cyber security Crossword Puzzles

NAFIS iPad mini raffle 2013-05-09

NAFIS iPad mini raffle crossword puzzle
Across
  1. Market transparency directive dating to 2004
  2. European tax on interest income
  3. Swiss tax treaty with UK & Austria: “_____ Withholding”
  4. US regulation to combat offshore tax evasion
  5. No. times SIX named "Best Corp. Actions Data Provider"
  6. Swiss national security ID number
  7. How many global security ID schemes cross-referenced by SIX
  8. “Legal Entity __________”
  9. Managing Director of SIX Financial Information USA
  10. How many millions of securities in SIX Financial’s DB
  11. “Nothing is certain but death and _____” (Benjamin Franklin)
Down
  1. FACTA report and revenue collector
  2. Adherence to regulations
  3. Fund look through also a requirement for this regulation
  4. Set of directives allowing cross-border fund sales in the EU
  5. Requirement for FATCA compliance: “Fund ___________”
  6. Second country to introduce a financial transaction tax
  7. First country to introduce a financial transaction tax
  8. How many decades SIX has been in business
  9. Type of data that describes a security or issuer
  10. When the sum of 1 plus 1 might equal 3 securities?
  11. Provider of robust tax & compliance data

22 Clues: Adherence to regulations“Legal Entity __________”European tax on interest incomeSwiss national security ID numberFACTA report and revenue collectorProvider of robust tax & compliance dataHow many decades SIX has been in businessMarket transparency directive dating to 2004US regulation to combat offshore tax evasion...

financial markets 2025-05-15

financial markets crossword puzzle
Across
  1. The total volume of trades in a given period
  2. Traders who expect prices to rise
  3. A participant in exchange trading
  4. The market price of a financial instrument
  5. Traders who expect prices to fall
  6. A price below the nominal value of a security
  7. An authority overseeing the financial market
  8. The degree of variation in trading prices
  9. The difference between bid and ask prices
  10. A person with access to non-public information
Down
  1. The amount of assets bought or sold
  2. A loan secured by real estate
  3. The process of putting securities into circulation
  4. A general term for a financial instrument
  5. Inclusion of a security in a stock exchange
  6. Relating to money, banking, or investments
  7. A representative acting on behalf of a client
  8. The difference between purchase and sale prices
  9. The transformation of assets into securities
  10. The process of studying the market for decision-making
  11. Use of borrowed funds for investment

21 Clues: A loan secured by real estateTraders who expect prices to riseA participant in exchange tradingTraders who expect prices to fallThe amount of assets bought or soldUse of borrowed funds for investmentA general term for a financial instrumentThe degree of variation in trading pricesThe difference between bid and ask prices...

Traylan Lockett, Breia.Varnado 2017-01-26

Traylan Lockett, Breia.Varnado crossword puzzle
Across
  1. Slapping is harassing someone
  2. or trolling is bullying, cyber bullying
  3. is to be endangered
  4. Shopping is making two photos and mixing them together
  5. is frightening them
  6. Treats is treats that involves some safety
  7. Spreading is gossiping
Down
  1. is various rituals involving harassment
  2. Theft is taking over someone's identity
  3. is revenge
  4. is making someone feel bad
  5. is stalking someone

12 Clues: is revengeis to be endangeredis frightening themis stalking someoneSpreading is gossipingis making someone feel badSlapping is harassing someoneis various rituals involving harassmentor trolling is bullying, cyber bullyingTheft is taking over someone's identityTreats is treats that involves some safety...

Traylan Lockett, Breia.Varnado 2017-01-26

Traylan Lockett, Breia.Varnado crossword puzzle
Across
  1. is various rituals involving harassment
  2. Spreading is gossiping
  3. Slapping is harassing someone
  4. is making someone feel bad
  5. is frightening them
  6. or trolling is bullying, cyber bullying
Down
  1. is stalking someone
  2. is revenge
  3. Treats is treats that involves some safety
  4. Theft is taking over someone's identity
  5. is to be endangered
  6. Shopping is making two photos and mixing them together

12 Clues: is revengeis stalking someoneis to be endangeredis frightening themSpreading is gossipingis making someone feel badSlapping is harassing someoneis various rituals involving harassmentTheft is taking over someone's identityor trolling is bullying, cyber bullyingTreats is treats that involves some safety...

