cyber security Crossword Puzzles

Cyber Safety 2016-08-26

Cyber Safety crossword puzzle
Across
  1. a person who breaks into computers to steal information
  2. a video camera attached to a computer
  3. media a digital platform on which you can communicate with people from around the world
  4. when criminals set up mock websites to steal information
  5. irrelevant messages which can be sources of criminal or advertising activity
Down
  1. web a collection of web-addresses which hide their IP addresses
  2. a malicious computer program which hacks a computer by lying about its intent
  3. repeatedly hurting someone emotionally online
  4. a software which can control your camera, delete your files
  5. an unwanted, self-opening browser window

10 Clues: a video camera attached to a computeran unwanted, self-opening browser windowrepeatedly hurting someone emotionally onlinea person who breaks into computers to steal informationwhen criminals set up mock websites to steal informationa software which can control your camera, delete your files...

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber Safety 2013-11-07

Cyber Safety crossword puzzle
Across
  1. A type of malware that spies on what you do on the Internet and can steal information about you from your computer.
  2. Someone who bullies others in Cyberspace.
  3. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  4. A type of chat slang
  5. A defensive software program that acts like a security guard and monitors and controls the traffic coming into and out of your machine from a network.
Down
  1. A person who hacks into computers to view or alter information that they don't have access to.
  2. Identity Your identity in cyberspace, who you are on the Internet.
  3. The physical components of a computer, usually contained within the computer's main case or tower.
  4. Something that can damage a living organism.
  5. Containing a combination of different types of content, like text, still images, audio, animations, videos and interactive content.

10 Clues: A type of chat slangSomeone who bullies others in Cyberspace.Something that can damage a living organism.Identity Your identity in cyberspace, who you are on the Internet.A person who hacks into computers to view or alter information that they don't have access to....

cyber safety 2021-09-16

cyber safety crossword puzzle
Across
  1. constant messages or something shared
  2. something affecting your computer
  3. what you leave on the internet
  4. someone who will have unwanted information
  5. the platforms that this is all performed on
Down
  1. a security device
  2. what people can see when online with you
  3. private information
  4. something that is personal to you
  5. your address

10 Clues: your addressa security deviceprivate informationwhat you leave on the internetsomething affecting your computersomething that is personal to youconstant messages or something sharedwhat people can see when online with yousomeone who will have unwanted informationthe platforms that this is all performed on

Cyber Bullying 2022-04-18

Cyber Bullying crossword puzzle
Across
  1. WHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE
  2. WHAT COLOUR WAS THE GOO IN THE VIDEO
  3. SPREADING FALSE INFORMATION ONLINE
  4. IF YOU HAVE HURT SOMEONE ONLINE SAY
  5. IF YOU ARE BULLIED ONLINE KEEP
Down
  1. CYBERBULLYING CAN FOLLOW YOU
  2. BULLYING CAN MAKE YOU FEEL
  3. THE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ART
  4. ALWAYS ASK FOR HELP
  5. BULLYING ONLINE IS CALLED

10 Clues: ALWAYS ASK FOR HELPBULLYING ONLINE IS CALLEDBULLYING CAN MAKE YOU FEELCYBERBULLYING CAN FOLLOW YOUIF YOU ARE BULLIED ONLINE KEEPSPREADING FALSE INFORMATION ONLINEIF YOU HAVE HURT SOMEONE ONLINE SAYWHAT COLOUR WAS THE GOO IN THE VIDEOTHE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ARTWHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE

Cyber Safety 2021-04-07

Cyber Safety crossword puzzle
Across
  1. Who to talk to if your worried?
  2. What should we get before posting photos of others?
  3. How long can things we put online last?
  4. We need to communicate politely, clearly & what? on the internet.
Down
  1. What do we call online bullying?
  2. Who should know our passwords?
  3. Illegally downloading movies breaks what laws?
  4. People we shouldn't talk to online?
  5. What kind of passwords should we have?
  6. People who are cyber bullied can become d........

10 Clues: Who should know our passwords?Who to talk to if your worried?What do we call online bullying?People we shouldn't talk to online?What kind of passwords should we have?How long can things we put online last?Illegally downloading movies breaks what laws?People who are cyber bullied can become d...........

Cyber Bullying 2021-05-03

Cyber Bullying crossword puzzle
Across
  1. Where people are able to make groups online
  2. The action of repeatedly sending offensive and insulting messages.
  3. The recording of everything accessed through the internet.
  4. Stopping the access of particular areas on the web.
Down
  1. When a group of people excludes someone intentionally.
  2. Bullying through online resources
  3. The act of engaging and following someone constantly where it breaches the victim's safety.
  4. When pretending to be someone else online
  5. Websites or application where people share content and messages
  6. Those who are under the age of 18.

10 Clues: Bullying through online resourcesThose who are under the age of 18.When pretending to be someone else onlineWhere people are able to make groups onlineStopping the access of particular areas on the web.When a group of people excludes someone intentionally.The recording of everything accessed through the internet....

cyber crossword 2021-05-10

cyber crossword crossword puzzle
Across
  1. relating to or involving computers and computing
  2. the practice of sending fraudulent communications that appear to come from a reputable source, intended to manipulate a victim into taking a desired action or giving up information.
  3. wrongful or criminal deception intended to result in financial or personal gain.
  4. a mail and calendering server developed by Microsoft
  5. a computer-software vulnerability unknown to those responsible for mitigation
Down
  1. a fix to a program that eliminates a vulnerability
  2. a type of malicious software that blocks access to a computer system until a sum of money is paid
  3. a computer that provides a services to other computers (clients)
  4. a person or thing likely to cause damage or danger
  5. attackes impersonate a vendor or supplier, often in an attempt to initiaate fraudulent payment.

10 Clues: relating to or involving computers and computinga fix to a program that eliminates a vulnerabilitya person or thing likely to cause damage or dangera mail and calendering server developed by Microsofta computer that provides a services to other computers (clients)a computer-software vulnerability unknown to those responsible for mitigation...

Cyber Bullying 2020-03-08

Cyber Bullying crossword puzzle
Across
  1. a person who pleads for a person, cause, or idea
  2. think about carefully; weigh
  3. The application of a set of criteria against which internet content is judged acceptable or not
  4. doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
  5. revenge
  6. an unfortunate person who suffers from adverse circumstances
  7. Someone who harms another through electronic devices
Down
  1. recognize as being
  2. Interactive web journal or diary,the contents of which are posted online and which others can view
  3. to threaten, frighten, scare, coerce, terrify, and to alarm

10 Clues: revengerecognize as beingthink about carefully; weigha person who pleads for a person, cause, or ideaSomeone who harms another through electronic devicesto threaten, frighten, scare, coerce, terrify, and to alarman unfortunate person who suffers from adverse circumstances...

cyber safety 2024-03-27

cyber safety crossword puzzle
Across
  1. Personall stuff
  2. Type of device
  3. Trying to make the most of you
Down
  1. Person trying to get your private info
  2. Something htat needs Wifi
  3. Old person pretending to be young
  4. Secret info
  5. Not doing stupid stuff
  6. On A device
  7. Personal Information

10 Clues: Secret infoOn A deviceType of devicePersonall stuffPersonal InformationNot doing stupid stuffSomething htat needs WifiTrying to make the most of youOld person pretending to be youngPerson trying to get your private info

cyber bullying 2024-06-13

cyber bullying crossword puzzle
Across
  1. if someone is bullying us, we should ask for
  2. what is a social media platform you can get bullied
  3. who can we go to if being bullied at school
  4. another word for messaging
Down
  1. talk to a trusted adult when you don't feel
  2. where can you get hacked on
  3. what app can people send harmful images
  4. if you have personal information, you should not
  5. if someone is bothering you what can you do
  6. what can you be bullied on

10 Clues: what can you be bullied onanother word for messagingwhere can you get hacked onwhat app can people send harmful imagestalk to a trusted adult when you don't feelif someone is bothering you what can you dowho can we go to if being bullied at schoolif someone is bullying us, we should ask forif you have personal information, you should not...

sample cyber 2024-10-03

sample cyber crossword puzzle
Across
  1. splash
  2. three
  3. key
  4. rivest
Down
  1. power
  2. kumar
  3. pokemon
  4. harold
  5. warriors
  6. ash

10 Clues: ashkeypowerkumarthreesplashharoldrivestpokemonwarriors

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Online fights using electronic messages with angry and vulgar language.
  2. The wrongful approximation and purloining and publication of another's authors language, thoughts, ideas, or expressions, and the representation of them as one's own original work.
  3. The use of the internet and related technologies to harm other people in a deliberate, repeated and hostie manner.
  4. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  5. A form of steeling someone's identity in which someone pretends to be someone else by assuming that persons identity.
Down
  1. Intentionally and cruelly excluding someone from an online group.
  2. Repeatedly sending nasty, mean, and insulting messages.
  3. Sharing someone's secrets or embarrassing information or images online.
  4. A computer virus is a computer program that can replicate itself and spread from one computer to another.
  5. Repeated, intense harassment and denigration that includes threats or creates significant fear.

10 Clues: Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Online fights using electronic messages with angry and vulgar language.Sharing someone's secrets or embarrassing information or images online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Repeatedly sending nasty, mean and insulting messages
  2. Only talking to someone into revealing secrets or embarrassing information the sharing it.
  3. Repeated harassment.
  4. Pretending to be someone else online and sending or posting others material.
  5. Internally and cruelly excluding someone from an online group.
Down
  1. Using internet and technologies to harm people.
  2. When someone pretends to be someone they are not.
  3. Fights online that use messages with angry and inappropriate language.
  4. The 'dissing' of someone online.
  5. Sharing someone's secrets or embarrassing information online.

10 Clues: Repeated harassment.The 'dissing' of someone online.Using internet and technologies to harm people.When someone pretends to be someone they are not.Repeatedly sending nasty, mean and insulting messagesSharing someone's secrets or embarrassing information online.Internally and cruelly excluding someone from an online group....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. make sure u have no info of ur personal life
  2. make someone scared (e.g.i will come and kill u)
  3. make fun of someone online
  4. to make someone feel uncomfy
Down
  1. to harrass someone online
  2. to not listen to someone
  3. opposite of rudeness
  4. to tell on a cyber bully to police
  5. a way to ignore unwanted messages
  6. send some messages over and over without stoping

10 Clues: opposite of rudenessto not listen to someoneto harrass someone onlinemake fun of someone onlineto make someone feel uncomfya way to ignore unwanted messagesto tell on a cyber bully to policemake sure u have no info of ur personal lifemake someone scared (e.g.i will come and kill u)send some messages over and over without stoping

CYBER ETHICS 2025-05-31

CYBER ETHICS crossword puzzle
Across
  1. The process of transforming data into a reatable code
  2. Also known as a digital dossier
  3. The unwanted bulk emails that come from unknown sources
  4. An act of harming,harrising and targetting a person using internet in deliberate manner
  5. Refers to a set of procedures,moral principles and ethical practices that regulates the use of a computer and the internet
Down
  1. Legal right granted by law to the creator for his original one
  2. piracy When a software is copied and destructed illegally it is called
  3. refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet
  4. An illegal intrusion into a computer system or network is known
  5. The simplest way to prevent plagiarism

10 Clues: Also known as a digital dossierThe simplest way to prevent plagiarismThe process of transforming data into a reatable codeThe unwanted bulk emails that come from unknown sourcesLegal right granted by law to the creator for his original oneAn illegal intrusion into a computer system or network is known...

