit -)Eindringen in fremde Computer ohne kriminelle AbsichtenScheinbar nützliches Programm mit gefährlichem Hintergrund...

Food Security 2024-01-19

Food Security crossword puzzle
Across
  1. We throw between 20-50% of our food in this
  2. Corn can be turned into this
  3. The state of being extremely poor
  4. The pharaoh dream was interpreted by this person
  5. The projected world population by 2050 is _ _ _ _ point one billion people
  6. This country was saved from famine due to a prophecy
Down
  1. We will need to increase our production by this much to feed the population in 2050
  2. We consumed more food than we produced in 6 of the last 11 years
  3. We need to support _ _ _ _ _ food systems.
  4. Plant breeding can ensure crops can survive this natural phenomena that is a result of limited water
  5. Technology and _ _ _ _ _ _ _ has the potential to increase food production by 50%
  6. Large food price increases can cause people to _ _ _ _

12 Clues: Corn can be turned into thisThe state of being extremely poorWe need to support _ _ _ _ _ food systems.We throw between 20-50% of our food in thisThe pharaoh dream was interpreted by this personThis country was saved from famine due to a prophecyLarge food price increases can cause people to _ _ _ _...

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Good for eyes and associated with bugs bunny
  2. Popeye favorite snack
  3. those both are two _ in a pod
  4. Used as pink food color
  5. Farming on aquatic species called
  6. Humpty dumpty is an
  7. Are considered backbone of nation
Down
  1. An_ a day keeps a doctor away
  2. Color and a fruit
  3. A staple grain used to make bread and pasta
  4. I'm rich in omega fatty acids
  5. The process of protecting food from spoilage and contamination in cold environment

12 Clues: Color and a fruitHumpty dumpty is anPopeye favorite snackUsed as pink food colorAn_ a day keeps a doctor awayI'm rich in omega fatty acidsthose both are two _ in a podFarming on aquatic species calledAre considered backbone of nationA staple grain used to make bread and pastaGood for eyes and associated with bugs bunny...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The dirt where plants grow
  2. Keeping food safe until it's time to eat
  3. Fruits and vegetables that grow at certain times of the year
  4. A small area where you can grow your own vegetables
  5. To keep food fresh for a long time, like canning or freezing
  6. The feeling when you need to eat
Down
  1. What you plant to grow new food
  2. To give food to people who need it
  3. What plants and people need to drink to live
  4. Food grown near where you live
  5. Where farmers sell their fresh food
  6. Throwing away good food that could be eaten

12 Clues: The dirt where plants growFood grown near where you liveWhat you plant to grow new foodThe feeling when you need to eatTo give food to people who need itWhere farmers sell their fresh foodKeeping food safe until it's time to eatThrowing away good food that could be eatenWhat plants and people need to drink to live...

Resource Reliance 2023-12-07

Resource Reliance crossword puzzle
Across
  1. growing food without soil
  2. China helped Tanzania build this to improve transport
  3. a crop which is turned into bread, pasta etc.
  4. the person who thought eventually there will be too many people for food supply
  5. the removal of trees
  6. the region where goat aid was given in Tanzania
  7. a human factor which can affect food security
  8. changing the DNA characteristics of something like food
  9. food grown without artificial chemicals
  10. what animals were given in Babati
  11. the type of farming that makes a profit
  12. something that will run out
  13. a manmade lake which stores water
Down
  1. how did the goats help grow more crops
  2. the present day attempt to achieve food security in Tanzania
  3. a period of less than average rainfall
  4. a human factor which can affect food security
  5. a product which gives farmers a fair price
  6. a human factor which can damage land causing food security issues
  7. growing food in towns and cities
  8. insects that can damage crops
  9. non renewable energy sources
  10. a way of getting coal
  11. the tribe who were most affected by the wheat project
  12. a measure of how much energy from food people get
  13. the country who gave aid to Tanzania in the past to help food security
  14. if a country has enough, affordable, nutritious food
  15. the person who thought technology will always help us supply enough food

28 Clues: the removal of treesa way of getting coalgrowing food without soilsomething that will run outnon renewable energy sourcesinsects that can damage cropsgrowing food in towns and citieswhat animals were given in Babatia manmade lake which stores waterhow did the goats help grow more cropsa period of less than average rainfall...

Coding 2022-06-10

Coding crossword puzzle
Across
  1. process to code
  2. Online
  3. A device used for coding
  4. Students use this everyday
Down
  1. popular hobby
  2. numbers used to code
  3. what you use to access google.
  4. What we do in our everyday life
  5. What everyone needs

9 Clues: Onlinepopular hobbyprocess to codeWhat everyone needsnumbers used to codeA device used for codingStudents use this everydaywhat you use to access google.What we do in our everyday life

PSSD 2019-12-09

PSSD crossword puzzle
Across
  1. Firm Tie
  2. First Installment
  3. Wal-Mart Competitor
  4. Unintentional omission
  5. Colonisation
  6. Bring into Harmony
  7. Security for a Loan
Down
  1. Liquid Gas Filled Sphere
  2. Discharge of a Debt
  3. Planned Undertaking
  4. Able to Function
  5. Aptly named bird
  6. State of being free from danger
  7. Course of Action

14 Clues: Firm TieColonisationAble to FunctionAptly named birdCourse of ActionFirst InstallmentBring into HarmonyDischarge of a DebtPlanned UndertakingWal-Mart CompetitorSecurity for a LoanUnintentional omissionLiquid Gas Filled SphereState of being free from danger

toms crossword 2015-02-15

toms crossword crossword puzzle
Across
  1. name of shop camera
  2. toms wife
  3. toms preferred title
  4. guard toms job
  5. where Tom lives
  6. toms car
  7. toms pastime
Down
  1. installed in shop to watch people
  2. toms word for shoplifters
  3. toms new boss
  4. one who arrests
  5. security measures for store
  6. where Tom works
  7. toms old boss

14 Clues: toms cartoms wifetoms pastimetoms new bosstoms old bossguard toms jobone who arrestswhere Tom workswhere Tom livesname of shop cameratoms preferred titletoms word for shoplifterssecurity measures for storeinstalled in shop to watch people

Bullying 2018-11-22

Bullying crossword puzzle
Across
  1. around you
  2. causing feeling of sadness
  3. different orientation
  4. someone who picks on or teases others
Down
  1. the way in which one acts or conducts oneself towards others
  2. different skin colour
  3. someone who is treated badly
  4. bully arguments on internet
  5. people in college
  6. having and expressing strong feelings
  7. not good at anything

11 Clues: around youpeople in collegenot good at anythingdifferent skin colourdifferent orientationcausing feeling of sadnessbully arguments on internetsomeone who is treated badlyhaving and expressing strong feelingssomeone who picks on or teases othersthe way in which one acts or conducts oneself towards others

Test 2021-11-12

Test crossword puzzle
Across
  1. the activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. any malicious computer program which is used to hack into a computer by misleading users of its true intent
  3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  4. a local or restricted communications network, especially a private network created using World Wide Web software
  5. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  2. are small files that Web sites put on your computer hard disk drive when you first visit
  3. algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
  4. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
  5. a standalone malware computer program that replicates itself in order to spread to other computers

10 Clues: are small files that Web sites put on your computer hard disk drive when you first visita standalone malware computer program that replicates itself in order to spread to other computersany malicious computer program which is used to hack into a computer by misleading users of its true intent...

cyber security awareness month-test your knowledge 2022-10-31

cyber security awareness month-test your knowledge crossword puzzle
Across
  1. WHEN IN DOUBT, THROW IT OUT – ......ME
  2. unique passphrase: Create your own .......and don’t share with anyone.
  3. “Let’s bring people to the ........and NOT the data to people”
  4. Suspicious? REPORT &..........!
Down
  1. MAKE A LONG, UNIQUE PASSPHRASE - ........ME
  2. We are....on the security and privacy team
  3. Stay ahead of the criminals by KEEPING A CLEAN MACHINE - ....... ME
  4. have a healthy suspicion towards a link or an..........
  5. take sensitive conversations somewhere........

9 Clues: Suspicious? REPORT &..........!WHEN IN DOUBT, THROW IT OUT – ......MEWe are....on the security and privacy teamMAKE A LONG, UNIQUE PASSPHRASE - ........MEtake sensitive conversations somewhere........have a healthy suspicion towards a link or an..........“Let’s bring people to the ........and NOT the data to people”...