Security x Word 2022-06-01

Security x Word crossword puzzle
Across
  1. Maori war dance? Illegal computing more like
  2. more than just a number cruncher
  3. Shhhh don't tell anyone it's a
  4. Malicious deception
  5. Works like a?
Down
  1. It's all about me
  2. Of conduct maybe?
  3. Sideways on, or online cv
  4. To unlock this answer...
  5. Man, scary robots from Dr Who
  6. Railway, Mud and Fire e.g.
  7. Was fixed, now its more mobile

12 Clues: Works like a?It's all about meOf conduct maybe?Malicious deceptionTo unlock this answer...Sideways on, or online cvRailway, Mud and Fire e.g.Man, scary robots from Dr WhoShhhh don't tell anyone it's aWas fixed, now its more mobilemore than just a number cruncherMaori war dance? Illegal computing more like

test 2024-03-27

test crossword puzzle
Across
  1. What kind of puzzle is this
  2. What company do we work for
Down
  1. Common form of hacking beginning with a P
  2. What section of the company are we in
  3. Fiserv Cyber Information Center

5 Clues: What kind of puzzle is thisWhat company do we work forFiserv Cyber Information CenterWhat section of the company are we inCommon form of hacking beginning with a P

Once Upon a Time A 2021-09-28

Once Upon a Time A crossword puzzle
Across
  1. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  2. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  3. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  4. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  5. Residents ? their fears of criminals by installing sophisticated security devices.
  6. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  7. Hearing the ? of the car alarm for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  8. Obviously, the family was suspicious of the ? of strangers wandering in the neighbourhood.
  9. After many false alarms, the family wondered about the ? of the security system.
  10. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s red wagon with the supplies for phys. Ed.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards residents can take at home.
  12. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  13. Nervously, the resident noticed the ? of a figure below the street light.
  14. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  15. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
  1. The ? gardener was willing to travel to different places where there was work.
  2. When slicing bread or tomato, it is easier using a knife with ?.
  3. The bulkiness of the cameras around the house ruined its ?, creating quite the eyesore.
  4. As usual, the father was ? from his sleep by the beeping of his phone.
  5. For their safety, they ? to the Neighbourhood Watch program.
  6. During the robbery, the bedroom had been ?, leaving quite the mess for the owners.
  7. As ? for the broken security alarm, the company offered them six months of service for no charge.
  8. Due to neglect, some of the ? of the homes required some painting and repairs.
  9. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  10. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  11. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  12. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  13. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.

28 Clues: For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? from his sleep by the beeping of his phone.Nervously, the resident noticed the ? of a figure below the street light.The ? gardener was willing to travel to different places where there was work....

Crossword puzzle 2024-04-30

Crossword puzzle crossword puzzle
Across
  1. Online moral principles.
  2. Tech-enabled capability.
  3. Online harassment.
  4. Tech proficiency.
  5. Digital image.
  6. Tech competency.
  7. Personal info fraud.
  8. Network security barrier.
  9. Online self-representation.
  10. Digital illegal activities.
  11. Personal recognition.
  12. Digital data secrecy.
  13. Data protection.
  14. Personal info protection.
  15. Malicious program blocker.
  16. Protection measures.
  17. Access authentication code.
  18. Data transfer to web.
  19. Harmful software.
  20. Global web network.
  21. Responsible online behavior.
  22. Fraudulent schemes.
  23. Effective digital info use.
  24. Online conduct regulations.
  25. Secure data encoding.
  26. Digital threat knowledge.
Down
  1. Personal online journals.
  2. Analytical reasoning.
  3. Secure web browsing.
  4. Malicious digital assault.
  5. Digital threat protection.
  6. Digital education.
  7. Identity verification.
  8. Digital threat potential.
  9. Digital security measures.
  10. Online activity traces.
  11. Web navigation software.
  12. Digital education platform.
  13. Info safeguarding measures.
  14. Tech access gap.
  15. Unauthorized info access.
  16. thinking: Logical analysis.
  17. Malicious intrusion.
  18. Personal info protection.
  19. Internet precaution.
  20. Defense against digital threats.
  21. Online data secrecy.
  22. Digital safety practices.
  23. Deceptive data theft tactics.
  24. Digital communication.