Cyber Ethics 2025-06-08

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk messages or emails
  2. Illegal activity that is done using computers, the internet, or other digital devices
  3. When someone uses the internet digital technologies to threaten, harass, embarrass, or hurt another person
  4. It is a type of cybercrime where someone tries to trick you into giving your personal information
Down
  1. The guidelines to be aware of behaving properly and appropriately on internet or while online
  2. The illegal copying and distribution of videos, software etc ad sharing or distributing without the permission of copyright holder
  3. Breaking into a computer network, or online account without permission to access or steal information
  4. It stop others from copying, stealing, or using someone’s work without permission
  5. It is a secret word or code to lock and unlock your accounts on computers, phones etc to protect personal information
  6. keeping your personal information, activities, and choices safe and protected from others

10 Clues: It refers to unwanted bulk messages or emailsIt stop others from copying, stealing, or using someone’s work without permissionIllegal activity that is done using computers, the internet, or other digital deviceskeeping your personal information, activities, and choices safe and protected from others...

Cyber crime 2025-12-12

Cyber crime crossword puzzle
Across
  1. network protection barrier
  2. coding data for security
  3. malware that demands payment
Down
  1. software that secretly collects data
  2. harmful software
  3. network of infected devices
  4. breaking into a computer system
  5. malicious program disguised as legitimate
  6. online fraud to steal personal information
  7. unauthorized access to data

10 Clues: harmful softwarecoding data for securitynetwork protection barriernetwork of infected devicesunauthorized access to datamalware that demands paymentbreaking into a computer systemsoftware that secretly collects datamalicious program disguised as legitimateonline fraud to steal personal information

Y13 Water Security 2023-09-19

Y13 Water Security crossword puzzle
Across
  1. also known as paleowater or ancient groundwater, refers to groundwater that has been stored in underground aquifers for an extended period, often thousands to millions of years. It is a non-renewable water resource.
  2. is the water stored beneath the Earth's surface in porous rock formations and aquifers. It is a vital source of freshwater for drinking, agriculture, and industrial purposes.
  3. is the phase transition in which water changes directly from a solid (ice) to a gas (water vapor) without passing through the liquid phase. It commonly occurs in cold and dry conditions.
  4. is the process by which water changes from its liquid state to vapor or gas when exposed to heat or sunlight. It primarily occurs from open water surfaces, such as lakes and oceans, and moist land areas.
  5. refers to the rate of flow or transfer of water through a specific area or volume. It quantifies the movement of water in various parts of the hydrological system.
  6. Radiation is the energy emitted by the sun in the form of electromagnetic waves. It plays a significant role in driving the processes of evaporation, transpiration, and heating of the Earth's surface, affecting the water cycle.
  7. represents the movement of water within natural or artificial channels, such as rivers, streams, and pipelines. It is characterized by the volume of water passing through a specific point over time.
  8. is the deliberate application of water to land or soil to assist in the growth of crops and vegetation. It is commonly used in agriculture to supplement natural rainfall.
  9. is the process by which water soaks into the ground, entering the soil and eventually recharging underground aquifers. It is a crucial aspect of groundwater replenishment.
Down
  1. Cycle also called the water cycle, is the continuous and interconnected process by which water circulates through the Earth's atmosphere, surface, and subsurface. It includes evaporation, condensation, precipitation, runoff, and groundwater flow.
  2. refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams.
  3. is the combined process of water vapor being released into the atmosphere through two primary mechanisms: evaporation from surfaces like soil and water bodies and transpiration from plants through their leaves. It represents the total loss of water from the Earth's surface to the atmosphere.
  4. is the energy possessed by water due to its elevation above a reference point, typically the Earth's surface. It is a key factor influencing the movement of water in rivers and streams.
  5. is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources.
  6. also known as a watershed or catchment area, is an area of land that collects and channels water, including rainfall and runoff, into a central point, such as a river or lake.
  7. refers to any form of water, such as rain, snow, sleet, or hail, that falls from the atmosphere to the Earth's surface. It is a critical component of the water cycle and contributes to replenishing water resources.
  8. is a systematic assessment of the inflows and outflows of water within a specific region or system. It helps in understanding the availability and usage of water resources and can guide sustainable water management.
  9. is the flow of water that occurs when excess rainwater or melted snow does not infiltrate into the soil but instead flows over the land surface, eventually entering streams, rivers, and other water bodies.

18 Clues: refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams.is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources....

Compliance & Security Week 2024-11-13

Compliance & Security Week crossword puzzle
Across
  1. An email that tricks you into clicking on a link or opening an attachment
  2. Bad software installed on a computer to damage or harm it. Examples are viruses, ransomware, spyware, etc.
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket.
  4. Unwanted emails or messages that usually try to sell you something
  5. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  6. What type of information must be secured and protected?
  7. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip though.
  8. Who is the person you should report any HIPAA breaches?
  9. If you receive a suspicious ___ hover over it with your mouse before clicking to make sure it is real
  10. It's like your underwear; don't share it with anyone and change it at least every 90 days
  11. How often does DDID require HIPAA training?
Down
  1. What program is Shane in control of?
  2. The process of transforming and encoding information to pass information securely
  3. Unauthorized user with malicious intent
  4. What is the private network you log into make you anonymous on the intranet?
  5. Always ___ your devices and software when the newest version is available
  6. What HIPAA rule protects individual rights
  7. When multiple devices are connected together to share information. They are together in a ____.

18 Clues: What program is Shane in control of?Unauthorized user with malicious intentWhat HIPAA rule protects individual rightsHow often does DDID require HIPAA training?What type of information must be secured and protected?Who is the person you should report any HIPAA breaches?Unwanted emails or messages that usually try to sell you something...

La spéciale Phebusa 2023-12-02

La spéciale Phebusa crossword puzzle
Across
  1. Jamais sans les Faber Castel
  2. Là où sont les vocaux de qualité
  3. Ton fruit préféré
  4. L'ensemble de la communauté
  5. En direct de Pandaland
  6. Ton métier sur Twitch
  7. Utile pour le lancé de carapaces
  8. We are constructors Ahou Ahou Ahou !
Down
  1. La DA de la chaine
  2. Apporte du soleil dans la vie
  3. Une reine ne sort jamais sans
  4. Boris, Chiken, ou même la Zumba en font partie
  5. Un panda, un renard et une coccinelle
  6. One shot
  7. Ton objet préféré dans les Sims

15 Clues: One shotTon fruit préféréLa DA de la chaineTon métier sur TwitchEn direct de PandalandL'ensemble de la communautéJamais sans les Faber CastelApporte du soleil dans la vieUne reine ne sort jamais sansTon objet préféré dans les SimsLà où sont les vocaux de qualitéUtile pour le lancé de carapacesWe are constructors Ahou Ahou Ahou !...

TTS Kata Serapan 2025-08-06

TTS Kata Serapan crossword puzzle
Across
  1. kata asing yang mengalami penyesuaian dalam pelafalan dan/atau ejaan agar sesuai dengan kaidah bahasa indonesia
  2. google translate
  3. warung makan sederhana
  4. ss
  5. rodanya ada 3
  6. penyerapan kata asing tanpa ada perubahan
Down
  1. minuman khas betawi
  2. berasal dari bahasa asing (foto foto)
  3. masuk karena pengaruh sejarah (penjajahan, perdagangan, agama) بيضة
  4. makanan daging ditusuk dan di panggang
  5. masakan daging sapi dengan santan dan rempah rempah
  6. salad khas betawi
  7. dunia maya (cyber world), ahli psikologi (psychologist)
  8. 🥚
  9. berasal dari kata portugis

15 Clues: 🥚ssrodanya ada 3google translatesalad khas betawiminuman khas betawiwarung makan sederhanaberasal dari kata portugisberasal dari bahasa asing (foto foto)makanan daging ditusuk dan di panggangpenyerapan kata asing tanpa ada perubahanmasakan daging sapi dengan santan dan rempah rempahdunia maya (cyber world), ahli psikologi (psychologist)...

public safty crossword 2024-08-20

public safty crossword crossword puzzle
Across
  1. control, to protect dangered animals and control thm
  2. to protect the city and people
  3. watch over an area
  4. protected
  5. security of things online
  6. to watch out for
  7. help minor injuries
  8. sound for an emergency
  9. to be quiet and away from windows
Down
  1. danger
  2. unexpected dangerous situation
  3. a statement that could mean possible danger
  4. to protect
  5. let someone know something important
  6. saving someone from danger
  7. flames
  8. to be kept safe
  9. to clear out quickly
  10. health, health of the population
  11. medical attention on the move
  12. being protected

21 Clues: dangerflamesprotectedto protectto be kept safebeing protectedto watch out forwatch over an areahelp minor injuriesto clear out quicklysound for an emergencysecurity of things onlinesaving someone from dangermedical attention on the moveunexpected dangerous situationto protect the city and peoplehealth, health of the population...

Safe Computing 2025-08-29

Safe Computing crossword puzzle
Across
  1. Locks data for ransom
  2. Hidden malicious web clicks
  3. containing suspicious files in isolation
  4. Hidden data in files
  5. Fixes security vulnerabilities
  6. Scrambles data for security
  7. Fake system traps hackers
Down
  1. Block unauthorized network
  2. records keyboard keystrokes
  3. Secure encrypted online tunnel
  4. Damage to system becomes unusable
  5. Unauthorized data transfer
  6. Malicious software program
  7. Secret system access method
  8. Fake emails to trick victim
  9. Secretly monitors user activity
  10. Self-spreading malicious code
  11. Network of infected devices
  12. Displays unwanted pop ads
  13. Converts data into digest
  14. Disguised program carrying hidden threat

21 Clues: Hidden data in filesLocks data for ransomDisplays unwanted pop adsConverts data into digestFake system traps hackersBlock unauthorized networkUnauthorized data transferMalicious software programrecords keyboard keystrokesHidden malicious web clicksSecret system access methodFake emails to trick victimNetwork of infected devices...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  2. scope background investigation WHAT DOES SSBI STAND FOR?
  3. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  4. officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
  5. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
  1. of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  2. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  3. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  4. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  5. WHO IS USUALLY DESIGNATED AS IAM?
  6. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?scope background investigation WHAT DOES SSBI STAND FOR?...

public safty words. 2024-08-08

public safty words. crossword puzzle
Across
  1. keeps order in the court.
  2. Clerk
  3. figers
  4. united States Drug Enforcement Administration.
  5. protecting our borders from outside threats.
  6. a formal inquiry or investagation.
  7. capture and track documents
  8. a first responder
  9. writes everything in the court
  10. health prevents diseases
  11. send to location
Down
  1. helps you in courts
  2. you have the right to______
  3. the activity of some members of government
  4. manages a emergency area.
  5. Federal Bureau of Investigation.
  6. fingers
  7. fingers
  8. a man meant to guard a area or person.
  9. transportation security

20 Clues: Clerkfigersfingersfingerssend to locationa first responderhelps you in courtstransportation securitykeeps order in the court.manages a emergency area.you have the right to______capture and track documentshealth prevents diseaseswrites everything in the courtFederal Bureau of Investigation.a formal inquiry or investagation....

public saftey 2024-08-09

public saftey crossword puzzle
Across
  1. measures ensuring protection
  2. organized withdrawal from danger
  3. actions to avert potential threats
  4. occurrence of an unexpected event
  5. state of being ready for emergencies
  6. state of being shielded from harm
  7. vehicle for urgent medical aid
  8. act of extricating from peril
  9. critical situation requiring immediate action
  10. event causing significant destruction
Down
  1. continuous observation for security
  2. routine surveillance activity
  3. action taken during an emergency
  4. Aid, preliminary medical intervention
  5. enforcers of law and order
  6. potential risk or danger
  7. combatant of infernos
  8. emergency procedure for cardiac arrest
  9. refuge from adverse conditions
  10. device signaling danger

20 Clues: combatant of infernosdevice signaling dangerpotential risk or dangerenforcers of law and ordermeasures ensuring protectionroutine surveillance activityact of extricating from perilvehicle for urgent medical aidrefuge from adverse conditionsaction taken during an emergencyorganized withdrawal from dangeroccurrence of an unexpected event...