Chronicles 2021-02-23

Chronicles crossword puzzle
Across
  1. Storage Array Balancing
  2. Change
  3. Computer security system against online attack
  4. Security
  5. Vcenter7.0
  6. Personal
Down
  1. Relocate
  2. Tick Tock Tick
  3. MFA (Multifactor Authentication)
  4. Check your phone
  5. Tracking Tool
  6. Golden Record
  7. Someone who was kicked out from all the major browsers on 31st Dec 2020
  8. need a break

14 Clues: ChangeRelocateSecurityPersonalVcenter7.0need a breakTracking ToolGolden RecordTick Tock TickCheck your phoneStorage Array BalancingMFA (Multifactor Authentication)Computer security system against online attackSomeone who was kicked out from all the major browsers on 31st Dec 2020

1/10 2025-01-10

1/10 crossword puzzle
Across
  1. Helping fix a flat tire
  2. Police go into the community to make their presence known
  3. Police use judgement to make decisions
  4. Domestic Assault requires these arrest laws
  5. illegal activities online
Down
  1. Preventing crime
  2. Guiding principles all officers must follow
  3. Today
  4. AVHS mascot
  5. Teacher's last name

10 Clues: TodayAVHS mascotPreventing crimeTeacher's last nameHelping fix a flat tireillegal activities onlinePolice use judgement to make decisionsGuiding principles all officers must followDomestic Assault requires these arrest lawsPolice go into the community to make their presence known

Government 2026-03-14

Government crossword puzzle
Across
  1. Federal Music Project
  2. Department of Homeland Security
  3. Agricultural Adjustment Administration
  4. Rural Electrification Administration
  5. Federal Bureau of Investigation
  6. Tennessee Valley Authority
  7. Central Intelligence Agency
  8. Indian Reorganization Act
Down
  1. Fair Labor Standards Act
  2. Puerto Rico Reconstruction Administration
  3. Department of Energy
  4. Bureau of Alcohol, Tobacco
  5. Bonneville Power Administration
  6. Transportation Security Administration
  7. Civil Aeronautics Authority

15 Clues: Department of EnergyFederal Music ProjectFair Labor Standards ActIndian Reorganization ActBureau of Alcohol, TobaccoTennessee Valley AuthorityCentral Intelligence AgencyCivil Aeronautics AuthorityDepartment of Homeland SecurityFederal Bureau of InvestigationBonneville Power AdministrationRural Electrification Administration...

Data Protection 2022-02-08

Data Protection crossword puzzle
Across
  1. Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.
  2. A stricter( )is expected in managing and processing “national core data”.
  3. If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
  4. Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
  5. “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
  6. In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
  7. Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
  8. The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
  9. Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
Down
  1. In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
  2. The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
  3. In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
  4. Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
  5. The Personal Information Protection Law also sets out a series of penalties for( ).
  6. If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
  7. “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.

16 Clues: A stricter( )is expected in managing and processing “national core data”.The Personal Information Protection Law also sets out a series of penalties for( ).Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines....

Risk 2020-05-12

Risk crossword puzzle
Across
  1. is the risk that failed business decisions, or lack thereof, may pose to a company.
  2. applies when you own foreign investments
  3. The risk of a loss in your purchasing power because the value of your investments does not keep up with
  4. risk as a subset of operational risk in 2003. This conception is based on a business perspective, recognizing that there are threats entailed in the business operating environment.
  5. is the risk of losses in positions arising from movements in market prices.
  6. cyber risk is any risk related to information technology.
  7. is a financial risk that for a certain period of time a given financial asset, security or commodity cannot be traded quickly enough in the market without impacting the market price.
  8. is the potential loss to financial capital, social capital and/or market share resulting from damage to a firm's reputation.
Down
  1. is any of various types of risk associated with financing
  2. is "the risk of a change in value caused by the fact that actual losses, incurred for inadequate or failed internal processes, people and systems, or from external events, differ from the expected losses
  3. the term covering an organization's approach across Compliance these three practices: Governance, risk management, and compliance.
  4. is the risk of loss resulting from using insufficiently accurate models to make decisions.
  5. applies to an investment in shares.
  6. is the risk of default on a debt that may arise from a borrower failing to make required payments.
  7. applies to debt investments such as bonds
  8. may be shortened because of an unforeseen event, for example, the loss of your job.

16 Clues: applies to an investment in shares.applies when you own foreign investmentsapplies to debt investments such as bondsis any of various types of risk associated with financingcyber risk is any risk related to information technology.is the risk of losses in positions arising from movements in market prices....

CyberSecurity Terminologies Check! 2024-12-03

CyberSecurity Terminologies Check! crossword puzzle
Across
  1. A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
  2. A decoy system or network that serves to attract potential attackers.
  3. A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
  4. Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
  5. Locks the computer or data and demands a payment to release the machine.
  6. identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
  1. The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
  2. A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
  3. A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
  4. A process that ensures and confirms a user’s identity.
  5. A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
  6. A type of surveillance software that records keystrokes made by a user
  7. Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
  8. Spread to other machines on a network.Red : A color
  9. A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.

15 Clues: Spread to other machines on a network.Red : A colorA process that ensures and confirms a user’s identity.A decoy system or network that serves to attract potential attackers.A type of surveillance software that records keystrokes made by a userLocks the computer or data and demands a payment to release the machine....

CompGov Choiceboard 1 2025-06-04

CompGov Choiceboard 1 crossword puzzle
Across
  1. Received as an heir
  2. Possessing something
  3. Compelling observance
  4. Useful item
  5. Morally Justified
  6. People of noble blood
  7. Motivation
  8. No one is above the law
  9. Thing that is borrowed
Down
  1. Putting money for profit
  2. Grant a payment contract
  3. Being free from danger
  4. Pledged as security for repayment
  5. Belonging to someone
  6. Economic System
  7. Economic System

16 Clues: MotivationUseful itemEconomic SystemEconomic SystemMorally JustifiedReceived as an heirPossessing somethingBelonging to someoneCompelling observancePeople of noble bloodBeing free from dangerThing that is borrowedNo one is above the lawPutting money for profitGrant a payment contractPledged as security for repayment

spanish 2023-01-09

spanish crossword puzzle
Across
  1. parade la-familia familia la-festividad-de-la-cosecha harvest festival
  2. gobble gobble (turkey sound)
  3. football (not soccer)
  4. share
Down
  1. Cyber Monday
  2. thankful
  3. —cornucopia
  4. colony
  5. gracias thanks

9 Clues: sharecolonythankful—cornucopiaCyber Mondaygracias thanksfootball (not soccer)gobble gobble (turkey sound)parade la-familia familia la-festividad-de-la-cosecha harvest festival

CEH Chapter 17 Crossword Puzzle 2026-03-13

CEH Chapter 17 Crossword Puzzle crossword puzzle
Across
  1. One time password authentication code
  2. Enterprise mobile device management system
  3. Remote monitoring spyware for iOS
  4. Secure Android storage for cryptographic keys
  5. Mobile application runtime protection platform
  6. Runtime instrumentation and hooking framework
  7. Taking control of device via Bluetooth
  8. Isolating apps to restrict system access
  9. Android application package file format
  10. Mobile application source code scanner
  11. Hijacking camera using remote malware
  12. Low orbit ion cannon DoS tool
  13. Mobile anti spyware protection software
  14. Removing Apple iOS security restrictions
  15. Android post exploitation control framework
  16. SIM toolkit vulnerability SMS attack
  17. SMS phishing attack using text messages
  18. Gaining privileged Android system access
  19. Android debugging bridge command tool
  20. Google Android device tracking service
  21. iOS post exploitation framework tool
  22. iOS runtime manipulation framework
Down
  1. Mobile antivirus and privacy protection
  2. Mobile runtime security testing framework
  3. Mobile security framework analysis tool
  4. Android network traffic capture tool
  5. Extracts stored secrets from iOS
  6. Employees use personal devices for work
  7. iOS malware targeting biometric data
  8. Android remote administration trojan tool
  9. Exploiting trusted computer pairing connection
  10. Android app reverse engineering tool
  11. Eavesdropping using smartphone motion sensors
  12. Mobile malware protection security tool
  13. Stealing data over Bluetooth connection
  14. Mobile application penetration testing toolkit
  15. Apple device location tracking service
  16. Secure iOS storage for passwords
  17. Tor based proxy privacy application
  18. Android application attack surface testing tool

40 Clues: Low orbit ion cannon DoS toolExtracts stored secrets from iOSSecure iOS storage for passwordsRemote monitoring spyware for iOSiOS runtime manipulation frameworkTor based proxy privacy applicationAndroid network traffic capture tooliOS malware targeting biometric dataAndroid app reverse engineering toolSIM toolkit vulnerability SMS attack...

Ekonomi di era digital 2023-11-06

Ekonomi di era digital crossword puzzle
Across
  1. Data
  2. up
  3. Cyber
  4. endorsement
Down
  1. Currency
  2. Coin
  3. of Things

7 Clues: upCoinDataCyberCurrencyof Thingsendorsement

Safety and Security 2021-11-15

Safety and Security crossword puzzle
Across
  1. What is placed on the new sharps to help prevent injuries?
  2. Who is the most commonly injured healthcare worker?
  3. In what unit of the hospital do most accidental sticks happen?
  4. What is the lowest cost a facility can plan to pay for a sharps injury?
  5. In what method are needle free systems handled?
  6. Be ______________.
  7. What is one way to prevent sharp injuries?
  8. What is the most important step when using sharps?
  9. what law was formed in 2000 to help with the sharps injury prevention in healthcare?
  10. During what part of the use of needles are the least amount of injuries occurring?
Down
  1. What is the number of sharps injuries annually in hospital based healthcare workers?
  2. what is the best way to ensure other staff members in the room don't get a sharp injury when you have a sharp?
  3. Which virus has the most risk of seroconversion due to sharp injury?
  4. Dispose with _______.
  5. What color are sharps containers?
  6. Most safety features on sharps require training because they are _______ not passive.
  7. Be __________________.
  8. Are the majority of sharps injuries avoidable?
  9. Have a ______ day.

