cyber security Crossword Puzzles
Cyber Safety 2016-08-26
Across
- a person who breaks into computers to steal information
- a video camera attached to a computer
- media a digital platform on which you can communicate with people from around the world
- when criminals set up mock websites to steal information
- irrelevant messages which can be sources of criminal or advertising activity
Down
- web a collection of web-addresses which hide their IP addresses
- a malicious computer program which hacks a computer by lying about its intent
- repeatedly hurting someone emotionally online
- a software which can control your camera, delete your files
- an unwanted, self-opening browser window
10 Clues: a video camera attached to a computer • an unwanted, self-opening browser window • repeatedly hurting someone emotionally online • a person who breaks into computers to steal information • when criminals set up mock websites to steal information • a software which can control your camera, delete your files • ...
Cyber Bullying 2013-02-12
Across
- Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
- A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
- social media site many people use.
- when someone wont leave you alone and says mean or hurtful things.
Down
- A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
- A secret word or phrase that must be used to gain admission to something.
- the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
- causing distress or injury: to say hurtful things.
- social media site that you "tweet" on.
- boldly assertive and forward; pushy.
10 Clues: social media site many people use. • boldly assertive and forward; pushy. • social media site that you "tweet" on. • causing distress or injury: to say hurtful things. • when someone wont leave you alone and says mean or hurtful things. • A secret word or phrase that must be used to gain admission to something. • ...
Cyber Safety 2013-11-07
Across
- A type of malware that spies on what you do on the Internet and can steal information about you from your computer.
- Someone who bullies others in Cyberspace.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- A type of chat slang
- A defensive software program that acts like a security guard and monitors and controls the traffic coming into and out of your machine from a network.
Down
- A person who hacks into computers to view or alter information that they don't have access to.
- Identity Your identity in cyberspace, who you are on the Internet.
- The physical components of a computer, usually contained within the computer's main case or tower.
- Something that can damage a living organism.
- Containing a combination of different types of content, like text, still images, audio, animations, videos and interactive content.
10 Clues: A type of chat slang • Someone who bullies others in Cyberspace. • Something that can damage a living organism. • Identity Your identity in cyberspace, who you are on the Internet. • A person who hacks into computers to view or alter information that they don't have access to. • ...
cyber safety 2021-09-16
Across
- constant messages or something shared
- something affecting your computer
- what you leave on the internet
- someone who will have unwanted information
- the platforms that this is all performed on
Down
- a security device
- what people can see when online with you
- private information
- something that is personal to you
- your address
10 Clues: your address • a security device • private information • what you leave on the internet • something affecting your computer • something that is personal to you • constant messages or something shared • what people can see when online with you • someone who will have unwanted information • the platforms that this is all performed on
Cyber Bullying 2022-04-18
Across
- WHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE
- WHAT COLOUR WAS THE GOO IN THE VIDEO
- SPREADING FALSE INFORMATION ONLINE
- IF YOU HAVE HURT SOMEONE ONLINE SAY
- IF YOU ARE BULLIED ONLINE KEEP
Down
- CYBERBULLYING CAN FOLLOW YOU
- BULLYING CAN MAKE YOU FEEL
- THE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ART
- ALWAYS ASK FOR HELP
- BULLYING ONLINE IS CALLED
10 Clues: ALWAYS ASK FOR HELP • BULLYING ONLINE IS CALLED • BULLYING CAN MAKE YOU FEEL • CYBERBULLYING CAN FOLLOW YOU • IF YOU ARE BULLIED ONLINE KEEP • SPREADING FALSE INFORMATION ONLINE • IF YOU HAVE HURT SOMEONE ONLINE SAY • WHAT COLOUR WAS THE GOO IN THE VIDEO • THE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ART • WHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE
Cyber Safety 2021-04-07
Across
- Who to talk to if your worried?
- What should we get before posting photos of others?
- How long can things we put online last?
- We need to communicate politely, clearly & what? on the internet.
Down
- What do we call online bullying?
- Who should know our passwords?
- Illegally downloading movies breaks what laws?
- People we shouldn't talk to online?
- What kind of passwords should we have?
- People who are cyber bullied can become d........
10 Clues: Who should know our passwords? • Who to talk to if your worried? • What do we call online bullying? • People we shouldn't talk to online? • What kind of passwords should we have? • How long can things we put online last? • Illegally downloading movies breaks what laws? • People who are cyber bullied can become d........ • ...
Cyber Bullying 2021-05-03
Across
- Where people are able to make groups online
- The action of repeatedly sending offensive and insulting messages.
- The recording of everything accessed through the internet.
- Stopping the access of particular areas on the web.
Down
- When a group of people excludes someone intentionally.
- Bullying through online resources
- The act of engaging and following someone constantly where it breaches the victim's safety.
- When pretending to be someone else online
- Websites or application where people share content and messages
- Those who are under the age of 18.
10 Clues: Bullying through online resources • Those who are under the age of 18. • When pretending to be someone else online • Where people are able to make groups online • Stopping the access of particular areas on the web. • When a group of people excludes someone intentionally. • The recording of everything accessed through the internet. • ...
cyber crossword 2021-05-10
Across
- relating to or involving computers and computing
- the practice of sending fraudulent communications that appear to come from a reputable source, intended to manipulate a victim into taking a desired action or giving up information.
- wrongful or criminal deception intended to result in financial or personal gain.
- a mail and calendering server developed by Microsoft
- a computer-software vulnerability unknown to those responsible for mitigation
Down
- a fix to a program that eliminates a vulnerability
- a type of malicious software that blocks access to a computer system until a sum of money is paid
- a computer that provides a services to other computers (clients)
- a person or thing likely to cause damage or danger
- attackes impersonate a vendor or supplier, often in an attempt to initiaate fraudulent payment.
10 Clues: relating to or involving computers and computing • a fix to a program that eliminates a vulnerability • a person or thing likely to cause damage or danger • a mail and calendering server developed by Microsoft • a computer that provides a services to other computers (clients) • a computer-software vulnerability unknown to those responsible for mitigation • ...
Cyber Bullying 2020-03-08
Across
- a person who pleads for a person, cause, or idea
- think about carefully; weigh
- The application of a set of criteria against which internet content is judged acceptable or not
- doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
- revenge
- an unfortunate person who suffers from adverse circumstances
- Someone who harms another through electronic devices
Down
- recognize as being
- Interactive web journal or diary,the contents of which are posted online and which others can view
- to threaten, frighten, scare, coerce, terrify, and to alarm
10 Clues: revenge • recognize as being • think about carefully; weigh • a person who pleads for a person, cause, or idea • Someone who harms another through electronic devices • to threaten, frighten, scare, coerce, terrify, and to alarm • an unfortunate person who suffers from adverse circumstances • ...
cyber safety 2024-03-27
10 Clues: Secret info • On A device • Type of device • Personall stuff • Personal Information • Not doing stupid stuff • Something htat needs Wifi • Trying to make the most of you • Old person pretending to be young • Person trying to get your private info
cyber bullying 2024-06-13
Across
- if someone is bullying us, we should ask for
- what is a social media platform you can get bullied
- who can we go to if being bullied at school
- another word for messaging
Down
- talk to a trusted adult when you don't feel
- where can you get hacked on
- what app can people send harmful images
- if you have personal information, you should not
- if someone is bothering you what can you do
- what can you be bullied on
10 Clues: what can you be bullied on • another word for messaging • where can you get hacked on • what app can people send harmful images • talk to a trusted adult when you don't feel • if someone is bothering you what can you do • who can we go to if being bullied at school • if someone is bullying us, we should ask for • if you have personal information, you should not • ...
sample cyber 2024-10-03
Cyber Safety 2023-05-22
Across
- Online fights using electronic messages with angry and vulgar language.
- The wrongful approximation and purloining and publication of another's authors language, thoughts, ideas, or expressions, and the representation of them as one's own original work.
- The use of the internet and related technologies to harm other people in a deliberate, repeated and hostie manner.
- Talking someone into revealing secrets or embarrassing information, then sharing it online.
- A form of steeling someone's identity in which someone pretends to be someone else by assuming that persons identity.
Down
- Intentionally and cruelly excluding someone from an online group.
- Repeatedly sending nasty, mean, and insulting messages.
- Sharing someone's secrets or embarrassing information or images online.
- A computer virus is a computer program that can replicate itself and spread from one computer to another.
- Repeated, intense harassment and denigration that includes threats or creates significant fear.
10 Clues: Repeatedly sending nasty, mean, and insulting messages. • Intentionally and cruelly excluding someone from an online group. • Online fights using electronic messages with angry and vulgar language. • Sharing someone's secrets or embarrassing information or images online. • ...
Cyber Safety 2023-05-22
Across
- Repeatedly sending nasty, mean and insulting messages
- Only talking to someone into revealing secrets or embarrassing information the sharing it.
- Repeated harassment.
- Pretending to be someone else online and sending or posting others material.
- Internally and cruelly excluding someone from an online group.
Down
- Using internet and technologies to harm people.
- When someone pretends to be someone they are not.
- Fights online that use messages with angry and inappropriate language.
- The 'dissing' of someone online.
- Sharing someone's secrets or embarrassing information online.
10 Clues: Repeated harassment. • The 'dissing' of someone online. • Using internet and technologies to harm people. • When someone pretends to be someone they are not. • Repeatedly sending nasty, mean and insulting messages • Sharing someone's secrets or embarrassing information online. • Internally and cruelly excluding someone from an online group. • ...
Cyber monday 2024-11-28
10 Clues: PHYSICAL MONEY • PART OF A WEBSITE • A SHORT-TERM SALE • A METHOD OF PAYMENT • THE NAME OF A COMPANY • A PLACE ONLINE TO SHOP • SOMETHING WITH NO COST • WHERE YOUR MONEY IS KEPT • A LINE OR LIST OF WAITING ITEMS • WHAT YOU NEED TO ACCESS A WEBSITE
cyber bullying 2025-03-11
Across
- make sure u have no info of ur personal life
- make someone scared (e.g.i will come and kill u)
- make fun of someone online
- to make someone feel uncomfy
Down
- to harrass someone online
- to not listen to someone
- opposite of rudeness
- to tell on a cyber bully to police
- a way to ignore unwanted messages
- send some messages over and over without stoping
10 Clues: opposite of rudeness • to not listen to someone • to harrass someone online • make fun of someone online • to make someone feel uncomfy • a way to ignore unwanted messages • to tell on a cyber bully to police • make sure u have no info of ur personal life • make someone scared (e.g.i will come and kill u) • send some messages over and over without stoping
CYBER ETHICS 2025-05-31
Across
- The process of transforming data into a reatable code
- Also known as a digital dossier
- The unwanted bulk emails that come from unknown sources
- An act of harming,harrising and targetting a person using internet in deliberate manner
- Refers to a set of procedures,moral principles and ethical practices that regulates the use of a computer and the internet
Down
- Legal right granted by law to the creator for his original one
- piracy When a software is copied and destructed illegally it is called
- refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet
- An illegal intrusion into a computer system or network is known
- The simplest way to prevent plagiarism
10 Clues: Also known as a digital dossier • The simplest way to prevent plagiarism • The process of transforming data into a reatable code • The unwanted bulk emails that come from unknown sources • Legal right granted by law to the creator for his original one • An illegal intrusion into a computer system or network is known • ...