50 Clues: Digital image.Tech competency.Tech access gap.Data protection.Tech proficiency.Harmful software.Online harassment.Digital education.Global web network.Fraudulent schemes.Secure web browsing.Personal info fraud.Malicious intrusion.Protection measures.Internet precaution.Online data secrecy.Analytical reasoning.Personal recognition....

RMRW Vocabulary Crossword 2026-02-17

RMRW Vocabulary Crossword crossword puzzle
Across
  1. A bank account used for daily transactions.
  2. A bank account that earns interest over time.
  3. Total earnings before deductions.
  4. Essentials for survival versus items desired for comfort.
  5. Tax paid to the U.S. government based on earnings.
  6. The amount paid out-of-pocket before insurance covers expenses.
  7. Borrowed money to pay for education that must be repaid.
  8. A numerical rating representing a person’s creditworthiness.
  9. The amount paid for insurance coverage.
  10. (Social Security & Medicare Tax)Payroll tax for Social Security and Medicare.
  11. Money set aside for financial security in retirement.
Down
  1. Amounts subtracted from gross income, including taxes and benefits.
  2. Money received from working.
  3. Interest calculated on both the initial principal and accumulated interest.
  4. The electronic transfer of a paycheck into a bank account.
  5. A financial plan for managing income and expenses.
  6. Guidance on managing money and making financial decisions.
  7. Coverage that helps pay for medical expenses.
  8. Money owed to lenders or creditors.
  9. Take-home pay after deductions.

20 Clues: Money received from working.Take-home pay after deductions.Total earnings before deductions.Money owed to lenders or creditors.The amount paid for insurance coverage.A bank account used for daily transactions.A bank account that earns interest over time.Coverage that helps pay for medical expenses.A financial plan for managing income and expenses....

Cyber - Annabelle Schmierer 2016-05-25

Cyber - Annabelle Schmierer crossword puzzle
Across
  1. Can be hacked
  2. something that tricks you into clicking it
  3. breaking the law on a computer
  4. watching someone online without them knowing
  5. a virus that pretends to be something good
  6. Someone pretending to be someone else
  7. software on people's computer that steals your information without them knowing
  8. a type of virus that repeats itself
  9. Destroys data
Down
  1. damages the computer network system
  2. Someone who can steal information
  3. used to track down a server
  4. being rude online
  5. unwanted emails from strangers
  6. a stranger who tries to make friends with you
  7. a plan to trick you

16 Clues: Can be hackedDestroys databeing rude onlinea plan to trick youused to track down a serverbreaking the law on a computerunwanted emails from strangersSomeone who can steal informationdamages the computer network systema type of virus that repeats itselfSomeone pretending to be someone elsesomething that tricks you into clicking it...

Angus cyber safety 2016-06-08

Angus cyber safety crossword puzzle
Across
  1. of unsafe
  2. that no one can see
  3. details
  4. way to contact people
  5. way you read fast
  6. use a keyboard to type words onto it
  7. protects your computer
  8. who bully's you online
  9. device people use to text
  10. a cold for your computer
Down
  1. you type in to log onto a computer
  2. who you don't know that emails you heaps of times
  3. you can search stuff up
  4. that no one can see
  5. people use to send stuff to anyone who has it
  6. front of your computer
  7. who goes into your account and steals stuff

17 Clues: detailsof unsafeway you read fastthat no one can seethat no one can seeway to contact peoplefront of your computerprotects your computerwho bully's you onlineyou can search stuff upa cold for your computerdevice people use to textyou type in to log onto a computeruse a keyboard to type words onto itwho goes into your account and steals stuff...