19 Clues: Be ______________.Have a ______ day.Dispose with _______.Be __________________.What color are sharps containers?What is one way to prevent sharp injuries?Are the majority of sharps injuries avoidable?In what method are needle free systems handled?What is the most important step when using sharps?Who is the most commonly injured healthcare worker?...

Cyber saftey Blake Biddell 2016-05-26

Cyber saftey Blake Biddell crossword puzzle
Across
  1. fun to play with
  2. to make a computer screen smaller
  3. downloadable fun
  4. random information sometimes not wanted
  5. site to gain information on the web
  6. people online who aren't nice
  7. person who helps at school
  8. appropriate level of content
  9. someone who looks after you
  10. makes your computer sick
Down
  1. to not be online
  2. one of Apples products
  3. scams games that aren't safe
  4. used to get online
  5. someone who helps at home
  6. cable needed to power a device
  7. provides power
  8. uses Electricity
  9. protect your online identity

19 Clues: provides powerto not be onlinefun to play withdownloadable funuses Electricityused to get onlineone of Apples productsmakes your computer sicksomeone who helps at homeperson who helps at schoolsomeone who looks after youscams games that aren't safeappropriate level of contentprotect your online identitypeople online who aren't nice...

Escape the Cold Date Night 2023-02-02

Escape the Cold Date Night crossword puzzle
Across
  1. The burninator
  2. Blows your heater fuse
  3. Has best friends and best Spani
  4. Mt. P eatery, with Max
  5. Scarce in Michigan Winters
  6. Good Mt. P sushi, near shops
  7. Mt. P Japanese near H. Depot
  8. Twilight character, or cat
  9. Ball, Bowl, or Monster
  10. World's worst songwriter
  11. Metal type, or fancy Mt. P cafe
Down
  1. This towards men, or a store
  2. Soaring Eagle mascot
  3. Kassia's favorite donut
  4. Mt. P cookie store, near goodwill
  5. Abundant in Michigan Winters
  6. Fancy Mt. P sushi, downtown
  7. Kid or Cyber, in Mt. P
  8. No, I don't want tooo!

19 Clues: The burninatorSoaring Eagle mascotBlows your heater fuseMt. P eatery, with MaxKid or Cyber, in Mt. PNo, I don't want tooo!Ball, Bowl, or MonsterKassia's favorite donutWorld's worst songwriterScarce in Michigan WintersTwilight character, or catFancy Mt. P sushi, downtownThis towards men, or a storeAbundant in Michigan Winters...

Westhill Crossword 2024-03-10

Westhill Crossword crossword puzzle
Across
  1. are wearing this in protest
  2. favorite gym rat
  3. apply to college when you are a ______
  4. Study Resource
  5. in math class
  6. to the SAT
  7. write what you are reading
  8. of a class curriculum
  9. and purple
Down
  1. 300s and 400s are in the _____ building
  2. college for Westhill graduates
  3. Alswanger and Mr. Cooney
  4. Cyber Rams
  5. you get into college you develop _____
  6. in 1916
  7. for the head janitor at Westhill
  8. section of the school building
  9. past participle
  10. Playmakers

19 Clues: in 1916Cyber RamsPlaymakersto the SATand purplein math classStudy Resourcepast participlefavorite gym ratof a class curriculumAlswanger and Mr. Cooneywrite what you are readingare wearing this in protestcollege for Westhill graduatessection of the school buildingfor the head janitor at Westhillyou get into college you develop _____...

test 2019-09-21

test crossword puzzle
Across
  1. you need one of these to work in the security industry
  2. guard,if you are posted outside a store
  3. officer, Section 12 of security and related activities(control) act 1996
  4. filled out at site
  5. patrol, If you use a car for your duties
Down
  1. arrest, section 25 of criminal code
  2. you must wear this
  3. need to complete this is you have an incident
  4. controller, Section 35 of security and related activities(control) act 1996
  5. use of section 26
  6. spray, You cannot use this in Western Australia

11 Clues: use of section 26you must wear thisfilled out at sitearrest, section 25 of criminal codeguard,if you are posted outside a storepatrol, If you use a car for your dutiesneed to complete this is you have an incidentspray, You cannot use this in Western Australiayou need one of these to work in the security industry...

Technology Crossword 2018-10-23

Technology Crossword crossword puzzle
Across
  1. Member of different groups
  2. the trail you leave behind as you use the internet, such as your comments on social media and the websites you visit
  3. viruses and spyware is categorized as ______
  4. Participating in your world in a responsible way.
  5. Being both proficient in the use of new technologies and comfortable in the atmosphere of cyberspace.
  6. relating to or involving an image, video, piece of information, that is circulated rapidly and widely from one internet user
  7. Participating in the cyber world
Down
  1. Play an important part in making today’s culture so interconnected.
  2. the ability to use information and communication technologies to find, evaluate, create, and communicate information
  3. taking responsibility for your role in cyberspace and engaging in positive and ethical decision-making to stay safe online.
  4. People who were born after the invention of digital technology and have grown up using it.
  5. a tool that helps someone sort through billions of websites to locate those that are specific to their search
  6. Online environment of the cyber world in which communications take place.
  7. Places that exist not in the real world but only online
  8. The modern world of computers, communications, and other digital technologies, such as mobile devices.
  9. a file written with the sole intention of doing harm

16 Clues: Member of different groupsParticipating in the cyber worldviruses and spyware is categorized as ______Participating in your world in a responsible way.a file written with the sole intention of doing harmPlaces that exist not in the real world but only onlinePlay an important part in making today’s culture so interconnected....

Networking 2024-09-25

Networking crossword puzzle
Across
  1. this is our community
  2. Unique identifier for a device on a network
  3. you do not cook in this
  4. layout or structure
  5. Barrier against cyber threats
Down
  1. Unauthorized digital infiltration
  2. secure browsing
  3. can could not catch a fish with this
  4. this is not a LAN
  5. better known as the handshake
  6. Malicious software

11 Clues: secure browsingthis is not a LANMalicious softwarelayout or structurethis is our communityyou do not cook in thisbetter known as the handshakeBarrier against cyber threatsUnauthorized digital infiltrationcan could not catch a fish with thisUnique identifier for a device on a network

BTW Cross word 2025-11-20

BTW Cross word crossword puzzle
Across
  1. One of BTW Main Colors
  2. Booker T. Washington High Schools Mascot?
  3. Engines that power machines
  4. AI Software
Down
  1. Applying math & science to solve practical problems
  2. Another BTW Main Color
  3. Prefix meaning “digital” or “online”
  4. The name of Booker T. Robot
  5. The act of introducing something new
  6. UBEST ______ Competition
  7. Turning ideas into computer commands

11 Clues: AI SoftwareOne of BTW Main ColorsAnother BTW Main ColorUBEST ______ CompetitionThe name of Booker T. RobotEngines that power machinesPrefix meaning “digital” or “online”The act of introducing something newTurning ideas into computer commandsBooker T. Washington High Schools Mascot?Applying math & science to solve practical problems

Hybrid Data Center Security 2024-05-01

Hybrid Data Center Security crossword puzzle
Across
  1. There are two different types of traffic, each of which is secured in a different manner.
  2. Focus of traditional data security solutions limits their ability to see all traffic on all ports.
  3. Consolidating servers ______________trust levels.
Down
  1. Provides clear delineation of application functions and allows a security team to easily implement security policies.
  2. Traffic is secured by one or more physical form factor perimeter edge firewalls.
  3. In traditional data center security solutions requires a corresponding security policy often using multiple management tools.
  4. An attacker has multiple options to steal data from the _______
  5. Traffic is protected by a local, virtualized firewall instantiated on each hypervisor.
  6. _____________ network security virtualization.
  7. ___________ lateral threat movement when a front-end workload has been compromised.

10 Clues: _____________ network security virtualization.Consolidating servers ______________trust levels.An attacker has multiple options to steal data from the _______Traffic is secured by one or more physical form factor perimeter edge firewalls.___________ lateral threat movement when a front-end workload has been compromised....

Cyber-wellness Crossword Puzzle 2013-06-06

Cyber-wellness Crossword Puzzle crossword puzzle
Across
  1. You should be ______________ for your words and action online because it can hurt others feelings.
  2. ______ bullying is using the computer or phone on online social media to say hurtful things to someone or to spread rumors
  3. Save the ________ using screenshots when you were being cyber bullied.
Down
  1. Do not post things that will _______ others feeling.
  2. Do not send _________ message or emails to unknown people as it could be spamming. Addiction Gamming ___________ is when you can’t control yourself to stop playing that game.
  3. You should have proper __________ when on the internet.
  4. You should report the _________ to your parents or teachers.
  5. Do not interfere other people’s quarrel as you can become another ________.
  6. You should not _________ or reply to strangers because they can ask you further private information.