INTERNET TERMINOLOGIES 2023-12-09

INTERNET TERMINOLOGIES crossword puzzle
Across
  1. Internet Service Provider
  2. Malicious software
  3. Device for internet access
  4. Connection to another web page
  5. Data security through encoding
  6. Software for navigating the web
  7. Collection of online pages
  8. Transfer data from the internet
  9. Website data stored on a device
  10. Fraudulent information retrieval
  11. Unsolicited emails/messages
  12. Temporary storage for web data
Down
  1. Tool for finding information online
  2. Language for web page creation
  3. Webpage address
  4. Computer delivering data to users
  5. Network security system
  6. Device directing internet traffic
  7. Wireless internet connection
  8. Data transfer capacity
  9. Website's name/address
  10. Transfer data to the internet
  11. Internet Service Provider

23 Clues: Webpage addressMalicious softwareData transfer capacityWebsite's name/addressNetwork security systemInternet Service ProviderInternet Service ProviderDevice for internet accessCollection of online pagesUnsolicited emails/messagesWireless internet connectionTransfer data to the internetLanguage for web page creationConnection to another web page...

dave crossword ig (lottie) 2021-11-03

dave crossword ig (lottie) crossword puzzle
Across
  1. codes into your device
  2. somthing you would need a password for
  3. a secret code you use foe websites,accounts more
Down
  1. comes before the word safety in "cyber safety"
  2. the electronic you are on right now

5 Clues: codes into your devicethe electronic you are on right nowsomthing you would need a password forcomes before the word safety in "cyber safety"a secret code you use foe websites,accounts more

IFG Security Crossword Puzzle 2023-07-27

IFG Security Crossword Puzzle crossword puzzle
Across
  1. Security incident that results in the loss, suspected compromise of classified info
  2. Security incident involving unintentional or negligent violation of customer or company security requirements
  3. Focal point for overall security administration and management
  4. required for access to SAP
  5. SAP Accredited Area
Down
  1. Dedicated unclassified F-22 program area
  2. Replaced FOUO
  3. Displays unclassified program identifiers for all SAPs an employee possesses
  4. Prohibited Item
  5. Control information about mission capabilities, limitations, and intentions

10 Clues: Replaced FOUOProhibited ItemSAP Accredited Arearequired for access to SAPDedicated unclassified F-22 program areaFocal point for overall security administration and managementControl information about mission capabilities, limitations, and intentionsDisplays unclassified program identifiers for all SAPs an employee possesses...

IFG Security Crossword Puzzle 2023-07-27

IFG Security Crossword Puzzle crossword puzzle
Across
  1. Replaced FOUO
  2. Security incident that results in the loss, suspected compromise of classified info
  3. The practice of controlling information about mission capabilities, limitations, and intentions
  4. Prohibited Item
Down
  1. Security incident involving unintentional or negligent violation of customer or company security requirements
  2. Focal point for overall security administration and management
  3. Displays unclassified program identifiers for all SAPs an employee possesses
  4. Dedicated unclassified F-22 program area
  5. Required for access to SAP
  6. SAP Accredited Area

10 Clues: Replaced FOUOProhibited ItemSAP Accredited AreaRequired for access to SAPDedicated unclassified F-22 program areaFocal point for overall security administration and managementDisplays unclassified program identifiers for all SAPs an employee possessesSecurity incident that results in the loss, suspected compromise of classified info...

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. ne saranno capaci Le macchine
  2. Sono state create…intelligenti
  3. Industrial
  4. contiene 4 elementi chiave
Down
  1. aumento dell’uso
  2. come sono le macchine
  3. rende più…il lavoro
  4. Sono sistemi di produzione

8 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineSono sistemi di produzionecontiene 4 elementi chiavene saranno capaci Le macchineSono state create…intelligenti

New Deal Program 2024-02-22

New Deal Program crossword puzzle
Across
  1. security - provided low interest credits and other services to farmers
  2. and Crafts - create, promote, protect Indian arts.
  3. Housing Act - Got funding to build houses
  4. - Funding of the arts
  5. Relief - Funds New Deal work agencies
  6. Drug Cosmetics - Improves public safety
  7. of Prohibition - 21st amendment added to constitution
  8. Security - Unemployment insurance, social security taxes on tolls and paychecks
  9. reorganization - Giving Indians back land, gave them credit
Down
  1. Youth Dance - small performing arts
  2. Project - Planted trees to give work and protect plains from wind erosion
  3. Forum - Americans discuss problems
  4. of Justice - Investigates civil rights
  5. Deposit Insurance Corporation - Insured bank deposits when bank fails
  6. Bureau - Increased travel and tourism in U.S

15 Clues: - Funding of the artsForum - Americans discuss problemsYouth Dance - small performing artsRelief - Funds New Deal work agenciesof Justice - Investigates civil rightsDrug Cosmetics - Improves public safetyHousing Act - Got funding to build housesBureau - Increased travel and tourism in U.Sand Crafts - create, promote, protect Indian arts....

KnowBe4 Security Crossword 2020-11-03

KnowBe4 Security Crossword crossword puzzle
Across
  1. Trick into visiting malicious websites
  2. File sent to a web browser & stored on Computer A programmable electrinic device
  3. Criminal activity through PC or internet
  4. Extends private network across public one
  5. Software to obtain covert info
  6. State of being free from danger
  7. Knowledge of situation or fact
  8. Members allowed to communicate with others
  9. Programs that damage computers/steal info
Down
  1. Network that links computers globally
  2. Protection of physical systems
  3. Program that runs on your computer
  4. System that monitors incoming/outgoing Networktraffic Amount/type of activity on a network
  5. Code that multiplies and corrupts systems
  6. Letter/numbers,etc. used to access device
  7. Transfer data from one computer to another
  8. Text
  9. Irrelevant messages sent on the internet

18 Clues: TextProtection of physical systemsSoftware to obtain covert infoKnowledge of situation or factState of being free from dangerProgram that runs on your computerNetwork that links computers globallyTrick into visiting malicious websitesCriminal activity through PC or internetIrrelevant messages sent on the internet...

AscTech Security Crossword 2022-03-15

AscTech Security Crossword crossword puzzle
Across
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
  2. A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
  3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. Another kind of malware that allows cybercriminals to remotely control your computer. Phishing A technique used by hackers to obtain sensitive information.
  6. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
  8. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  10. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  11. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  3. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
  4. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  5. An internet version of a home address for your computer, which is identified when it communicates over a network
  6. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
  7. Refers to a company security policy that allows for employees’ personal devices to be used in business.

18 Clues: The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.Refers to a company security policy that allows for employees’ personal devices to be used in business....

Health Final Exam Review 2020-12-07

Health Final Exam Review crossword puzzle
Across
  1. good health here shown by expressing feeling
  2. starve yourself
  3. good health here shown by respecting others
  4. bullying that hurts your body
  5. gives more energy
  6. the S in SMART goal
Down
  1. at least 8 hours a day
  2. eat then throw up
  3. cause of stress
  4. well being of physical mental social
  5. hormone that prepares body to act
  6. bullying that happens online
  7. happens to you if under stress for long time
  8. bullying that hurts mentally
  9. talking to friend (3 "out" ways to handle stress

15 Clues: cause of stressstarve yourselfeat then throw upgives more energythe S in SMART goalat least 8 hours a daybullying that happens onlinebullying that hurts mentallybullying that hurts your bodyhormone that prepares body to actwell being of physical mental socialgood health here shown by respecting othersgood health here shown by expressing feeling...

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. mogućnost slanja pošte putem interneta
  2. tragovi koji nisu bezobrazni,ne vrjeđaju nikog
  3. nasilničko ponašanje
  4. tragovi koji vrijeđaju nekog
  5. prividna stvarnost nastala pomoću računala
  6. skup podataka s pripisanim značenjem
  7. male datoteke
Down
  1. zbirka elektroničkih dokaza
  2. tragovi koje bez namjere ostavimo na internetu
  3. nosimo ih na dan protiv nasilja
  4. svrha je poniziti drugu osobu
  5. informacije koje ostavljamo na internetu
  6. neželjena pošta
  7. pošta koju šaljemo internetom i ostavljamo digitalne tragove
  8. tragovi koje namjerno ostavimo na internetu

15 Clues: male datotekeneželjena poštanasilničko ponašanjezbirka elektroničkih dokazatragovi koji vrijeđaju nekogsvrha je poniziti drugu osobunosimo ih na dan protiv nasiljaskup podataka s pripisanim značenjemmogućnost slanja pošte putem internetainformacije koje ostavljamo na internetuprividna stvarnost nastala pomoću računala...

Vocabulary Review Weeks 1-4 2025-04-28

Vocabulary Review Weeks 1-4 crossword puzzle
Across
  1. synonym of earn
  2. antonym of cowardice
  3. the sale of goods to the public
  4. synonym of modern
  5. when you work extra hours
  6. condition that happens when your blood sugar is too high
  7. involving, using, or relating to computers, especially the internet.
Down
  1. synonym of vital
  2. process of taking in food and using it for growth
  3. every second one
  4. restrain or keep in check
  5. encourage someone
  6. cut down on something
  7. positive outlook of life
  8. synonym of speed

15 Clues: synonym of earnsynonym of vitalevery second onesynonym of speedencourage someonesynonym of modernantonym of cowardicecut down on somethingpositive outlook of liferestrain or keep in checkwhen you work extra hoursthe sale of goods to the publicprocess of taking in food and using it for growthcondition that happens when your blood sugar is too high...

Compliance Champions League 2023 - Crossword 2023-11-28

Compliance Champions League 2023 - Crossword crossword puzzle
Across
  1. Attachments are made visible externally by setting the _ flag:
  2. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
  3. Patch Day notes are released on 2nd _________ of every Month :
  4. Subscribe using the _ to receive email notifications on external updates for cases :
  5. Software with rating ___________ at SAP should not be installed:
  6. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
  7. _______ notes must be entered to put the case to status Resolved:
  8. The _____ feature enables SAP to secure the usage of any application specific function:
  9. _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
  10. _______ field ensures that the action plan step documented will be visible to the customer:
Down
  1. We can find the latest SAP logo and word/ppt templates at www.______.com :
  2. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
  3. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
  4. Which Board area does AIS belong to?
  5. To installl a software which is not listed in software center, we get it via go/ :
  6. What should be the status of a product security incident if you get a CVSS score of 0.0.:
  7. While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
  8. What should be the final status of a Security Incident:
  9. How is the priority of the security note calculated?
  10. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:

20 Clues: Which Board area does AIS belong to?How is the priority of the security note calculated?What should be the final status of a Security Incident:Attachments are made visible externally by setting the _ flag:Patch Day notes are released on 2nd _________ of every Month :Software with rating ___________ at SAP should not be installed:...