Network and Infrastructure Security (Medium) 2023-06-01

Network and Infrastructure Security (Medium) crossword puzzle
Across
  1. A network security device that monitors and controls incoming and outgoing network traffic.
  2. A security technology that monitors network traffic for suspicious activities or behavior.
  3. Control The practice of limiting and controlling who can access and use resources in a system or network.
  4. Strategies and technologies implemented to prevent the unauthorized loss or leakage of sensitive data.
  5. Segmentation The practice of dividing a network into smaller, isolated segments to enhance security and control access.
Down
  1. An attack that targets a vulnerability unknown to the software vendor, giving them zero days to fix it before it can be exploited.
  2. A security method that requires users to provide two forms of identification, typically a password and a unique code.
  3. The process of converting information into a secure code to prevent unauthorized access.
  4. A security technology that actively monitors and blocks malicious activities in a network.
  5. Manipulating individuals to divulge sensitive information or perform actions that may compromise security.
  6. A secure network connection that allows users to access a private network over the internet.

11 Clues: The process of converting information into a secure code to prevent unauthorized access.A security technology that monitors network traffic for suspicious activities or behavior.A security technology that actively monitors and blocks malicious activities in a network....

General insurance products 2020-11-23

General insurance products crossword puzzle
Across
  1. Theft
  2. Damage caused to your own vehicle
  3. Losses due to piracy or jettison
  4. Fines or ransoms to restore data
  5. Losses following the inability to trade
  6. Spending a night in hospital
  7. Fire or storm damage to your place of business
  8. Damage caused to someone else's vehicle
Down
  1. Losses arising from failed debts
  2. Injury in the workplace
  3. Injury to oneself
  4. Redundancy
  5. Losses cause by malicious employees
  6. Fire or storm damage to your home
  7. Damage caused by faulty packaging
  8. Fire, explosion, terrorism
  9. Loss resulting from poor advice
  10. Injury or loss when someone is on your property

18 Clues: TheftRedundancyInjury to oneselfInjury in the workplaceFire, explosion, terrorismSpending a night in hospitalLoss resulting from poor adviceLosses arising from failed debtsLosses due to piracy or jettisonFines or ransoms to restore dataDamage caused to your own vehicleFire or storm damage to your homeDamage caused by faulty packaging...

KELAS VII.4 RESKI FAREL RAMADHAN 2023-05-10

KELAS VII.4 RESKI FAREL RAMADHAN crossword puzzle
Across
  1. APILAKASI YG DICIP TAKAKAN PADA TH 2010
  2. YG MUNCUL PADA TH 2011
  3. BULIYNG DAMPAK PENGUNAAN TIK
  4. 2002
  5. KE INTERNET DITUNJUKKAN
  6. MAYA
  7. HP PERANG KATJARINGAN YG DIKEMBANGKAN AGAR BISA
  8. SITUS YG MENGKEM SEBAGAI SITUS MINCO BLOGGING
  9. LEBIH POPULER SBAGAI SUMBER INFORMASI CEPAT
  10. TUNAI
  11. SISTEM PEMBAYARAN ELEKTRONIK YG MEMUNGKINKAN
  12. MEDIA MENJADI AWAL LAHIRNYA MEDIA SOSIAL PADA
Down
  1. MYITY KEINGINAN UNTUK MENG RAHASIAKAN JATI DIRI
  2. KEBERADAAN
  3. SITUS JARINGAN SOSIAL YG BERFUNGSI PADA PETUKARAN
  4. SECARA UMUMNYA RUNG PERSONAL INDIVIDU SANGAT
  5. MENJUAL OLEN SHOP DAN BISNIS OLEN
  6. TAPAHARUS MENGUNAKAN CEK ATAUPUN

18 Clues: 2002MAYATUNAIKEBERADAANYG MUNCUL PADA TH 2011KE INTERNET DITUNJUKKANBULIYNG DAMPAK PENGUNAAN TIKTAPAHARUS MENGUNAKAN CEK ATAUPUNMENJUAL OLEN SHOP DAN BISNIS OLENAPILAKASI YG DICIP TAKAKAN PADA TH 2010LEBIH POPULER SBAGAI SUMBER INFORMASI CEPATSECARA UMUMNYA RUNG PERSONAL INDIVIDU SANGATSISTEM PEMBAYARAN ELEKTRONIK YG MEMUNGKINKAN...