9 Clues: Do not post things that will _______ others feeling.You should have proper __________ when on the internet.You should report the _________ to your parents or teachers.Save the ________ using screenshots when you were being cyber bullied.Do not interfere other people’s quarrel as you can become another ________....

Lemoncello's Library 2025-06-18

Lemoncello's Library crossword puzzle
Across
  1. everything to do with books
  2. room with round cieling and 10 chambers
  3. new head librarian
  4. nufevah
  5. important color
  6. other security guard
  7. The Smart one
  8. the one we think will win
  9. The reader
Down
  1. name of town
  2. security guard
  3. old head librarian
  4. what's on library cards
  5. furtune telling robot in booth
  6. The Cheater
  7. how to collect book titles

16 Clues: nufevahThe readerThe Cheatername of townThe Smart onesecurity guardimportant colorold head librariannew head librarianother security guardwhat's on library cardsthe one we think will winhow to collect book titleseverything to do with booksfurtune telling robot in boothroom with round cieling and 10 chambers

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. offering stocks to the public from a private corporation
  2. age you can collect more social security
  3. you contribute to a roth IRA...
  4. government account everyone taxes into
  5. 6.2%
  6. if you don't pay social security you might have a...
  7. currency backed by the government
  8. a sum of money saved for a particular purpose
  9. the increase in value of an asset
  10. social security might be classified on your paystub as...
  11. 1.45%
  12. market is falling
Down
  1. you put money into your 401k...
  2. measures the price performance of a basket of securities
  3. money before taxes
  4. well established and financially sound company
  5. market is rising
  6. age you can collect social security
  7. virtual currency
  8. how old you need to be to invest in crypto
  9. investing all the money you have avalible into the market at once
  10. Individual Retirement Account
  11. money a company is giving back to its share holders
  12. expected to run out of money in 2031
  13. having worked a certain amount of time with a company so you get 100% of the money your company matched you
  14. money after taxes
  15. dollar cost averaging
  16. tells you how big the company is on the stock market
  17. how you make money in a roth IRA
  18. you have 60 days to do this when moving money into a different retirement account

30 Clues: 6.2%1.45%market is risingvirtual currencymoney after taxesmarket is fallingmoney before taxesdollar cost averagingIndividual Retirement Accountyou put money into your 401k...you contribute to a roth IRA...how you make money in a roth IRAcurrency backed by the governmentthe increase in value of an assetage you can collect social security...

Investing - Ayden Templeton 2025-03-25

Investing - Ayden Templeton crossword puzzle
Across
  1. money Currencies that are created and backed by the government
  2. Cost averaging a strategy in which you invest your money in equal amounts, at regular intervals
  3. market when markets fall
  4. An amount of money saved/available for a specific purpose
  5. Federal Insurance Contributions Act(Social Security and Medicare taxes)
  6. Buffett CEO of Berkshire Hathaway
  7. A company that a larger company owns
  8. A system of recording information that makes it difficult/impossible to change
  9. measures the price performance of a basket of various securities
  10. Factors Something the company has done, like introducing a new product
  11. retirement savings plan 401K
  12. Security To address the permanent problem of economic security for the elderly
  13. Market A place where people buy and sell pieces of companies, called shares, to make money
Down
  1. cap The total value of a company’s stock
  2. Government Medical Health Plan
  3. IRA Individual retirement account
  4. fund A fund that pools money from a large group of investors
  5. traded funds a collection of stocks, bonds, etc
  6. refers to the process of offering shares of a private corporation
  7. market When markets rise
  8. They represent a loan from the buyer
  9. Factors Something that does not directly involve the company, like a pandemic
  10. A security representing the ownership of a fraction of a corporation.
  11. funds a type of mutual fund, or ETF, that follows a benchmark index
  12. The availability of cash

25 Clues: The availability of cashmarket when markets fallmarket When markets riseretirement savings plan 401KGovernment Medical Health PlanBuffett CEO of Berkshire HathawayIRA Individual retirement accountA company that a larger company ownsThey represent a loan from the buyercap The total value of a company’s stock...

Chapter 5 - Application Security 2025-05-21

Chapter 5 - Application Security crossword puzzle
Across
  1. An iterative and flexible approach to software development and delivery.
  2. A condition where a program fails to release unused memory, reducing performance.
  3. A Windows feature that limits application privileges to prevent unauthorized changes.
  4. A condition where a calculation exceeds the max value of an integer type.
  5. A security feature that randomly arranges memory addresses to prevent exploits.
  6. Analyzing source code to find and fix security vulnerabilities.
  7. A vulnerability that allows attackers to run arbitrary code on a remote system.
  8. An attack technique that accesses restricted files by manipulating file paths.
  9. The process of planning, creating, testing, and deploying secure software.
  10. Best practices for writing software that avoids introducing security flaws.
  11. Testing software with full access to internal logic and source code.
Down
  1. An error that occurs when a program tries to access memory through a null pointer.
  2. A linear and sequential software development methodology.
  3. Identifying and evaluating potential security risks in an application.
  4. Testing software without knowing its internal code or logic.
  5. Checking and filtering user input to prevent malicious data processing.
  6. A method of handling software errors without crashing the system.
  7. An isolated environment used to run and test code safely.
  8. A type of Flash-based browser cookie stored locally on the user's device.
  9. A technique that tests software by inputting large amounts of random data.

20 Clues: A linear and sequential software development methodology.An isolated environment used to run and test code safely.Testing software without knowing its internal code or logic.Analyzing source code to find and fix security vulnerabilities.A method of handling software errors without crashing the system....

Module 6 Vocabulary 2023-09-19

Module 6 Vocabulary crossword puzzle
Across
  1. A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
  2. A device that monitors, logs, detects, and reacts to stop or prevent security breaches
  3. a type of IDS that uses behavior for decision making
  4. hardware firewall that protects the entire network
  5. combines several layers of security and networking services into one solution
  6. A buffer network that sits between the private network and an untrusted network
Down
  1. the main benefit of an ACL
  2. a type of IDS that uses patterns for decision making
  3. the type of computer that may be found inside a screened subnet
  4. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules
  5. software firewall that protects a single device
  6. Firewalls use filtering rules, which are sometimes called access control lists, to identify allowed and blocked traffic.

12 Clues: the main benefit of an ACLsoftware firewall that protects a single devicehardware firewall that protects the entire networka type of IDS that uses patterns for decision makinga type of IDS that uses behavior for decision makingthe type of computer that may be found inside a screened subnet...

Airport 2017-09-11

Airport crossword puzzle
Across
  1. How many Cargo terminals are located at Auckland International Airport
  2. Part of NZ custom - Ministry of Agriculture and Forestry
  3. What is the Airport name for the IATA code NSN?
  4. Number of baggage claim belts at Auckland International Airport
  5. City code of Rarotonga
  6. The area where security and screenings are taken place
  7. How many passenger terminals are located at Auckland International Airport
  8. Process of producing your boarding pass
  9. "The area before departing passengers pass through security and are also accessible by both travellers and non-travellers"
  10. This facility is only offered to departing and arriving international travellers
Down
  1. Free and used to carry your luggage throughout the terminals
  2. "For passesngers travelling business or first class on their airline or for passengers that have joined the airlines VIP club"
  3. "_________ is a company located in the check-in area which enables travellers to have their luggage sealed in recyclable, transparent polythene to protect it from scratches, moisture or any form of tampering"
  4. City code is SIN
  5. "Location with either paved, dirt, grass or gravel runways for aircraft to take off and/or land"
  6. What is the code for Customer Service Officer?
  7. "Area where you go through security and hand over your passport and departure card for inspection"
  8. IATA code for Kapiti Coast
  9. Once passengers are through immigration and _________ they are now airside
  10. The country of the busiest Airport

20 Clues: City code is SINCity code of RarotongaIATA code for Kapiti CoastThe country of the busiest AirportProcess of producing your boarding passWhat is the code for Customer Service Officer?What is the Airport name for the IATA code NSN?The area where security and screenings are taken placePart of NZ custom - Ministry of Agriculture and Forestry...

NASAA Investment Adviser Examiners' Crossword 2018-02-27

NASAA Investment Adviser Examiners' Crossword crossword puzzle
Across
  1. to act in the best interest of the client
  2. the cost for an investment adviser's services
  3. ticker symbol for Facebook
  4. a fixed income security
  5. freedom to make investment decisions on behalf of the client
  6. a method to raise funds for cryptocurrency
  7. fraudulant investment operations where returns for older investors are paid through revenue from new investors
  8. a firm that executes security transactions for itself and clients
  9. the oldest investor protection organization
  10. free from security registration
  11. the sunshine state
Down
  1. possession of client funds or securities
  2. provides continuous investment services for a fee
  3. competing personal and business plans
  4. recommended procedure or implementation
  5. a digital ledger for cryptocurrency transactions
  6. client and firm documents
  7. exempt sale of securities to accredited investors
  8. a written disclosure statement that must be provided to existing and prospective clients
  9. individuals with a history of disciplinary actions
  10. ticker symbol for Netflix
  11. a type of cryptocurrency
  12. ticker for Amazon
  13. wrongful or criminal deception intended to result in personal gain

24 Clues: ticker for Amazonthe sunshine statea fixed income securitya type of cryptocurrencyclient and firm documentsticker symbol for Netflixticker symbol for Facebookfree from security registrationcompeting personal and business plansrecommended procedure or implementationpossession of client funds or securitiesto act in the best interest of the client...

