cyber security Crossword Puzzles
Word of the Day Review 2020-10-21
10 Clues: fake or man-made • very hot or baking • delicate and pretty • in space or in the sky • to plod or walk slowly • simulated or cyber-real • to chew for a long time • approaching threateningly • lively, vivid or energetic • luxurious or self-indulgent
Computer e-safety 2025-03-11
Across
- A secret code to protect accounts.
- Getting files from the internet (can be risky).
- Someone who tries to break into computers.
- A trick to steal money or information.
- The name you use to log into accounts.
- Bullying that happens online.
Down
- A harmful program that can damage a device.
- A security system that blocks threats.
- Keeping software current to fix security issues.
- Keeping personal information safe.
- To prevent someone from contacting you online.
- A scam to steal personal information.
- Telling an adult or authority about online dangers.
- Multi-Factor Authentication for extra security.
- Safe and protected from threats.
15 Clues: Bullying that happens online. • Safe and protected from threats. • Keeping personal information safe. • A secret code to protect accounts. • A scam to steal personal information. • A security system that blocks threats. • A trick to steal money or information. • The name you use to log into accounts. • Someone who tries to break into computers. • ...
Stock Mint 2025-01-06
Across
- Buying and selling within a day
- Measure of stock volatility
- Automated trading using computer programs
- Company's first public stock sale
- Stock trading intermediary
- Individual investor
- Indian securities regulatory body
- Loss Order to limit losses
- Risk-reducing strategy
- Spread investments to reduce risk
Down
- Large organization investing
- Person buying and selling securities
- Contract to buy a security
- US stock market index
- Firm providing liquidity
- Collection of investments
- Professionally managed investment fund
- Making multiple small trades
- Measure of security price fluctuations
- US securities regulatory body
20 Clues: Individual investor • US stock market index • Risk-reducing strategy • Firm providing liquidity • Collection of investments • Contract to buy a security • Stock trading intermediary • Loss Order to limit losses • Measure of stock volatility • Large organization investing • Making multiple small trades • US securities regulatory body • Buying and selling within a day • ...
bullying and online 2023-04-27
8 Clues: not nice • mental state • doing to much • getting walked over • when your really sad • nice oppisite of nice • bully not nice online • sticking up for yourself
The Cipher Grid 2025-09-18
Across
- Modern name for the foreign arm of the KGB
- Cyber tactic for stealing login credentials
- Spy who defects to another country
- Spy's false background story
- Method used to pass information
- Escape route
- Listening device
Down
- Technique for intercepting communications
- Official notice when an asset is unreliable
- Spy without diplomatic cover
- Double agent who betrayed the Soviets
- CIA's predecessor
- Cipher machine used in WWII
13 Clues: Escape route • Listening device • CIA's predecessor • Cipher machine used in WWII • Spy without diplomatic cover • Spy's false background story • Method used to pass information • Spy who defects to another country • Double agent who betrayed the Soviets • Technique for intercepting communications • Modern name for the foreign arm of the KGB • ...
Crossword 2021-05-12
Across
- I am a type of computer program that, when executed, replicates myself by modifying other computer programs and inserting its own code. I also have the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data and a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
- 9. I am a class of malware whose intention is to wipe the hard drive of the computer which infects and also involves wiping/overwriting/removing data from the victim. I can be used to cover the tracks of a separate data theft and are destructive in nature.
- I am a malware who misleads users of my true intent and can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing me on their systems. Once activated, I can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system
- I am a malicious software that infects your computer and also threatens to publish the victim's data or perpetually block access to it unless a ransom is paid and can be installed through deceptive links in an email message, instant message or website. I also have the ability to lock a computer screen or encrypt important, predetermined files with a password
- I am a malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software and also tricks computer users into visiting malware-infected websites.Once activated, I exposes data, deletes files, steals funds, or takes some other form of harmful action
Down
- I am a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent ; also gather information about a person or organization and send such information to another entity in a way that harms the user. I belong to the category of software which aims to steal personal or organisational information.
- I am a form of malicious software and internet fraud which misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer and also will threaten the user with ransomware if they do not pay up
- I am a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.I establishes a barrier between a trusted network and an untrusted network, such as the Internet.I am also a software program that prevents unauthorized access to or from a private network and can be used to enhance the security of computers connected to a network.
- I am a software that displays unwanted advertisements on your computer and also will tend to serve you pop-up ads, can change your browser’s homepage, add spyware and just bombard your device with advertisements. I can also generate revenue for the developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
- I am a type of malware that spreads copies of myself from computer to computer and can replicate myself without any human interaction, and does not need to attach myself to a software program in order to cause damage.I use a computer network to spread myself, relying on security failures on the target computer to access it. I does not usually infect computer files, but rather infects another computer on the network and also passes this ability on to replica, which allows it to infect other systems in the same way.
10 Clues: 9. I am a class of malware whose intention is to wipe the hard drive of the computer which infects and also involves wiping/overwriting/removing data from the victim. I can be used to cover the tracks of a separate data theft and are destructive in nature. • ...
CISO Crossword Puzzle: 1324 2024-12-18
Across
- A cyber crime in which image or recording that has been convincingly altered and manipulated by using technology to misrepresent someone as doing or saying something that was not actually done or said
- A Cyber crime committed through internet to conduct violent acts that result in, or threaten, the loss of life in order to achieve political or ideological gains
- A form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
- A type of Fraud where fraudsters impersonate law enforcement officials (police, CBI etc) and extort money from victim
- A cyber crime in which someone harasses/stalks a victim using electronic or digital means, such as social media, email etc.
Down
- The process of befriending a child online by someone (often an adult)and builds an emotional connection with an intention of sexual abuse, sexual exploitation or trafficking
- Encrypted parts of the internet that are not indexed by search engines, most notoriously used by criminals
- The act of gaining unauthorized access to data in a computer or network by exploiting weaknesses in the system or network
- When someone pretends to be someone else in an attempt to gain confidence, access to systems, steal data or money
- The practice of extorting money or sexual favours from someone by threatening to reveal their personal videos and photos
10 Clues: Encrypted parts of the internet that are not indexed by search engines, most notoriously used by criminals • When someone pretends to be someone else in an attempt to gain confidence, access to systems, steal data or money • A type of Fraud where fraudsters impersonate law enforcement officials (police, CBI etc) and extort money from victim • ...
Puzzle #24 – “Social Security Myths” 2025-06-29
Across
- - Myth: Social Security funds are stored in this type of account
- - Myth: These individuals won’t receive benefits later
- - Myth: You must always claim your benefits this way
- - Many fear that Social Security will do this with money
Down
- - Myth: Only this kind of immigrant can’t qualify (answer is “illegal”)
- - A common misunderstanding or false belief
- - Some think this person can’t get benefits, but they can
- - Myth: You don’t pay these on Social Security income
- - False belief that Social Security is going completely ______
- - Myth: You can't do this while collecting Social Security
10 Clues: - A common misunderstanding or false belief • - Myth: You must always claim your benefits this way • - Myth: You don’t pay these on Social Security income • - Myth: These individuals won’t receive benefits later • - Many fear that Social Security will do this with money • - Some think this person can’t get benefits, but they can • ...
Security and Net 2024-07-24
Across
- fundamental building block for the storage, retrieval, and analysis of a company’s data
- type of malware that self-replicates and spreads through computers and networks
- used to prevent attenuation when packets are traveling long distances
- logical layout of the cables and devices that connect the nodes of the network
- weakness that has not been protected against threats
- is anything that can cause harm
- most widely-used standard for local area networks
Down
- malicious computer programs that are created to harm computer systems
- is a node on a network that serves as an entrance to another network
- allows users to communicate and share information between computers
- contains only the company’s private information
- wireless access point
- wide area network (acronym)
- may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams
- can be used to share some of a company’s intranet resources with people outside the organization
- similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
- device that connects two LANs or two segments of the same LAN
- type of malware that is attached to a host file and has the ability to replicate, or copy, itself
- local area network (acronym)
- provides multiple ports for connecting nodes
20 Clues: wireless access point • wide area network (acronym) • local area network (acronym) • is anything that can cause harm • provides multiple ports for connecting nodes • contains only the company’s private information • most widely-used standard for local area networks • weakness that has not been protected against threats • ...
1.4 Network Security 2025-04-09
Across
- Malware that encrypts files and demands payment for decryption.
- A self-replicating malware that spreads itself across networks, without user action.
- Observing someone's action, such as watching them enter their password.
- A type of malware that secretly monitors a user.
- Software or hardware that filters and blocks unauthorised access to a network.
- Unauthorised access of data as it is being transmitted over a network.
- A form of social engineering that involves maintaining a conversation.
- Should be at least 8 characters long with upper and lowercase letters.
- A form of testing designed to find any weaknesses in a system.
- A technique that exploits vulnerabilities in databases by injecting malicious code.
Down
- Attempting to guess passwords by trying every possible combination.
- Manipulating people into sharing sensitive/confidential information.
- Overloading a network or website with traffic to make it unavailable.
- Permissions assigned to a user defining what resources they can access.
- The process of scrambling data so it can only be read by authorised users.
- A malicious program that disguises itself as legitimate software.
- A term for malicious software.
- A malicious program that replicates itself and attaches itself to files.
- A form of social engineering that involves tricking people into sharing information through fake emails or websites.
19 Clues: A term for malicious software. • A type of malware that secretly monitors a user. • A form of testing designed to find any weaknesses in a system. • Malware that encrypts files and demands payment for decryption. • A malicious program that disguises itself as legitimate software. • Attempting to guess passwords by trying every possible combination. • ...
ANTI-BULLYING :) 2021-11-22
Across
- Someone who bullies someone is called a ________.
- When the bully plays as the victim making the victim look like the bad guy it means they are a _______ person.
- When rumors are spread or embarrassing photos of you it is called _____-bullying
- A person who watches someone get bullied and doesn't do anything is called a _________.
Down
- When being punched kicked other every day it is called ______ -bullying.
- When you are being called mean names daily it is called _______-bullying.
- There are 4 types of it such as verbal social physical and cyber _________.
- When a bully has a target its usually called a ______.
- Bullies could also bully someone because they think that it is _____ possibly because their friends do it to.
- When a bully bullies someone is probably because they are ______ of something they have that they don't.
- When being bullied online it is called ______-bullying.
- When being bullied it is a common feeling to feel ______ and that fear can make you want to skip school.
12 Clues: Someone who bullies someone is called a ________. • When a bully has a target its usually called a ______. • When being bullied online it is called ______-bullying. • When being punched kicked other every day it is called ______ -bullying. • When you are being called mean names daily it is called _______-bullying. • ...