Crossword 1 2014-12-28

Crossword 1 crossword puzzle
Across
  1. When securing a crime scene, make note of any __________ conditions.
  2. “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
  3. Designing the environment to reduce the possibility of crime is called?
  4. The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
  5. Only the __________ government can create indictable offences.
  6. When handling evidence, you should wear gloves to avoid __________.
  7. The basic security role is implemented by observing, reporting, __________ and deterring.
  8. One of the recommendations from the Patrick Shand case was __________ licensing.
  9. An arrest is defined as getting control of someone with intent to __________.
Down
  1. Post orders are often called __________ orders.
  2. It is the responsibility of every security guard to be aware of __________ materials on the work site.
  3. The basic security role is to protect people, property and __________.
  4. One reason that we patrol is to deter people from __________ acts.
  5. Patrick Shand was arrested for __________ baby food.
  6. We can protect information by protecting computer screens from __________ eyes.
  7. When taking a witness statement, the facts should be in __________ order.
  8. If a crowd seems to be getting out of control, __________ from any communication.
  9. You will need a security license to work in loss __________.

18 Clues: Post orders are often called __________ orders.Patrick Shand was arrested for __________ baby food.You will need a security license to work in loss __________.Only the __________ government can create indictable offences.One reason that we patrol is to deter people from __________ acts....

Investment Strategies and Analysis - Jace 2021-02-06

Investment Strategies and Analysis - Jace crossword puzzle
Across
  1. the ratio used to evaluate return based on risk level
  2. cluster of protein filament currently found on Micheal's face
  3. portfolio theory that seeks for optimal returns at a given risk level and time horizon
  4. portfolio management type that adapts to a seasonal market trend
  5. more __
  6. __ hypothesis (of the Efficient Market Hypothesis) disregards past history and refute theories of technical analysis of any security
  7. passive investment technique that attempts to match a particular stock baseline
  8. private activity __ bonds would be taxable under the Alternative Minimum Tax (AMT)
Down
  1. the P/E ratio of a growth company
  2. Rob's favorite shirt design
  3. correlation at a (+1) coefficient
  4. term used when ensuring a portfolio does not overemphasize one or more asset categories
  5. by calculating a weighted average of various performance probabilities, the __ return is the amount an investor expects to receive from an investment
  6. rule of 72 determines the time it take an investment to do this
  7. the period an investor has actual ownership of the security
  8. the government agency security guaranteed by the US government
  9. the stepped up cost basis of an inherited security is determined as of the date of the owner's___
  10. portfolio turnover rate in a buy and hold strategy
  11. the P/E ratio of a value company

19 Clues: more __Rob's favorite shirt designthe P/E ratio of a value companythe P/E ratio of a growth companycorrelation at a (+1) coefficientportfolio turnover rate in a buy and hold strategythe ratio used to evaluate return based on risk levelthe period an investor has actual ownership of the security...

CS Unit 2 Vocab 2025-09-30

CS Unit 2 Vocab crossword puzzle
Across
  1. identity verification
  2. software that is programmed to detect, prevent, and remove viruses from devices
  3. a network that only uses cables to connect to devices or the internet
  4. a network that transmit data extremely fast through thin strands of plastic or glass fiber
  5. data stored on a device that is not connected to the internet or to a network
  6. open authorization and two-factor authentication
  7. security process that requires two different forms/factors of authentication to verify someone's identity
  8. the data is trustworthy and accurate (part of the CIA triad)
  9. the exposure something has to being in danger
Down
  1. to reduce the severity of something
  2. the accessibility of data to authorized users (part of the CIA triad)
  3. services that are useable
  4. the core fundamental concept of cybersecurity
  5. proof that someone/something has performed a digital action, so they can not deny involvement
  6. network security systems that monitor and control network trafficet, used as barriers between internal and external networks
  7. only people who are authorized have access to data (part of the CIA triad)
  8. network security tool that monitors system and network activity for threats and mitigates them immediately
  9. network security tool that monitors system and nwork activity for suspicious behavior

18 Clues: identity verificationservices that are useableto reduce the severity of somethingthe core fundamental concept of cybersecuritythe exposure something has to being in dangeropen authorization and two-factor authenticationthe data is trustworthy and accurate (part of the CIA triad)the accessibility of data to authorized users (part of the CIA triad)...

Arkansas School for Mathematics, Sciences, and the Arts 2020-06-24

Arkansas School for Mathematics, Sciences, and the Arts crossword puzzle
Across
  1. academic department
  2. by a sensei
  3. year project
  4. success coordinators/class schedulers and admissions gurus
  5. and Innovation Complex/CIC
  6. Muse/student arts publication
  7. of Arkansas/a campus of this system
  8. Dolphin/mascot
  9. Arkansas School for Mathematics, Sciences, and the Arts
  10. Bay Cafe/aquatic mammal eatery
  11. center/home away from home
Down
  1. sports competition against sister schools
  2. where arts and humanities students showcase their research and portfolios
  3. magazine
  4. and green/school colors
  5. fair/STEM students showcase their research here
  6. weeks before classes begin in August

17 Clues: magazineby a senseiyear projectDolphin/mascotacademic departmentand green/school colorsand Innovation Complex/CICcenter/home away from homeMuse/student arts publicationBay Cafe/aquatic mammal eateryof Arkansas/a campus of this systemweeks before classes begin in Augustsports competition against sister schools...

Cyberbezpieczeństwo 2025-04-09

Cyberbezpieczeństwo crossword puzzle
Across
  1. Podszywanie się pod inną osobę .
  2. Chroni tożsamość w internecie .
  3. Może zawierać litery, cyfry i znaki specjalne .
  4. Zabezpieczenie dostępu np.login.
  5. Sieć WI-FI bez hasła .
  6. Ogólna nazwa dla złośliwego orpogramowania .
Down
  1. Nazwa użytkownika potrzebna do zalogowania się .
  2. Fałszywa wiadomość podszywająca się pod zaufane żródłó.
  3. Program,który chroni komputer przed wirusami .
  4. Krótkie potwierdzenie logowania .
  5. Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
  6. Proces szyfrowania danych .
  7. forma złośliwego oprogramowania, które żąda okupu.
  8. Złośliwe oprogramowanie podszywające się pod coś użytycznego .
  9. Kopia zapasowa danych .
  10. DDoS Cyber atak polegający na zalaniu serwera.

16 Clues: Sieć WI-FI bez hasła .Kopia zapasowa danych .Proces szyfrowania danych .Chroni tożsamość w internecie .Podszywanie się pod inną osobę .Zabezpieczenie dostępu np.login.Krótkie potwierdzenie logowania .Ogólna nazwa dla złośliwego orpogramowania .Program,który chroni komputer przed wirusami .Może zawierać litery, cyfry i znaki specjalne ....

Mesleki İngilizce İnternet Terimleri 2022-11-18

Mesleki İngilizce İnternet Terimleri crossword puzzle
Across
  1. web sayfası
  2. tıklanma oranı
  3. İndirme
  4. Alt alan adı
  5. Etkileşimli Web Sitesi
  6. Zincir Mail
  7. Alan adı
  8. Sanal alem, sanal gerçeklik
  9. ziyaretçi defteri
  10. kodlama, şifreleme
  11. çerez
  12. kablosuz bağlantı noktası
  13. sohbet sunucusu
  14. Etiket
  15. Kara liste
  16. alışveriş
  17. kırık link
  18. internet günlüğü
  19. Reklam bandı
  20. bağlantı çiftliği
Down
  1. işaret kutusu
  2. takipçi
  3. Yüklemek
  4. Otomatik Tamamlama
  5. arama
  6. Yemleme
  7. kullanıcı
  8. sohbet
  9. İstenmeyen
  10. siber
  11. yer imi
  12. Barındırma
  13. güvenlik kodu
  14. gözatmak
  15. Ana sayfa
  16. köprü
  17. kalıcı bağlantı
  18. derin ağı
  19. ziyaretçi
  20. İnternette gezinme
  21. bağlantı
  22. çevrimdışı

42 Clues: aramasiberçerezköprüsohbetEtikettakipçiİndirmeYemlemeyer imiYüklemekAlan adıgözatmakbağlantıkullanıcıAna sayfaderin ağıziyaretçialışverişİstenmeyenBarındırmaKara listekırık linkçevrimdışıweb sayfasıZincir MailAlt alan adıReklam bandıişaret kutusugüvenlik kodutıklanma oranıkalıcı bağlantısohbet sunucusuinternet günlüğüziyaretçi defteri...

Through the years 2022-12-05

Through the years crossword puzzle
Across
  1. A Childs dream
  2. Cyber sleuth
  3. They call me Moose
  4. I feel the need for speed
  5. I can’t see, but I can
  6. Found any missing planes lately?
  7. Chonker
  8. Splitting lanes
  9. Jump!
  10. Born on Cupid’s Day
  11. I like it black
  12. Lucky Roulette
Down
  1. Friday night football
  2. Fishing from the skies
  3. Honeymoon smooth sailing
  4. How deep can you go?
  5. Low wing
  6. Not the hibernating kind
  7. Afraid of my own shadow
  8. Japanese treat
  9. Night Shift
  10. 43 feet of luxury
  11. The World on Time
  12. Retired killer
  13. Surfing and Tacos
  14. Elvis was here

26 Clues: Jump!ChonkerLow wingNight ShiftCyber sleuthA Childs dreamJapanese treatRetired killerElvis was hereLucky RouletteSplitting lanesI like it black43 feet of luxuryThe World on TimeSurfing and TacosThey call me MooseBorn on Cupid’s DayHow deep can you go?Friday night footballFishing from the skiesI can’t see, but I canAfraid of my own shadow...

Cyber Hackers & Cybersecurity 2023-06-01

Cyber Hackers & Cybersecurity crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
  3. A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
  4. Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  5. Software designed to detect and destroy computer viruses
  6. Interconnected computing devices that can exchange data and share resources with each other
  7. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
  3. It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
  4. Creation of a false identity by a cybercriminal with the intention of defrauding a victim
  5. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  6. Software that automatically displays or downloads advertising material (often unwanted) when a user is online
  7. Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
  8. Baiting a trap for hackers
  9. The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th

16 Clues: Baiting a trap for hackersSoftware designed to detect and destroy computer virusesCreation of a false identity by a cybercriminal with the intention of defrauding a victimInterconnected computing devices that can exchange data and share resources with each other...

CYBER SMART 2014-04-07

CYBER SMART crossword puzzle
Across
  1. thief someone that try's to steal your identity
  2. another word for inteligent
  3. a way of peir pressuring someone
  4. a way to call someone from a distance
  5. sending nudes from phone
Down
  1. bullying socially
  2. way to send messages
  3. someones veiw of you
  4. someone that harms you
  5. another word for protection

10 Clues: bullying sociallyway to send messagessomeones veiw of yousomeone that harms yousending nudes from phoneanother word for inteligentanother word for protectiona way of peir pressuring someonea way to call someone from a distancethief someone that try's to steal your identity

Cyber Safety 2020-02-23

Cyber Safety crossword puzzle
Across
  1. He told me to stop playing computer games and start exercising. This was good _____.
  2. The new recharging cable was not ___, so it caused a fire
  3. Scaring or intimidating someone to make they do something.
  4. Send messages over the intenet like paper letters.
  5. If you spend 5 hours every day playing computer games, you have bad _____.
Down
  1. He showed __________when he told the teacher about the bullies
  2. I help my sister with homework because it's my _______.
  3. A global network of computers.
  4. connected to the internet.
  5. We used this machine to do math calculations and to send messages. machine does calculations and

10 Clues: connected to the internet.A global network of computers.Send messages over the intenet like paper letters.I help my sister with homework because it's my _______.The new recharging cable was not ___, so it caused a fireScaring or intimidating someone to make they do something.He showed __________when he told the teacher about the bullies...