Cyber Ethics 2025-06-08
Across
- It refers to unwanted bulk messages or emails
- Illegal activity that is done using computers, the internet, or other digital devices
- When someone uses the internet digital technologies to threaten, harass, embarrass, or hurt another person
- It is a type of cybercrime where someone tries to trick you into giving your personal information
Down
- The guidelines to be aware of behaving properly and appropriately on internet or while online
- The illegal copying and distribution of videos, software etc ad sharing or distributing without the permission of copyright holder
- Breaking into a computer network, or online account without permission to access or steal information
- It stop others from copying, stealing, or using someone’s work without permission
- It is a secret word or code to lock and unlock your accounts on computers, phones etc to protect personal information
- keeping your personal information, activities, and choices safe and protected from others
10 Clues: It refers to unwanted bulk messages or emails • It stop others from copying, stealing, or using someone’s work without permission • Illegal activity that is done using computers, the internet, or other digital devices • keeping your personal information, activities, and choices safe and protected from others • ...
Cyber crime 2025-12-12
Across
- network protection barrier
- coding data for security
- malware that demands payment
Down
- software that secretly collects data
- harmful software
- network of infected devices
- breaking into a computer system
- malicious program disguised as legitimate
- online fraud to steal personal information
- unauthorized access to data
10 Clues: harmful software • coding data for security • network protection barrier • network of infected devices • unauthorized access to data • malware that demands payment • breaking into a computer system • software that secretly collects data • malicious program disguised as legitimate • online fraud to steal personal information
Y13 Water Security 2023-09-19
Across
- also known as paleowater or ancient groundwater, refers to groundwater that has been stored in underground aquifers for an extended period, often thousands to millions of years. It is a non-renewable water resource.
- is the water stored beneath the Earth's surface in porous rock formations and aquifers. It is a vital source of freshwater for drinking, agriculture, and industrial purposes.
- is the phase transition in which water changes directly from a solid (ice) to a gas (water vapor) without passing through the liquid phase. It commonly occurs in cold and dry conditions.
- is the process by which water changes from its liquid state to vapor or gas when exposed to heat or sunlight. It primarily occurs from open water surfaces, such as lakes and oceans, and moist land areas.
- refers to the rate of flow or transfer of water through a specific area or volume. It quantifies the movement of water in various parts of the hydrological system.
- Radiation is the energy emitted by the sun in the form of electromagnetic waves. It plays a significant role in driving the processes of evaporation, transpiration, and heating of the Earth's surface, affecting the water cycle.
- represents the movement of water within natural or artificial channels, such as rivers, streams, and pipelines. It is characterized by the volume of water passing through a specific point over time.
- is the deliberate application of water to land or soil to assist in the growth of crops and vegetation. It is commonly used in agriculture to supplement natural rainfall.
- is the process by which water soaks into the ground, entering the soil and eventually recharging underground aquifers. It is a crucial aspect of groundwater replenishment.
Down
- Cycle also called the water cycle, is the continuous and interconnected process by which water circulates through the Earth's atmosphere, surface, and subsurface. It includes evaporation, condensation, precipitation, runoff, and groundwater flow.
- refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams.
- is the combined process of water vapor being released into the atmosphere through two primary mechanisms: evaporation from surfaces like soil and water bodies and transpiration from plants through their leaves. It represents the total loss of water from the Earth's surface to the atmosphere.
- is the energy possessed by water due to its elevation above a reference point, typically the Earth's surface. It is a key factor influencing the movement of water in rivers and streams.
- is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources.
- also known as a watershed or catchment area, is an area of land that collects and channels water, including rainfall and runoff, into a central point, such as a river or lake.
- refers to any form of water, such as rain, snow, sleet, or hail, that falls from the atmosphere to the Earth's surface. It is a critical component of the water cycle and contributes to replenishing water resources.
- is a systematic assessment of the inflows and outflows of water within a specific region or system. It helps in understanding the availability and usage of water resources and can guide sustainable water management.
- is the flow of water that occurs when excess rainwater or melted snow does not infiltrate into the soil but instead flows over the land surface, eventually entering streams, rivers, and other water bodies.
18 Clues: refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams. • is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources. • ...
Compliance & Security Week 2024-11-13
Across
- An email that tricks you into clicking on a link or opening an attachment
- Bad software installed on a computer to damage or harm it. Examples are viruses, ransomware, spyware, etc.
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket.
- Unwanted emails or messages that usually try to sell you something
- What is the acronym that identifies individual's information such as name, birthdate, and SSN
- What type of information must be secured and protected?
- A piece of data about your online history that creates a trail of crumbs. Not chocolate chip though.
- Who is the person you should report any HIPAA breaches?
- If you receive a suspicious ___ hover over it with your mouse before clicking to make sure it is real
- It's like your underwear; don't share it with anyone and change it at least every 90 days
- How often does DDID require HIPAA training?
Down
- What program is Shane in control of?
- The process of transforming and encoding information to pass information securely
- Unauthorized user with malicious intent
- What is the private network you log into make you anonymous on the intranet?
- Always ___ your devices and software when the newest version is available
- What HIPAA rule protects individual rights
- When multiple devices are connected together to share information. They are together in a ____.
18 Clues: What program is Shane in control of? • Unauthorized user with malicious intent • What HIPAA rule protects individual rights • How often does DDID require HIPAA training? • What type of information must be secured and protected? • Who is the person you should report any HIPAA breaches? • Unwanted emails or messages that usually try to sell you something • ...
La spéciale Phebusa 2023-12-02
Across
- Jamais sans les Faber Castel
- Là où sont les vocaux de qualité
- Ton fruit préféré
- L'ensemble de la communauté
- En direct de Pandaland
- Ton métier sur Twitch
- Utile pour le lancé de carapaces
- We are constructors Ahou Ahou Ahou !
Down
- La DA de la chaine
- Apporte du soleil dans la vie
- Une reine ne sort jamais sans
- Boris, Chiken, ou même la Zumba en font partie
- Un panda, un renard et une coccinelle
- One shot
- Ton objet préféré dans les Sims
15 Clues: One shot • Ton fruit préféré • La DA de la chaine • Ton métier sur Twitch • En direct de Pandaland • L'ensemble de la communauté • Jamais sans les Faber Castel • Apporte du soleil dans la vie • Une reine ne sort jamais sans • Ton objet préféré dans les Sims • Là où sont les vocaux de qualité • Utile pour le lancé de carapaces • We are constructors Ahou Ahou Ahou ! • ...
TTS Kata Serapan 2025-08-06
Across
- kata asing yang mengalami penyesuaian dalam pelafalan dan/atau ejaan agar sesuai dengan kaidah bahasa indonesia
- google translate
- warung makan sederhana
- ss
- rodanya ada 3
- penyerapan kata asing tanpa ada perubahan
Down
- minuman khas betawi
- berasal dari bahasa asing (foto foto)
- masuk karena pengaruh sejarah (penjajahan, perdagangan, agama) بيضة
- makanan daging ditusuk dan di panggang
- masakan daging sapi dengan santan dan rempah rempah
- salad khas betawi
- dunia maya (cyber world), ahli psikologi (psychologist)
- 🥚
- berasal dari kata portugis
15 Clues: 🥚 • ss • rodanya ada 3 • google translate • salad khas betawi • minuman khas betawi • warung makan sederhana • berasal dari kata portugis • berasal dari bahasa asing (foto foto) • makanan daging ditusuk dan di panggang • penyerapan kata asing tanpa ada perubahan • masakan daging sapi dengan santan dan rempah rempah • dunia maya (cyber world), ahli psikologi (psychologist) • ...
public safty crossword 2024-08-20
Across
- control, to protect dangered animals and control thm
- to protect the city and people
- watch over an area
- protected
- security of things online
- to watch out for
- help minor injuries
- sound for an emergency
- to be quiet and away from windows
Down
- danger
- unexpected dangerous situation
- a statement that could mean possible danger
- to protect
- let someone know something important
- saving someone from danger
- flames
- to be kept safe
- to clear out quickly
- health, health of the population
- medical attention on the move
- being protected
21 Clues: danger • flames • protected • to protect • to be kept safe • being protected • to watch out for • watch over an area • help minor injuries • to clear out quickly • sound for an emergency • security of things online • saving someone from danger • medical attention on the move • unexpected dangerous situation • to protect the city and people • health, health of the population • ...
Safe Computing 2025-08-29
Across
- Locks data for ransom
- Hidden malicious web clicks
- containing suspicious files in isolation
- Hidden data in files
- Fixes security vulnerabilities
- Scrambles data for security
- Fake system traps hackers
Down
- Block unauthorized network
- records keyboard keystrokes
- Secure encrypted online tunnel
- Damage to system becomes unusable
- Unauthorized data transfer
- Malicious software program
- Secret system access method
- Fake emails to trick victim
- Secretly monitors user activity
- Self-spreading malicious code
- Network of infected devices
- Displays unwanted pop ads
- Converts data into digest
- Disguised program carrying hidden threat
21 Clues: Hidden data in files • Locks data for ransom • Displays unwanted pop ads • Converts data into digest • Fake system traps hackers • Block unauthorized network • Unauthorized data transfer • Malicious software program • records keyboard keystrokes • Hidden malicious web clicks • Secret system access method • Fake emails to trick victim • Network of infected devices • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- OFFICER WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- OF NCIS DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • SCOPE BACKGROUND INVESTIGATION WHAT DOES SSBI STAND FOR? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- scope background investigation WHAT DOES SSBI STAND FOR?
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
Down
- of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- WHO IS USUALLY DESIGNATED AS IAM?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • scope background investigation WHAT DOES SSBI STAND FOR? • ...
public safty words. 2024-08-08
Across
- keeps order in the court.