B&W Security 2012-10-19
11 Clues: booshaw! • go obama! • go hokies! • go yankees! • a master huntsman • our little hairy boy • b&w security environmentalist • loves a good beer from time to time • last security officer on site, usually • the man you go to with all your questions • the best security supervisor in b&w history
Govt jobs vs private jobs 2024-09-20
Across
- employee benefit
- govt job category
- govt job application process
- career growth opportunity
- private company's priority
- job search platform
- job satisfaction factor
Down
- professional network
- work life balance aspect
- govt job advantage
- sector offering rapid career growth
- skill required for private sector success
- govt job requirement
- benefit often associated with govt jobs
- job security feature
- resume building tool
- type of job known for stability
- private sector job risk
- career advancement path
- industry with private and govt sector presence
20 Clues: employee benefit • govt job category • govt job advantage • job search platform • professional network • govt job requirement • job security feature • resume building tool • private sector job risk • career advancement path • job satisfaction factor • work life balance aspect • career growth opportunity • private company's priority • govt job application process • ...
How well do you know ISO Standards? - Dr. Sriram Rajagopalan 2024-05-08
Across
- Social Responsibility
- IT Services
- Privacy Extension
- Risk Management for Medical Devices
- Information Security
- Medical Devices
- Electronic Port Clearance
- Sustainable Events
- Risk Management
- Aircraft Equipment
- Agriculture Tractors and Machinery
- Business Continuity
- Energy Management Services
- Occupational Health & Safety: Psychosocial Risks
Down
- Food Safety & Farming
- Quality Management
- Anti-bribery Management Services
- Mobile Financial Services
- Traceability in the Feed and Food Chains
- Environment
- Testing and Calibration Laboratories
- Certificate Management
- Banking Security
- Occupational Health & Safety: Physical Risks
- Food & Safety Management
25 Clues: IT Services • Environment • Medical Devices • Risk Management • Banking Security • Privacy Extension • Quality Management • Sustainable Events • Aircraft Equipment • Business Continuity • Information Security • Social Responsibility • Food Safety & Farming • Certificate Management • Food & Safety Management • Mobile Financial Services • Electronic Port Clearance • Energy Management Services • ...
34 2024-08-08
Across
- Tech database request
- Tech wireless internet
- Tech access site
- Tech access point
- Tech automated program
- Tech information
- Tech core system
- Tech server
- Tech video call
- Tech local network
- Tech network cable
- Tech web address
- Tech online world
Down
- Tech computer system
- Tech harmful program
- Tech internet address
- Tech video blog
- Tech security measure
- Tech programming language
- Tech security code
- Tech online storage
- Tech internet device
- Tech markup language
- Tech connected devices
- Tech network device
25 Clues: Tech server • Tech video blog • Tech video call • Tech access site • Tech information • Tech core system • Tech web address • Tech access point • Tech online world • Tech security code • Tech local network • Tech network cable • Tech online storage • Tech network device • Tech computer system • Tech harmful program • Tech internet device • Tech markup language • Tech database request • ...
ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ 2024-03-05
Across
- Εκφοβισμός με λόγια
- Το βαπτιστικό όνομα της καθαρίστριας
- Το χωριό του Δημητράκη
- Έτσι ονομάζονταν το χωριό μας παλιά
- Ηγέτης της Νότιας Αφρικής
- Μπορεί να συμβεί και κατά την ώρα του....
- Το επίθετο της κ Χρύσας
- Έβγαινε τα βραδια με πανσέληνο
- Στα ελληνικά το τέννις
Down
- Στα ελληνικά το cyber bullying
- Ασκεί τον εκφοβισμό
- Όνομα του τραγουδιού που ακούσαμε
- Ενισχύουν τη συμπεριφορά του θύτη μερικές φορές
- Δέχεται τον εκφοβισμό
- Το επίθετο της κ Μαρίνας
15 Clues: Ασκεί τον εκφοβισμό • Εκφοβισμός με λόγια • Δέχεται τον εκφοβισμό • Το χωριό του Δημητράκη • Στα ελληνικά το τέννις • Το επίθετο της κ Χρύσας • Το επίθετο της κ Μαρίνας • Ηγέτης της Νότιας Αφρικής • Στα ελληνικά το cyber bullying • Έβγαινε τα βραδια με πανσέληνο • Όνομα του τραγουδιού που ακούσαμε • Έτσι ονομάζονταν το χωριό μας παλιά • Το βαπτιστικό όνομα της καθαρίστριας • ...
TTS TOLERANSI DAN EMPATI RIKO 2025-03-13
10 Clues: APA CONTOH EMPATI • JENIS JENIS BULLYING • APA CONTOH TOLERANSI • APA DAMPAK CYBER BULLYING • APA CONTOH EMPATI DI SEKOLAH • CONTOH PERUNDUNGAN DI SEKOLAHAN • APA CONTOH TOLERANSI DI SEKOLAHAN • APA CONTOH BULLYING DI MEDIA SOSIAL • CONTOH EMPATI DI LINGKUNGAN KELUARGA • CONTOH TOLERANSI DI LINGKUNGAN KELUARGA
Cyberbullying 2024-11-01
9 Clues: Online Bullying • How cyberbullying • Type of cyberbullying. • Type of cyber bullying (h) • Where Cyberbullying occurs. • Platforms for cyberbullying. • What a cyberbully thrives behind • How cyberbullying can make someoen feel. • What you should do when cyberbullying occurs
Bullying 2018-11-22
Across
- bully arguments on internet
- having and expressing strong feelings
- different skin colour
- people in college
Down
- around you
- causing feeling of sadness
- someone who is treated badly
- the way in which one acts or conducts oneself towards others
- not good at anything
- someone who picks on or teases others
- different orientation
11 Clues: around you • people in college • not good at anything • different skin colour • different orientation • causing feeling of sadness • bully arguments on internet • someone who is treated badly • having and expressing strong feelings • someone who picks on or teases others • the way in which one acts or conducts oneself towards others
Networking 2024-09-25
11 Clues: secure browsing • this is not a LAN • Malicious software • layout or structure • this is our community • you do not cook in this • Barrier against cyber threats • better known as the handshake • Unauthorized digital infiltration • can could not catch a fish with this • Unique identifier for a device on a network
Ky and Mattie 2014-10-10
Across
- a file used to organize files into groups
- Mail- Commonly known as email. System designed to send messages and attachments electronically.
- A word or phrase pursued be a hash or a pound sign (#) and used to identify messages on a specific topic
- To make changes to a document or presentation
- Drive- A device for storing info in a fixed location within your computer. Like filling a cabinet in your computer
- To send the margins, fonts, tabs, line spacing, layout of document
- Name- The part in the left is the most specific , and the part on the right is most in general, these are in numbers
- File- A set of rules that allow computers to “talk” to one another while transferring files from one to one. This is a protocol computer across the Internet
Down
- A place in a database record where a category of info can be located
- Boot- Start up computer from a powered down state, when there is no electrical current
- Hardware or software that separates a local area to a network into 2 or more parts for security purposes
- Interchange Format- an method for storing graphics. Takes up a small amount of disks space and can be transmitted quickly
- The process of transferring software/info from the Internet to your computer
- Publishing- using features of word processor/DTP software to format and produce documents, letters, reports, flyers and newsletter with graphics
- Bully- The electronic way to make fun or humiliate somebody, or mean comments about somebody
- Involving questions of right and wrong behavior, following accepted rules of behavior: morally right good. What is moral when using technology.
- This is a coding language used to create sites on the WWW.
- Name System- This is a service that stores, translates and retrieves the numeral address equivalent of familiar names that you use everyday
- Base- A type of computer application (program) used storing, organizing and retrieving information
19 Clues: a file used to organize files into groups • To make changes to a document or presentation • This is a coding language used to create sites on the WWW. • To send the margins, fonts, tabs, line spacing, layout of document • A place in a database record where a category of info can be located • ...
Ready Player One 2023-04-24
Across
- The main character
- Class he was taking when he made a connection to the keys
- Organization's name that wants to control the OASIS
- Which parent died first
- Wades best friend
- Wade's aunt's name
- What year is it
Down
- Wade's mom's name
- Wade's cyber-crush
- OASIS creator
- Wades OASIS character
- The key that Wade has found so far
- The place Wade lives
- Nickname for people searching for the keys
- James Halliday's avatar
15 Clues: OASIS creator • What year is it • Wade's mom's name • Wades best friend • Wade's cyber-crush • The main character • Wade's aunt's name • The place Wade lives • Wades OASIS character • Which parent died first • James Halliday's avatar • The key that Wade has found so far • Nickname for people searching for the keys • Organization's name that wants to control the OASIS • ...
Zajedno za Bolji Internet 2023-03-01
Across
- nose se na dan protiv nasilja
- prividna stvarnost nastala pomoću računala
- nasilničko ponašanje
- mogućnost slanja pošte preko interneta
- tragovi koji nikog ne ugrožavaju
- tragovi koje bez namjere plasiramo na internet
- cyberbullying
- pošta koju šaljemo internetom i ostavljamo digitalne tragove
- skup znakova koji imaju neko značenje
Down
- tragovi koji vrijeđaju ili ugrožavaju nekog
- otisci koje ostavljamo na internetu
- neželjena pošta
- tragovi koje namjerno ostavljamo na internetu
- digitalna mapa
- male datoteke
15 Clues: cyberbullying • male datoteke • digitalna mapa • neželjena pošta • nasilničko ponašanje • nose se na dan protiv nasilja • tragovi koji nikog ne ugrožavaju • otisci koje ostavljamo na internetu • skup znakova koji imaju neko značenje • mogućnost slanja pošte preko interneta • prividna stvarnost nastala pomoću računala • tragovi koji vrijeđaju ili ugrožavaju nekog • ...
Cyber safety 2015-02-22
Across
- when you keep something secret and you don't tell anyone else
- when you are being safe on the Internet
- when people go on other peoples profiles and pretend to be them
Down
- someone sends or posts people rude things to make them upset
- helps someone to protect there profile so no one can hack into it
- when you communicate over computer network, especially the Internet
- when you get an email on your computer and it gives it a virus
7 Clues: when you are being safe on the Internet • someone sends or posts people rude things to make them upset • when you keep something secret and you don't tell anyone else • when you get an email on your computer and it gives it a virus • when people go on other peoples profiles and pretend to be them • helps someone to protect there profile so no one can hack into it • ...
Cyber Safety 2022-09-07
Across
- Remember to ________ ________ of your accounts.
- ________________ suspicious attachments or links.
- A cyber attack that uses emails or malicious websites to steal a person’s login and password details.
Down
- Our full name, birthday, home address, email address phone number and passwords are examples of _______________________ information.
- Spam, phishing and scams are examples of cyber __________________.
- Set a ________________ password to keep your online accounts secure.
- Unwanted emails, or “junk emails” that are usually sent out in bulk for the purpose of making the victim spend money
7 Clues: Remember to ________ ________ of your accounts. • ________________ suspicious attachments or links. • Spam, phishing and scams are examples of cyber __________________. • Set a ________________ password to keep your online accounts secure. • A cyber attack that uses emails or malicious websites to steal a person’s login and password details. • ...
Physical security 2021-05-04
Across
- somethings without understand
- wall for protection
- uses biological characteristics for authentication and identification.