Security Week 2021-02-22

Security Week crossword puzzle
Across
  1. the security classification used when the compromise of the information could cause damage to the national interest, organisations or individuals
  2. A security zone used to access and store top secret and code word material (acronym)
  3. A p_ _ _ _ _ _ _ _ _ _ m_ _ _ _ _ _ indicates the required level of protection to all users of the information
  4. the approved method of destroying hard copy security classified information.
  5. a physical storage place for security classified documents
  6. caveat that indicates only Australian citizens can access the information.
Down
  1. The overarching framework that mandates security requirements for the department
  2. The secretary has signed a clear desk and clear screen
  3. a method for securely transferring hard copy PROTECTED material and above
  4. who is the only person / area that can change the sensitivity or security classification applied to information?

10 Clues: The secretary has signed a clear desk and clear screena physical storage place for security classified documentsa method for securely transferring hard copy PROTECTED material and abovecaveat that indicates only Australian citizens can access the information.the approved method of destroying hard copy security classified information....

ΑΣΦΑΛΕΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟ 2024-02-12

ΑΣΦΑΛΕΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟ crossword puzzle
Across
  1. ΔΙΑΔΙΚΤΥΑΚΟΣ ΕΚΦΟΒΙΣΜΟΣ
  2. GAMING ΠΑΙΧΝΙΔΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟ
  3. NEWS ΨΕΥΔΕΙΣ ΕΙΔΗΣΕΙΣ
  4. PRIVACY ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ
  5. PASSWORD ΚΩΔΙΚΟΙ ΠΡΟΣΒΑΣΗΣ
Down
  1. ADVERTISMENT ΣΤΟΧΕΥΜΕΝΕΣ ΔΙΑΦΗΜΙΣΕΙΣ
  2. REPUTATION ΔΙΑΔΙΚΤΥΑΚΗ ΦΗΜΗ
  3. SCAMS ΗΛΕΚΤΡΟΝΙΚΕΣ ΑΠΑΤΕΣ
  4. ADDICTION ΕΘΙΣΜΟΣ ΣΤΟ ΔΙΑΔΥΚΤΙΟ
  5. ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜIKO

10 Clues: ΚΑΚΟΒΟΥΛΟ ΛΟΓΙΣΜIKONEWS ΨΕΥΔΕΙΣ ΕΙΔΗΣΕΙΣΔΙΑΔΙΚΤΥΑΚΟΣ ΕΚΦΟΒΙΣΜΟΣSCAMS ΗΛΕΚΤΡΟΝΙΚΕΣ ΑΠΑΤΕΣPASSWORD ΚΩΔΙΚΟΙ ΠΡΟΣΒΑΣΗΣREPUTATION ΔΙΑΔΙΚΤΥΑΚΗ ΦΗΜΗPRIVACY ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥGAMING ΠΑΙΧΝΙΔΙΑ ΣΤΟ ΔΙΑΔΙΚΤΥΟADDICTION ΕΘΙΣΜΟΣ ΣΤΟ ΔΙΑΔΥΚΤΙΟADVERTISMENT ΣΤΟΧΕΥΜΕΝΕΣ ΔΙΑΦΗΜΙΣΕΙΣ

cyber ops crossword 2022-11-22

cyber ops crossword crossword puzzle
Across
  1. transition of packets from one mission to another
  2. used to connect two or more networks
  3. tells connections you computer currently has
  4. different type of networks communication
  5. open system interconnection model
Down
  1. unique address for a nic
  2. millions of individual computer sending
  3. tells you if packet got to its destination
  4. commonly used command to send test packet
  5. small box shaped electronic device
  6. device used to boost signals
  7. a connection point
  8. data divided into small chunks
  9. abbreviation for name server lookup
  10. classless interdomain routing
  11. lookback address written as 128

16 Clues: a connection pointunique address for a nicdevice used to boost signalsclassless interdomain routingdata divided into small chunkslookback address written as 128open system interconnection modelsmall box shaped electronic deviceabbreviation for name server lookupused to connect two or more networksmillions of individual computer sending...