Cyber Crimes 2021-01-28

Cyber Crimes crossword puzzle
Across
  1. A computer hacker whose activity is aimed at promoting a social or political cause
  2. software or code intended to damage or disable computers and computer systems
  3. Scams that usually offer the victims large returns with minimal risk
  4. Type of fraud where a perpetrator deceives a victim into believing the the perpetrator and victim have a trust relationship and the victim is persuaded to send money
  5. Unlawful extraction of money or property through intimidation or undue exercise of authority
Down
  1. The perpetrator informs a victim that they qualified for a large loan or won large amount of money, but they have to first pay money first to get it
  2. An individual is sent a payment and instructed to keep a portion and send the remainder to another person or business
  3. contact information is deliberately falsified to mislead and appear to be from a legitimate source
  4. Type of attack that floods a network with multiple requests, slowing down or interrupting service
  5. type of malicious software designed to block access to a computer system until money is paid

10 Clues: Scams that usually offer the victims large returns with minimal risksoftware or code intended to damage or disable computers and computer systemsA computer hacker whose activity is aimed at promoting a social or political causetype of malicious software designed to block access to a computer system until money is paid...

Cyber bullying 2019-07-11

Cyber bullying crossword puzzle
Across
  1. Holt
  2. answer someones question
  3. being hurt constantly
  4. private to you
  5. not tell the truth
  6. like a cold
Down
  1. something you use to access messages and internet
  2. to hold up
  3. someone who is mean to someone else
  4. texting and communicating

10 Clues: Holtto hold uplike a coldprivate to younot tell the truthbeing hurt constantlyanswer someones questiontexting and communicatingsomeone who is mean to someone elsesomething you use to access messages and internet

Cyber Crossword 2024-05-24

Cyber Crossword crossword puzzle
Across
  1. A piece of software designed to update or fix problems with a computer program or its supporting data.
  2. Malicious software designed to block access to a computer system until a sum of money is paid.
  3. The process of converting information or data into a code to prevent unauthorized access.
  4. Software that enables a user to obtain covert information about another's computer activities.
Down
  1. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. A type of malware disguised as legitimate software.
  3. A secret word or phrase that must be used to gain admission to something.
  4. A network security system that monitors and controls incoming and outgoing network traffic.
  5. A network of private computers infected with malicious software and controlled as a group.
  6. A method of trying to distribute malware or steal information or money using deceptive e-mails and websites.

10 Clues: A type of malware disguised as legitimate software.A secret word or phrase that must be used to gain admission to something.Software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to prevent unauthorized access....

Cyber Etiquette 2023-04-02

Cyber Etiquette crossword puzzle
Across
  1. Do not participate in ______ conduct such as being an online troll, bully or hacker
  2. Do not consume or spread ______ inappropriate content
  3. Communicate and share ______ by posting positive content
  4. Do not ______ personal information
Down
  1. We can protect ourselves from online dangers by reaching out to police or trusted adult
  2. Could the person have any malicious intent
  3. Take _____ against cyberbullying
  4. Do you know the person or are they credible
  5. Keep personal information ______
  6. Did the person intimidate or rush you to do something

10 Clues: Take _____ against cyberbullyingKeep personal information ______Do not ______ personal informationCould the person have any malicious intentDo you know the person or are they credibleDo not consume or spread ______ inappropriate contentDid the person intimidate or rush you to do somethingCommunicate and share ______ by posting positive content...

Cyber Safety 2023-03-27

Cyber Safety crossword puzzle
Across
  1. Sites such as Snapchat, tiktok etc...
  2. simulation of the real thing
  3. To stop a computer from reaching something on the internet.
  4. An attempt to trick people into visiting malicious websites.
Down
  1. Measures taken to protect a computer
  2. When a child abuser tries to start a relationship online.
  3. Repeated behavior that is intended to cause psychological or emotional harm.
  4. A word or series of letters, numbers and characters.
  5. Computer program designed to damage files
  6. Person who uses computer to gain unauthorized access to data.

10 Clues: simulation of the real thingMeasures taken to protect a computerSites such as Snapchat, tiktok etc...Computer program designed to damage filesA word or series of letters, numbers and characters.When a child abuser tries to start a relationship online.To stop a computer from reaching something on the internet....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. arguing or dissing someone online
  2. repeat rude messages
  3. pretending to be another person
  4. excluding a person from an activity
Down
  1. use of Internet and technologies to harm other people
  2. Presenting work or ideas from another source as your own, with or without consent of the original creator by using it in your work without acknowledgement.
  3. sharing someones secrets and other personal info without consent
  4. offensive and rude rumors and gossip
  5. harrasing or threatening someone online
  6. tricking someone into giving personal info

10 Clues: repeat rude messagespretending to be another personarguing or dissing someone onlineexcluding a person from an activityoffensive and rude rumors and gossipharrasing or threatening someone onlinetricking someone into giving personal infouse of Internet and technologies to harm other people...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. into revealing secrets or embarrassing information, then sharing it online.
  2. someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  3. nasty, mean, and insulting messages.
  4. is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." - Wikipedia
  5. is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity" - Wikipedia
Down
  1. secrets or embarrassing information or images online.
  2. is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability."
  3. is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work."
  4. and cruelly excluding someone from an online group.
  5. using electronic messages with angry and vulgar language.

10 Clues: nasty, mean, and insulting messages.and cruelly excluding someone from an online group.secrets or embarrassing information or images online.using electronic messages with angry and vulgar language.into revealing secrets or embarrassing information, then sharing it online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Sharing somebody else's secrets online.
  2. Stealing someone's identify to pretend to be them.
  3. A computer program that can replicate and spread over the computer.
  4. Repeatedly sending mean insulting messages.
  5. Cruely excluding someone online.
Down
  1. Someone stealing another authors own work.
  2. To harm peoples feelings on repeat online.
  3. Online fights send through message with anger.
  4. Repeated harassment on someone's page.
  5. Tricking someone into saying stuff about other people online.

10 Clues: Cruely excluding someone online.Repeated harassment on someone's page.Sharing somebody else's secrets online.Someone stealing another authors own work.To harm peoples feelings on repeat online.Repeatedly sending mean insulting messages.Online fights send through message with anger.Stealing someone's identify to pretend to be them....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. stalking repeated intense harrasment
  2. to share someone else secerets or information ofimages online
  3. pretending to be someone or posting vidoes online to get them introuble
  4. to trick someone to reveal secrets or embarrisingInfromation online
  5. means to diss someone or spread rumors.
Down
  1. intentionally and cruely exculuding someone froman online group
  2. theft means to stels someones identity
  3. means to send mean or insulting messages.
  4. means to use angry and vulgar launage online
  5. denigration that includes threats and significant fear

10 Clues: stalking repeated intense harrasmenttheft means to stels someones identitymeans to diss someone or spread rumors.means to send mean or insulting messages.means to use angry and vulgar launage onlinedenigration that includes threats and significant fearto share someone else secerets or information ofimages online...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Pretending to be someone your not on the internet.
  2. Sharing another person's secrets online.
  3. Using Technology to hurt others.
  4. Repeated harassment on someone's page.
Down
  1. Pretending to be someone else and using their name and personal information.
  2. A disease in your PC.
  3. Not including another person.
  4. Repeatedly sending nasty and mean messages.
  5. Taking someone else's work or ideas and passing them as their own.
  6. Online fight and saying vulgar language.

10 Clues: A disease in your PC.Not including another person.Using Technology to hurt others.Repeated harassment on someone's page.Sharing another person's secrets online.Online fight and saying vulgar language.Repeatedly sending nasty and mean messages.Pretending to be someone your not on the internet....

Cyber Foundations 2022-04-07

Cyber Foundations crossword puzzle
Across
  1. The slide currrently selected or displayed
  2. The preset amount of time between slides as they advance automatically during a slide show
  3. The template will appear along with traditional information on how the template could be used
  4. A feature that allows you to create a show from scratch
Down
  1. Where you will find commands to perform common tasks in PowerPoint
  2. The visual appearance or images of something when looked at in a certain way
  3. an item of illustrative matter
  4. A graphic tool that allows you to create a visual representation of information and ideas
  5. A graphical computer display that can be superimposed on another
  6. The figure that appears when you are adding text to a slide

10 Clues: an item of illustrative matterThe slide currrently selected or displayedA feature that allows you to create a show from scratchThe figure that appears when you are adding text to a slideA graphical computer display that can be superimposed on anotherWhere you will find commands to perform common tasks in PowerPoint...

Cyber bulliyng 2025-03-11

Cyber bulliyng crossword puzzle
Across
  1. a secret word that you only know
  2. a global computer network providing a variety of information
  3. The repetitive, intentional hurting of one person
  4. not invitng some to there goup
Down
  1. a person who speaks or acts in support
  2. a computer program with a graphical user.
  3. posting unsults
  4. bullying someone online
  5. available on or performed using the internet or other computer network
  6. the willful and repeated following, watching or harassing

10 Clues: posting unsultsbullying someone onlinenot invitng some to there goupa secret word that you only knowa person who speaks or acts in supporta computer program with a graphical user.The repetitive, intentional hurting of one personthe willful and repeated following, watching or harassinga global computer network providing a variety of information...

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. loacating resourse on online
  2. getting bullied on online
  3. getting harast
  4. posting about someone else
  5. following someone
  6. a safe way of investigating
Down
  1. to get a fight on purpose
  2. a program on a computer
  3. how syberbulling tricks people
  4. to be safe on line

10 Clues: getting harastfollowing someoneto be safe on linea program on a computerto get a fight on purposegetting bullied on onlineposting about someone elsea safe way of investigatingloacating resourse on onlinehow syberbulling tricks people

travis cyber 2023-10-08

travis cyber crossword puzzle
Across
  1. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  2. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  3. Verifying the identity of users or systems to ensure secure access.
  4. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
  1. Pertaining to the security challenges and measures for smartphones and tablets.
  2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
  3. Malware that encrypts files, demanding payment for their release.
  4. An update to fix vulnerabilities or improve security in software or systems.
  5. Converting data into a code to prevent unauthorized access, especially during transmission.
  6. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.

10 Clues: Malware that encrypts files, demanding payment for their release.Verifying the identity of users or systems to ensure secure access.An update to fix vulnerabilities or improve security in software or systems.Pertaining to the security challenges and measures for smartphones and tablets....

CYBER BULLYING 2024-10-22

CYBER BULLYING crossword puzzle
Across
  1. group of platforms where people post their pictures
  2. a form of aggressive behavior which causes injury or discomfort to others
  3. demand something (undesirable) from someone
  4. avoid talking to ____ online
Down
  1. a search site
  2. this can be used to track what people post online(2 words)
  3. a connection on facebook
  4. restrict contact with someone on an online app
  5. a popular mobile device
  6. a secret text that only authorized users have access to

10 Clues: a search sitea popular mobile devicea connection on facebookavoid talking to ____ onlinedemand something (undesirable) from someonerestrict contact with someone on an online appgroup of platforms where people post their picturesa secret text that only authorized users have access tothis can be used to track what people post online(2 words)...