- theft of data
- many row and column
Down
- use finger to access
- list for user authorization
- house, department
- is one of control prodedures
- code to identify
- privacy network
- distance work
- is one of control prodedures
13 Clues: theft of data • distance work • privacy network • code to identify • house, department • wall for protection • many row and column • use finger to access • list for user authorization • is one of control prodedures • is one of control prodedures • somethings without understand • uses biological characteristics for authentication and identification.
General security 2022-10-07
Across
- abbreviation relating to company policy where employees bring their own devices to work
- if you see something, say something! Report it to ____
- Knows all about & is used in place of search frequently
- released everymonth to fix vulnerabilities
- Data that gives information about the data
- allows 2 operating system to run at the same time
- should be unique and separate to each accounts to help thwarft cybercriminals
Down
- This software can slow down your computer & watch everywhere you go on the internet
- This horse can stampede your security defenses for the bad guys and make you look sheepish too!
- your company can ____ your internet activity
- software designed to protect your system from malwares
- any unsolicited email, text message or phone call
12 Clues: released everymonth to fix vulnerabilities • Data that gives information about the data • your company can ____ your internet activity • any unsolicited email, text message or phone call • allows 2 operating system to run at the same time • if you see something, say something! Report it to ____ • software designed to protect your system from malwares • ...
Airport security 2022-10-20
Across
- lodging a place to sleep
- being in another country
- a person who takes luggage to your room
- person who operates a vehicle
- a mark a document with an official sign
- cab
- timetable
Down
- baggage
- a document to that allowed you to travel though a country
- the best option or the highest quality
- not allowed
- to work at something carefully
12 Clues: cab • baggage • timetable • not allowed • lodging a place to sleep • being in another country • person who operates a vehicle • to work at something carefully • the best option or the highest quality • a person who takes luggage to your room • a mark a document with an official sign • a document to that allowed you to travel though a country
IT-Security 2016-01-29
Across
- Datensicherung auf externen Speicher
- Gezieltes Ansprechen von Minderjährigen mit sexuellem hintergrund
- Internetvirus
- Befehlssequenzen
- Websiten merken sich die gesuchten Artikel mit...
- Begriff für ilegales eindringen von fremden Personen in den Computer
- Scheinbar nützliches Programm mit gefährlichem Hintergrund
Down
- Wie können Daten nachvollzogen werden (Hint: mit -)
- Eindringen in fremde Computer ohne kriminelle Absichten
- Was schützt unseren Computer vor dem Zugriff von anderen durch das Internet
- Ordner in den Mails welche gewisse E-Mails mit negativen Werbeinhalt enthalten
- Umleitung auf gefälschte Seiten
12 Clues: Internetvirus • Befehlssequenzen • Umleitung auf gefälschte Seiten • Datensicherung auf externen Speicher • Websiten merken sich die gesuchten Artikel mit... • Wie können Daten nachvollzogen werden (Hint: mit -) • Eindringen in fremde Computer ohne kriminelle Absichten • Scheinbar nützliches Programm mit gefährlichem Hintergrund • ...
IT-Security 2016-01-29
Across
- Begriff für ilegales eindringen von fremden Personen in den Computer
- Scheinbar nützliches Programm mit gefährlichem Hintergrund
- Eindringen in fremde Computer ohne kriminelle Absichten
- Umleitung auf gefälschte Seiten
- Wie können Daten nachvollzogen werden (Hint: mit -)
- Befehlssequenzen
- Ordner in den Mails welche gewisse E-Mails mit negativen Werbeinhalt enthalten
Down
- Was schützt unseren Computer vor dem Zugriff von anderen durch das Internet
- Internetvirus
- Datensicherung auf externen Speicher
- Gezieltes Ansprechen von Minderjährigen mit sexuellem hintergrund
- Websiten merken sich die gesuchten Artikel mit...
12 Clues: Internetvirus • Befehlssequenzen • Umleitung auf gefälschte Seiten • Datensicherung auf externen Speicher • Websiten merken sich die gesuchten Artikel mit... • Wie können Daten nachvollzogen werden (Hint: mit -) • Eindringen in fremde Computer ohne kriminelle Absichten • Scheinbar nützliches Programm mit gefährlichem Hintergrund • ...
Food Security 2024-01-19
Across
- We throw between 20-50% of our food in this
- Corn can be turned into this
- The state of being extremely poor
- The pharaoh dream was interpreted by this person
- The projected world population by 2050 is _ _ _ _ point one billion people
- This country was saved from famine due to a prophecy
Down
- We will need to increase our production by this much to feed the population in 2050
- We consumed more food than we produced in 6 of the last 11 years
- We need to support _ _ _ _ _ food systems.
- Plant breeding can ensure crops can survive this natural phenomena that is a result of limited water
- Technology and _ _ _ _ _ _ _ has the potential to increase food production by 50%
- Large food price increases can cause people to _ _ _ _
12 Clues: Corn can be turned into this • The state of being extremely poor • We need to support _ _ _ _ _ food systems. • We throw between 20-50% of our food in this • The pharaoh dream was interpreted by this person • This country was saved from famine due to a prophecy • Large food price increases can cause people to _ _ _ _ • ...
Food security 2024-12-17
Across
- Good for eyes and associated with bugs bunny
- Popeye favorite snack
- those both are two _ in a pod
- Used as pink food color
- Farming on aquatic species called
- Humpty dumpty is an
- Are considered backbone of nation
Down
- An_ a day keeps a doctor away
- Color and a fruit
- A staple grain used to make bread and pasta
- I'm rich in omega fatty acids
- The process of protecting food from spoilage and contamination in cold environment
12 Clues: Color and a fruit • Humpty dumpty is an • Popeye favorite snack • Used as pink food color • An_ a day keeps a doctor away • I'm rich in omega fatty acids • those both are two _ in a pod • Farming on aquatic species called • Are considered backbone of nation • A staple grain used to make bread and pasta • Good for eyes and associated with bugs bunny • ...
Food Security 2024-12-17
Across
- The dirt where plants grow
- Keeping food safe until it's time to eat
- Fruits and vegetables that grow at certain times of the year
- A small area where you can grow your own vegetables
- To keep food fresh for a long time, like canning or freezing
- The feeling when you need to eat
Down
- What you plant to grow new food
- To give food to people who need it
- What plants and people need to drink to live
- Food grown near where you live
- Where farmers sell their fresh food
- Throwing away good food that could be eaten
12 Clues: The dirt where plants grow • Food grown near where you live • What you plant to grow new food • The feeling when you need to eat • To give food to people who need it • Where farmers sell their fresh food • Keeping food safe until it's time to eat • Throwing away good food that could be eaten • What plants and people need to drink to live • ...
Resource Reliance 2023-12-07
Across
- growing food without soil
- China helped Tanzania build this to improve transport
- a crop which is turned into bread, pasta etc.
- the person who thought eventually there will be too many people for food supply
- the removal of trees
- the region where goat aid was given in Tanzania
- a human factor which can affect food security
- changing the DNA characteristics of something like food
- food grown without artificial chemicals
- what animals were given in Babati
- the type of farming that makes a profit
- something that will run out
- a manmade lake which stores water
Down
- how did the goats help grow more crops
- the present day attempt to achieve food security in Tanzania
- a period of less than average rainfall
- a human factor which can affect food security
- a product which gives farmers a fair price
- a human factor which can damage land causing food security issues
- growing food in towns and cities
- insects that can damage crops
- non renewable energy sources
- a way of getting coal
- the tribe who were most affected by the wheat project
- a measure of how much energy from food people get
- the country who gave aid to Tanzania in the past to help food security
- if a country has enough, affordable, nutritious food
- the person who thought technology will always help us supply enough food
28 Clues: the removal of trees • a way of getting coal • growing food without soil • something that will run out • non renewable energy sources • insects that can damage crops • growing food in towns and cities • what animals were given in Babati • a manmade lake which stores water • how did the goats help grow more crops • a period of less than average rainfall • ...
Coding 2022-06-10
9 Clues: Online • popular hobby • process to code • What everyone needs • numbers used to code • A device used for coding • Students use this everyday • what you use to access google. • What we do in our everyday life
PSSD 2019-12-09
14 Clues: Firm Tie • Colonisation • Able to Function • Aptly named bird • Course of Action • First Installment • Bring into Harmony • Discharge of a Debt • Planned Undertaking • Wal-Mart Competitor • Security for a Loan • Unintentional omission • Liquid Gas Filled Sphere • State of being free from danger
toms crossword 2015-02-15
14 Clues: toms car • toms wife • toms pastime • toms new boss • toms old boss • guard toms job • one who arrests • where Tom works • where Tom lives • name of shop camera • toms preferred title • toms word for shoplifters • security measures for store • installed in shop to watch people
Bullying 2018-11-22
Across
- around you
- causing feeling of sadness
- different orientation
- someone who picks on or teases others
Down
- the way in which one acts or conducts oneself towards others
- different skin colour
- someone who is treated badly
- bully arguments on internet
- people in college
- having and expressing strong feelings
- not good at anything
11 Clues: around you • people in college • not good at anything • different skin colour • different orientation • causing feeling of sadness • bully arguments on internet • someone who is treated badly • having and expressing strong feelings • someone who picks on or teases others • the way in which one acts or conducts oneself towards others
Test 2021-11-12
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company
- any malicious computer program which is used to hack into a computer by misleading users of its true intent
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- a local or restricted communications network, especially a private network created using World Wide Web software
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- are small files that Web sites put on your computer hard disk drive when you first visit
- algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- a standalone malware computer program that replicates itself in order to spread to other computers
10 Clues: are small files that Web sites put on your computer hard disk drive when you first visit • a standalone malware computer program that replicates itself in order to spread to other computers • any malicious computer program which is used to hack into a computer by misleading users of its true intent • ...
cyber security awareness month-test your knowledge 2022-10-31
Across
- WHEN IN DOUBT, THROW IT OUT – ......ME
- unique passphrase: Create your own .......and don’t share with anyone.
- “Let’s bring people to the ........and NOT the data to people”
- Suspicious? REPORT &..........!
Down
- MAKE A LONG, UNIQUE PASSPHRASE - ........ME
- We are....on the security and privacy team
- Stay ahead of the criminals by KEEPING A CLEAN MACHINE - ....... ME
- have a healthy suspicion towards a link or an..........
- take sensitive conversations somewhere........
9 Clues: Suspicious? REPORT &..........! • WHEN IN DOUBT, THROW IT OUT – ......ME • We are....on the security and privacy team • MAKE A LONG, UNIQUE PASSPHRASE - ........ME • take sensitive conversations somewhere........ • have a healthy suspicion towards a link or an.......... • “Let’s bring people to the ........and NOT the data to people” • ...