CM-BCMS 2025-04-04

CM-BCMS crossword puzzle
Across
  1. Analysis Evaluating potential digital threats to ensure safety.
  2. Assessment Analyzing threats to minimize potential vulnerabilities.
  3. Management Routine updates to close security gaps in software.
  4. Deceptive techniques using fake messages to steal sensitive information.
  5. Testing Simulated attack to uncover security system flaws.
  6. An attack demanding payment to unlock encrypted data.
  7. Backup plan prepared for unexpected disruptions.
  8. A voice-based scam to extract personal information over the phone.
  9. Management Planning to ensure survival during emergencies.
  10. Malicious software created to disrupt or damage systems.
  11. Ability to recover operations during or after a crisis.
  12. Continuity Plan (BCP) Framework ensuring operations continue despite challenges.
  13. Cyberattack via text messages designed to deceive users.
Down
  1. State of readiness to effectively respond to issues.
  2. Process of restoring crucial business functions post-disruption.
  3. Weakness in a system exploitable by attackers.
  4. Process of verifying a user’s identity for security purposes.
  5. Secures information by converting it into unreadable code.
  6. A system barrier preventing unauthorized access to networks.

19 Clues: Weakness in a system exploitable by attackers.Backup plan prepared for unexpected disruptions.State of readiness to effectively respond to issues.An attack demanding payment to unlock encrypted data.Ability to recover operations during or after a crisis.Malicious software created to disrupt or damage systems....

CYBER LAW- CROSSWORD (CIA 1) 2021-09-05

CYBER LAW- CROSSWORD (CIA 1) crossword puzzle
Across
  1. This school points that individual acting in whatever capacity should be at liberty to pursue their own tastes and online interests.
  2. The backbone of World Wide Web, which are specially formatted documents that contain links, images, etc.
  3. It is often viewed as the act of sending unsolicited email.
  4. It is a common file format used to combine and compress data for easy downloading.
  5. Most popular search engine.
  6. These are a constraint to the principle of anonymity, which act as a regulation to trace back people using it.
Down
  1. The act of persistent and unwanted contact from someone online.
  2. He is one of the famous scholar in cyber paternalism.
  3. There are 4 constraints given by one of the famous cyber paternalist, which are law, market space, social norms and ____________.
  4. The conversion of texts, pictures, or sound into a digital form.

10 Clues: Most popular search engine.He is one of the famous scholar in cyber paternalism.It is often viewed as the act of sending unsolicited email.The act of persistent and unwanted contact from someone online.The conversion of texts, pictures, or sound into a digital form.It is a common file format used to combine and compress data for easy downloading....

TTS INFORMATIKA QIRANI 2025-03-11

TTS INFORMATIKA QIRANI crossword puzzle
Across
  1. cyber crime
  2. tujuan konten media digital
  3. jenis jenis media digital
  4. etika dalam konten digital
  5. pilihan platform konten media digital
  6. tahapan awalan dalam produksi konten digital
Down
  1. hak cipta konten digital adalah
  2. ciri ciri media digital
  3. contoh media digital
  4. siapakah target audiens dalam konten digital

10 Clues: cyber crimecontoh media digitalciri ciri media digitaljenis jenis media digitaletika dalam konten digitaltujuan konten media digitalhak cipta konten digital adalahpilihan platform konten media digitalsiapakah target audiens dalam konten digitaltahapan awalan dalam produksi konten digital

tts informatika (zahra) 2025-03-11

tts informatika (zahra) crossword puzzle
Across
  1. Hak cipta dalam konten digital?
  2. tahapan produksi konten digital
  3. Menjaga privasi dalam konten digital?
  4. apa ciri media digital
Down
  1. apa perbedaan media digital dan tradisional
  2. Cyber crime dalam konten digital?
  3. Plagiarisme dalam konten digital?
  4. Hoaks dalam konten digital?
  5. bagaimana memilih media digital
  6. apa media digital

10 Clues: apa media digitalapa ciri media digitalHoaks dalam konten digital?Hak cipta dalam konten digital?tahapan produksi konten digitalbagaimana memilih media digitalCyber crime dalam konten digital?Plagiarisme dalam konten digital?Menjaga privasi dalam konten digital?apa perbedaan media digital dan tradisional

Internet crossword questions 2013-05-16

Internet crossword questions crossword puzzle
Across
  1. broswing the web
  2. bits per second
  3. a online bully
  4. board tool used to type
  5. web adress
Down
  1. tool used to click on the computer
  2. A software program
  3. Text that is usally in the color blue
  4. Place on the internet where you can communicate
  5. Place where you can send emails