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber Attackers 2025-03-24

Cyber Attackers crossword puzzle
Across
  1. Emails pretending to be from trusted sources to steal information.
  2. An attack where criminals demand money to restore access to data.
  3. Type of hacker paid to test security systems ethically.
  4. Attack that floods a system with traffic to bring it down.
Down
  1. A trick where a criminal looks over your shoulder to steal information.
  2. The unauthorised use of someone’s private information to pretend to be them.
  3. Software that replicates itself and can damage files or systems.
  4. Law passed in 1990 to deal with hacking offences.
  5. Security method requiring both a password and a text code.
  6. Personal facts and figures collected online.

10 Clues: Personal facts and figures collected online.Law passed in 1990 to deal with hacking offences.Type of hacker paid to test security systems ethically.Security method requiring both a password and a text code.Attack that floods a system with traffic to bring it down.Software that replicates itself and can damage files or systems....

CYBER CROSSWORD 2021-09-05

CYBER CROSSWORD crossword puzzle
Across
  1. The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. An individual who subscribes to a kind of ideology about new technologies, such as the Internet.
  3. A switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices.
  4. Any piece of technology that connects people and machines with each other or with information.
  5. The conversion of text, pictures, or sound into a digital form that can be processed by a computer.
  6. The unauthorized use, copying or distribution of copyrighted software
Down
  1. The notional environment in which communication over computer networks occurs.
  2. The unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
  3. is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within a given industry.
  4. This provides legal recognition for transactions that are carried out by means of electronic data interchange.

10 Clues: The unauthorized use, copying or distribution of copyrighted softwareThe notional environment in which communication over computer networks occurs.Any piece of technology that connects people and machines with each other or with information.An individual who subscribes to a kind of ideology about new technologies, such as the Internet....

Cyber Law 2021-09-04

Cyber Law crossword puzzle
Across
  1. It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
  2. regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
  3. 'citizen of the internet' can be called__
  4. which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
  5. It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
  1. It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
  2. The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
  3. you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
  4. it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
  5. It is a conversion of data,document and processes from analog to digital

10 Clues: 'citizen of the internet' can be called__It is a conversion of data,document and processes from analog to digitalIt refers to the adoption or increase in use of computer technology by an organization,Industry etc.It can be thought of as a global electronic village with instantaneous communication and no geographical barriers...

cyber ethicsc 2025-06-14

cyber ethicsc crossword puzzle
Across
  1. illegally accessing someone's computer
  2. moral rules to follow online and offline
  3. a secret code you should never share
  4. you need permission before using this kind of content
  5. antivirus software helps with this
  6. everyone has a right to this online and offline
Down
  1. stealing work and calling it your own
  2. fake emails asking for your passwords or bank info
  3. tell a trusted adult or click this option on social media
  4. always show this to people online too

10 Clues: antivirus software helps with thisa secret code you should never sharestealing work and calling it your ownalways show this to people online tooillegally accessing someone's computermoral rules to follow online and offlineeveryone has a right to this online and offlinefake emails asking for your passwords or bank info...

Cyber Puzzle 2022-09-20

Cyber Puzzle crossword puzzle
Across
  1. Special virus that moves from computer to computer without human interaction.
  2. An important process that verifies a user is really who they are; many different ways this can be done.
  3. unique address that identifies a device on the internet or a local network.
Down
  1. The form of encryption that requires a single key
  2. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  4. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
  5. a person who uses computers to gain unauthorized access to data.
  6. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  7. An ________ is a program or code that makes use of the vulnerability in an application or system.

10 Clues: The form of encryption that requires a single keya person who uses computers to gain unauthorized access to data.unique address that identifies a device on the internet or a local network.Special virus that moves from computer to computer without human interaction....

Cyber Crossword! 2025-05-23

Cyber Crossword! crossword puzzle
Across
  1. A popular operating system
  2. The company that makes windows
  3. The main menu with lots of options
  4. The common color of the screen of death
  5. What happens if you press ctrl-alt-del
Down
  1. A portable computer that folds
  2. The little arrow that the mouse controls
  3. A purple guy that "helps"
  4. Zeus is an example
  5. A fun game full of mines

10 Clues: Zeus is an exampleA fun game full of minesA purple guy that "helps"A popular operating systemA portable computer that foldsThe company that makes windowsThe main menu with lots of optionsWhat happens if you press ctrl-alt-delThe common color of the screen of deathThe little arrow that the mouse controls

CYBER BULLYING 2025-12-12

CYBER BULLYING crossword puzzle
Across
  1. Online messages meant to hurt or threaten someone
  2. Sending repeated threatening message
  3. A group targeting one individual online
  4. Sharing someone’s personal info without permission
Down
  1. Repeated aggressive behaviour using digital devices
  2. Pretending to be someone else online to cause harm
  3. Online platforms used for bullying (general term)
  4. Anonymous hateful comments on social media
  5. When someone is left out intentionally in online groups
  6. A harmful, untrue statement spread online

10 Clues: A group targeting one individual onlineA harmful, untrue statement spread onlineSending repeated threatening messageAnonymous hateful comments on social mediaOnline messages meant to hurt or threaten someoneOnline platforms used for bullying (general term)Pretending to be someone else online to cause harm...

Frontier Familiarity 2012-04-04

Frontier Familiarity crossword puzzle
Across
  1. Frontier online television service
  2. deferred payment arrangment
  3. Intranet site for call center consultants
  4. Internet Only
  5. Fiber Optic Service
  6. 768K Internet
  7. $2.99 Feature Pack
  8. Simply
  9. Federal Discount Program
  10. Security with Parental Controls and Firewall
  11. assuming the sale
  12. seasonal service called stay...
Down
  1. monthly charge
  2. DSL Line Conditioner
  3. Basic Phone Package
  4. Free service for customers moving out of area
  5. EA, LF, US, CA, AZ, PA, etc.
  6. DISH order entry tool
  7. credit agency used by Frontier
  8. DP Silver, Bronze, Freedom, Choices
  9. switching number to different provider
  10. Security with AntiVirus and AntiSpam

22 Clues: SimplyInternet Only768K Internetmonthly chargeassuming the sale$2.99 Feature PackBasic Phone PackageFiber Optic ServiceDSL Line ConditionerDISH order entry toolFederal Discount Programdeferred payment arrangmentEA, LF, US, CA, AZ, PA, etc.credit agency used by Frontierseasonal service called stay...Frontier online television service...

Networking concepts and cyber ethics 2025-05-18

Networking concepts and cyber ethics crossword puzzle
Across
  1. : Used to access accounts securely.
  2. : Maximum data transfer rate.
  3. : Security system that controls traffic.
  4. : Online bullying.
  5. : Rules for communication between devices.
  6. : Secure remote access method.
  7. : Fake emails to steal data.
Down
  1. : Secretly collects data.
  2. : Wireless network technology.
  3. : A device that forwards data packets between networks.
  4. : Wired networking method.
  5. : Unwanted email.
  6. : Harmful software.
  7. : Protects creative work.
  8. : Scrambling data for security.
  9. : Local Area Network.
  10. : Right to keep data secure.
  11. Address : Unique identifier for a device on a network.
  12. : Unauthorized system access.
  13. : A computer that provides services or data.

20 Clues: : Unwanted email.: Online bullying.: Harmful software.: Local Area Network.: Secretly collects data.: Protects creative work.: Wired networking method.: Right to keep data secure.: Fake emails to steal data.: Maximum data transfer rate.: Unauthorized system access.: Wireless network technology.: Secure remote access method....

fshapdsafybasd112fdjf 2023-03-03

fshapdsafybasd112fdjf crossword puzzle
Across
  1. A nonprofit org known for publishing a "top 10" of critical risks
  2. A 3-word term for applying multiple layers of security
  3. A flaw that weakens the overall security of a program or system
  4. ______ mantis
  5. Codename for a recent RT operation
Down
  1. Randomly terminates production apps to ensure they're resilient
  2. New feature that emulates sitting in an open office
  3. FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
  4. Research project for enumerating our environment
  5. This involves sending invalid, unexpected, or random input to a program
  6. Team that emulates real-world attacks

11 Clues: ______ mantisCodename for a recent RT operationTeam that emulates real-world attacksResearch project for enumerating our environmentNew feature that emulates sitting in an open officeA 3-word term for applying multiple layers of securityRandomly terminates production apps to ensure they're resilient...

Mobile Security Crossword 2025-09-11

Mobile Security Crossword crossword puzzle
Across
  1. Network Network type often targeted in mobile security risks (2 words)
  2. Malicious software targeting mobile devices
  3. Authentication Security measure involving password plus an extra step (2 words)
  4. Patches Software updates to fix vulnerabilities (2 words)
  5. Encryption The process of converting data to prevent unauthorized access
Down
  1. Security Protection of the mobile device itself
  2. Method to confirm identity beyond password (abbreviation)
  3. Kind of phishing specific to SMS messages (1 word)
  4. Permissions Safety measure for apps to limit access (2 words)
  5. Store Where trusted mobile apps should be downloaded from (2 words)
  6. Detection Detecting unauthorized software or behavior on mobile
  7. Management system for securing mobile devices (3 letters)

12 Clues: Malicious software targeting mobile devicesSecurity Protection of the mobile device itselfKind of phishing specific to SMS messages (1 word)Method to confirm identity beyond password (abbreviation)Patches Software updates to fix vulnerabilities (2 words)Management system for securing mobile devices (3 letters)...

Investing Crossword Puzzle 2025-03-25

Investing Crossword Puzzle crossword puzzle
Across
  1. Investing all the money you have available at a given time, and putting it into the market
  2. Considered one of the world’s most successful investors
  3. Guaranteed payment by employer after retirement
  4. Created by President Roosevelt in 1935
  5. Spreading investments across different assets instead of all into one asset
  6. An investor's ability and willingness to endure fluctuations in the value of their investments
  7. The process of offering shares of a private corporation to the public in a new stock issuance
  8. A market in which prices are falling and a pessimistic outlook overall
  9. This measures the price performance of a basket of securities
  10. Created and backed by the government but not tied to any physical commodity
  11. A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
Down
  1. A person who buys and sells stocks with the intention of gaining a profit
  2. The age where you can receive full social security
  3. Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
  4. Social Security and Medicare Taxes
  5. A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
  6. The ease with which an asset or security can be converted into cash without affecting its market price
  7. A unit of ownership in a company, dividing its ownership into equal parts
  8. Government Medical Health Plan
  9. A financial marketplace where investors can buy and sell shares of publicly traded companies
  10. Contribute money post tax. Money grows tax free
  11. Putting funds into a new investment account after leaving a company
  12. A type of security representing ownership of a company
  13. A sum of money saved or made available for a particular purpose
  14. Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities

25 Clues: Government Medical Health PlanSocial Security and Medicare TaxesCreated by President Roosevelt in 1935Guaranteed payment by employer after retirementContribute money post tax. Money grows tax freeThe age where you can receive full social securityA type of security representing ownership of a company...