Chronicles 2021-02-23
14 Clues: Change • Relocate • Security • Personal • Vcenter7.0 • need a break • Tracking Tool • Golden Record • Tick Tock Tick • Check your phone • Storage Array Balancing • MFA (Multifactor Authentication) • Computer security system against online attack • Someone who was kicked out from all the major browsers on 31st Dec 2020
1/10 2025-01-10
10 Clues: Today • AVHS mascot • Preventing crime • Teacher's last name • Helping fix a flat tire • illegal activities online • Police use judgement to make decisions • Guiding principles all officers must follow • Domestic Assault requires these arrest laws • Police go into the community to make their presence known
Government 2026-03-14
Across
- Federal Music Project
- Department of Homeland Security
- Agricultural Adjustment Administration
- Rural Electrification Administration
- Federal Bureau of Investigation
- Tennessee Valley Authority
- Central Intelligence Agency
- Indian Reorganization Act
Down
- Fair Labor Standards Act
- Puerto Rico Reconstruction Administration
- Department of Energy
- Bureau of Alcohol, Tobacco
- Bonneville Power Administration
- Transportation Security Administration
- Civil Aeronautics Authority
15 Clues: Department of Energy • Federal Music Project • Fair Labor Standards Act • Indian Reorganization Act • Bureau of Alcohol, Tobacco • Tennessee Valley Authority • Central Intelligence Agency • Civil Aeronautics Authority • Department of Homeland Security • Federal Bureau of Investigation • Bonneville Power Administration • Rural Electrification Administration • ...
Data Protection 2022-02-08
Across
- Future parties of a potential licensing deal involving the PRC data should be aware of the expansion of the( )of export control.
- A stricter( )is expected in managing and processing “national core data”.
- If a personal data processor gets sued for allegedly( )of an individual’ rights and interests in personal information and fails to prove that it was not at fault, it shall be liable for damages.
- Under the Data Security Law and the Personal Data Protection Law, Chinese regulators can exert( )over overseas activities if certain criteria are met.
- “National( )data,” means data that concerns national security, people’s livelihood in general or important public interest, or is crucial to national economy.
- In addressing cross-border( )of personal information, the Personal Information Protection Law requires processors to perform an impact assessment.
- Processors are only permitted to process sensitive personal information if it is for a specific and( )purpose and demonstrates necessity.
- The Personal Information Protection Law( )the personal data protection rules previously scattered across different laws and regulations.
- Under the Data Security Law, data relating to protection of national security and interest or( )of international obligations that is categorized as controlled items may be subject to export control.
Down
- In addressing cross-border transfer of important data, the Data Security Law distinguishes operators of( )information infrastructure and other data processors.
- The ( )or illegal use of “sensitive personal information” would easily cause harm to the dignity of individuals or serious damages to the safety of individuals or properties.
- In addition to data and privacy laws, there are other layers of Chinese( )that may impact data processing activities.
- Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines.
- The Personal Information Protection Law also sets out a series of penalties for( ).
- If other data processors need to transfer important data outside the PRC, they must follow the security rules to be established by regulators( )to the Data Security Law.
- “Anonymization” means an( )process in which personal information is processed in a manner that has made it impossible to associate such information with any specific individual.
16 Clues: A stricter( )is expected in managing and processing “national core data”. • The Personal Information Protection Law also sets out a series of penalties for( ). • Depending on the seriousness of the relevant violations, regulators may( )illegal gains and impose fines. • ...
Risk 2020-05-12
Across
- is the risk that failed business decisions, or lack thereof, may pose to a company.
- applies when you own foreign investments
- The risk of a loss in your purchasing power because the value of your investments does not keep up with
- risk as a subset of operational risk in 2003. This conception is based on a business perspective, recognizing that there are threats entailed in the business operating environment.
- is the risk of losses in positions arising from movements in market prices.
- cyber risk is any risk related to information technology.
- is a financial risk that for a certain period of time a given financial asset, security or commodity cannot be traded quickly enough in the market without impacting the market price.
- is the potential loss to financial capital, social capital and/or market share resulting from damage to a firm's reputation.
Down
- is any of various types of risk associated with financing
- is "the risk of a change in value caused by the fact that actual losses, incurred for inadequate or failed internal processes, people and systems, or from external events, differ from the expected losses
- the term covering an organization's approach across Compliance these three practices: Governance, risk management, and compliance.
- is the risk of loss resulting from using insufficiently accurate models to make decisions.
- applies to an investment in shares.
- is the risk of default on a debt that may arise from a borrower failing to make required payments.
- applies to debt investments such as bonds
- may be shortened because of an unforeseen event, for example, the loss of your job.
16 Clues: applies to an investment in shares. • applies when you own foreign investments • applies to debt investments such as bonds • is any of various types of risk associated with financing • cyber risk is any risk related to information technology. • is the risk of losses in positions arising from movements in market prices. • ...
CyberSecurity Terminologies Check! 2024-12-03
Across
- A weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.
- A decoy system or network that serves to attract potential attackers.
- A system that collects, analyzes, and correlates security event data from across an organization’s IT infrastructure to detect, monitor, and respond to potential security incidents in real-time.
- Facility where enterprise information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts.
- Locks the computer or data and demands a payment to release the machine.
- identification method that enables users to log in to multiple applications and websites with one set of credentials
Down
- The act of secretly listening to private communications, typically to gather sensitive or personal information without the knowledge or consent of the participants
- A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules.
- A network of infected devices controlled remotely by a hacker, often used for carrying out distributed denial-of-service (DDoS) attacks.
- A process that ensures and confirms a user’s identity.
- A security measure that allows only approved, trusted entities or actions to be executed, blocking everything else.
- A type of surveillance software that records keystrokes made by a user
- Software designed to detect, prevent, and remove malicious software, such as viruses, worms, and trojans, from computers.
- Spread to other machines on a network.Red : A color
- A security mechanism that isolates programs or files to prevent them from affecting the rest of the system, often used for testing potentially harmful software.
15 Clues: Spread to other machines on a network.Red : A color • A process that ensures and confirms a user’s identity. • A decoy system or network that serves to attract potential attackers. • A type of surveillance software that records keystrokes made by a user • Locks the computer or data and demands a payment to release the machine. • ...
CompGov Choiceboard 1 2025-06-04
Across
- Received as an heir
- Possessing something
- Compelling observance
- Useful item
- Morally Justified
- People of noble blood
- Motivation
- No one is above the law
- Thing that is borrowed
Down
- Putting money for profit
- Grant a payment contract
- Being free from danger
- Pledged as security for repayment
- Belonging to someone
- Economic System
- Economic System
16 Clues: Motivation • Useful item • Economic System • Economic System • Morally Justified • Received as an heir • Possessing something • Belonging to someone • Compelling observance • People of noble blood • Being free from danger • Thing that is borrowed • No one is above the law • Putting money for profit • Grant a payment contract • Pledged as security for repayment
spanish 2023-01-09
9 Clues: share • colony • thankful • —cornucopia • Cyber Monday • gracias thanks • football (not soccer) • gobble gobble (turkey sound) • parade la-familia familia la-festividad-de-la-cosecha harvest festival
CEH Chapter 17 Crossword Puzzle 2026-03-13
Across
- One time password authentication code
- Enterprise mobile device management system
- Remote monitoring spyware for iOS
- Secure Android storage for cryptographic keys
- Mobile application runtime protection platform
- Runtime instrumentation and hooking framework
- Taking control of device via Bluetooth
- Isolating apps to restrict system access
- Android application package file format
- Mobile application source code scanner
- Hijacking camera using remote malware
- Low orbit ion cannon DoS tool
- Mobile anti spyware protection software
- Removing Apple iOS security restrictions
- Android post exploitation control framework
- SIM toolkit vulnerability SMS attack
- SMS phishing attack using text messages
- Gaining privileged Android system access
- Android debugging bridge command tool
- Google Android device tracking service
- iOS post exploitation framework tool
- iOS runtime manipulation framework
Down
- Mobile antivirus and privacy protection
- Mobile runtime security testing framework
- Mobile security framework analysis tool
- Android network traffic capture tool
- Extracts stored secrets from iOS
- Employees use personal devices for work
- iOS malware targeting biometric data
- Android remote administration trojan tool
- Exploiting trusted computer pairing connection
- Android app reverse engineering tool
- Eavesdropping using smartphone motion sensors
- Mobile malware protection security tool
- Stealing data over Bluetooth connection
- Mobile application penetration testing toolkit
- Apple device location tracking service
- Secure iOS storage for passwords
- Tor based proxy privacy application
- Android application attack surface testing tool
40 Clues: Low orbit ion cannon DoS tool • Extracts stored secrets from iOS • Secure iOS storage for passwords • Remote monitoring spyware for iOS • iOS runtime manipulation framework • Tor based proxy privacy application • Android network traffic capture tool • iOS malware targeting biometric data • Android app reverse engineering tool • SIM toolkit vulnerability SMS attack • ...
Ekonomi di era digital 2023-11-06
Safety and Security 2021-11-15
Across
- What is placed on the new sharps to help prevent injuries?
- Who is the most commonly injured healthcare worker?
- In what unit of the hospital do most accidental sticks happen?
- What is the lowest cost a facility can plan to pay for a sharps injury?
- In what method are needle free systems handled?
- Be ______________.
- What is one way to prevent sharp injuries?
- What is the most important step when using sharps?
- what law was formed in 2000 to help with the sharps injury prevention in healthcare?
- During what part of the use of needles are the least amount of injuries occurring?
Down
- What is the number of sharps injuries annually in hospital based healthcare workers?
- what is the best way to ensure other staff members in the room don't get a sharp injury when you have a sharp?
- Which virus has the most risk of seroconversion due to sharp injury?
- Dispose with _______.
- What color are sharps containers?
- Most safety features on sharps require training because they are _______ not passive.
- Be __________________.
- Are the majority of sharps injuries avoidable?
- Have a ______ day.
19 Clues: Be ______________. • Have a ______ day. • Dispose with _______. • Be __________________. • What color are sharps containers? • What is one way to prevent sharp injuries? • Are the majority of sharps injuries avoidable? • In what method are needle free systems handled? • What is the most important step when using sharps? • Who is the most commonly injured healthcare worker? • ...
Cyber saftey Blake Biddell 2016-05-26
Across
- fun to play with
- to make a computer screen smaller
- downloadable fun
- random information sometimes not wanted
- site to gain information on the web
- people online who aren't nice
- person who helps at school
- appropriate level of content
- someone who looks after you
- makes your computer sick
Down
- to not be online
- one of Apples products
- scams games that aren't safe
- used to get online
- someone who helps at home
- cable needed to power a device
- provides power
- uses Electricity
- protect your online identity
19 Clues: provides power • to not be online • fun to play with • downloadable fun • uses Electricity • used to get online • one of Apples products • makes your computer sick • someone who helps at home • person who helps at school • someone who looks after you • scams games that aren't safe • appropriate level of content • protect your online identity • people online who aren't nice • ...