- Clerk
- figers
- united States Drug Enforcement Administration.
- protecting our borders from outside threats.
- a formal inquiry or investagation.
- capture and track documents
- a first responder
- writes everything in the court
- health prevents diseases
- send to location
Down
- helps you in courts
- you have the right to______
- the activity of some members of government
- manages a emergency area.
- Federal Bureau of Investigation.
- fingers
- fingers
- a man meant to guard a area or person.
- transportation security
20 Clues: Clerk • figers • fingers • fingers • send to location • a first responder • helps you in courts • transportation security • keeps order in the court. • manages a emergency area. • you have the right to______ • capture and track documents • health prevents diseases • writes everything in the court • Federal Bureau of Investigation. • a formal inquiry or investagation. • ...
public saftey 2024-08-09
Across
- measures ensuring protection
- organized withdrawal from danger
- actions to avert potential threats
- occurrence of an unexpected event
- state of being ready for emergencies
- state of being shielded from harm
- vehicle for urgent medical aid
- act of extricating from peril
- critical situation requiring immediate action
- event causing significant destruction
Down
- continuous observation for security
- routine surveillance activity
- action taken during an emergency
- Aid, preliminary medical intervention
- enforcers of law and order
- potential risk or danger
- combatant of infernos
- emergency procedure for cardiac arrest
- refuge from adverse conditions
- device signaling danger
20 Clues: combatant of infernos • device signaling danger • potential risk or danger • enforcers of law and order • measures ensuring protection • routine surveillance activity • act of extricating from peril • vehicle for urgent medical aid • refuge from adverse conditions • action taken during an emergency • organized withdrawal from danger • occurrence of an unexpected event • ...
INTERNET TERMINOLOGIES 2023-12-09
Across
- Internet Service Provider
- Malicious software
- Device for internet access
- Connection to another web page
- Data security through encoding
- Software for navigating the web
- Collection of online pages
- Transfer data from the internet
- Website data stored on a device
- Fraudulent information retrieval
- Unsolicited emails/messages
- Temporary storage for web data
Down
- Tool for finding information online
- Language for web page creation
- Webpage address
- Computer delivering data to users
- Network security system
- Device directing internet traffic
- Wireless internet connection
- Data transfer capacity
- Website's name/address
- Transfer data to the internet
- Internet Service Provider
23 Clues: Webpage address • Malicious software • Data transfer capacity • Website's name/address • Network security system • Internet Service Provider • Internet Service Provider • Device for internet access • Collection of online pages • Unsolicited emails/messages • Wireless internet connection • Transfer data to the internet • Language for web page creation • Connection to another web page • ...
dave crossword ig (lottie) 2021-11-03
5 Clues: codes into your device • the electronic you are on right now • somthing you would need a password for • comes before the word safety in "cyber safety" • a secret code you use foe websites,accounts more
IFG Security Crossword Puzzle 2023-07-27
Across
- Security incident that results in the loss, suspected compromise of classified info
- Security incident involving unintentional or negligent violation of customer or company security requirements
- Focal point for overall security administration and management
- required for access to SAP
- SAP Accredited Area
Down
- Dedicated unclassified F-22 program area
- Replaced FOUO
- Displays unclassified program identifiers for all SAPs an employee possesses
- Prohibited Item
- Control information about mission capabilities, limitations, and intentions
10 Clues: Replaced FOUO • Prohibited Item • SAP Accredited Area • required for access to SAP • Dedicated unclassified F-22 program area • Focal point for overall security administration and management • Control information about mission capabilities, limitations, and intentions • Displays unclassified program identifiers for all SAPs an employee possesses • ...
IFG Security Crossword Puzzle 2023-07-27
Across
- Replaced FOUO
- Security incident that results in the loss, suspected compromise of classified info
- The practice of controlling information about mission capabilities, limitations, and intentions
- Prohibited Item
Down
- Security incident involving unintentional or negligent violation of customer or company security requirements
- Focal point for overall security administration and management
- Displays unclassified program identifiers for all SAPs an employee possesses
- Dedicated unclassified F-22 program area
- Required for access to SAP
- SAP Accredited Area
10 Clues: Replaced FOUO • Prohibited Item • SAP Accredited Area • Required for access to SAP • Dedicated unclassified F-22 program area • Focal point for overall security administration and management • Displays unclassified program identifiers for all SAPs an employee possesses • Security incident that results in the loss, suspected compromise of classified info • ...
Quarta Rivoluzione industriale 2024-02-05
8 Clues: Industrial • aumento dell’uso • rende più…il lavoro • come sono le macchine • Sono sistemi di produzione • contiene 4 elementi chiave • ne saranno capaci Le macchine • Sono state create…intelligenti
New Deal Program 2024-02-22
Across
- security - provided low interest credits and other services to farmers
- and Crafts - create, promote, protect Indian arts.
- Housing Act - Got funding to build houses
- - Funding of the arts
- Relief - Funds New Deal work agencies
- Drug Cosmetics - Improves public safety
- of Prohibition - 21st amendment added to constitution
- Security - Unemployment insurance, social security taxes on tolls and paychecks
- reorganization - Giving Indians back land, gave them credit
Down
- Youth Dance - small performing arts
- Project - Planted trees to give work and protect plains from wind erosion
- Forum - Americans discuss problems
- of Justice - Investigates civil rights
- Deposit Insurance Corporation - Insured bank deposits when bank fails
- Bureau - Increased travel and tourism in U.S
15 Clues: - Funding of the arts • Forum - Americans discuss problems • Youth Dance - small performing arts • Relief - Funds New Deal work agencies • of Justice - Investigates civil rights • Drug Cosmetics - Improves public safety • Housing Act - Got funding to build houses • Bureau - Increased travel and tourism in U.S • and Crafts - create, promote, protect Indian arts. • ...
KnowBe4 Security Crossword 2020-11-03
Across
- Trick into visiting malicious websites
- File sent to a web browser & stored on Computer A programmable electrinic device
- Criminal activity through PC or internet
- Extends private network across public one
- Software to obtain covert info
- State of being free from danger
- Knowledge of situation or fact
- Members allowed to communicate with others
- Programs that damage computers/steal info
Down
- Network that links computers globally
- Protection of physical systems
- Program that runs on your computer
- System that monitors incoming/outgoing Networktraffic Amount/type of activity on a network
- Code that multiplies and corrupts systems
- Letter/numbers,etc. used to access device
- Transfer data from one computer to another
- Text
- Irrelevant messages sent on the internet
18 Clues: Text • Protection of physical systems • Software to obtain covert info • Knowledge of situation or fact • State of being free from danger • Program that runs on your computer • Network that links computers globally • Trick into visiting malicious websites • Criminal activity through PC or internet • Irrelevant messages sent on the internet • ...
AscTech Security Crossword 2022-03-15
Across
- A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- Another kind of malware that allows cybercriminals to remotely control your computer. Phishing A technique used by hackers to obtain sensitive information.
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
- An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Down
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
- A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- An internet version of a home address for your computer, which is identified when it communicates over a network
- A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- Refers to a company security policy that allows for employees’ personal devices to be used in business.
18 Clues: The process of encoding data to prevent theft by ensuring the data can only be accessed with a key. • A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based. • Refers to a company security policy that allows for employees’ personal devices to be used in business. • ...
Health Final Exam Review 2020-12-07
Across
- good health here shown by expressing feeling
- starve yourself
- good health here shown by respecting others
- bullying that hurts your body
- gives more energy
- the S in SMART goal
Down
- at least 8 hours a day
- eat then throw up
- cause of stress
- well being of physical mental social
- hormone that prepares body to act
- bullying that happens online
- happens to you if under stress for long time
- bullying that hurts mentally
- talking to friend (3 "out" ways to handle stress
15 Clues: cause of stress • starve yourself • eat then throw up • gives more energy • the S in SMART goal • at least 8 hours a day • bullying that happens online • bullying that hurts mentally • bullying that hurts your body • hormone that prepares body to act • well being of physical mental social • good health here shown by respecting others • good health here shown by expressing feeling • ...
Zajedno za bolji internet 2023-03-01
Across
- mogućnost slanja pošte putem interneta
- tragovi koji nisu bezobrazni,ne vrjeđaju nikog
- nasilničko ponašanje
- tragovi koji vrijeđaju nekog
- prividna stvarnost nastala pomoću računala
- skup podataka s pripisanim značenjem
- male datoteke
Down
- zbirka elektroničkih dokaza
- tragovi koje bez namjere ostavimo na internetu
- nosimo ih na dan protiv nasilja
- svrha je poniziti drugu osobu
- informacije koje ostavljamo na internetu
- neželjena pošta
- pošta koju šaljemo internetom i ostavljamo digitalne tragove
- tragovi koje namjerno ostavimo na internetu
15 Clues: male datoteke • neželjena pošta • nasilničko ponašanje • zbirka elektroničkih dokaza • tragovi koji vrijeđaju nekog • svrha je poniziti drugu osobu • nosimo ih na dan protiv nasilja • skup podataka s pripisanim značenjem • mogućnost slanja pošte putem interneta • informacije koje ostavljamo na internetu • prividna stvarnost nastala pomoću računala • ...
Vocabulary Review Weeks 1-4 2025-04-28
Across
- synonym of earn
- antonym of cowardice
- the sale of goods to the public
- synonym of modern
- when you work extra hours
- condition that happens when your blood sugar is too high
- involving, using, or relating to computers, especially the internet.
Down
- synonym of vital
- process of taking in food and using it for growth
- every second one
- restrain or keep in check
- encourage someone
- cut down on something
- positive outlook of life
- synonym of speed
15 Clues: synonym of earn • synonym of vital • every second one • synonym of speed • encourage someone • synonym of modern • antonym of cowardice • cut down on something • positive outlook of life • restrain or keep in check • when you work extra hours • the sale of goods to the public • process of taking in food and using it for growth • condition that happens when your blood sugar is too high • ...
Compliance Champions League 2023 - Crossword 2023-11-28
Across
- Attachments are made visible externally by setting the _ flag:
- Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
- Patch Day notes are released on 2nd _________ of every Month :
- Subscribe using the _ to receive email notifications on external updates for cases :
- Software with rating ___________ at SAP should not be installed:
- Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
- _______ notes must be entered to put the case to status Resolved:
- The _____ feature enables SAP to secure the usage of any application specific function:
- _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
- _______ field ensures that the action plan step documented will be visible to the customer:
Down
- We can find the latest SAP logo and word/ppt templates at www.______.com :
- If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
- _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
- Which Board area does AIS belong to?