Investing - Kaleb Wayman 2025-03-25

Investing - Kaleb Wayman crossword puzzle
Across
  1. A person who buys and sells stocks with the intention of gaining a profit
  2. Social Security and Medicare Taxes
  3. A market in which prices are falling and a pessimistic outlook overall
  4. A sum of money saved or made available for a particular purpose
  5. Contribute money post tax. Money grows tax free
  6. Created by President Roosevelt in 1935
  7. Created and backed by the government but not tied to any physical commodity
  8. A financial marketplace where investors can buy and sell shares of publicly traded companies
  9. A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
  10. This measures the price performance of a basket of securities
  11. Putting funds into a new investment account after leaving a company
  12. The age where you can receive full social security
  13. The ease with which an asset or security can be converted into cash without affecting its market price
Down
  1. A type of security representing ownership of a company
  2. Spreading investments across different assets instead of all into one asset
  3. An investor's ability and willingness to endure fluctuations in the value of their investments
  4. Investing all the money you have available at a given time, and putting it into the market
  5. Considered one of the world’s most successful investors
  6. Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
  7. Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
  8. The process of offering shares of a private corporation to the public in a new stock issuance
  9. Government Medical Health Plan
  10. A unit of ownership in a company, dividing its ownership into equal parts
  11. A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
  12. Guaranteed payment by employer after retirement

25 Clues: Government Medical Health PlanSocial Security and Medicare TaxesCreated by President Roosevelt in 1935Contribute money post tax. Money grows tax freeGuaranteed payment by employer after retirementThe age where you can receive full social securityA type of security representing ownership of a company...

BCS reveiw noah seabolt 2015-11-11

BCS reveiw noah seabolt crossword puzzle
Across
  1. a group of computers
  2. something you can access the web on
  3. a message sender thing that send messages to people
  4. micro soft excel
  5. asdfjkl;'
  6. something that you move and click stuff with
  7. ware stuff that makes up a computer
  8. computer screen
Down
  1. bully bully on the internet
  2. being safe on thee interwebs
  3. web page maker
  4. a plan u pick that limits sertan thing
  5. publisher grating cards
  6. a small slip of buttons at the top of a Microsoft thing
  7. proper technique

15 Clues: asdfjkl;'web page makercomputer screenmicro soft excelproper techniquea group of computerspublisher grating cardsbully bully on the internetbeing safe on thee interwebssomething you can access the web onware stuff that makes up a computera plan u pick that limits sertan thingsomething that you move and click stuff with...

PERSONNEL SECURITY PROGRAM 2021-08-16

PERSONNEL SECURITY PROGRAM crossword puzzle
Across
  1. WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
  2. SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
  3. of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
  4. AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
  5. WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
  6. WHO IS USUALLY DESIGNATED AS IAM?
Down
  1. TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
  2. TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
  3. scope background investigation WHAT DOES SSBI STAND FOR?
  4. AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
  5. officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?

11 Clues: WHO IS USUALLY DESIGNATED AS IAM?SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM....

Cyber Safety-Archie Webb 2016-05-24

Cyber Safety-Archie Webb crossword puzzle
Across
  1. an Apple tablet
  2. a group of computers that are connected
  3. to protect your computer from viruses
  4. how you securely connect to a network or program
  5. this person about cyber safety
  6. a search engine
  7. way to check if your computer has a virus
  8. program instruction
  9. a large device
Down
  1. a program you can install on your device
  2. how to connect
  3. what a hacker tries to steal
  4. blocksvirus
  5. a small device
  6. you a virus
  7. a machine that allows you to use the Internet
  8. unhealthy for device
  9. someonewho breaks into your computer

18 Clues: blocksvirusyou a virushow to connecta small devicea large devicean Apple tableta search engineprogram instructionunhealthy for devicewhat a hacker tries to stealthis person about cyber safetysomeonewho breaks into your computerto protect your computer from virusesa group of computers that are connecteda program you can install on your device...

2016 Responsible Care Certification Audit 2016-08-29

2016 Responsible Care Certification Audit crossword puzzle
Across
  1. independent, unbiased inspector to assure a structure and system in place to measure, manage and verify performance in the Responsible Care Program.
  2. text, sometimes referred to SHE&S, Safety or Responsible Care, which outlines company's committment to SHE&S; found on corporate website
  3. The Responsible Care ____________ is the program by which Odyssey manages its business and operations with regard to Safety, Health, Environment & Security (SHE&S) issues.
  4. pre-designated gathering point for all personnel during evacuations
  5. established by senior management as guidance to ensure Odyssey maintains a leading SHE&S position throughout the company
  6. the chemical industry's voluntary SHE&S initiative
  7. Risk of coming into contact with chemicals during
  8. a danger or risk
  9. Employees should maintain an awareness of the policy, risks/hazards, and their work environment
  10. ___________ should maintain an awareness of the policy, risks/hazards, and their work environment
Down
  1. Responsible Care Awareness, HM & Security, HAZCOM, Forklift, First Aid/CPR
  2. Safety, Health, Environment & Security
  3. We all have responsibility for Safety, Health, Environment & Security (SHE&S) in our __________
  4. an industry trade association for American chemical companies
  5. Establishes goals and provides resources
  6. A key part of the Responsible Care Management System process is mandatory __________ by an independent, accredited auditor
  7. Provides ________ as evidence as management support
  8. prioritized based on frequency and severity
  9. SHE&S Special Thanks And Recognition Awards Program

19 Clues: a danger or riskSafety, Health, Environment & SecurityEstablishes goals and provides resourcesprioritized based on frequency and severityRisk of coming into contact with chemicals duringthe chemical industry's voluntary SHE&S initiativeProvides ________ as evidence as management supportSHE&S Special Thanks And Recognition Awards Program...

Security and Legislation 2022-02-25

Security and Legislation crossword puzzle
Across
  1. being honest and upright
  2. proving something to be genuine or valid
  3. the quality of being able to be used, reached or entered easily
  4. the standing of a person or organisation in the eyes of the public
  5. people who work for a company
  6. software that needs to be put on a newer version
  7. software that is no longer being maintained or updated
  8. programs on a computer
  9. for letter word for information that does not have a meaning to it
Down
  1. keeping something private
  2. being ready to use at any time
  3. having to pay for doing something wrong
  4. the physical components of a computer
  5. it belongs to an individual
  6. acting in accordance to something, obeying, following the rules
  7. a string of text that needs to be entered in order to access a system
  8. a dispute that has been brought to court
  9. permanent software programmed into a read-only memory

18 Clues: programs on a computerbeing honest and uprightkeeping something privateit belongs to an individualpeople who work for a companybeing ready to use at any timethe physical components of a computerhaving to pay for doing something wrongproving something to be genuine or valida dispute that has been brought to court...

Custody and Security 2024-08-28

Custody and Security crossword puzzle
Across
  1. _______ and procedure
  2. equipment used to communicate
  3. handcuffs, leg irons, belly chains
  4. opens doors, may have silver rivet
  5. fence surrounding the facility
  6. gang members or gang activity
  7. type of search looking for obvious contraband
  8. formal, informal, emergency, keep track of prisoners
Down
  1. card the item carried by prisoners to identify them
  2. you'd radio call to them during emergencies
  3. slang for contraband item usually made to inflict harm
  4. the people incarcerated
  5. paperwork that allows items to come through the gate
  6. the official name for a "ticket"
  7. custody staff
  8. prohibited items of property held by prisoners
  9. prisoners are moving units and must ____ their stuff
  10. the person who oversees the running of the facility

18 Clues: custody staff_______ and procedurethe people incarceratedequipment used to communicategang members or gang activityfence surrounding the facilitythe official name for a "ticket"handcuffs, leg irons, belly chainsopens doors, may have silver rivetyou'd radio call to them during emergenciestype of search looking for obvious contraband...

6B Crossword 2022-10-25

6B Crossword crossword puzzle
Across
  1. The deep-voice actor
  2. Tennis master
  3. The tallest, yet the youngest
  4. Marvel fan
  5. He deserves to be friends with everybody
  6. Always happy
  7. Black and white on a green field player
  8. Cooking Queen
  9. The only one that can buy highlighters for 500 rupees
  10. The class lawyer
  11. On the path to success
  12. The funny one-perhaps the funniest of all
Down
  1. She speaks with love
  2. His last name rhymes with his first.
  3. His name ends with a hero's name
  4. Cyber Master, Fitness Superstar
  5. A new member of 6B
  6. Artist
  7. She can paint pennywise on a white cloth
  8. Our habibi

20 Clues: ArtistMarvel fanOur habibiAlways happyTennis masterCooking QueenThe class lawyerA new member of 6BShe speaks with loveThe deep-voice actorOn the path to successThe tallest, yet the youngestCyber Master, Fitness SuperstarHis name ends with a hero's nameHis last name rhymes with his first.Black and white on a green field player...

parish test 2023-12-08

parish test crossword puzzle
Across
  1. website where visitors can make changes and edits to
  2. bullying Bullying in the digital form
  3. Object showing human workmanship
  4. related to hearing
  5. domain Creative work that anyone is free to use
  6. To annoy persistently
  7. To increase
  8. Unknown authorship
  9. someone who is present but does not take part in
  10. First full scale design
  11. Behavior of motivation
  12. research gathering info for customer
Down
  1. Being physically or emotionally wounded
  2. Your online image
  3. Being apart from company
  4. what an individual want to achieve in the future
  5. introduction to something new
  6. Someone who stands up for someone
  7. Deceptive act
  8. Legal right to reproduce others work

20 Clues: To increaseDeceptive actYour online imagerelated to hearingUnknown authorshipTo annoy persistentlyBehavior of motivationFirst full scale designBeing apart from companyintroduction to something newObject showing human workmanshipSomeone who stands up for someoneLegal right to reproduce others workresearch gathering info for customer...

Space Camp 2024-05-30

Space Camp crossword puzzle
Across
  1. simulators flown in Mach 3
  2. what will call coordinators and management
  3. last name of CEO
  4. kay taylor's job title
  5. General Admission plus a planetarium show for groups
  6. the first director of Space Camp
  7. the simulation floor
  8. the name of the shuttle outside
  9. general email inbox
Down
  1. First week of camp 2024
  2. customer insight analyst
  3. $105 item in the giftshop
  4. the sequel to robotics
  5. the name of our Apollo capsule
  6. filling in for Jennifer Bradford
  7. an invitaition only program
  8. Space Program for 12-14 year olds
  9. 1986 film
  10. camp director
  11. scholarship program for alabama residents

20 Clues: 1986 filmcamp directorlast name of CEOgeneral email inboxthe simulation floorkay taylor's job titlethe sequel to roboticsFirst week of camp 2024customer insight analyst$105 item in the giftshopsimulators flown in Mach 3an invitaition only programthe name of our Apollo capsulethe name of the shuttle outsidefilling in for Jennifer Bradford...