Escape the Cold Date Night 2023-02-02
Across
- The burninator
- Blows your heater fuse
- Has best friends and best Spani
- Mt. P eatery, with Max
- Scarce in Michigan Winters
- Good Mt. P sushi, near shops
- Mt. P Japanese near H. Depot
- Twilight character, or cat
- Ball, Bowl, or Monster
- World's worst songwriter
- Metal type, or fancy Mt. P cafe
Down
- This towards men, or a store
- Soaring Eagle mascot
- Kassia's favorite donut
- Mt. P cookie store, near goodwill
- Abundant in Michigan Winters
- Fancy Mt. P sushi, downtown
- Kid or Cyber, in Mt. P
- No, I don't want tooo!
19 Clues: The burninator • Soaring Eagle mascot • Blows your heater fuse • Mt. P eatery, with Max • Kid or Cyber, in Mt. P • No, I don't want tooo! • Ball, Bowl, or Monster • Kassia's favorite donut • World's worst songwriter • Scarce in Michigan Winters • Twilight character, or cat • Fancy Mt. P sushi, downtown • This towards men, or a store • Abundant in Michigan Winters • ...
Westhill Crossword 2024-03-10
Across
- are wearing this in protest
- favorite gym rat
- apply to college when you are a ______
- Study Resource
- in math class
- to the SAT
- write what you are reading
- of a class curriculum
- and purple
Down
- 300s and 400s are in the _____ building
- college for Westhill graduates
- Alswanger and Mr. Cooney
- Cyber Rams
- you get into college you develop _____
- in 1916
- for the head janitor at Westhill
- section of the school building
- past participle
- Playmakers
19 Clues: in 1916 • Cyber Rams • Playmakers • to the SAT • and purple • in math class • Study Resource • past participle • favorite gym rat • of a class curriculum • Alswanger and Mr. Cooney • write what you are reading • are wearing this in protest • college for Westhill graduates • section of the school building • for the head janitor at Westhill • you get into college you develop _____ • ...
test 2019-09-21
Across
- you need one of these to work in the security industry
- guard,if you are posted outside a store
- officer, Section 12 of security and related activities(control) act 1996
- filled out at site
- patrol, If you use a car for your duties
Down
- arrest, section 25 of criminal code
- you must wear this
- need to complete this is you have an incident
- controller, Section 35 of security and related activities(control) act 1996
- use of section 26
- spray, You cannot use this in Western Australia
11 Clues: use of section 26 • you must wear this • filled out at site • arrest, section 25 of criminal code • guard,if you are posted outside a store • patrol, If you use a car for your duties • need to complete this is you have an incident • spray, You cannot use this in Western Australia • you need one of these to work in the security industry • ...
Technology Crossword 2018-10-23
Across
- Member of different groups
- the trail you leave behind as you use the internet, such as your comments on social media and the websites you visit
- viruses and spyware is categorized as ______
- Participating in your world in a responsible way.
- Being both proficient in the use of new technologies and comfortable in the atmosphere of cyberspace.
- relating to or involving an image, video, piece of information, that is circulated rapidly and widely from one internet user
- Participating in the cyber world
Down
- Play an important part in making today’s culture so interconnected.
- the ability to use information and communication technologies to find, evaluate, create, and communicate information
- taking responsibility for your role in cyberspace and engaging in positive and ethical decision-making to stay safe online.
- People who were born after the invention of digital technology and have grown up using it.
- a tool that helps someone sort through billions of websites to locate those that are specific to their search
- Online environment of the cyber world in which communications take place.
- Places that exist not in the real world but only online
- The modern world of computers, communications, and other digital technologies, such as mobile devices.
- a file written with the sole intention of doing harm
16 Clues: Member of different groups • Participating in the cyber world • viruses and spyware is categorized as ______ • Participating in your world in a responsible way. • a file written with the sole intention of doing harm • Places that exist not in the real world but only online • Play an important part in making today’s culture so interconnected. • ...
Networking 2024-09-25
11 Clues: secure browsing • this is not a LAN • Malicious software • layout or structure • this is our community • you do not cook in this • better known as the handshake • Barrier against cyber threats • Unauthorized digital infiltration • can could not catch a fish with this • Unique identifier for a device on a network
BTW Cross word 2025-11-20
Across
- One of BTW Main Colors
- Booker T. Washington High Schools Mascot?
- Engines that power machines
- AI Software
Down
- Applying math & science to solve practical problems
- Another BTW Main Color
- Prefix meaning “digital” or “online”
- The name of Booker T. Robot
- The act of introducing something new
- UBEST ______ Competition
- Turning ideas into computer commands
11 Clues: AI Software • One of BTW Main Colors • Another BTW Main Color • UBEST ______ Competition • The name of Booker T. Robot • Engines that power machines • Prefix meaning “digital” or “online” • The act of introducing something new • Turning ideas into computer commands • Booker T. Washington High Schools Mascot? • Applying math & science to solve practical problems
Hybrid Data Center Security 2024-05-01
Across
- There are two different types of traffic, each of which is secured in a different manner.
- Focus of traditional data security solutions limits their ability to see all traffic on all ports.
- Consolidating servers ______________trust levels.
Down
- Provides clear delineation of application functions and allows a security team to easily implement security policies.
- Traffic is secured by one or more physical form factor perimeter edge firewalls.
- In traditional data center security solutions requires a corresponding security policy often using multiple management tools.
- An attacker has multiple options to steal data from the _______
- Traffic is protected by a local, virtualized firewall instantiated on each hypervisor.
- _____________ network security virtualization.
- ___________ lateral threat movement when a front-end workload has been compromised.
10 Clues: _____________ network security virtualization. • Consolidating servers ______________trust levels. • An attacker has multiple options to steal data from the _______ • Traffic is secured by one or more physical form factor perimeter edge firewalls. • ___________ lateral threat movement when a front-end workload has been compromised. • ...
Cyber-wellness Crossword Puzzle 2013-06-06
Across
- You should be ______________ for your words and action online because it can hurt others feelings.
- ______ bullying is using the computer or phone on online social media to say hurtful things to someone or to spread rumors
- Save the ________ using screenshots when you were being cyber bullied.
Down
- Do not post things that will _______ others feeling.
- Do not send _________ message or emails to unknown people as it could be spamming. Addiction Gamming ___________ is when you can’t control yourself to stop playing that game.
- You should have proper __________ when on the internet.
- You should report the _________ to your parents or teachers.
- Do not interfere other people’s quarrel as you can become another ________.
- You should not _________ or reply to strangers because they can ask you further private information.
9 Clues: Do not post things that will _______ others feeling. • You should have proper __________ when on the internet. • You should report the _________ to your parents or teachers. • Save the ________ using screenshots when you were being cyber bullied. • Do not interfere other people’s quarrel as you can become another ________. • ...
Lemoncello's Library 2025-06-18
Across
- everything to do with books
- room with round cieling and 10 chambers
- new head librarian
- nufevah
- important color
- other security guard
- The Smart one
- the one we think will win
- The reader
Down
- name of town
- security guard
- old head librarian
- what's on library cards
- furtune telling robot in booth
- The Cheater
- how to collect book titles
16 Clues: nufevah • The reader • The Cheater • name of town • The Smart one • security guard • important color • old head librarian • new head librarian • other security guard • what's on library cards • the one we think will win • how to collect book titles • everything to do with books • furtune telling robot in booth • room with round cieling and 10 chambers
Investment Unit 2024-03-20
Across
- offering stocks to the public from a private corporation
- age you can collect more social security
- you contribute to a roth IRA...
- government account everyone taxes into
- 6.2%
- if you don't pay social security you might have a...
- currency backed by the government
- a sum of money saved for a particular purpose
- the increase in value of an asset
- social security might be classified on your paystub as...
- 1.45%
- market is falling
Down
- you put money into your 401k...
- measures the price performance of a basket of securities
- money before taxes
- well established and financially sound company
- market is rising
- age you can collect social security
- virtual currency
- how old you need to be to invest in crypto
- investing all the money you have avalible into the market at once
- Individual Retirement Account
- money a company is giving back to its share holders
- expected to run out of money in 2031
- having worked a certain amount of time with a company so you get 100% of the money your company matched you
- money after taxes
- dollar cost averaging
- tells you how big the company is on the stock market
- how you make money in a roth IRA
- you have 60 days to do this when moving money into a different retirement account
30 Clues: 6.2% • 1.45% • market is rising • virtual currency • money after taxes • market is falling • money before taxes • dollar cost averaging • Individual Retirement Account • you put money into your 401k... • you contribute to a roth IRA... • how you make money in a roth IRA • currency backed by the government • the increase in value of an asset • age you can collect social security • ...
Investing - Ayden Templeton 2025-03-25
Across
- money Currencies that are created and backed by the government
- Cost averaging a strategy in which you invest your money in equal amounts, at regular intervals
- market when markets fall
- An amount of money saved/available for a specific purpose
- Federal Insurance Contributions Act(Social Security and Medicare taxes)
- Buffett CEO of Berkshire Hathaway
- A company that a larger company owns
- A system of recording information that makes it difficult/impossible to change
- measures the price performance of a basket of various securities
- Factors Something the company has done, like introducing a new product
- retirement savings plan 401K
- Security To address the permanent problem of economic security for the elderly
- Market A place where people buy and sell pieces of companies, called shares, to make money
Down
- cap The total value of a company’s stock
- Government Medical Health Plan
- IRA Individual retirement account
- fund A fund that pools money from a large group of investors
- traded funds a collection of stocks, bonds, etc
- refers to the process of offering shares of a private corporation
- market When markets rise
- They represent a loan from the buyer
- Factors Something that does not directly involve the company, like a pandemic
- A security representing the ownership of a fraction of a corporation.
- funds a type of mutual fund, or ETF, that follows a benchmark index
- The availability of cash
25 Clues: The availability of cash • market when markets fall • market When markets rise • retirement savings plan 401K • Government Medical Health Plan • Buffett CEO of Berkshire Hathaway • IRA Individual retirement account • A company that a larger company owns • They represent a loan from the buyer • cap The total value of a company’s stock • ...
Chapter 5 - Application Security 2025-05-21
Across
- An iterative and flexible approach to software development and delivery.
- A condition where a program fails to release unused memory, reducing performance.
- A Windows feature that limits application privileges to prevent unauthorized changes.
- A condition where a calculation exceeds the max value of an integer type.
- A security feature that randomly arranges memory addresses to prevent exploits.
- Analyzing source code to find and fix security vulnerabilities.
- A vulnerability that allows attackers to run arbitrary code on a remote system.
- An attack technique that accesses restricted files by manipulating file paths.
- The process of planning, creating, testing, and deploying secure software.
- Best practices for writing software that avoids introducing security flaws.
- Testing software with full access to internal logic and source code.
Down
- An error that occurs when a program tries to access memory through a null pointer.
- A linear and sequential software development methodology.
- Identifying and evaluating potential security risks in an application.
- Testing software without knowing its internal code or logic.
- Checking and filtering user input to prevent malicious data processing.
- A method of handling software errors without crashing the system.
- An isolated environment used to run and test code safely.
- A type of Flash-based browser cookie stored locally on the user's device.
- A technique that tests software by inputting large amounts of random data.