NASAA Investment Adviser Examiners' Crossword 2018-02-27

NASAA Investment Adviser Examiners' Crossword crossword puzzle
Across
  1. ticker symbol for Facebook
  2. individuals with a history of disciplinary actions
  3. exempt sale of securities to accredited investors
  4. ticker for Amazon
  5. the cost for an investment adviser's services
  6. the oldest investor protection organization
  7. competing personal and business plans
  8. ticker symbol for Netflix
  9. recommended procedure or implementation
  10. a digital ledger for cryptocurrency transactions
  11. a firm that executes security transactions for itself and clients
  12. wrongful or criminal deception intended to result in personal gain
Down
  1. a fixed income security
  2. a method to raise funds for cryptocurrency
  3. fraudulant investment operations where returns for older investors are paid through revenue from new investors
  4. provides continuous investment services for a fee
  5. freedom to make investment decisions on behalf of the client
  6. a written disclosure statement that must be provided to existing and prospective clients
  7. to act in the best interest of the client
  8. client and firm documents
  9. possession of client funds or securities
  10. free from security registration
  11. a type of cryptocurrency
  12. the sunshine state

24 Clues: ticker for Amazonthe sunshine statea fixed income securitya type of cryptocurrencyclient and firm documentsticker symbol for Netflixticker symbol for Facebookfree from security registrationcompeting personal and business plansrecommended procedure or implementationpossession of client funds or securitiesto act in the best interest of the client...

Acronyms part 4 2024-12-13

Acronyms part 4 crossword puzzle
Across
  1. Internet Message Access Protocol
  2. Memorandum of Understanding
  3. Mobile Device Management
  4. Incident Response
  5. Local Area Network
  6. Internet Relay Chat
  7. Lightweight Extensible Authentication
  8. Master Service Agreement
  9. Initialization Vector
  10. Indicators of Compromise
  11. Mandatory Access Control
  12. Key Distribution Center
  13. Mean Time Between Failures
  14. Incident Response Plan
  15. Media Access Control
  16. Instant Messaging
  17. Internet Key Exchange
  18. Lightweight Directory Access Protocol
  19. Information Systems Security Officer
  20. Layer 2 Tunneling Protocol
  21. Microsoft Challenge Handshake
  22. Main Distribution Frame
  23. Managed Service Provider
  24. International Standards Organization
Down
  1. Protocol
  2. Master Boot Record
  3. Metropolitan Area Network
  4. Message Authentication Code
  5. Machine Learning
  6. Internet Service Provider
  7. Internet Protocol Security
  8. Key Encryption Key
  9. Internet of Things
  10. Managed Security Service Provider
  11. Multifunction Device
  12. Multifactor Authentication
  13. Intrusion Prevention System
  14. Institute of Electrical and Electronics
  15. Message Digest 5
  16. Multi-protocol Label Switching
  17. Mean Time to Failure
  18. Multimedia Message Service
  19. Internet Protocol
  20. Multifunction Printer
  21. Monitoring as a Service
  22. Memorandum of Agreement

46 Clues: ProtocolMachine LearningMessage Digest 5Incident ResponseInstant MessagingInternet ProtocolMaster Boot RecordLocal Area NetworkKey Encryption KeyInternet of ThingsInternet Relay ChatMultifunction DeviceMedia Access ControlMean Time to FailureInitialization VectorInternet Key ExchangeMultifunction PrinterIncident Response PlanKey Distribution Center...

Papa Javi 6 weeks down, years to go... 2023-01-28

Papa Javi 6 weeks down, years to go... crossword puzzle
Across
  1. Your initial ideas about something
  2. Relative, uncle's child
  3. Awful, terrible
  4. Workers representation
  5. What Ukraine is receiving a lot of
  6. Pasta dish
  7. What you need to do to Matteo to comfort him
Down
  1. Something that causes discussion, debate, even outrage
  2. Go up
  3. The cyber group, also without identity
  4. Period of freezing weather (go crazy suddenly) 4,(4)
  5. The red stuff

12 Clues: Go upPasta dishThe red stuffAwful, terribleWorkers representationRelative, uncle's childYour initial ideas about somethingWhat Ukraine is receiving a lot ofThe cyber group, also without identityWhat you need to do to Matteo to comfort himPeriod of freezing weather (go crazy suddenly) 4,(4)Something that causes discussion, debate, even outrage

Don't Travel Without 2022-01-21

Don't Travel Without crossword puzzle
Across
  1. your paper ticket
  2. the people who work in the plane with passengers
  3. when security checks your person
  4. what you pass through at security
  5. the official document that lets you travel
  6. the area you go to pick up your luggage
Down
  1. the person flying the airplane
  2. what your luggage goes through at security
  3. the luggage you personally take on a plane
  4. telling the airline you're here for your flight
  5. the area you pass through when traveling in a new country
  6. moving from one flight to another
  7. a square piece of luggage
  8. the cart used to carry luggage

14 Clues: your paper ticketa square piece of luggagethe person flying the airplanethe cart used to carry luggagewhen security checks your personmoving from one flight to anotherwhat you pass through at securitythe area you go to pick up your luggagewhat your luggage goes through at securitythe luggage you personally take on a plane...

Cyber Threat Crossword 2022-02-07

Cyber Threat Crossword crossword puzzle
Across
  1. Never share your _________ with another person
  2. Also known as malicious software any; any program or file that is harmful to a computer user
  3. Passwords should should always be at least this many characters long.
  4. Choose a password that is easy for you _______________ but hard for you someone to guess.
  5. Applied to data to protect it from unauthorized use in case of theft or loss.
  6. A collection of information that is organized so that it can easily be accessed, managed and updated
  7. Email scam or attempt to trick you into giving your password or personal information
Down
  1. A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
  2. _________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
  3. Do not leave your laptop or computer ___________________
  4. The state of being free from danger and threat
  5. Always _______your computer when you leave your desk
  6. To protect personal information, avoid sending it via
  7. A _______ assessment is the process by which risks are identified and the impact of those risks determined
  8. A software that is designed and destroy computer viruses
  9. A ___________ is often an email that gets mailed in chain letter fashion describing something devastating.

16 Clues: Never share your _________ with another personThe state of being free from danger and threatAlways _______your computer when you leave your deskTo protect personal information, avoid sending it viaDo not leave your laptop or computer ___________________A software that is designed and destroy computer viruses...

Cyber Ethics crossword 2025-05-28

Cyber Ethics crossword crossword puzzle
Across
  1. Harmful software that
  2. secret code to access an account
  3. Theft Stealing someone's personal or confidential data
  4. online bullying or harassment
  5. Name used to log into websites or apps
  6. Fake emails to steal personal information
  7. Rules of right and wrong behavior online
Down
  1. Blocks unauthorized access to a network
  2. Breaking into a system without permission
  3. Software that secretly gathers your information
  4. Keeping your personal information safe
  5. Program that spreads and corrupts files
  6. systems
  7. Scrambling data to prevent unauthorized access
  8. Protects against harmful programs
  9. A trick to steal your data or money

16 Clues: systemsHarmful software thatonline bullying or harassmentsecret code to access an accountProtects against harmful programsA trick to steal your data or moneyKeeping your personal information safeName used to log into websites or appsBlocks unauthorized access to a networkProgram that spreads and corrupts files...

People at school 2025-04-13

People at school crossword puzzle
Across
  1. Security
  2. Librarian
  3. Janitor
  4. Boy
  5. Teacher
Down
  1. Subprincipal
  2. Secretary
  3. Students
  4. Principal
  5. Girl

10 Clues: BoyGirlJanitorTeacherSecurityStudentsSecretaryLibrarianPrincipalSubprincipal

Monitoring 2024-11-10

Monitoring crossword puzzle
Across
  1. A notification system that warns administrators of potential security incidents (8 letters).
  2. The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
  3. Alerts generated by network devices to notify administrators of significant events (4 letters).
  4. A tool used to identify security weaknesses in systems and applications (20 letters).
  5. The act of examining systems or networks for vulnerabilities or threats (8 letters).
  6. The process of generating documents that summarize security findings and incidents (9 letters).
Down
  1. Software designed to detect and remove malicious programs from a computer system (9 letters).
  2. Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
  3. A network protocol that collects IP traffic information for analysis (7 letters).
  4. A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
  5. A standard for automating vulnerability management and compliance checks (4 letters).
  6. A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
  7. Long-term storage of logs and data for compliance and future reference (9 letters).
  8. Security standards or best practices used to evaluate the configuration of systems (10 letters).