- To installl a software which is not listed in software center, we get it via go/ :
- What should be the status of a product security incident if you get a CVSS score of 0.0.:
- While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
- What should be the final status of a Security Incident:
- How is the priority of the security note calculated?
- You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com:
20 Clues: Which Board area does AIS belong to? • How is the priority of the security note calculated? • What should be the final status of a Security Incident: • Attachments are made visible externally by setting the _ flag: • Patch Day notes are released on 2nd _________ of every Month : • Software with rating ___________ at SAP should not be installed: • ...
Crossword 1 2014-12-28
Across
- When securing a crime scene, make note of any __________ conditions.
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- Designing the environment to reduce the possibility of crime is called?
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- Only the __________ government can create indictable offences.
- When handling evidence, you should wear gloves to avoid __________.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- One of the recommendations from the Patrick Shand case was __________ licensing.
- An arrest is defined as getting control of someone with intent to __________.
Down
- Post orders are often called __________ orders.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- The basic security role is to protect people, property and __________.
- One reason that we patrol is to deter people from __________ acts.
- Patrick Shand was arrested for __________ baby food.
- We can protect information by protecting computer screens from __________ eyes.
- When taking a witness statement, the facts should be in __________ order.
- If a crowd seems to be getting out of control, __________ from any communication.
- You will need a security license to work in loss __________.
18 Clues: Post orders are often called __________ orders. • Patrick Shand was arrested for __________ baby food. • You will need a security license to work in loss __________. • Only the __________ government can create indictable offences. • One reason that we patrol is to deter people from __________ acts. • ...
Investment Strategies and Analysis - Jace 2021-02-06
Across
- the ratio used to evaluate return based on risk level
- cluster of protein filament currently found on Micheal's face
- portfolio theory that seeks for optimal returns at a given risk level and time horizon
- portfolio management type that adapts to a seasonal market trend
- more __
- __ hypothesis (of the Efficient Market Hypothesis) disregards past history and refute theories of technical analysis of any security
- passive investment technique that attempts to match a particular stock baseline
- private activity __ bonds would be taxable under the Alternative Minimum Tax (AMT)
Down
- the P/E ratio of a growth company
- Rob's favorite shirt design
- correlation at a (+1) coefficient
- term used when ensuring a portfolio does not overemphasize one or more asset categories
- by calculating a weighted average of various performance probabilities, the __ return is the amount an investor expects to receive from an investment
- rule of 72 determines the time it take an investment to do this
- the period an investor has actual ownership of the security
- the government agency security guaranteed by the US government
- the stepped up cost basis of an inherited security is determined as of the date of the owner's___
- portfolio turnover rate in a buy and hold strategy
- the P/E ratio of a value company
19 Clues: more __ • Rob's favorite shirt design • the P/E ratio of a value company • the P/E ratio of a growth company • correlation at a (+1) coefficient • portfolio turnover rate in a buy and hold strategy • the ratio used to evaluate return based on risk level • the period an investor has actual ownership of the security • ...
CS Unit 2 Vocab 2025-09-30
Across
- identity verification
- software that is programmed to detect, prevent, and remove viruses from devices
- a network that only uses cables to connect to devices or the internet
- a network that transmit data extremely fast through thin strands of plastic or glass fiber
- data stored on a device that is not connected to the internet or to a network
- open authorization and two-factor authentication
- security process that requires two different forms/factors of authentication to verify someone's identity
- the data is trustworthy and accurate (part of the CIA triad)
- the exposure something has to being in danger
Down
- to reduce the severity of something
- the accessibility of data to authorized users (part of the CIA triad)
- services that are useable
- the core fundamental concept of cybersecurity
- proof that someone/something has performed a digital action, so they can not deny involvement
- network security systems that monitor and control network trafficet, used as barriers between internal and external networks
- only people who are authorized have access to data (part of the CIA triad)
- network security tool that monitors system and network activity for threats and mitigates them immediately
- network security tool that monitors system and nwork activity for suspicious behavior
18 Clues: identity verification • services that are useable • to reduce the severity of something • the core fundamental concept of cybersecurity • the exposure something has to being in danger • open authorization and two-factor authentication • the data is trustworthy and accurate (part of the CIA triad) • the accessibility of data to authorized users (part of the CIA triad) • ...
Arkansas School for Mathematics, Sciences, and the Arts 2020-06-24
Across
- academic department
- by a sensei
- year project
- success coordinators/class schedulers and admissions gurus
- and Innovation Complex/CIC
- Muse/student arts publication
- of Arkansas/a campus of this system
- Dolphin/mascot
- Arkansas School for Mathematics, Sciences, and the Arts
- Bay Cafe/aquatic mammal eatery
- center/home away from home
Down
- sports competition against sister schools
- where arts and humanities students showcase their research and portfolios
- magazine
- and green/school colors
- fair/STEM students showcase their research here
- weeks before classes begin in August
17 Clues: magazine • by a sensei • year project • Dolphin/mascot • academic department • and green/school colors • and Innovation Complex/CIC • center/home away from home • Muse/student arts publication • Bay Cafe/aquatic mammal eatery • of Arkansas/a campus of this system • weeks before classes begin in August • sports competition against sister schools • ...
Cyberbezpieczeństwo 2025-04-09
Across
- Podszywanie się pod inną osobę .
- Chroni tożsamość w internecie .
- Może zawierać litery, cyfry i znaki specjalne .
- Zabezpieczenie dostępu np.login.
- Sieć WI-FI bez hasła .
- Ogólna nazwa dla złośliwego orpogramowania .
Down
- Nazwa użytkownika potrzebna do zalogowania się .
- Fałszywa wiadomość podszywająca się pod zaufane żródłó.
- Program,który chroni komputer przed wirusami .
- Krótkie potwierdzenie logowania .
- Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
- Proces szyfrowania danych .
- forma złośliwego oprogramowania, które żąda okupu.
- Złośliwe oprogramowanie podszywające się pod coś użytycznego .
- Kopia zapasowa danych .
- DDoS Cyber atak polegający na zalaniu serwera.
16 Clues: Sieć WI-FI bez hasła . • Kopia zapasowa danych . • Proces szyfrowania danych . • Chroni tożsamość w internecie . • Podszywanie się pod inną osobę . • Zabezpieczenie dostępu np.login. • Krótkie potwierdzenie logowania . • Ogólna nazwa dla złośliwego orpogramowania . • Program,który chroni komputer przed wirusami . • Może zawierać litery, cyfry i znaki specjalne . • ...
Mesleki İngilizce İnternet Terimleri 2022-11-18
Across
- web sayfası
- tıklanma oranı
- İndirme
- Alt alan adı
- Etkileşimli Web Sitesi
- Zincir Mail
- Alan adı
- Sanal alem, sanal gerçeklik
- ziyaretçi defteri
- kodlama, şifreleme
- çerez
- kablosuz bağlantı noktası
- sohbet sunucusu
- Etiket
- Kara liste
- alışveriş
- kırık link
- internet günlüğü
- Reklam bandı
- bağlantı çiftliği
Down
- işaret kutusu
- takipçi
- Yüklemek
- Otomatik Tamamlama
- arama
- Yemleme
- kullanıcı
- sohbet
- İstenmeyen
- siber
- yer imi
- Barındırma
- güvenlik kodu
- gözatmak
- Ana sayfa
- köprü
- kalıcı bağlantı
- derin ağı
- ziyaretçi
- İnternette gezinme
- bağlantı
- çevrimdışı
42 Clues: arama • siber • çerez • köprü • sohbet • Etiket • takipçi • İndirme • Yemleme • yer imi • Yüklemek • Alan adı • gözatmak • bağlantı • kullanıcı • Ana sayfa • derin ağı • ziyaretçi • alışveriş • İstenmeyen • Barındırma • Kara liste • kırık link • çevrimdışı • web sayfası • Zincir Mail • Alt alan adı • Reklam bandı • işaret kutusu • güvenlik kodu • tıklanma oranı • kalıcı bağlantı • sohbet sunucusu • internet günlüğü • ziyaretçi defteri • ...
Through the years 2022-12-05
Across
- A Childs dream
- Cyber sleuth
- They call me Moose
- I feel the need for speed
- I can’t see, but I can
- Found any missing planes lately?
- Chonker
- Splitting lanes
- Jump!
- Born on Cupid’s Day
- I like it black
- Lucky Roulette
Down
- Friday night football
- Fishing from the skies
- Honeymoon smooth sailing
- How deep can you go?
- Low wing
- Not the hibernating kind
- Afraid of my own shadow
- Japanese treat
- Night Shift
- 43 feet of luxury
- The World on Time
- Retired killer
- Surfing and Tacos
- Elvis was here
26 Clues: Jump! • Chonker • Low wing • Night Shift • Cyber sleuth • A Childs dream • Japanese treat • Retired killer • Elvis was here • Lucky Roulette • Splitting lanes • I like it black • 43 feet of luxury • The World on Time • Surfing and Tacos • They call me Moose • Born on Cupid’s Day • How deep can you go? • Friday night football • Fishing from the skies • I can’t see, but I can • Afraid of my own shadow • ...
Cyber Hackers & Cybersecurity 2023-06-01
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
- A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Software designed to detect and destroy computer viruses
- Interconnected computing devices that can exchange data and share resources with each other
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
- It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
- Creation of a false identity by a cybercriminal with the intention of defrauding a victim
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online
- Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
- Baiting a trap for hackers
- The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th
16 Clues: Baiting a trap for hackers • Software designed to detect and destroy computer viruses • Creation of a false identity by a cybercriminal with the intention of defrauding a victim • Interconnected computing devices that can exchange data and share resources with each other • ...
CYBER SMART 2014-04-07
10 Clues: bullying socially • way to send messages • someones veiw of you • someone that harms you • sending nudes from phone • another word for inteligent • another word for protection • a way of peir pressuring someone • a way to call someone from a distance • thief someone that try's to steal your identity
Cyber Safety 2020-02-23
Across
- He told me to stop playing computer games and start exercising. This was good _____.
- The new recharging cable was not ___, so it caused a fire
- Scaring or intimidating someone to make they do something.
- Send messages over the intenet like paper letters.
- If you spend 5 hours every day playing computer games, you have bad _____.
Down
- He showed __________when he told the teacher about the bullies
- I help my sister with homework because it's my _______.
- A global network of computers.
- connected to the internet.