Match the Cards to the Duel Links Duelist Part 1 2023-04-06

Match the Cards to the Duel Links Duelist Part 1 crossword puzzle
Across
  1. Cyber Commander
  2. Infernity Doom Dragon
  3. Elemental HERO Flame Wingman & Elemental HERO Neos
  4. Number 39: Utopia, Number C39: Utopia Ray, & Ultimate Leo Utopia Ray
  5. Ancient Gear Golem
  6. Cyber Blader
  7. Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
  8. Dark Magician, Dark Magician Girl, Gandora the Dragon of Destruction, & Silent Magician LV8
  9. Armed Dragon LV7 & Ojama King
  10. Duza the Meteoric Cubic Vessel
  11. Number 6: Chronomaly Atlandis
  12. Blast Held by a Tribute
  13. Blue-Eyes Ultimate Dragon & Blue-Eyes White Dragon
  14. Meklord Emperor Wisel
  15. Dark Necrofear
  16. Orgoth the Relentless
  17. Ancient Fairy Dragon
  18. Chevalier de Fleur
  19. Fairy Cheer Girl
  20. Indiora Doom Volt the Cubic Emperor
  21. Tin Archduke
  22. Sephylon, the Ultimate Timelord
  23. Water Dragon
  24. Malefic Truth Dragon
  25. Humpty Grumpty
  26. Barrel Dragon
  27. Volcanic Doomfire
  28. Red-Eyes Black Dragon
  29. The Legendary Fisherman
  30. Life Stream Dragon & Power Tool Dragon
  31. T.G. Halberd Cannon
  32. Black-Winged Dragon
  33. Blue-Eyes White Dragon
  34. Embodiment of Apophis
  35. Goyo Guardian
  36. Number 106: Giant Hand
  37. Jinzo, Red-Eyes Black Dragon, & The Legendary Fisherman
  38. Earthbound Immortal Ccapac Apu
  39. Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
  40. Arcana Force EX - The Light Ruler
  41. Fortune Fairy Chee
Down
  1. Red Dragon Archfiend
  2. Lava Golem & The Winged Dragon of Ra
  3. Earthbound Immortal Aslla Piscu
  4. Blue-Eyes Alternative White Dragon, Blue-Eyes Ultimate Dragon, Blue-Eyes White Dragon, Obelisk the Tormentor, & Vampire Lord
  5. Number 107: Galaxy-Eyes Tachyon Dragon
  6. Evil HERO Malicious Fiend
  7. Gate Guardian
  8. Black Rose Dragon
  9. Fossil Warrior Skull King
  10. Number 15: Gimmick Puppet Giant Grinder
  11. Jinzo
  12. Black Luster Soldier, Dark Magician, Dark Magician Girl, Obelisk the Tormentor, Slifer the Sky Dragon, & The Winged Dragon of Ra
  13. Rainbow Dragon
  14. Curse Necrofear
  15. Harpie Lady Sisters
  16. Number 32: Shark Drake
  17. Maiden in Love
  18. Dark Magician Girl
  19. Number 105: Battlin' Boxer Star Cestus
  20. Earthbound Immortal Wiraqocha Rasca
  21. Meklord Astro Mekanikle
  22. Cyber End Dragon
  23. Superdreadnought Rail Cannon Gustav Max
  24. Relinquished
  25. Destiny HERO - Plasma
  26. Masked Beast Des Gardius
  27. Insect Queen
  28. Number 9: Dyson Sphere
  29. Ultimate Tyranno
  30. Junk Warrior, Shooting Star Dragon, & Stardust Dragon
  31. Super Vehicroid Jumbo Drill
  32. Number 102: Star Seraph Sentry
  33. Ice Beast Zerofyne
  34. Pumpking the King of Ghosts
  35. Dark Magician
  36. Galaxy-Eyes Photon Dragon

77 Clues: JinzoCyber BladerTin ArchdukeWater DragonRelinquishedInsect QueenGate GuardianBarrel DragonDark MagicianGoyo GuardianRainbow DragonDark NecrofearMaiden in LoveHumpty GrumptyCyber CommanderCurse NecrofearFairy Cheer GirlCyber End DragonUltimate TyrannoBlack Rose DragonVolcanic DoomfireAncient Gear GolemDark Magician GirlChevalier de Fleur...

Ασφάλεια στο διαδύκτιο 2024-02-15

Ασφάλεια στο διαδύκτιο crossword puzzle
Across
  1. positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
  2. Κακόβουλο Λογισμικό
  3. gaming Παιχνίδια στο Διαδίκτυο
  4. Scams Ηλεκτρονικές Απάτες
  5. Addiction Εθισμόσ στο διαδιίκτυο
  6. Piracy Πειρατεία Λογισμικού
Down
  1. Διαδικτυακός Εκφοβισμός
  2. Reputation Διαδικτυακή Φήμη
  3. news Ψευδής Ειδήσεις
  4. Passwords Κωδικοί Πρόσβασης

10 Clues: Κακόβουλο Λογισμικόnews Ψευδής ΕιδήσειςΔιαδικτυακός ΕκφοβισμόςScams Ηλεκτρονικές ΑπάτεςReputation Διαδικτυακή ΦήμηPasswords Κωδικοί ΠρόσβασηςPiracy Πειρατεία Λογισμικούgaming Παιχνίδια στο ΔιαδίκτυοAddiction Εθισμόσ στο διαδιίκτυοpositive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα

T-VISTARA 2022-11-11

T-VISTARA crossword puzzle
Across
  1. Mobile infra arm of Telstra
  2. The force in sales
  3. Kaught in Berlin (I am a language)
  4. All APIs in one place, sit back and relax.
  5. Our former CEO
Down
  1. FY Starts from this month
  2. Type of cyber attack
  3. Tool to say thanks
  4. Program for Women in SE
  5. Telstra's idea store

10 Clues: Our former CEOTool to say thanksThe force in salesType of cyber attackTelstra's idea storeProgram for Women in SEFY Starts from this monthMobile infra arm of TelstraKaught in Berlin (I am a language)All APIs in one place, sit back and relax.

Energy Crossword Puzzle 2025-04-18

Energy Crossword Puzzle crossword puzzle
Across
  1. something fans work with
  2. Using cars to to make them move
  3. Something you drive in
  4. Runs though houses
  5. Fuel Used to power cars
  6. Power Something that is Powered by the sun
Down
  1. Powers everything on here
  2. Found in mines
  3. So you can play games on your phone
  4. Cyber trucks cousin

10 Clues: Found in minesRuns though housesCyber trucks cousinSomething you drive insomething fans work withPowers everything on hereFuel Used to power carsUsing cars to to make them moveSo you can play games on your phonePower Something that is Powered by the sun

security awareness CW3 2023-03-29

security awareness CW3 crossword puzzle
Across
  1. X is a large network of servers that can improve the security, performance, and reliability of anything connected to the Internet. X does this by serving as a reverse proxy Open external link for your web traffic. At Meesho, X WAF provides both automatic protection from vulnerabilities and the flexibility to create custom rules.
  2. A X test is an authorized simulated attack performed on a Meesho applications to evaluate its security. X testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system. The Product Security team performs quarterly X testing across the family of apps to identify and mitigate security issues in production.
  3. Meesho's ________ team ensures that our platform offers a safe environment for people to shop online and build businesses. Hence, Meesho _____ team collaborates with various teams such as Information Security, Product Security, and Red Team to design secure products and services, perform security assessments, evaluate threats, and develop engineered mitigations.
  4. Secure ________, also referred to as secure programming, involves writing code in a high-level language that follows strict principles with the goal of preventing potential vulnerabilities. Secure _______ practices entail writing code in a way that will prevent potential security vulnerabilities. This includes maintaining both your source code and any third-party libraries in a secure state.
  5. The team publishes a lot of information on Confluence or JIRA pages, so we need to ensure that there is no X information being published intentionally or unintentionally. This X information can be transferred away with employees when they leave the organization, which can be a risk in itself. The name starts with the letter 'S' and ends 'E'.
Down
  1. The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams.
  2. At Meesho, X helps users of your GitHub Enterprise Server instance find and fix vulnerabilities in their dependencies. You can enable X alerts to notify users about vulnerable dependencies and X updates to fix the vulnerabilities and keep dependencies updated to the latest version.
  3. X attacks, in that it uses a single Internet-connected device (one network connection) to flood a target with malicious traffic. You can tag @security-oncall on slack in such situations.
  4. The X tool is required to ensure that the company's cloud computing environments, AWS and GCP, are protected with utmost assurance. This tool scans for data breaches and misconfigurations to secure a company's data
  5. To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack.

10 Clues: The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams.To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack....

Cybersecurity 2025-01-09

Cybersecurity crossword puzzle
Across
  1. malware that collect data
  2. an extra copy of data from a computer
  3. protects data by scrambling it
  4. an attack that wants ransom
  5. a value with a unique length to identify data
  6. being bullied using the internet
  7. malware that reproduces itself
Down
  1. "UI redress attack"
  2. short for malicious malware
  3. applications that direct computers
  4. cyber attack that is disguised
  5. filters network traffic
  6. using your own device
  7. someone who breaks into a computer's system
  8. network of computers for attack
  9. where users store data
  10. protects your location
  11. connected items that represent one

18 Clues: "UI redress attack"using your own devicewhere users store dataprotects your locationfilters network trafficmalware that collect datashort for malicious malwarean attack that wants ransomcyber attack that is disguisedprotects data by scrambling itmalware that reproduces itselfnetwork of computers for attackbeing bullied using the internet...

fshapdsafybasd112fdjf 2023-03-03

fshapdsafybasd112fdjf crossword puzzle
Across
  1. A nonprofit org known for publishing a "top 10" of critical risks
  2. A 3-word term for applying multiple layers of security
  3. A flaw that weakens the overall security of a program or system
  4. ______ mantis
  5. Codename for a recent RT operation
Down
  1. Randomly terminates production apps to ensure they're resilient
  2. New feature that emulates sitting in an open office
  3. FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
  4. Research project for enumerating our environment
  5. This involves sending invalid, unexpected, or random input to a program
  6. Team that emulates real-world attacks

11 Clues: ______ mantisCodename for a recent RT operationTeam that emulates real-world attacksResearch project for enumerating our environmentNew feature that emulates sitting in an open officeA 3-word term for applying multiple layers of securityRandomly terminates production apps to ensure they're resilient...

Digital Literacy: Safety and Ethics 2017-01-04

Digital Literacy: Safety and Ethics crossword puzzle
Across
  1. This happens when a person is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another using the Internet, interactive and digital technologies or mobile phones.
  2. These "account protectors" should be kept secure to ensure others with malicious intent cannot access account information.
  3. Heavy objects should be lifted with these muscles.
  4. This is an online type of computer virus that monitors and records the victim's keystrokes in order to steal personal information.
  5. This is one of the most common causes of accidents in an office environment.
Down
  1. Heavy objects should never be lifted with these muscles.
  2. Cyber bullies can face criminal prosecution for this.
  3. Bad computer code that does nasty or undesirable things to the host computer or code is called a computer...
  4. Be sure electrical wiring is properly _______ to avoid electric shock.
  5. Your name, address, phone number, birth date, and other identification and location information should be kept _______ online as a protection from cyber criminals.

10 Clues: Heavy objects should be lifted with these muscles.Cyber bullies can face criminal prosecution for this.Heavy objects should never be lifted with these muscles.Be sure electrical wiring is properly _______ to avoid electric shock.This is one of the most common causes of accidents in an office environment....

OPS Zone Newsletter Review 7/7/21 2021-07-09

OPS Zone Newsletter Review 7/7/21 crossword puzzle
Across
  1. Individuals Receiving Payments
  2. Stop Getting Advance Payments
  3. Bleeding Ink Color
  4. Paper from the US Treasury
  5. Type of Check Feature
  6. Procedure Related to These Checks
  7. Watermark Reads
  8. Small Printing
Down
  1. Security Ink
  2. Signed Check
  3. Tool to Assist in Fraud Detection
  4. No Watermark
  5. Website

13 Clues: WebsiteSecurity InkSigned CheckNo WatermarkSmall PrintingWatermark ReadsBleeding Ink ColorType of Check FeaturePaper from the US TreasuryStop Getting Advance PaymentsIndividuals Receiving PaymentsTool to Assist in Fraud DetectionProcedure Related to These Checks