20 Clues: A linear and sequential software development methodology. • An isolated environment used to run and test code safely. • Testing software without knowing its internal code or logic. • Analyzing source code to find and fix security vulnerabilities. • A method of handling software errors without crashing the system. • ...
Module 6 Vocabulary 2023-09-19
Across
- A device or software that monitors, logs, and detects security breaches but takes no action to stop or prevent the attack
- A device that monitors, logs, detects, and reacts to stop or prevent security breaches
- a type of IDS that uses behavior for decision making
- hardware firewall that protects the entire network
- combines several layers of security and networking services into one solution
- A buffer network that sits between the private network and an untrusted network
Down
- the main benefit of an ACL
- a type of IDS that uses patterns for decision making
- the type of computer that may be found inside a screened subnet
- A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules
- software firewall that protects a single device
- Firewalls use filtering rules, which are sometimes called access control lists, to identify allowed and blocked traffic.
12 Clues: the main benefit of an ACL • software firewall that protects a single device • hardware firewall that protects the entire network • a type of IDS that uses patterns for decision making • a type of IDS that uses behavior for decision making • the type of computer that may be found inside a screened subnet • ...
Airport 2017-09-11
Across
- How many Cargo terminals are located at Auckland International Airport
- Part of NZ custom - Ministry of Agriculture and Forestry
- What is the Airport name for the IATA code NSN?
- Number of baggage claim belts at Auckland International Airport
- City code of Rarotonga
- The area where security and screenings are taken place
- How many passenger terminals are located at Auckland International Airport
- Process of producing your boarding pass
- "The area before departing passengers pass through security and are also accessible by both travellers and non-travellers"
- This facility is only offered to departing and arriving international travellers
Down
- Free and used to carry your luggage throughout the terminals
- "For passesngers travelling business or first class on their airline or for passengers that have joined the airlines VIP club"
- "_________ is a company located in the check-in area which enables travellers to have their luggage sealed in recyclable, transparent polythene to protect it from scratches, moisture or any form of tampering"
- City code is SIN
- "Location with either paved, dirt, grass or gravel runways for aircraft to take off and/or land"
- What is the code for Customer Service Officer?
- "Area where you go through security and hand over your passport and departure card for inspection"
- IATA code for Kapiti Coast
- Once passengers are through immigration and _________ they are now airside
- The country of the busiest Airport
20 Clues: City code is SIN • City code of Rarotonga • IATA code for Kapiti Coast • The country of the busiest Airport • Process of producing your boarding pass • What is the code for Customer Service Officer? • What is the Airport name for the IATA code NSN? • The area where security and screenings are taken place • Part of NZ custom - Ministry of Agriculture and Forestry • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- to act in the best interest of the client
- the cost for an investment adviser's services
- ticker symbol for Facebook
- a fixed income security
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- a firm that executes security transactions for itself and clients
- the oldest investor protection organization
- free from security registration
- the sunshine state
Down
- possession of client funds or securities
- provides continuous investment services for a fee
- competing personal and business plans
- recommended procedure or implementation
- a digital ledger for cryptocurrency transactions
- client and firm documents
- exempt sale of securities to accredited investors
- a written disclosure statement that must be provided to existing and prospective clients
- individuals with a history of disciplinary actions
- ticker symbol for Netflix
- a type of cryptocurrency
- ticker for Amazon
- wrongful or criminal deception intended to result in personal gain
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- ticker symbol for Facebook
- individuals with a history of disciplinary actions
- exempt sale of securities to accredited investors
- ticker for Amazon
- the cost for an investment adviser's services
- the oldest investor protection organization
- competing personal and business plans
- ticker symbol for Netflix
- recommended procedure or implementation
- a digital ledger for cryptocurrency transactions
- a firm that executes security transactions for itself and clients
- wrongful or criminal deception intended to result in personal gain
Down
- a fixed income security
- a method to raise funds for cryptocurrency
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- provides continuous investment services for a fee
- freedom to make investment decisions on behalf of the client
- a written disclosure statement that must be provided to existing and prospective clients
- to act in the best interest of the client
- client and firm documents
- possession of client funds or securities
- free from security registration
- a type of cryptocurrency
- the sunshine state
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
Acronyms part 4 2024-12-13
Across
- Internet Message Access Protocol
- Memorandum of Understanding
- Mobile Device Management
- Incident Response
- Local Area Network
- Internet Relay Chat
- Lightweight Extensible Authentication
- Master Service Agreement
- Initialization Vector
- Indicators of Compromise
- Mandatory Access Control
- Key Distribution Center
- Mean Time Between Failures
- Incident Response Plan
- Media Access Control
- Instant Messaging
- Internet Key Exchange
- Lightweight Directory Access Protocol
- Information Systems Security Officer
- Layer 2 Tunneling Protocol
- Microsoft Challenge Handshake
- Main Distribution Frame
- Managed Service Provider
- International Standards Organization
Down
- Protocol
- Master Boot Record
- Metropolitan Area Network
- Message Authentication Code
- Machine Learning
- Internet Service Provider
- Internet Protocol Security
- Key Encryption Key
- Internet of Things
- Managed Security Service Provider
- Multifunction Device
- Multifactor Authentication
- Intrusion Prevention System
- Institute of Electrical and Electronics
- Message Digest 5
- Multi-protocol Label Switching
- Mean Time to Failure
- Multimedia Message Service
- Internet Protocol
- Multifunction Printer
- Monitoring as a Service
- Memorandum of Agreement
46 Clues: Protocol • Machine Learning • Message Digest 5 • Incident Response • Instant Messaging • Internet Protocol • Master Boot Record • Local Area Network • Key Encryption Key • Internet of Things • Internet Relay Chat • Multifunction Device • Media Access Control • Mean Time to Failure • Initialization Vector • Internet Key Exchange • Multifunction Printer • Incident Response Plan • Key Distribution Center • ...
Papa Javi 6 weeks down, years to go... 2023-01-28
Across
- Your initial ideas about something
- Relative, uncle's child
- Awful, terrible
- Workers representation
- What Ukraine is receiving a lot of
- Pasta dish
- What you need to do to Matteo to comfort him
Down
- Something that causes discussion, debate, even outrage
- Go up
- The cyber group, also without identity
- Period of freezing weather (go crazy suddenly) 4,(4)
- The red stuff
12 Clues: Go up • Pasta dish • The red stuff • Awful, terrible • Workers representation • Relative, uncle's child • Your initial ideas about something • What Ukraine is receiving a lot of • The cyber group, also without identity • What you need to do to Matteo to comfort him • Period of freezing weather (go crazy suddenly) 4,(4) • Something that causes discussion, debate, even outrage
Don't Travel Without 2022-01-21
Across
- your paper ticket
- the people who work in the plane with passengers
- when security checks your person
- what you pass through at security
- the official document that lets you travel
- the area you go to pick up your luggage
Down
- the person flying the airplane
- what your luggage goes through at security
- the luggage you personally take on a plane
- telling the airline you're here for your flight
- the area you pass through when traveling in a new country
- moving from one flight to another
- a square piece of luggage
- the cart used to carry luggage
14 Clues: your paper ticket • a square piece of luggage • the person flying the airplane • the cart used to carry luggage • when security checks your person • moving from one flight to another • what you pass through at security • the area you go to pick up your luggage • what your luggage goes through at security • the luggage you personally take on a plane • ...
Cyber Threat Crossword 2022-02-07
Across
- Never share your _________ with another person
- Also known as malicious software any; any program or file that is harmful to a computer user
- Passwords should should always be at least this many characters long.
- Choose a password that is easy for you _______________ but hard for you someone to guess.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- A collection of information that is organized so that it can easily be accessed, managed and updated
- Email scam or attempt to trick you into giving your password or personal information
Down
- A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit
- _________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user
- Do not leave your laptop or computer ___________________
- The state of being free from danger and threat
- Always _______your computer when you leave your desk
- To protect personal information, avoid sending it via
- A _______ assessment is the process by which risks are identified and the impact of those risks determined
- A software that is designed and destroy computer viruses
- A ___________ is often an email that gets mailed in chain letter fashion describing something devastating.
16 Clues: Never share your _________ with another person • The state of being free from danger and threat • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Do not leave your laptop or computer ___________________ • A software that is designed and destroy computer viruses • ...
Cyber Ethics crossword 2025-05-28
Across
- Harmful software that
- secret code to access an account
- Theft Stealing someone's personal or confidential data
- online bullying or harassment
- Name used to log into websites or apps
- Fake emails to steal personal information
- Rules of right and wrong behavior online
Down
- Blocks unauthorized access to a network
- Breaking into a system without permission
- Software that secretly gathers your information
- Keeping your personal information safe
- Program that spreads and corrupts files
- systems
- Scrambling data to prevent unauthorized access
- Protects against harmful programs
- A trick to steal your data or money
16 Clues: systems • Harmful software that • online bullying or harassment • secret code to access an account • Protects against harmful programs • A trick to steal your data or money • Keeping your personal information safe • Name used to log into websites or apps • Blocks unauthorized access to a network • Program that spreads and corrupts files • ...
People at school 2025-04-13
Monitoring 2024-11-10
Across
- A notification system that warns administrators of potential security incidents (8 letters).
- The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
- Alerts generated by network devices to notify administrators of significant events (4 letters).
- A tool used to identify security weaknesses in systems and applications (20 letters).
- The act of examining systems or networks for vulnerabilities or threats (8 letters).
- The process of generating documents that summarize security findings and incidents (9 letters).
Down
- Software designed to detect and remove malicious programs from a computer system (9 letters).
- Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
- A network protocol that collects IP traffic information for analysis (7 letters).
- A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
- A standard for automating vulnerability management and compliance checks (4 letters).
- A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
- Long-term storage of logs and data for compliance and future reference (9 letters).
- Security standards or best practices used to evaluate the configuration of systems (10 letters).
14 Clues: A network protocol that collects IP traffic information for analysis (7 letters). • Long-term storage of logs and data for compliance and future reference (9 letters). • The act of examining systems or networks for vulnerabilities or threats (8 letters). • A standard for automating vulnerability management and compliance checks (4 letters). • ...
Stock Exchange 2024-02-04
Across
- Market:A market in which stock prices are rising.
- Gain or Loss:Profit or loss resulting from the sale of certain assets classified under the federal income tax legislation as capital assets. This includes stocks and other investments such as investment property.
- Size:The aggregate size in board lots of the most recent bid to buy a particular security.
- measurement of the relationship between the price of a stock and the movement of the whole market.
- Transaction:An order to close out an existing open futures or options contract.
- securities firm is classified as an agent when it acts on behalf of its clients as buyer or seller of a security. The agent does not own the security at any time during the transaction.
- Day:Any business day on which the clearing corporation is open to effect trade clearing and settlement.
- an economist, capital means machinery, factories and inventory required to produce other products. To investors, capital means their cash plus the financial assets they have invested in securities, their home and other fixed assets.
- Day:Any day from Monday to Friday, excluding statutory holidays.