14 Clues: A network protocol that collects IP traffic information for analysis (7 letters).Long-term storage of logs and data for compliance and future reference (9 letters).The act of examining systems or networks for vulnerabilities or threats (8 letters).A standard for automating vulnerability management and compliance checks (4 letters)....

Stock Exchange 2024-02-04

Stock Exchange crossword puzzle
Across
  1. Market:A market in which stock prices are rising.
  2. Gain or Loss:Profit or loss resulting from the sale of certain assets classified under the federal income tax legislation as capital assets. This includes stocks and other investments such as investment property.
  3. Size:The aggregate size in board lots of the most recent bid to buy a particular security.
  4. measurement of the relationship between the price of a stock and the movement of the whole market.
  5. Transaction:An order to close out an existing open futures or options contract.
  6. securities firm is classified as an agent when it acts on behalf of its clients as buyer or seller of a security. The agent does not own the security at any time during the transaction.
  7. Day:Any business day on which the clearing corporation is open to effect trade clearing and settlement.
  8. an economist, capital means machinery, factories and inventory required to produce other products. To investors, capital means their cash plus the financial assets they have invested in securities, their home and other fixed assets.
  9. Day:Any day from Monday to Friday, excluding statutory holidays.
  10. notes issued by a corporation or government to its lenders, usually with a specified amount of interest for a specified length of time.
  11. physical document that shows ownership of a bond, stock or other security.
  12. Price:The price of the last board lot trade executed at the close of trading
  13. a company or person owns, including money, securities, equipment and real estate. Assets include everything that is owed to the company or person. Assets are listed on a company's balance sheet or an individual's net worth statement.
Down
  1. Order:An order from a retail customer of a Participating Organization.
  2. special term attached to an equity order that requires the trade to be settled either the same day or the following business day for cash.
  3. Number:The trading number of the clearing Participating Organization or Member.
  4. Chip Stocks:Stocks of leading and nationally known companies that offer a record of continuous dividend payments and other strong investment qualities.
  5. The simultaneous purchase of a security on one stock market and the sale of the same security on another stock market at prices which yield a profit.
  6. highest price a buyer is willing to pay for a stock. When combined with the ask price information, it forms the basis of a stock quote.
  7. Size:The aggregate size in board lots of the most recent ask to sell a particular security.
  8. Stock:All shares representing ownership of a company, including preferred and common shares
  9. or Offer:The lowest price at which someone is willing to sell the security. When combined with the bid price information, it forms the basis of a stock quote.
  10. fee charged by an investment advisor or broker for buying or selling securities as an agent on behalf of a client.
  11. Report:A publication, including financial statements and a report on operations, issued by a company to its shareholders at the company's fiscal year-end.
  12. Market:A market in which stock prices are falling.
  13. Dividend / Distribution:A dividend/distribution that is paid in cash.

26 Clues: Market:A market in which stock prices are rising.Market:A market in which stock prices are falling.Day:Any day from Monday to Friday, excluding statutory holidays.Dividend / Distribution:A dividend/distribution that is paid in cash.Order:An order from a retail customer of a Participating Organization....

History 2021-04-06

History crossword puzzle
Across
  1. reduce value of dollar
  2. money
  3. progress administration- headed by harry hopkins a new federal agency
  4. labor relations board- 5 members appointed by us president
  5. security act- provide security for elerds and unemployed
  6. basic
  7. business leade
  8. direct talks for held
  9. as a result of
  10. party
  11. important
  12. strike- workers did not work
  13. liberty league- business leaders and anit new deal politicians get together
  14. headed by harry hopkins a new
Down
  1. bills sent to congress
  2. policy-----made panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds worldwide panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds
  3. Roosevelt’s policies
  4. policy-----made Deficit spending- borrowed money to pay for programs
  5. arbitration-neutral party listen to both sides and decide
  6. provide security for elerds and unemployed
  7. clear
  8. borrowed money
  9. 5 members appointed by us
  10. down strike- workers did not work and protested
  11. collection of ideas
  12. closed banks

26 Clues: moneyclearbasicpartyimportantclosed banksbusiness leadeborrowed moneyas a result ofcollection of ideasRoosevelt’s policiesdirect talks for heldbills sent to congressreduce value of dollar5 members appointed by usstrike- workers did not workheaded by harry hopkins a newprovide security for elerds and unemployed...

BCS reveiw noah 2015-11-13

BCS reveiw noah crossword puzzle
Across
  1. a message sender thing that send messages to people
  2. a plan u pick that limits sertan thing
  3. being safe on thee interwebs
  4. bully bully on the internet
  5. proper technique
  6. computer screen
  7. micro soft excel
  8. something you can access the web on
Down
  1. web page maker
  2. asdfjkl;'
  3. publisher grating cards
  4. a group of computers
  5. ware stuff that makes up a computer
  6. something that you move and click stuff with
  7. a small slip of buttons at the top of a Microsoft thing

15 Clues: asdfjkl;'web page makercomputer screenproper techniquemicro soft excela group of computerspublisher grating cardsbully bully on the internetbeing safe on thee interwebsware stuff that makes up a computersomething you can access the web ona plan u pick that limits sertan thingsomething that you move and click stuff with...

Friday Fun - Do you know your DOB Acronyms? 2022-02-04

Friday Fun - Do you know your DOB Acronyms? crossword puzzle
Across
  1. The C in CPS
  2. The I in AISP
  3. The A in OPA
  4. The E in OBIE
  5. The G in GDPR
  6. The I in PISP
  7. The L in AML
  8. The T in TPP
  9. The first U in UUID
  10. The C in CDC
  11. The P in ERP
Down
  1. The A in QWAC
  2. The S in QTSP
  3. The C in DSCA
  4. The O in DSOP
  5. The N in JSON
  6. The Q in QSealC
  7. The B in CBPII
  8. The T in QTSP
  9. The L in OBL
  10. The I in DPIA
  11. The D in PSD2
  12. The first S in ASPSP

23 Clues: The C in CPSThe A in OPAThe L in OBLThe L in AMLThe T in TPPThe C in CDCThe P in ERPThe A in QWACThe S in QTSPThe C in DSCAThe I in AISPThe O in DSOPThe N in JSONThe E in OBIEThe T in QTSPThe G in GDPRThe I in PISPThe I in DPIAThe D in PSD2The B in CBPIIThe Q in QSealCThe first U in UUIDThe first S in ASPSP

Cyber Security Crossword By AGUSTINA PETRACCA 2020-08-20

Cyber Security Crossword By AGUSTINA PETRACCA crossword puzzle
Across
  1. es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento.
  2. es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
  3. son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
  4. son pequeños archivos que algunos sitios web guardan en tu ordenador.
  5. es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
  1. es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
  2. es un sistema diseñado para evitar el acceso no autorizado a una red privada.

7 Clues: son pequeños archivos que algunos sitios web guardan en tu ordenador.es un sistema diseñado para evitar el acceso no autorizado a una red privada.es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento....

Know Your Money - 2004 Style Notes 2024-12-11

Know Your Money - 2004 Style Notes crossword puzzle
Across
  1. Some security features are visible under this kind of light.
  2. FRNs designed before 1990 do not contain security threads or ______.
  3. This person's portrait is on the $50 note.
  4. This person's portrait is on the $20 note.
  5. $100 FRNs have a blue security _____ woven into the paper.
  6. This person's portrait is on the $10 note.
Down
  1. All genuine FRNs except $1 and $2 have a clear _____ thread embedded.
  2. This person's portrait is on the $5 note.
  3. This person's portrait is on the $100 note.
  4. ____ Plate Number is found on the bottom right-hand corner of the back of the note.
  5. Currency paper has ____ and blue threads randomly disbursed throughout.
  6. visible from either side of the note when held to light.
  7. The first letter of this number on FRNs of each series year 1996 or later correspond to a series year.
  8. Currency paper consists of 25% linen and 75% _____.
  9. Color-shifting ___ is visible in the 2004 style $10, $20, $50 and $100 federal reserve notes.

15 Clues: This person's portrait is on the $5 note.This person's portrait is on the $50 note.This person's portrait is on the $20 note.This person's portrait is on the $10 note.This person's portrait is on the $100 note.Currency paper consists of 25% linen and 75% _____.visible from either side of the note when held to light....

Computer Ethics 2022-08-15

Computer Ethics crossword puzzle
Across
  1. words for protecting your account
  2. Another Word for Internet
  3. Words or images which can be clicked to visit other webpages
  4. not suitable or proper in the circumstances
  5. message sent through email
  6. moral values
  7. rules to punish against crime
  8. to illegally use others computer
Down
  1. your online identity
  2. activity punishable by Law
  3. crime of deceiving someone
  4. someone's identification
  5. another word for good behavior
  6. do damage to someone or something

14 Clues: moral valuesyour online identitysomeone's identificationAnother Word for Internetactivity punishable by Lawcrime of deceiving someonemessage sent through emailrules to punish against crimeanother word for good behaviorto illegally use others computerwords for protecting your accountdo damage to someone or something...