- We used this machine to do math calculations and to send messages. machine does calculations and
10 Clues: connected to the internet. • A global network of computers. • Send messages over the intenet like paper letters. • I help my sister with homework because it's my _______. • The new recharging cable was not ___, so it caused a fire • Scaring or intimidating someone to make they do something. • He showed __________when he told the teacher about the bullies • ...
Cyber Crimes 2021-01-28
Across
- A computer hacker whose activity is aimed at promoting a social or political cause
- software or code intended to damage or disable computers and computer systems
- Scams that usually offer the victims large returns with minimal risk
- Type of fraud where a perpetrator deceives a victim into believing the the perpetrator and victim have a trust relationship and the victim is persuaded to send money
- Unlawful extraction of money or property through intimidation or undue exercise of authority
Down
- The perpetrator informs a victim that they qualified for a large loan or won large amount of money, but they have to first pay money first to get it
- An individual is sent a payment and instructed to keep a portion and send the remainder to another person or business
- contact information is deliberately falsified to mislead and appear to be from a legitimate source
- Type of attack that floods a network with multiple requests, slowing down or interrupting service
- type of malicious software designed to block access to a computer system until money is paid
10 Clues: Scams that usually offer the victims large returns with minimal risk • software or code intended to damage or disable computers and computer systems • A computer hacker whose activity is aimed at promoting a social or political cause • type of malicious software designed to block access to a computer system until money is paid • ...
Cyber bullying 2019-07-11
10 Clues: Holt • to hold up • like a cold • private to you • not tell the truth • being hurt constantly • answer someones question • texting and communicating • someone who is mean to someone else • something you use to access messages and internet
Cyber Crossword 2024-05-24
Across
- A piece of software designed to update or fix problems with a computer program or its supporting data.
- Malicious software designed to block access to a computer system until a sum of money is paid.
- The process of converting information or data into a code to prevent unauthorized access.
- Software that enables a user to obtain covert information about another's computer activities.
Down
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A type of malware disguised as legitimate software.
- A secret word or phrase that must be used to gain admission to something.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A network of private computers infected with malicious software and controlled as a group.
- A method of trying to distribute malware or steal information or money using deceptive e-mails and websites.
10 Clues: A type of malware disguised as legitimate software. • A secret word or phrase that must be used to gain admission to something. • Software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to prevent unauthorized access. • ...
Cyber Etiquette 2023-04-02
Across
- Do not participate in ______ conduct such as being an online troll, bully or hacker
- Do not consume or spread ______ inappropriate content
- Communicate and share ______ by posting positive content
- Do not ______ personal information
Down
- We can protect ourselves from online dangers by reaching out to police or trusted adult
- Could the person have any malicious intent
- Take _____ against cyberbullying
- Do you know the person or are they credible
- Keep personal information ______
- Did the person intimidate or rush you to do something
10 Clues: Take _____ against cyberbullying • Keep personal information ______ • Do not ______ personal information • Could the person have any malicious intent • Do you know the person or are they credible • Do not consume or spread ______ inappropriate content • Did the person intimidate or rush you to do something • Communicate and share ______ by posting positive content • ...
Cyber Safety 2023-03-27
Across
- Sites such as Snapchat, tiktok etc...
- simulation of the real thing
- To stop a computer from reaching something on the internet.
- An attempt to trick people into visiting malicious websites.
Down
- Measures taken to protect a computer
- When a child abuser tries to start a relationship online.
- Repeated behavior that is intended to cause psychological or emotional harm.
- A word or series of letters, numbers and characters.
- Computer program designed to damage files
- Person who uses computer to gain unauthorized access to data.
10 Clues: simulation of the real thing • Measures taken to protect a computer • Sites such as Snapchat, tiktok etc... • Computer program designed to damage files • A word or series of letters, numbers and characters. • When a child abuser tries to start a relationship online. • To stop a computer from reaching something on the internet. • ...
cyber safety 2023-05-22
Across
- arguing or dissing someone online
- repeat rude messages
- pretending to be another person
- excluding a person from an activity
Down
- use of Internet and technologies to harm other people
- Presenting work or ideas from another source as your own, with or without consent of the original creator by using it in your work without acknowledgement.
- sharing someones secrets and other personal info without consent
- offensive and rude rumors and gossip
- harrasing or threatening someone online
- tricking someone into giving personal info
10 Clues: repeat rude messages • pretending to be another person • arguing or dissing someone online • excluding a person from an activity • offensive and rude rumors and gossip • harrasing or threatening someone online • tricking someone into giving personal info • use of Internet and technologies to harm other people • ...
cyber safety 2023-05-22
Across
- into revealing secrets or embarrassing information, then sharing it online.
- someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
- nasty, mean, and insulting messages.
- is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." - Wikipedia
- is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity" - Wikipedia
Down
- secrets or embarrassing information or images online.
- is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability."
- is the wrongful appropriation and purloining and publication of another author's language, thoughts, ideas, or expressions, and the representation of them as one's own original work."
- and cruelly excluding someone from an online group.
- using electronic messages with angry and vulgar language.
10 Clues: nasty, mean, and insulting messages. • and cruelly excluding someone from an online group. • secrets or embarrassing information or images online. • using electronic messages with angry and vulgar language. • into revealing secrets or embarrassing information, then sharing it online. • ...
Cyber Safety 2023-05-22
Across
- Sharing somebody else's secrets online.
- Stealing someone's identify to pretend to be them.
- A computer program that can replicate and spread over the computer.
- Repeatedly sending mean insulting messages.
- Cruely excluding someone online.
Down
- Someone stealing another authors own work.
- To harm peoples feelings on repeat online.
- Online fights send through message with anger.
- Repeated harassment on someone's page.
- Tricking someone into saying stuff about other people online.
10 Clues: Cruely excluding someone online. • Repeated harassment on someone's page. • Sharing somebody else's secrets online. • Someone stealing another authors own work. • To harm peoples feelings on repeat online. • Repeatedly sending mean insulting messages. • Online fights send through message with anger. • Stealing someone's identify to pretend to be them. • ...
Cyber Safety 2023-05-22
Across
- stalking repeated intense harrasment
- to share someone else secerets or information ofimages online
- pretending to be someone or posting vidoes online to get them introuble
- to trick someone to reveal secrets or embarrisingInfromation online
- means to diss someone or spread rumors.
Down
- intentionally and cruely exculuding someone froman online group
- theft means to stels someones identity
- means to send mean or insulting messages.
- means to use angry and vulgar launage online
- denigration that includes threats and significant fear
10 Clues: stalking repeated intense harrasment • theft means to stels someones identity • means to diss someone or spread rumors. • means to send mean or insulting messages. • means to use angry and vulgar launage online • denigration that includes threats and significant fear • to share someone else secerets or information ofimages online • ...
Cyber Safety 2023-05-22
Across
- Pretending to be someone your not on the internet.
- Sharing another person's secrets online.
- Using Technology to hurt others.
- Repeated harassment on someone's page.
Down
- Pretending to be someone else and using their name and personal information.
- A disease in your PC.
- Not including another person.
- Repeatedly sending nasty and mean messages.
- Taking someone else's work or ideas and passing them as their own.
- Online fight and saying vulgar language.
10 Clues: A disease in your PC. • Not including another person. • Using Technology to hurt others. • Repeated harassment on someone's page. • Sharing another person's secrets online. • Online fight and saying vulgar language. • Repeatedly sending nasty and mean messages. • Pretending to be someone your not on the internet. • ...
Cyber Foundations 2022-04-07
Across
- The slide currrently selected or displayed
- The preset amount of time between slides as they advance automatically during a slide show
- The template will appear along with traditional information on how the template could be used
- A feature that allows you to create a show from scratch
Down
- Where you will find commands to perform common tasks in PowerPoint
- The visual appearance or images of something when looked at in a certain way
- an item of illustrative matter
- A graphic tool that allows you to create a visual representation of information and ideas
- A graphical computer display that can be superimposed on another
- The figure that appears when you are adding text to a slide
10 Clues: an item of illustrative matter • The slide currrently selected or displayed • A feature that allows you to create a show from scratch • The figure that appears when you are adding text to a slide • A graphical computer display that can be superimposed on another • Where you will find commands to perform common tasks in PowerPoint • ...
Cyber bulliyng 2025-03-11
Across
- a secret word that you only know
- a global computer network providing a variety of information
- The repetitive, intentional hurting of one person
- not invitng some to there goup
Down
- a person who speaks or acts in support
- a computer program with a graphical user.
- posting unsults
- bullying someone online
- available on or performed using the internet or other computer network
- the willful and repeated following, watching or harassing
10 Clues: posting unsults • bullying someone online • not invitng some to there goup • a secret word that you only know • a person who speaks or acts in support • a computer program with a graphical user. • The repetitive, intentional hurting of one person • the willful and repeated following, watching or harassing • a global computer network providing a variety of information • ...
cyber bullying 2025-03-11
10 Clues: getting harast • following someone • to be safe on line • a program on a computer • to get a fight on purpose • getting bullied on online • posting about someone else • a safe way of investigating • loacating resourse on online • how syberbulling tricks people
travis cyber 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
CYBER BULLYING 2024-10-22
Across
- group of platforms where people post their pictures
- a form of aggressive behavior which causes injury or discomfort to others
- demand something (undesirable) from someone
- avoid talking to ____ online
Down
- a search site
- this can be used to track what people post online(2 words)
- a connection on facebook
- restrict contact with someone on an online app
- a popular mobile device
- a secret text that only authorized users have access to
10 Clues: a search site • a popular mobile device • a connection on facebook • avoid talking to ____ online • demand something (undesirable) from someone • restrict contact with someone on an online app • group of platforms where people post their pictures • a secret text that only authorized users have access to • this can be used to track what people post online(2 words) • ...
Cyber monday 2024-11-28
10 Clues: HOLDS YOUR CASH • A WAITING GROUP • A DEAL OR DISCOUNT • THE COST OF AN ITEM • NEEDED TO SHOP ONLINE • A PROMOTIONAL MESSAGE • AVAILABILITY OF ITEMS • PLAN FOR SPENDING MONEY • TO GIVE MONEY FOR SOMETHING • TO VERIFY ITEMS IN YOUR CART
Cyber monday 2024-11-28
10 Clues: WORTH OF AN ITEM • BUYING MANY ITEMS • TO LOOK THROUGH ITEMS • TO KEEP MONEY UNSPENT • WHAT YOU WANT TO ACHIEVE • MAXIMUM PURCHASE QUANTITY • HOLDS YOUR SELECTED ITEMS • REMOVING ITEMS FROM STOCK • ACTION FOR SELECTING ONLINE • WHAT YOU MAKE TO ORGANIZE SHOPPING
Cyber Attackers 2025-03-24
Across
- Emails pretending to be from trusted sources to steal information.