- notes issued by a corporation or government to its lenders, usually with a specified amount of interest for a specified length of time.
- physical document that shows ownership of a bond, stock or other security.
- Price:The price of the last board lot trade executed at the close of trading
- a company or person owns, including money, securities, equipment and real estate. Assets include everything that is owed to the company or person. Assets are listed on a company's balance sheet or an individual's net worth statement.
Down
- Order:An order from a retail customer of a Participating Organization.
- special term attached to an equity order that requires the trade to be settled either the same day or the following business day for cash.
- Number:The trading number of the clearing Participating Organization or Member.
- Chip Stocks:Stocks of leading and nationally known companies that offer a record of continuous dividend payments and other strong investment qualities.
- The simultaneous purchase of a security on one stock market and the sale of the same security on another stock market at prices which yield a profit.
- highest price a buyer is willing to pay for a stock. When combined with the ask price information, it forms the basis of a stock quote.
- Size:The aggregate size in board lots of the most recent ask to sell a particular security.
- Stock:All shares representing ownership of a company, including preferred and common shares
- or Offer:The lowest price at which someone is willing to sell the security. When combined with the bid price information, it forms the basis of a stock quote.
- fee charged by an investment advisor or broker for buying or selling securities as an agent on behalf of a client.
- Report:A publication, including financial statements and a report on operations, issued by a company to its shareholders at the company's fiscal year-end.
- Market:A market in which stock prices are falling.
- Dividend / Distribution:A dividend/distribution that is paid in cash.
26 Clues: Market:A market in which stock prices are rising. • Market:A market in which stock prices are falling. • Day:Any day from Monday to Friday, excluding statutory holidays. • Dividend / Distribution:A dividend/distribution that is paid in cash. • Order:An order from a retail customer of a Participating Organization. • ...
History 2021-04-06
Across
- reduce value of dollar
- money
- progress administration- headed by harry hopkins a new federal agency
- labor relations board- 5 members appointed by us president
- security act- provide security for elerds and unemployed
- basic
- business leade
- direct talks for held
- as a result of
- party
- important
- strike- workers did not work
- liberty league- business leaders and anit new deal politicians get together
- headed by harry hopkins a new
Down
- bills sent to congress
- policy-----made panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds worldwide panama canal,expanded the navy,great white fleet tp naval power, Emergency banking act--- helped hundreds
- Roosevelt’s policies
- policy-----made Deficit spending- borrowed money to pay for programs
- arbitration-neutral party listen to both sides and decide
- provide security for elerds and unemployed
- clear
- borrowed money
- 5 members appointed by us
- down strike- workers did not work and protested
- collection of ideas
- closed banks
26 Clues: money • clear • basic • party • important • closed banks • business leade • borrowed money • as a result of • collection of ideas • Roosevelt’s policies • direct talks for held • bills sent to congress • reduce value of dollar • 5 members appointed by us • strike- workers did not work • headed by harry hopkins a new • provide security for elerds and unemployed • ...
BCS reveiw noah 2015-11-13
Across
- a message sender thing that send messages to people
- a plan u pick that limits sertan thing
- being safe on thee interwebs
- bully bully on the internet
- proper technique
- computer screen
- micro soft excel
- something you can access the web on
Down
- web page maker
- asdfjkl;'
- publisher grating cards
- a group of computers
- ware stuff that makes up a computer
- something that you move and click stuff with
- a small slip of buttons at the top of a Microsoft thing
15 Clues: asdfjkl;' • web page maker • computer screen • proper technique • micro soft excel • a group of computers • publisher grating cards • bully bully on the internet • being safe on thee interwebs • ware stuff that makes up a computer • something you can access the web on • a plan u pick that limits sertan thing • something that you move and click stuff with • ...
Friday Fun - Do you know your DOB Acronyms? 2022-02-04
Across
- The C in CPS
- The I in AISP
- The A in OPA
- The E in OBIE
- The G in GDPR
- The I in PISP
- The L in AML
- The T in TPP
- The first U in UUID
- The C in CDC
- The P in ERP
Down
- The A in QWAC
- The S in QTSP
- The C in DSCA
- The O in DSOP
- The N in JSON
- The Q in QSealC
- The B in CBPII
- The T in QTSP
- The L in OBL
- The I in DPIA
- The D in PSD2
- The first S in ASPSP
23 Clues: The C in CPS • The A in OPA • The L in OBL • The L in AML • The T in TPP • The C in CDC • The P in ERP • The A in QWAC • The S in QTSP • The C in DSCA • The I in AISP • The O in DSOP • The N in JSON • The E in OBIE • The T in QTSP • The G in GDPR • The I in PISP • The I in DPIA • The D in PSD2 • The B in CBPII • The Q in QSealC • The first U in UUID • The first S in ASPSP
Cyber Security Crossword By AGUSTINA PETRACCA 2020-08-20
Across
- es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento.
- es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario se de cuenta. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
- son pequeños archivos que algunos sitios web guardan en tu ordenador.
- es el correo electrónico no solicitado que recibe una persona. Dichos mensajes, también llamados correo no deseado o correo basura, suelen ser publicidades de toda clase de productos y servicios.
Down
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
- es un sistema diseñado para evitar el acceso no autorizado a una red privada.
7 Clues: son pequeños archivos que algunos sitios web guardan en tu ordenador. • es un sistema diseñado para evitar el acceso no autorizado a una red privada. • es un término general para referirse a cualquier tipo de software malicioso diseñado para infiltrarse en su dispositivo sin su conocimiento. • ...
Know Your Money - 2004 Style Notes 2024-12-11
Across
- Some security features are visible under this kind of light.
- FRNs designed before 1990 do not contain security threads or ______.
- This person's portrait is on the $50 note.
- This person's portrait is on the $20 note.
- $100 FRNs have a blue security _____ woven into the paper.
- This person's portrait is on the $10 note.
Down
- All genuine FRNs except $1 and $2 have a clear _____ thread embedded.
- This person's portrait is on the $5 note.
- This person's portrait is on the $100 note.
- ____ Plate Number is found on the bottom right-hand corner of the back of the note.
- Currency paper has ____ and blue threads randomly disbursed throughout.
- visible from either side of the note when held to light.
- The first letter of this number on FRNs of each series year 1996 or later correspond to a series year.
- Currency paper consists of 25% linen and 75% _____.
- Color-shifting ___ is visible in the 2004 style $10, $20, $50 and $100 federal reserve notes.
15 Clues: This person's portrait is on the $5 note. • This person's portrait is on the $50 note. • This person's portrait is on the $20 note. • This person's portrait is on the $10 note. • This person's portrait is on the $100 note. • Currency paper consists of 25% linen and 75% _____. • visible from either side of the note when held to light. • ...
Computer Ethics 2022-08-15
Across
- words for protecting your account
- Another Word for Internet
- Words or images which can be clicked to visit other webpages
- not suitable or proper in the circumstances
- message sent through email
- moral values
- rules to punish against crime
- to illegally use others computer
Down
- your online identity
- activity punishable by Law
- crime of deceiving someone
- someone's identification
- another word for good behavior
- do damage to someone or something
14 Clues: moral values • your online identity • someone's identification • Another Word for Internet • activity punishable by Law • crime of deceiving someone • message sent through email • rules to punish against crime • another word for good behavior • to illegally use others computer • words for protecting your account • do damage to someone or something • ...
Cyber Crossword (CIA 1) 2021-09-05
Across
- A current challenge in cyber space, where your identity lies under the wraps, but your activities are visible to everyone.
- The simulation of movement created by a series of pictures.
- Conversion of analog data into digital form.
- The fact of being alone so that you can do things without being seen or disturbed.
- Proponent of Cyber Paternalism.
Down
- The action of receiving electronic transmissions before they reach the intended recipient.
- Electronic form of legally enforceable promise, and every set of promises, forming the consideration for each other.
- A belief that individuals acting in whatever capacity, should be at liberty to pursue their own tastes and interests online.
- A virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure.
- Software that enables photo editing, image creation and graphic design.
10 Clues: Proponent of Cyber Paternalism. • Conversion of analog data into digital form. • The simulation of movement created by a series of pictures. • Software that enables photo editing, image creation and graphic design. • The fact of being alone so that you can do things without being seen or disturbed. • ...
cyber world crossworld 2021-12-16
Across
- The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity." Netizen has the same meaning.
- Electronic media are media that use electronics or electromechanical means for the audience to access the content.
- the notional environment in which communication over computer networks occurs.
- Cyber citizenship is the rights, privileges and responsibilities required of internet and cellular network users.
- a person born or brought up during the age of digital technology and therefore familiar with computers and the internet from an early age.
Down
- A real or virtual world of information in cyberspace
- the position or status of being a citizen of a particular country.
- not physically existing as such but made by software to appear to do so
- an inhabitant of a particular town or city.
- By definition, Cyber Literacy means the ability to use computer technologie
10 Clues: an inhabitant of a particular town or city. • A real or virtual world of information in cyberspace • the position or status of being a citizen of a particular country. • not physically existing as such but made by software to appear to do so • By definition, Cyber Literacy means the ability to use computer technologie • ...
crossword cyber alexy 2025-11-03
Across
- infiltrate an individual's computer systems
- device for carrying out malicious activities
- software updates
- cyber criminal
- code that can steal sensitive information
Down
- safely test software code
- protects your network and your device
- online scam similar to phishing
- malicious software capable of self-propagation
- malware attack
10 Clues: cyber criminal • malware attack • software updates • safely test software code • online scam similar to phishing • protects your network and your device • code that can steal sensitive information • infiltrate an individual's computer systems • device for carrying out malicious activities • malicious software capable of self-propagation
cyber 2024-11-16
križaljka sigurnosti na internetu 2026-02-10
Across
- caps Pisanje poruka isključivo velikim slovima
- Namjerno dijeljenje neprovjerenih ili lažnih informacija
- lažni profil
- Slanje ili traženje seksualno eksplicitnih poruka/slika
- sta pregledavamo svaki dan
- seksualno ili financijsko zlostavljanje
- namjerno osmišljen tako da izazove bijes
Down
- Slanje neželjenih poruka
- korištenje drugih fotografija
- predstavljajući se kao legitimne tvrtke ili institucije
- zezeanje drugih na internetu
- bulying ponavljano zlostavljanje putem digitalnih tehnologija
12 Clues: lažni profil • Slanje neželjenih poruka • sta pregledavamo svaki dan • zezeanje drugih na internetu • korištenje drugih fotografija • seksualno ili financijsko zlostavljanje • namjerno osmišljen tako da izazove bijes • caps Pisanje poruka isključivo velikim slovima • predstavljajući se kao legitimne tvrtke ili institucije • ...