Cyber Crossword (CIA 1) 2021-09-05

Cyber Crossword (CIA 1) crossword puzzle
Across
  1. A current challenge in cyber space, where your identity lies under the wraps, but your activities are visible to everyone.
  2. The simulation of movement created by a series of pictures.
  3. Conversion of analog data into digital form.
  4. The fact of being alone so that you can do things without being seen or disturbed.
  5. Proponent of Cyber Paternalism.
Down
  1. The action of receiving electronic transmissions before they reach the intended recipient.
  2. Electronic form of legally enforceable promise, and every set of promises, forming the consideration for each other.
  3. A belief that individuals acting in whatever capacity, should be at liberty to pursue their own tastes and interests online.
  4. A virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure.
  5. Software that enables photo editing, image creation and graphic design.

10 Clues: Proponent of Cyber Paternalism.Conversion of analog data into digital form.The simulation of movement created by a series of pictures.Software that enables photo editing, image creation and graphic design.The fact of being alone so that you can do things without being seen or disturbed....

cyber world crossworld 2021-12-16

cyber world crossworld crossword puzzle
Across
  1. The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity." Netizen has the same meaning.
  2. Electronic media are media that use electronics or electromechanical means for the audience to access the content.
  3. the notional environment in which communication over computer networks occurs.
  4. Cyber citizenship is the rights, privileges and responsibilities required of internet and cellular network users.
  5. a person born or brought up during the age of digital technology and therefore familiar with computers and the internet from an early age.
Down
  1. A real or virtual world of information in cyberspace
  2. the position or status of being a citizen of a particular country.
  3. not physically existing as such but made by software to appear to do so
  4. an inhabitant of a particular town or city.
  5. By definition, Cyber Literacy means the ability to use computer technologie

10 Clues: an inhabitant of a particular town or city.A real or virtual world of information in cyberspacethe position or status of being a citizen of a particular country.not physically existing as such but made by software to appear to do soBy definition, Cyber Literacy means the ability to use computer technologie...

crossword cyber alexy 2025-11-03

crossword cyber alexy crossword puzzle
Across
  1. infiltrate an individual's computer systems
  2. device for carrying out malicious activities
  3. software updates
  4. cyber criminal
  5. code that can steal sensitive information
Down
  1. safely test software code
  2. protects your network and your device
  3. online scam similar to phishing
  4. malicious software capable of self-propagation
  5. malware attack

10 Clues: cyber criminalmalware attacksoftware updatessafely test software codeonline scam similar to phishingprotects your network and your devicecode that can steal sensitive informationinfiltrate an individual's computer systemsdevice for carrying out malicious activitiesmalicious software capable of self-propagation

cyber 2024-11-16

cyber crossword puzzle
Across
  1. what is the most important
Down
  1. wh

2 Clues: whwhat is the most important

križaljka sigurnosti na internetu 2026-02-10

križaljka sigurnosti na internetu crossword puzzle
Across
  1. caps Pisanje poruka isključivo velikim slovima
  2. Namjerno dijeljenje neprovjerenih ili lažnih informacija
  3. lažni profil
  4. Slanje ili traženje seksualno eksplicitnih poruka/slika
  5. sta pregledavamo svaki dan
  6. seksualno ili financijsko zlostavljanje
  7. namjerno osmišljen tako da izazove bijes
Down
  1. Slanje neželjenih poruka
  2. korištenje drugih fotografija
  3. predstavljajući se kao legitimne tvrtke ili institucije
  4. zezeanje drugih na internetu
  5. bulying ponavljano zlostavljanje putem digitalnih tehnologija

12 Clues: lažni profilSlanje neželjenih porukasta pregledavamo svaki danzezeanje drugih na internetukorištenje drugih fotografijaseksualno ili financijsko zlostavljanjenamjerno osmišljen tako da izazove bijescaps Pisanje poruka isključivo velikim slovimapredstavljajući se kao legitimne tvrtke ili institucije...

Chapter 7 2022-12-01

Chapter 7 crossword puzzle
Across
  1. Global position systems
  2. 1928 supreme court case made wiretapping unconstitutional
  3. Freedom of speech and right to privacy
  4. 1974 law passed to regulate the goverments use of personal data
  5. Electronic communications act
  6. 1937 supreme court case banning message interception without the senders consent
  7. using different data bases to compare and compound information
  8. uses algorithms to hide data
  9. rules or boundaries that are enforced by laws
  10. understanding of positive and negative consequences of utility
  11. A philosopher who believed actions are unethical if they negatively affected others
Down
  1. ethic perspective that rules should apply universally
  2. security procedure that is searching for leaks and other security vulnerabilities
  3. created corporate rule, requiring companies to be transparent when sharing customers data
  4. social security number
  5. informed consent and regulations for secondary uses
  6. a deal of buying or selling for business
  7. analyzation of copious masses of data
  8. protects children with parental controls on websites
  9. a right and state of liberty of being disturbed and observed.

20 Clues: social security numberGlobal position systemsuses algorithms to hide dataElectronic communications actanalyzation of copious masses of dataFreedom of speech and right to privacya deal of buying or selling for businessrules or boundaries that are enforced by lawsinformed consent and regulations for secondary uses...

a crossword by moon 2019-02-27

a crossword by moon crossword puzzle
Across
  1. flight name for Emirates Airlines
  2. a school subject that tells you countries and things
  3. the word for getting on the plane
  4. photo ID specifically used for boarding a zoomy sky boy
  5. the first part of UM
  6. the good boy who finds drugs and big money
  7. the side of the airport you're on before going through security
  8. the area where aircraft park
  9. the side of the airport you're on after going through security
  10. the current aviation security service
Down
  1. alternative S
  2. used of evacuating passengers from a stricken aircraft
  3. the airline alphabet
  4. the people going on the metal bird
  5. the big man who protects the community from potential bad guys
  6. vehicles with movable belts used to load and unload baggage onto aircraft
  7. the place where you get cheap drinks and cigs
  8. international travel documents you need to go to lots of other places
  9. the items passengers bring in suitcases and stuff
  10. flight name for Virgin Australia

20 Clues: alternative Sthe airline alphabetthe first part of UMthe area where aircraft parkflight name for Virgin Australiaflight name for Emirates Airlinesthe word for getting on the planethe people going on the metal birdthe current aviation security servicethe good boy who finds drugs and big moneythe place where you get cheap drinks and cigs...

NASAA Investment Adviser Examiners' Crossword 2018-02-27

NASAA Investment Adviser Examiners' Crossword crossword puzzle
Across
  1. a digital ledger for cryptocurrency transactions
  2. the cost for an investment adviser's services
  3. to act in the best interest of the client
  4. provides continuous investment services for a fee
  5. wrongful or criminal deception intended to result in personal gain
  6. ticker for Amazon
  7. competing personal and business plans
  8. a firm that executes security transactions for itself and clients
Down
  1. fraudulant investment operations where returns for older investors are paid through revenue from new investors
  2. ticker symbol for Facebook
  3. the oldest investor protection organization
  4. a written disclosure statement that must be provided to existing and prospective clients
  5. client and firm documents
  6. a type of cryptocurrency
  7. ticker symbol for Netflix
  8. freedom to make investment decisions on behalf of the client
  9. a method to raise funds for cryptocurrency
  10. recommended procedure or implementation
  11. exempt sale of securities to accredited investors
  12. free from security registration
  13. individuals with a history of disciplinary actions
  14. possession of client funds or securities
  15. a fixed income security
  16. the sunshine state

24 Clues: ticker for Amazonthe sunshine statea fixed income securitya type of cryptocurrencyclient and firm documentsticker symbol for Netflixticker symbol for Facebookfree from security registrationcompeting personal and business plansrecommended procedure or implementationpossession of client funds or securitiesto act in the best interest of the client...

NASAA Investment Adviser Examiners' Crossword 2018-02-27

NASAA Investment Adviser Examiners' Crossword crossword puzzle
Across
  1. ticker symbol for Netflix
  2. to act in the best interest of the client
  3. a type of cryptocurrency
  4. client and firm documents
  5. a fixed income security
  6. a digital ledger for cryptocurrency transactions
  7. the sunshine state
  8. competing personal and business plans
  9. exempt sale of securities to accredited investors
  10. free from security registration
Down
  1. the oldest investor protection organization
  2. freedom to make investment decisions on behalf of the client
  3. a method to raise funds for cryptocurrency
  4. recommended procedure or implementation
  5. provides continuous investment services for a fee
  6. possession of client funds or securities
  7. fraudulent investment operations where returns for older investors are paid through revenue from new investors
  8. a firm that executes security transactions for itself and clients
  9. the cost for an investment adviser's services
  10. a written disclosure statement that must be provided to existing and prospective clients
  11. wrongful or criminal deception intended to result in personal gain
  12. individuals with a history of disciplinary actions
  13. ticker symbol for Facebook
  14. ticker symbol for Amazon

24 Clues: the sunshine statea fixed income securitya type of cryptocurrencyticker symbol for Amazonticker symbol for Netflixclient and firm documentsticker symbol for Facebookfree from security registrationcompeting personal and business plansrecommended procedure or implementationpossession of client funds or securities...