- An attack where criminals demand money to restore access to data.
- Type of hacker paid to test security systems ethically.
- Attack that floods a system with traffic to bring it down.
Down
- A trick where a criminal looks over your shoulder to steal information.
- The unauthorised use of someone’s private information to pretend to be them.
- Software that replicates itself and can damage files or systems.
- Law passed in 1990 to deal with hacking offences.
- Security method requiring both a password and a text code.
- Personal facts and figures collected online.
10 Clues: Personal facts and figures collected online. • Law passed in 1990 to deal with hacking offences. • Type of hacker paid to test security systems ethically. • Security method requiring both a password and a text code. • Attack that floods a system with traffic to bring it down. • Software that replicates itself and can damage files or systems. • ...
CYBER CROSSWORD 2021-09-05
Across
- The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- An individual who subscribes to a kind of ideology about new technologies, such as the Internet.
- A switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices.
- Any piece of technology that connects people and machines with each other or with information.
- The conversion of text, pictures, or sound into a digital form that can be processed by a computer.
- The unauthorized use, copying or distribution of copyrighted software
Down
- The notional environment in which communication over computer networks occurs.
- The unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
- is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within a given industry.
- This provides legal recognition for transactions that are carried out by means of electronic data interchange.
10 Clues: The unauthorized use, copying or distribution of copyrighted software • The notional environment in which communication over computer networks occurs. • Any piece of technology that connects people and machines with each other or with information. • An individual who subscribes to a kind of ideology about new technologies, such as the Internet. • ...
Cyber Law 2021-09-04
Across
- It refers to the technologies, process and practices designed to protect networks, devices, app and data from any kind of cyber attack.
- regulatory arbitrage in Cyberspace (that is applying to the Internet) is a focal point for two opposing schools of thought, the Cyberlibertarians and
- 'citizen of the internet' can be called__
- which communication is a permanent telephone connection between two points set up by a telecommunication common carrier
- It refers to the adoption or increase in use of computer technology by an organization,Industry etc.
Down
- It can be thought of as a global electronic village with instantaneous communication and no geographical barriers
- The essence of this approach is that cyberspace is a distinct new space and that it can (or should) not be regulated by the state.
- you have your computer, you really don't need much additional hardware to connect to the internet. The primary piece of hardware you need is a
- it allows perfect freedom of expression, which in the physical world has been tempered by even the most liberal of regime
- It is a conversion of data,document and processes from analog to digital
10 Clues: 'citizen of the internet' can be called__ • It is a conversion of data,document and processes from analog to digital • It refers to the adoption or increase in use of computer technology by an organization,Industry etc. • It can be thought of as a global electronic village with instantaneous communication and no geographical barriers • ...
cyber ethicsc 2025-06-14
Across
- illegally accessing someone's computer
- moral rules to follow online and offline
- a secret code you should never share
- you need permission before using this kind of content
- antivirus software helps with this
- everyone has a right to this online and offline
Down
- stealing work and calling it your own
- fake emails asking for your passwords or bank info
- tell a trusted adult or click this option on social media
- always show this to people online too
10 Clues: antivirus software helps with this • a secret code you should never share • stealing work and calling it your own • always show this to people online too • illegally accessing someone's computer • moral rules to follow online and offline • everyone has a right to this online and offline • fake emails asking for your passwords or bank info • ...
Cyber Puzzle 2022-09-20
Across
- Special virus that moves from computer to computer without human interaction.
- An important process that verifies a user is really who they are; many different ways this can be done.
- unique address that identifies a device on the internet or a local network.
Down
- The form of encryption that requires a single key
- A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
- means that data is protected from unauthorized changes to ensure that it is reliable and correct.
- The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
- a person who uses computers to gain unauthorized access to data.
- the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
- An ________ is a program or code that makes use of the vulnerability in an application or system.
10 Clues: The form of encryption that requires a single key • a person who uses computers to gain unauthorized access to data. • unique address that identifies a device on the internet or a local network. • Special virus that moves from computer to computer without human interaction. • ...
Cyber Crossword! 2025-05-23
Across
- A popular operating system
- The company that makes windows
- The main menu with lots of options
- The common color of the screen of death
- What happens if you press ctrl-alt-del
Down
- A portable computer that folds
- The little arrow that the mouse controls
- A purple guy that "helps"
- Zeus is an example
- A fun game full of mines
10 Clues: Zeus is an example • A fun game full of mines • A purple guy that "helps" • A popular operating system • A portable computer that folds • The company that makes windows • The main menu with lots of options • What happens if you press ctrl-alt-del • The common color of the screen of death • The little arrow that the mouse controls
CYBER BULLYING 2025-12-12
Across
- Online messages meant to hurt or threaten someone
- Sending repeated threatening message
- A group targeting one individual online
- Sharing someone’s personal info without permission
Down
- Repeated aggressive behaviour using digital devices
- Pretending to be someone else online to cause harm
- Online platforms used for bullying (general term)
- Anonymous hateful comments on social media
- When someone is left out intentionally in online groups
- A harmful, untrue statement spread online
10 Clues: A group targeting one individual online • A harmful, untrue statement spread online • Sending repeated threatening message • Anonymous hateful comments on social media • Online messages meant to hurt or threaten someone • Online platforms used for bullying (general term) • Pretending to be someone else online to cause harm • ...
Frontier Familiarity 2012-04-04
Across
- Frontier online television service
- deferred payment arrangment
- Intranet site for call center consultants
- Internet Only
- Fiber Optic Service
- 768K Internet
- $2.99 Feature Pack
- Simply
- Federal Discount Program
- Security with Parental Controls and Firewall
- assuming the sale
- seasonal service called stay...
Down
- monthly charge
- DSL Line Conditioner
- Basic Phone Package
- Free service for customers moving out of area
- EA, LF, US, CA, AZ, PA, etc.
- DISH order entry tool
- credit agency used by Frontier
- DP Silver, Bronze, Freedom, Choices
- switching number to different provider
- Security with AntiVirus and AntiSpam
22 Clues: Simply • Internet Only • 768K Internet • monthly charge • assuming the sale • $2.99 Feature Pack • Basic Phone Package • Fiber Optic Service • DSL Line Conditioner • DISH order entry tool • Federal Discount Program • deferred payment arrangment • EA, LF, US, CA, AZ, PA, etc. • credit agency used by Frontier • seasonal service called stay... • Frontier online television service • ...
Networking concepts and cyber ethics 2025-05-18
Across
- : Used to access accounts securely.
- : Maximum data transfer rate.
- : Security system that controls traffic.
- : Online bullying.
- : Rules for communication between devices.
- : Secure remote access method.
- : Fake emails to steal data.
Down
- : Secretly collects data.
- : Wireless network technology.
- : A device that forwards data packets between networks.
- : Wired networking method.
- : Unwanted email.
- : Harmful software.
- : Protects creative work.
- : Scrambling data for security.
- : Local Area Network.
- : Right to keep data secure.
- Address : Unique identifier for a device on a network.
- : Unauthorized system access.
- : A computer that provides services or data.
20 Clues: : Unwanted email. • : Online bullying. • : Harmful software. • : Local Area Network. • : Secretly collects data. • : Protects creative work. • : Wired networking method. • : Right to keep data secure. • : Fake emails to steal data. • : Maximum data transfer rate. • : Unauthorized system access. • : Wireless network technology. • : Secure remote access method. • ...
fshapdsafybasd112fdjf 2023-03-03
Across
- A nonprofit org known for publishing a "top 10" of critical risks
- A 3-word term for applying multiple layers of security
- A flaw that weakens the overall security of a program or system
- ______ mantis
- Codename for a recent RT operation
Down
- Randomly terminates production apps to ensure they're resilient
- New feature that emulates sitting in an open office
- FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
- Research project for enumerating our environment
- This involves sending invalid, unexpected, or random input to a program
- Team that emulates real-world attacks
11 Clues: ______ mantis • Codename for a recent RT operation • Team that emulates real-world attacks • Research project for enumerating our environment • New feature that emulates sitting in an open office • A 3-word term for applying multiple layers of security • Randomly terminates production apps to ensure they're resilient • ...
Mobile Security Crossword 2025-09-11
Across
- Network Network type often targeted in mobile security risks (2 words)
- Malicious software targeting mobile devices
- Authentication Security measure involving password plus an extra step (2 words)
- Patches Software updates to fix vulnerabilities (2 words)
- Encryption The process of converting data to prevent unauthorized access
Down
- Security Protection of the mobile device itself
- Method to confirm identity beyond password (abbreviation)
- Kind of phishing specific to SMS messages (1 word)
- Permissions Safety measure for apps to limit access (2 words)
- Store Where trusted mobile apps should be downloaded from (2 words)
- Detection Detecting unauthorized software or behavior on mobile
- Management system for securing mobile devices (3 letters)
12 Clues: Malicious software targeting mobile devices • Security Protection of the mobile device itself • Kind of phishing specific to SMS messages (1 word) • Method to confirm identity beyond password (abbreviation) • Patches Software updates to fix vulnerabilities (2 words) • Management system for securing mobile devices (3 letters) • ...
Investing Crossword Puzzle 2025-03-25
Across
- Investing all the money you have available at a given time, and putting it into the market
- Considered one of the world’s most successful investors
- Guaranteed payment by employer after retirement
- Created by President Roosevelt in 1935
- Spreading investments across different assets instead of all into one asset
- An investor's ability and willingness to endure fluctuations in the value of their investments
- The process of offering shares of a private corporation to the public in a new stock issuance
- A market in which prices are falling and a pessimistic outlook overall
- This measures the price performance of a basket of securities
- Created and backed by the government but not tied to any physical commodity
- A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
Down
- A person who buys and sells stocks with the intention of gaining a profit
- The age where you can receive full social security
- Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
- Social Security and Medicare Taxes
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
- The ease with which an asset or security can be converted into cash without affecting its market price
- A unit of ownership in a company, dividing its ownership into equal parts
- Government Medical Health Plan
- A financial marketplace where investors can buy and sell shares of publicly traded companies
- Contribute money post tax. Money grows tax free
- Putting funds into a new investment account after leaving a company
- A type of security representing ownership of a company
- A sum of money saved or made available for a particular purpose
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
25 Clues: Government Medical Health Plan • Social Security and Medicare Taxes • Created by President Roosevelt in 1935 • Guaranteed payment by employer after retirement • Contribute money post tax. Money grows tax free • The age where you can receive full social security • A type of security representing ownership of a company • ...