Chapter 7 2022-12-01
Across
- Global position systems
- 1928 supreme court case made wiretapping unconstitutional
- Freedom of speech and right to privacy
- 1974 law passed to regulate the goverments use of personal data
- Electronic communications act
- 1937 supreme court case banning message interception without the senders consent
- using different data bases to compare and compound information
- uses algorithms to hide data
- rules or boundaries that are enforced by laws
- understanding of positive and negative consequences of utility
- A philosopher who believed actions are unethical if they negatively affected others
Down
- ethic perspective that rules should apply universally
- security procedure that is searching for leaks and other security vulnerabilities
- created corporate rule, requiring companies to be transparent when sharing customers data
- social security number
- informed consent and regulations for secondary uses
- a deal of buying or selling for business
- analyzation of copious masses of data
- protects children with parental controls on websites
- a right and state of liberty of being disturbed and observed.
20 Clues: social security number • Global position systems • uses algorithms to hide data • Electronic communications act • analyzation of copious masses of data • Freedom of speech and right to privacy • a deal of buying or selling for business • rules or boundaries that are enforced by laws • informed consent and regulations for secondary uses • ...
a crossword by moon 2019-02-27
Across
- flight name for Emirates Airlines
- a school subject that tells you countries and things
- the word for getting on the plane
- photo ID specifically used for boarding a zoomy sky boy
- the first part of UM
- the good boy who finds drugs and big money
- the side of the airport you're on before going through security
- the area where aircraft park
- the side of the airport you're on after going through security
- the current aviation security service
Down
- alternative S
- used of evacuating passengers from a stricken aircraft
- the airline alphabet
- the people going on the metal bird
- the big man who protects the community from potential bad guys
- vehicles with movable belts used to load and unload baggage onto aircraft
- the place where you get cheap drinks and cigs
- international travel documents you need to go to lots of other places
- the items passengers bring in suitcases and stuff
- flight name for Virgin Australia
20 Clues: alternative S • the airline alphabet • the first part of UM • the area where aircraft park • flight name for Virgin Australia • flight name for Emirates Airlines • the word for getting on the plane • the people going on the metal bird • the current aviation security service • the good boy who finds drugs and big money • the place where you get cheap drinks and cigs • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- a digital ledger for cryptocurrency transactions
- the cost for an investment adviser's services
- to act in the best interest of the client
- provides continuous investment services for a fee
- wrongful or criminal deception intended to result in personal gain
- ticker for Amazon
- competing personal and business plans
- a firm that executes security transactions for itself and clients
Down
- fraudulant investment operations where returns for older investors are paid through revenue from new investors
- ticker symbol for Facebook
- the oldest investor protection organization
- a written disclosure statement that must be provided to existing and prospective clients
- client and firm documents
- a type of cryptocurrency
- ticker symbol for Netflix
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- recommended procedure or implementation
- exempt sale of securities to accredited investors
- free from security registration
- individuals with a history of disciplinary actions
- possession of client funds or securities
- a fixed income security
- the sunshine state
24 Clues: ticker for Amazon • the sunshine state • a fixed income security • a type of cryptocurrency • client and firm documents • ticker symbol for Netflix • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • to act in the best interest of the client • ...
NASAA Investment Adviser Examiners' Crossword 2018-02-27
Across
- ticker symbol for Netflix
- to act in the best interest of the client
- a type of cryptocurrency
- client and firm documents
- a fixed income security
- a digital ledger for cryptocurrency transactions
- the sunshine state
- competing personal and business plans
- exempt sale of securities to accredited investors
- free from security registration
Down
- the oldest investor protection organization
- freedom to make investment decisions on behalf of the client
- a method to raise funds for cryptocurrency
- recommended procedure or implementation
- provides continuous investment services for a fee
- possession of client funds or securities
- fraudulent investment operations where returns for older investors are paid through revenue from new investors
- a firm that executes security transactions for itself and clients
- the cost for an investment adviser's services
- a written disclosure statement that must be provided to existing and prospective clients
- wrongful or criminal deception intended to result in personal gain
- individuals with a history of disciplinary actions
- ticker symbol for Facebook
- ticker symbol for Amazon
24 Clues: the sunshine state • a fixed income security • a type of cryptocurrency • ticker symbol for Amazon • ticker symbol for Netflix • client and firm documents • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • ...
[KoCyber] - FamilyOnlineSafety 2025-07-13
Across
- Online trickery designed to steal money or information.
- Fake emails or messages tricking you into giving personal information.
- A secret word or phrase that secures your account.
- Practices and habits to stay secure online.
- Turning information into secret code for security.
- Making extra copies of data in case originals are lost.
- Software protecting your devices from viruses.
- Harmful software designed to damage your device.
- Extra security step requiring two ways to prove your identity.
- Software secretly installed to monitor your online activities.
- A person who tries to illegally access your accounts or devices.
- Misleading links designed to attract clicks and trap users.
Down
- Verifying that someone is who they claim to be.
- Protecting your personal information online.
- Malicious software that locks files and demands payment.
- Online harassment or bullying behavior.
- A digital barrier protecting your devices from harmful traffic.
- Internet connection freely accessible but risky to use.
- Posting too much personal information online.
- Regularly improving software to prevent security flaws.
20 Clues: Online harassment or bullying behavior. • Practices and habits to stay secure online. • Protecting your personal information online. • Posting too much personal information online. • Software protecting your devices from viruses. • Verifying that someone is who they claim to be. • Harmful software designed to damage your device. • ...
GCSE Computer Science: Network Security 2018-02-17
Across
- A malicious program designed to gather information about the user or their system.
- A standard way of providing authentication.
- Software to control data going in and out of a network.
- A malicious program designed to damage a computer system.
- An activity performed by an ethical hacker to test a network's security. (2 words)
- A person who is employed by companies to try to break their network security. (2 words)
- Authentication system that requires more than one item to log in. (2 words)
- Proving your identity.
Down
- Protection of systems against theft, vandalism, etc. (2 words)
- Sending an email pretending to be from a bank, etc.
- A method of breaching security by tricking people. (2 words)
- A document that defines what users are (not) permitted to do on a system. (2 words)
- Ensuring data is within an acceptable range and format.
- An update to software to fix bugs - especially security bugs.
14 Clues: Proving your identity. • A standard way of providing authentication. • Sending an email pretending to be from a bank, etc. • Ensuring data is within an acceptable range and format. • Software to control data going in and out of a network. • A malicious program designed to damage a computer system. • A method of breaching security by tricking people. (2 words) • ...
Norwegian Prison 2024-01-23
digital 2025-04-29
CYBER LAW- CROSSWORD (CIA 1) 2021-09-05
Across
- There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
- The conversion of texts, pictures, or sound into a digital form.
- The act of persistent and unwanted contact from someone online.
- He is one of the famous scholar in cyber paternalism.
Down
- It is often viewed as the act of sending unsolicited email.
- These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
- The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
- It is a common file format used to combine and compress data for easy downloading.
- This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
- Most popular search engine.
10 Clues: Most popular search engine. • He is one of the famous scholar in cyber paternalism. • It is often viewed as the act of sending unsolicited email. • The act of persistent and unwanted contact from someone online. • The conversion of texts, pictures, or sound into a digital form. • It is a common file format used to combine and compress data for easy downloading. • ...
CYBER LAW- CROSSWORD (CIA 1) 2021-09-15
Across
- There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
- It is a common file format used to combine and compress data for easy downloading.
- This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
- These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
- Most popular search engine
Down
- He is one of the famous scholar in cyber paternalism.
- The conversion of texts, pictures, or sound into a digital form.
- It is often viewed as the act of sending unsolicited email.
- __________ resources is one major problem in cyberspace.
- The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
10 Clues: Most popular search engine • He is one of the famous scholar in cyber paternalism. • __________ resources is one major problem in cyberspace. • The conversion of texts, pictures, or sound into a digital form. • It is often viewed as the act of sending unsolicited email. • It is a common file format used to combine and compress data for easy downloading. • ...
Job and Occupation 2021-04-30
Across
- a person in charge of controlling the rudder of an aircraft during flight time.
- as a legal expert has the authority to provide advice on cases in court.
- health workers who are the main point of patients.
- people who cook
- people whose job is to dive.
- a person whose job is to write.
- engineer of a ship locomotive
- the most number of health workers.
- female attendant on long distance transport
- members of government agencies or state employees in charge of maintaining security.
- lascar or state soldiers.
Down
- people who cover the news.
- female health workers assigned to assist.
- people working on public transportation
- people whose job is to raise livestock
- the person whose job is to catch fish.
- people who are in charge of taking care of and saving the result of payments, especially money.
- people whose job is to drive cars.
- a man who cultivates cops
- people who provide knowledge to students.
- a group assigned by the agency to carry out security.
21 Clues: people who cook • a man who cultivates cops • lascar or state soldiers. • people who cover the news. • people whose job is to dive. • engineer of a ship locomotive • a person whose job is to write. • people whose job is to drive cars. • the most number of health workers. • people whose job is to raise livestock • the person whose job is to catch fish. • ...
NASAA IA Training After Lunch Crossword Challenge 2018-02-23
Across
- a type of cryptocurrency
- ticker symbol for Netflix
- to act in the best interest of the client
- a fixed income security
- the cost for an investment adviser's services
- exempt sale of securities to accredited investors
- competing personal and business plans
- provides continuous investment services for a fee
- client and firm documents
- a firm that executes security transactions for itself and clients
- a digital ledger for cryptocurrency transactions
- the oldest investor protection organization
Down
- ticker symbol for Amazon
- a fraudulent plan promising high returns for little risk
- wrongful or criminal deception intended to result in personal gain
- recommended procedure or implementation
- free from security registration
- individuals with a history of disciplinary actions
- freedom to make investment decisions on behalf of the client
- a method to raise funds for a cyrptocurrency
- a written disclosure statement that must be provided to existing and prospective clients
- ticker symbol for Facebook
- the sunshine state
- possession of client funds or securities
24 Clues: the sunshine state • a fixed income security • ticker symbol for Amazon • a type of cryptocurrency • ticker symbol for Netflix • client and firm documents • ticker symbol for Facebook • free from security registration • competing personal and business plans • recommended procedure or implementation • possession of client funds or securities • ...
a crossword by moon 2019-02-27
Across
- international travel documents you need to go to lots of other places
- the people going on the metal bird
- vehicles with movable belts used to load and unload baggage onto aircraft
- the current aviation security service
- the airline alphabet
- the place where you get cheap drinks and cigs
- the big man who protects the community from potential bad guys
- a school subject that tells you countries and things
- the items passengers bring in suitcases and stuff
- the side of the airport you're on before going through security
- the side of the airport you're on after going through security
Down
- alternative S
- the area where aircraft park
- used of evacuating passengers from a stricken aircraft
- the good boy who finds drugs and big money
- flight name for Virgin Australia
- the first part of UM
- flight name for Emirates Airlines
- photo ID specifically used for boarding a zoomy sky boy
- the word for getting on the plane
20 Clues: alternative S • the first part of UM • the airline alphabet • the area where aircraft park • flight name for Virgin Australia • flight name for Emirates Airlines • the word for getting on the plane • the people going on the metal bird • the current aviation security service • the good boy who finds drugs and big money • the place where you get cheap drinks and cigs • ...