[KoCyber] - FamilyOnlineSafety 2025-07-13

[KoCyber] - FamilyOnlineSafety crossword puzzle
Across
  1. Online trickery designed to steal money or information.
  2. Fake emails or messages tricking you into giving personal information.
  3. A secret word or phrase that secures your account.
  4. Practices and habits to stay secure online.
  5. Turning information into secret code for security.
  6. Making extra copies of data in case originals are lost.
  7. Software protecting your devices from viruses.
  8. Harmful software designed to damage your device.
  9. Extra security step requiring two ways to prove your identity.
  10. Software secretly installed to monitor your online activities.
  11. A person who tries to illegally access your accounts or devices.
  12. Misleading links designed to attract clicks and trap users.
Down
  1. Verifying that someone is who they claim to be.
  2. Protecting your personal information online.
  3. Malicious software that locks files and demands payment.
  4. Online harassment or bullying behavior.
  5. A digital barrier protecting your devices from harmful traffic.
  6. Internet connection freely accessible but risky to use.
  7. Posting too much personal information online.
  8. Regularly improving software to prevent security flaws.

20 Clues: Online harassment or bullying behavior.Practices and habits to stay secure online.Protecting your personal information online.Posting too much personal information online.Software protecting your devices from viruses.Verifying that someone is who they claim to be.Harmful software designed to damage your device....

GCSE Computer Science: Network Security 2018-02-17

GCSE Computer Science: Network Security crossword puzzle
Across
  1. A malicious program designed to gather information about the user or their system.
  2. A standard way of providing authentication.
  3. Software to control data going in and out of a network.
  4. A malicious program designed to damage a computer system.
  5. An activity performed by an ethical hacker to test a network's security. (2 words)
  6. A person who is employed by companies to try to break their network security. (2 words)
  7. Authentication system that requires more than one item to log in. (2 words)
  8. Proving your identity.
Down
  1. Protection of systems against theft, vandalism, etc. (2 words)
  2. Sending an email pretending to be from a bank, etc.
  3. A method of breaching security by tricking people. (2 words)
  4. A document that defines what users are (not) permitted to do on a system. (2 words)
  5. Ensuring data is within an acceptable range and format.
  6. An update to software to fix bugs - especially security bugs.

14 Clues: Proving your identity.A standard way of providing authentication.Sending an email pretending to be from a bank, etc.Ensuring data is within an acceptable range and format.Software to control data going in and out of a network.A malicious program designed to damage a computer system.A method of breaching security by tricking people. (2 words)...

Norwegian Prison 2024-01-23

Norwegian Prison crossword puzzle
Across
  1. Rehabilitate
  2. Normality
  3. Facilities
  4. Reintegration
  5. Community
Down
  1. Inmate
  2. Punishment
  3. Prison
  4. Recidivism
  5. Security

10 Clues: InmatePrisonSecurityNormalityCommunityPunishmentRecidivismFacilitiesRehabilitateReintegration

digital 2025-04-29

digital crossword puzzle
Across
  1. SECURITY
  2. INTERNET
  3. NETWORK
  4. HARDWARE
  5. ALGORITHM
Down
  1. TECHNOLOGY
  2. DIGITAL
  3. SOFTWARE
  4. PROGRAM
  5. DATABASE

10 Clues: DIGITALPROGRAMNETWORKSECURITYSOFTWAREINTERNETHARDWAREDATABASEALGORITHMTECHNOLOGY

CYBER LAW- CROSSWORD (CIA 1) 2021-09-05

CYBER LAW- CROSSWORD (CIA 1) crossword puzzle
Across
  1. There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
  2. The conversion of texts, pictures, or sound into a digital form.
  3. The act of persistent and unwanted contact from someone online.
  4. He is one of the famous scholar in cyber paternalism.
Down
  1. It is often viewed as the act of sending unsolicited email.
  2. These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
  3. The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
  4. It is a common file format used to combine and compress data for easy downloading.
  5. This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
  6. Most popular search engine.

10 Clues: Most popular search engine.He is one of the famous scholar in cyber paternalism.It is often viewed as the act of sending unsolicited email.The act of persistent and unwanted contact from someone online.The conversion of texts, pictures, or sound into a digital form.It is a common file format used to combine and compress data for easy downloading....

CYBER LAW- CROSSWORD (CIA 1) 2021-09-15

CYBER LAW- CROSSWORD (CIA 1) crossword puzzle
Across
  1. There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
  2. It is a common file format used to combine and compress data for easy downloading.
  3. This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
  4. These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
  5. Most popular search engine
Down
  1. He is one of the famous scholar in cyber paternalism.
  2. The conversion of texts, pictures, or sound into a digital form.
  3. It is often viewed as the act of sending unsolicited email.
  4. __________ resources is one major problem in cyberspace.
  5. The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.

10 Clues: Most popular search engineHe is one of the famous scholar in cyber paternalism.__________ resources is one major problem in cyberspace.The conversion of texts, pictures, or sound into a digital form.It is often viewed as the act of sending unsolicited email.It is a common file format used to combine and compress data for easy downloading....

Job and Occupation 2021-04-30

Job and Occupation crossword puzzle
Across
  1. a person in charge of controlling the rudder of an aircraft during flight time.
  2. as a legal expert has the authority to provide advice on cases in court.
  3. health workers who are the main point of patients.
  4. people who cook
  5. people whose job is to dive.
  6. a person whose job is to write.
  7. engineer of a ship locomotive
  8. the most number of health workers.
  9. female attendant on long distance transport
  10. members of government agencies or state employees in charge of maintaining security.
  11. lascar or state soldiers.
Down
  1. people who cover the news.
  2. female health workers assigned to assist.
  3. people working on public transportation
  4. people whose job is to raise livestock
  5. the person whose job is to catch fish.
  6. people who are in charge of taking care of and saving the result of payments, especially money.
  7. people whose job is to drive cars.
  8. a man who cultivates cops
  9. people who provide knowledge to students.
  10. a group assigned by the agency to carry out security.

21 Clues: people who cooka man who cultivates copslascar or state soldiers.people who cover the news.people whose job is to dive.engineer of a ship locomotivea person whose job is to write.people whose job is to drive cars.the most number of health workers.people whose job is to raise livestockthe person whose job is to catch fish....

NASAA IA Training After Lunch Crossword Challenge 2018-02-23

NASAA IA Training After Lunch Crossword Challenge crossword puzzle
Across
  1. a type of cryptocurrency
  2. ticker symbol for Netflix
  3. to act in the best interest of the client
  4. a fixed income security
  5. the cost for an investment adviser's services
  6. exempt sale of securities to accredited investors
  7. competing personal and business plans
  8. provides continuous investment services for a fee
  9. client and firm documents
  10. a firm that executes security transactions for itself and clients
  11. a digital ledger for cryptocurrency transactions
  12. the oldest investor protection organization
Down
  1. ticker symbol for Amazon
  2. a fraudulent plan promising high returns for little risk
  3. wrongful or criminal deception intended to result in personal gain
  4. recommended procedure or implementation
  5. free from security registration
  6. individuals with a history of disciplinary actions
  7. freedom to make investment decisions on behalf of the client
  8. a method to raise funds for a cyrptocurrency
  9. a written disclosure statement that must be provided to existing and prospective clients
  10. ticker symbol for Facebook
  11. the sunshine state
  12. possession of client funds or securities

24 Clues: the sunshine statea fixed income securityticker symbol for Amazona type of cryptocurrencyticker symbol for Netflixclient and firm documentsticker symbol for Facebookfree from security registrationcompeting personal and business plansrecommended procedure or implementationpossession of client funds or securities...

a crossword by moon 2019-02-27

a crossword by moon crossword puzzle
Across
  1. international travel documents you need to go to lots of other places
  2. the people going on the metal bird
  3. vehicles with movable belts used to load and unload baggage onto aircraft
  4. the current aviation security service
  5. the airline alphabet
  6. the place where you get cheap drinks and cigs
  7. the big man who protects the community from potential bad guys
  8. a school subject that tells you countries and things
  9. the items passengers bring in suitcases and stuff
  10. the side of the airport you're on before going through security
  11. the side of the airport you're on after going through security
Down
  1. alternative S
  2. the area where aircraft park
  3. used of evacuating passengers from a stricken aircraft
  4. the good boy who finds drugs and big money
  5. flight name for Virgin Australia
  6. the first part of UM
  7. flight name for Emirates Airlines
  8. photo ID specifically used for boarding a zoomy sky boy
  9. the word for getting on the plane

20 Clues: alternative Sthe first part of UMthe airline alphabetthe area where aircraft parkflight name for Virgin Australiaflight name for Emirates Airlinesthe word for getting on the planethe people going on the metal birdthe current aviation security servicethe good boy who finds drugs and big moneythe place where you get cheap drinks and cigs...