Investing - Kaleb Wayman 2025-03-25
Across
- A person who buys and sells stocks with the intention of gaining a profit
- Social Security and Medicare Taxes
- A market in which prices are falling and a pessimistic outlook overall
- A sum of money saved or made available for a particular purpose
- Contribute money post tax. Money grows tax free
- Created by President Roosevelt in 1935
- Created and backed by the government but not tied to any physical commodity
- A financial marketplace where investors can buy and sell shares of publicly traded companies
- A portion of a company's earnings distributed to shareholders as a return on their investment usually in cash
- This measures the price performance of a basket of securities
- Putting funds into a new investment account after leaving a company
- The age where you can receive full social security
- The ease with which an asset or security can be converted into cash without affecting its market price
Down
- A type of security representing ownership of a company
- Spreading investments across different assets instead of all into one asset
- An investor's ability and willingness to endure fluctuations in the value of their investments
- Investing all the money you have available at a given time, and putting it into the market
- Considered one of the world’s most successful investors
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities
- Someone who allocates capital into various financial assets with the expectations to generate long term returns and building wealth over time
- The process of offering shares of a private corporation to the public in a new stock issuance
- Government Medical Health Plan
- A unit of ownership in a company, dividing its ownership into equal parts
- A unique series of letters or a combination of letters and numbers that represents a particular publicly traded company's stock or security
- Guaranteed payment by employer after retirement
25 Clues: Government Medical Health Plan • Social Security and Medicare Taxes • Created by President Roosevelt in 1935 • Contribute money post tax. Money grows tax free • Guaranteed payment by employer after retirement • The age where you can receive full social security • A type of security representing ownership of a company • ...
BCS reveiw noah seabolt 2015-11-11
Across
- a group of computers
- something you can access the web on
- a message sender thing that send messages to people
- micro soft excel
- asdfjkl;'
- something that you move and click stuff with
- ware stuff that makes up a computer
- computer screen
Down
- bully bully on the internet
- being safe on thee interwebs
- web page maker
- a plan u pick that limits sertan thing
- publisher grating cards
- a small slip of buttons at the top of a Microsoft thing
- proper technique
15 Clues: asdfjkl;' • web page maker • computer screen • micro soft excel • proper technique • a group of computers • publisher grating cards • bully bully on the internet • being safe on thee interwebs • something you can access the web on • ware stuff that makes up a computer • a plan u pick that limits sertan thing • something that you move and click stuff with • ...
PERSONNEL SECURITY PROGRAM 2021-08-16
Across
- WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY?
- SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR?
- of ncis DURING ACTS OF TERRORISM, IF YOU CAN NOT GET IN CONTACT WITH JAX NCIS WHO CAN YOU CONTACT?
- AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER?
- WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY?
- WHO IS USUALLY DESIGNATED AS IAM?
Down
- TRUE OR FALSE? YOU HAVE TO BE DESIGNATED IN WRITING TO BE A COMMAND SECURITY MANAGER.
- TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM.
- scope background investigation WHAT DOES SSBI STAND FOR?
- AS COMMAND SECURITY MANAGER YOU MUST BE A MILITARY OFFICER, CIVILIAN EMPLOYEE OR GS-11 ABOVE.
- officer WHO IS OVERALL IN CHARGE OF THE COMMAND SECURITY PROGRAM?
11 Clues: WHO IS USUALLY DESIGNATED AS IAM? • SECRET CONTROL OFFICER WHAT DOES TSCO STAND FOR? • WHO IS OVERALL RESPONSIBLE FOR NATIONAL SECURITY? • AND ABOVE WHO CAN BE THE ASSISTANT SECURITY MANAGER? • WHAT IS THE GOVERNING INSTRUCTION FOR PERSONNEL SECURITY? • TRUE OR FALSE THE CSM DOES NOT HAVE TO COORDINATE WITH THE IAM. • ...
Cyber Safety-Archie Webb 2016-05-24
Across
- an Apple tablet
- a group of computers that are connected
- to protect your computer from viruses
- how you securely connect to a network or program
- this person about cyber safety
- a search engine
- way to check if your computer has a virus
- program instruction
- a large device
Down
- a program you can install on your device
- how to connect
- what a hacker tries to steal
- blocksvirus
- a small device
- you a virus
- a machine that allows you to use the Internet
- unhealthy for device
- someonewho breaks into your computer
18 Clues: blocksvirus • you a virus • how to connect • a small device • a large device • an Apple tablet • a search engine • program instruction • unhealthy for device • what a hacker tries to steal • this person about cyber safety • someonewho breaks into your computer • to protect your computer from viruses • a group of computers that are connected • a program you can install on your device • ...
2016 Responsible Care Certification Audit 2016-08-29
Across
- independent, unbiased inspector to assure a structure and system in place to measure, manage and verify performance in the Responsible Care Program.
- text, sometimes referred to SHE&S, Safety or Responsible Care, which outlines company's committment to SHE&S; found on corporate website
- The Responsible Care ____________ is the program by which Odyssey manages its business and operations with regard to Safety, Health, Environment & Security (SHE&S) issues.
- pre-designated gathering point for all personnel during evacuations
- established by senior management as guidance to ensure Odyssey maintains a leading SHE&S position throughout the company
- the chemical industry's voluntary SHE&S initiative
- Risk of coming into contact with chemicals during
- a danger or risk
- Employees should maintain an awareness of the policy, risks/hazards, and their work environment
- ___________ should maintain an awareness of the policy, risks/hazards, and their work environment
Down
- Responsible Care Awareness, HM & Security, HAZCOM, Forklift, First Aid/CPR
- Safety, Health, Environment & Security
- We all have responsibility for Safety, Health, Environment & Security (SHE&S) in our __________
- an industry trade association for American chemical companies
- Establishes goals and provides resources
- A key part of the Responsible Care Management System process is mandatory __________ by an independent, accredited auditor
- Provides ________ as evidence as management support
- prioritized based on frequency and severity
- SHE&S Special Thanks And Recognition Awards Program
19 Clues: a danger or risk • Safety, Health, Environment & Security • Establishes goals and provides resources • prioritized based on frequency and severity • Risk of coming into contact with chemicals during • the chemical industry's voluntary SHE&S initiative • Provides ________ as evidence as management support • SHE&S Special Thanks And Recognition Awards Program • ...
Security and Legislation 2022-02-25
Across
- being honest and upright
- proving something to be genuine or valid
- the quality of being able to be used, reached or entered easily
- the standing of a person or organisation in the eyes of the public
- people who work for a company
- software that needs to be put on a newer version
- software that is no longer being maintained or updated
- programs on a computer
- for letter word for information that does not have a meaning to it
Down
- keeping something private
- being ready to use at any time
- having to pay for doing something wrong
- the physical components of a computer
- it belongs to an individual
- acting in accordance to something, obeying, following the rules
- a string of text that needs to be entered in order to access a system
- a dispute that has been brought to court
- permanent software programmed into a read-only memory
18 Clues: programs on a computer • being honest and upright • keeping something private • it belongs to an individual • people who work for a company • being ready to use at any time • the physical components of a computer • having to pay for doing something wrong • proving something to be genuine or valid • a dispute that has been brought to court • ...
Custody and Security 2024-08-28
Across
- _______ and procedure
- equipment used to communicate
- handcuffs, leg irons, belly chains
- opens doors, may have silver rivet
- fence surrounding the facility
- gang members or gang activity
- type of search looking for obvious contraband
- formal, informal, emergency, keep track of prisoners
Down
- card the item carried by prisoners to identify them
- you'd radio call to them during emergencies
- slang for contraband item usually made to inflict harm
- the people incarcerated
- paperwork that allows items to come through the gate
- the official name for a "ticket"
- custody staff
- prohibited items of property held by prisoners
- prisoners are moving units and must ____ their stuff
- the person who oversees the running of the facility
18 Clues: custody staff • _______ and procedure • the people incarcerated • equipment used to communicate • gang members or gang activity • fence surrounding the facility • the official name for a "ticket" • handcuffs, leg irons, belly chains • opens doors, may have silver rivet • you'd radio call to them during emergencies • type of search looking for obvious contraband • ...
6B Crossword 2022-10-25
Across
- The deep-voice actor
- Tennis master
- The tallest, yet the youngest
- Marvel fan
- He deserves to be friends with everybody
- Always happy
- Black and white on a green field player
- Cooking Queen
- The only one that can buy highlighters for 500 rupees
- The class lawyer
- On the path to success
- The funny one-perhaps the funniest of all
Down
- She speaks with love
- His last name rhymes with his first.
- His name ends with a hero's name
- Cyber Master, Fitness Superstar
- A new member of 6B
- Artist
- She can paint pennywise on a white cloth
- Our habibi
20 Clues: Artist • Marvel fan • Our habibi • Always happy • Tennis master • Cooking Queen • The class lawyer • A new member of 6B • She speaks with love • The deep-voice actor • On the path to success • The tallest, yet the youngest • Cyber Master, Fitness Superstar • His name ends with a hero's name • His last name rhymes with his first. • Black and white on a green field player • ...
parish test 2023-12-08
Across
- website where visitors can make changes and edits to
- bullying Bullying in the digital form
- Object showing human workmanship
- related to hearing
- domain Creative work that anyone is free to use
- To annoy persistently
- To increase
- Unknown authorship
- someone who is present but does not take part in
- First full scale design
- Behavior of motivation
- research gathering info for customer
Down
- Being physically or emotionally wounded
- Your online image
- Being apart from company
- what an individual want to achieve in the future
- introduction to something new
- Someone who stands up for someone
- Deceptive act
- Legal right to reproduce others work
20 Clues: To increase • Deceptive act • Your online image • related to hearing • Unknown authorship • To annoy persistently • Behavior of motivation • First full scale design • Being apart from company • introduction to something new • Object showing human workmanship • Someone who stands up for someone • Legal right to reproduce others work • research gathering info for customer • ...
Space Camp 2024-05-30
Across
- simulators flown in Mach 3
- what will call coordinators and management
- last name of CEO
- kay taylor's job title
- General Admission plus a planetarium show for groups
- the first director of Space Camp
- the simulation floor
- the name of the shuttle outside
- general email inbox
Down
- First week of camp 2024
- customer insight analyst
- $105 item in the giftshop
- the sequel to robotics
- the name of our Apollo capsule
- filling in for Jennifer Bradford
- an invitaition only program
- Space Program for 12-14 year olds
- 1986 film
- camp director
- scholarship program for alabama residents
20 Clues: 1986 film • camp director • last name of CEO • general email inbox • the simulation floor • kay taylor's job title • the sequel to robotics • First week of camp 2024 • customer insight analyst • $105 item in the giftshop • simulators flown in Mach 3 • an invitaition only program • the name of our Apollo capsule • the name of the shuttle outside • filling in for Jennifer Bradford • ...
Match the Cards to the Duel Links Duelist Part 1 2023-04-06
Across
- Cyber Commander
- Infernity Doom Dragon
- Elemental HERO Flame Wingman & Elemental HERO Neos
- Number 39: Utopia, Number C39: Utopia Ray, & Ultimate Leo Utopia Ray
- Ancient Gear Golem
- Cyber Blader
- Hamon, Lord of Striking Thunder, Raviel, Lord of Phantasms, Uria, Lord of Searing Flames, & Yubel
- Dark Magician, Dark Magician Girl, Gandora the Dragon of Destruction, & Silent Magician LV8
- Armed Dragon LV7 & Ojama King
- Duza the Meteoric Cubic Vessel
- Number 6: Chronomaly Atlandis
- Blast Held by a Tribute
- Blue-Eyes Ultimate Dragon & Blue-Eyes White Dragon
- Meklord Emperor Wisel
- Dark Necrofear
- Orgoth the Relentless
- Ancient Fairy Dragon
- Chevalier de Fleur
- Fairy Cheer Girl
- Indiora Doom Volt the Cubic Emperor
- Tin Archduke
- Sephylon, the Ultimate Timelord
- Water Dragon
- Malefic Truth Dragon
- Humpty Grumpty
- Barrel Dragon
- Volcanic Doomfire
- Red-Eyes Black Dragon
- The Legendary Fisherman
- Life Stream Dragon & Power Tool Dragon
- T.G. Halberd Cannon
- Black-Winged Dragon
- Blue-Eyes White Dragon
- Embodiment of Apophis
- Goyo Guardian
- Number 106: Giant Hand
- Jinzo, Red-Eyes Black Dragon, & The Legendary Fisherman
- Earthbound Immortal Ccapac Apu
- Elemental HERO Divine Neos, Elemental HERO Flame Wingman, Elemental HERO Neos, & Yubel
- Arcana Force EX - The Light Ruler
- Fortune Fairy Chee
Down
- Red Dragon Archfiend
- Lava Golem & The Winged Dragon of Ra
- Earthbound Immortal Aslla Piscu
- Blue-Eyes Alternative White Dragon, Blue-Eyes Ultimate Dragon, Blue-Eyes White Dragon, Obelisk the Tormentor, & Vampire Lord
- Number 107: Galaxy-Eyes Tachyon Dragon
- Evil HERO Malicious Fiend
- Gate Guardian
- Black Rose Dragon
- Fossil Warrior Skull King
- Number 15: Gimmick Puppet Giant Grinder
- Jinzo
- Black Luster Soldier, Dark Magician, Dark Magician Girl, Obelisk the Tormentor, Slifer the Sky Dragon, & The Winged Dragon of Ra
- Rainbow Dragon
- Curse Necrofear
- Harpie Lady Sisters
- Number 32: Shark Drake
- Maiden in Love
- Dark Magician Girl
- Number 105: Battlin' Boxer Star Cestus
- Earthbound Immortal Wiraqocha Rasca
- Meklord Astro Mekanikle
- Cyber End Dragon
- Superdreadnought Rail Cannon Gustav Max
- Relinquished
- Destiny HERO - Plasma
- Masked Beast Des Gardius
- Insect Queen
- Number 9: Dyson Sphere
- Ultimate Tyranno
- Junk Warrior, Shooting Star Dragon, & Stardust Dragon
- Super Vehicroid Jumbo Drill
- Number 102: Star Seraph Sentry
- Ice Beast Zerofyne
- Pumpking the King of Ghosts
- Dark Magician
- Galaxy-Eyes Photon Dragon
77 Clues: Jinzo • Cyber Blader • Tin Archduke • Water Dragon • Relinquished • Insect Queen • Gate Guardian • Barrel Dragon • Dark Magician • Goyo Guardian • Rainbow Dragon • Dark Necrofear • Maiden in Love • Humpty Grumpty • Cyber Commander • Curse Necrofear • Fairy Cheer Girl • Cyber End Dragon • Ultimate Tyranno • Black Rose Dragon • Volcanic Doomfire • Ancient Gear Golem • Dark Magician Girl • Chevalier de Fleur • ...
Ασφάλεια στο διαδύκτιο 2024-02-15
10 Clues: Κακόβουλο Λογισμικό • news Ψευδής Ειδήσεις • Διαδικτυακός Εκφοβισμός • Scams Ηλεκτρονικές Απάτες • Reputation Διαδικτυακή Φήμη • Passwords Κωδικοί Πρόσβασης • Piracy Πειρατεία Λογισμικού • gaming Παιχνίδια στο Διαδίκτυο • Addiction Εθισμόσ στο διαδιίκτυο • positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
T-VISTARA 2022-11-11
10 Clues: Our former CEO • Tool to say thanks • The force in sales • Type of cyber attack • Telstra's idea store • Program for Women in SE • FY Starts from this month • Mobile infra arm of Telstra • Kaught in Berlin (I am a language) • All APIs in one place, sit back and relax.
Energy Crossword Puzzle 2025-04-18
10 Clues: Found in mines • Runs though houses • Cyber trucks cousin • Something you drive in • something fans work with • Powers everything on here • Fuel Used to power cars • Using cars to to make them move • So you can play games on your phone • Power Something that is Powered by the sun
security awareness CW3 2023-03-29
Across
- X is a large network of servers that can improve the security, performance, and reliability of anything connected to the Internet. X does this by serving as a reverse proxy Open external link for your web traffic. At Meesho, X WAF provides both automatic protection from vulnerabilities and the flexibility to create custom rules.
- A X test is an authorized simulated attack performed on a Meesho applications to evaluate its security. X testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system. The Product Security team performs quarterly X testing across the family of apps to identify and mitigate security issues in production.
- Meesho's ________ team ensures that our platform offers a safe environment for people to shop online and build businesses. Hence, Meesho _____ team collaborates with various teams such as Information Security, Product Security, and Red Team to design secure products and services, perform security assessments, evaluate threats, and develop engineered mitigations.
- Secure ________, also referred to as secure programming, involves writing code in a high-level language that follows strict principles with the goal of preventing potential vulnerabilities. Secure _______ practices entail writing code in a way that will prevent potential security vulnerabilities. This includes maintaining both your source code and any third-party libraries in a secure state.
- The team publishes a lot of information on Confluence or JIRA pages, so we need to ensure that there is no X information being published intentionally or unintentionally. This X information can be transferred away with employees when they leave the organization, which can be a risk in itself. The name starts with the letter 'S' and ends 'E'.
Down
- The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams.
- At Meesho, X helps users of your GitHub Enterprise Server instance find and fix vulnerabilities in their dependencies. You can enable X alerts to notify users about vulnerable dependencies and X updates to fix the vulnerabilities and keep dependencies updated to the latest version.
- X attacks, in that it uses a single Internet-connected device (one network connection) to flood a target with malicious traffic. You can tag @security-oncall on slack in such situations.
- The X tool is required to ensure that the company's cloud computing environments, AWS and GCP, are protected with utmost assurance. This tool scans for data breaches and misconfigurations to secure a company's data
- To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack.
10 Clues: The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams. • To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack. • ...
Cybersecurity 2025-01-09
Across
- malware that collect data
- an extra copy of data from a computer
- protects data by scrambling it
- an attack that wants ransom
- a value with a unique length to identify data
- being bullied using the internet
- malware that reproduces itself
Down
- "UI redress attack"
- short for malicious malware
- applications that direct computers
- cyber attack that is disguised
- filters network traffic
- using your own device
- someone who breaks into a computer's system
- network of computers for attack
- where users store data
- protects your location
- connected items that represent one
18 Clues: "UI redress attack" • using your own device • where users store data • protects your location • filters network traffic • malware that collect data • short for malicious malware • an attack that wants ransom • cyber attack that is disguised • protects data by scrambling it • malware that reproduces itself • network of computers for attack • being bullied using the internet • ...
fshapdsafybasd112fdjf 2023-03-03
Across
- A nonprofit org known for publishing a "top 10" of critical risks
- A 3-word term for applying multiple layers of security
- A flaw that weakens the overall security of a program or system
- ______ mantis
- Codename for a recent RT operation
Down
- Randomly terminates production apps to ensure they're resilient
- New feature that emulates sitting in an open office
- FY24 Security Goal: ______ security efforts according to risk and adopt risk-driven decision making
- Research project for enumerating our environment
- This involves sending invalid, unexpected, or random input to a program
- Team that emulates real-world attacks
11 Clues: ______ mantis • Codename for a recent RT operation • Team that emulates real-world attacks • Research project for enumerating our environment • New feature that emulates sitting in an open office • A 3-word term for applying multiple layers of security • Randomly terminates production apps to ensure they're resilient • ...
Digital Literacy: Safety and Ethics 2017-01-04
Across
- This happens when a person is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another using the Internet, interactive and digital technologies or mobile phones.
- These "account protectors" should be kept secure to ensure others with malicious intent cannot access account information.
- Heavy objects should be lifted with these muscles.
- This is an online type of computer virus that monitors and records the victim's keystrokes in order to steal personal information.
- This is one of the most common causes of accidents in an office environment.
Down
- Heavy objects should never be lifted with these muscles.
- Cyber bullies can face criminal prosecution for this.
- Bad computer code that does nasty or undesirable things to the host computer or code is called a computer...
- Be sure electrical wiring is properly _______ to avoid electric shock.
- Your name, address, phone number, birth date, and other identification and location information should be kept _______ online as a protection from cyber criminals.
10 Clues: Heavy objects should be lifted with these muscles. • Cyber bullies can face criminal prosecution for this. • Heavy objects should never be lifted with these muscles. • Be sure electrical wiring is properly _______ to avoid electric shock. • This is one of the most common causes of accidents in an office environment. • ...
OPS Zone Newsletter Review 7/7/21 2021-07-09
13 Clues: Website • Security Ink • Signed Check • No Watermark • Small Printing • Watermark Reads • Bleeding Ink Color • Type of Check Feature • Paper from the US Treasury • Stop Getting Advance Payments • Individuals Receiving Payments • Tool to Assist in Fraud Detection • Procedure Related to These Checks