10 Clues: web adressa online bullybits per secondbroswing the webA software programboard tool used to typePlace where you can send emailstool used to click on the computerText that is usally in the color bluePlace on the internet where you can communicate

Crossword-2 2019-06-30

Crossword-2 crossword puzzle
Across
  1. initiative for Multi-lingual Internet
  2. smarter banking alternatives
  3. Regional Internet Registry
  4. reason for being
  5. Key ICANN focus area
Down
  1. UNICEF Report on IG and Child rights
  2. Cyber Hygiene initiative by ISOC...Chapter?
  3. category of top level domains
  4. Internet Governance Academy
  5. ISOC Palestine initiative on online sexual harassment

10 Clues: reason for beingKey ICANN focus areaRegional Internet RegistryInternet Governance Academysmarter banking alternativescategory of top level domainsUNICEF Report on IG and Child rightsinitiative for Multi-lingual InternetCyber Hygiene initiative by ISOC...Chapter?ISOC Palestine initiative on online sexual harassment

Quality 2023-04-03

Quality crossword puzzle
Across
  1. CAT scan alternative
  2. Basic unit of all forms of life
  3. what 5280 feet equals
  4. Greenish blue hue
  5. Interruptions during TV programs
Down
  1. Board games has it in black and white
  2. prefix involving computers or computer networks
  3. Final letter in the Greek alphabet
  4. A golf course has 18
  5. Catch forty winks

10 Clues: Catch forty winksGreenish blue hueCAT scan alternativeA golf course has 18what 5280 feet equalsBasic unit of all forms of lifeInterruptions during TV programsFinal letter in the Greek alphabetBoard games has it in black and whiteprefix involving computers or computer networks

Unit 7-8 2019-06-03

Unit 7-8 crossword puzzle
Across
  1. Device used at airport security
  2. Piece of plastic you pay with
  3. When two people have different skills that work together
  4. Number to use your card
  5. Software to protect your computer
Down
  1. Company started by two other companies
  2. Serious problem with security
  3. Person working in security
  4. Win-win situation
  5. Thing which interests both sides
  6. Close circuit camera system (abbreviation)
  7. Somebody who works well with others

12 Clues: Win-win situationNumber to use your cardPerson working in securitySerious problem with securityPiece of plastic you pay withDevice used at airport securityThing which interests both sidesSoftware to protect your computerSomebody who works well with othersCompany started by two other companiesClose circuit camera system (abbreviation)...

U11 - Technical Language used in reports 2025-12-15

U11 - Technical Language used in reports crossword puzzle
Across
  1. Significant damage requiring substantial resources to resolve. (Risk severity)
  2. International standard for managing information security. (compliance framework)
  3. (8,6) A trustworthy origin of information or evidence. (Reliability)
  4. Formal rules and guidelines for secure system use and behaviour. (Administrative controls)
  5. A potential event or action that could cause harm to systems, data, or operations. (Risk Assessment)
  6. A weakness in a system or process that can be exploited by a threat. (Risk Assessment)
  7. Video surveillance used to monitor and record physical activity. (Physical control)
  8. Noticeable disruption but recoverable without major cost. (Risk severity)
  9. (8,9) Assurance that evidence remains unchanged and reliable. (Forensic Analysis)
  10. (6,6,4) A locked and restricted area for housing critical hardware. (Physical control)
  11. Verification that data or evidence is genuine. (Reliability)
  12. (5,2,7) Documentation showing who handled evidence and when. (Forensic Analysis)
  13. (9,6) Authentication using unique biological traits like fingerprints. (Physical control)
  14. (4,10,3,4) UK law that governs the collection, processing, and use of personal data; works with UK GDPR and grants individuals rights over their data. (compliance framework)
  15. EU regulation governing personal data protection and privacy. (compliance framework)
  16. The level of damage or disruption that a successful attack or incident would cause. (Risk Assessment)
  17. (3,4) A record of system events and activities for analysis. (Forensic Analysis)
Down
  1. (8,8) A structured approach to detect, contain, and recover from security incidents. (Administrative controls)
  2. (5-6,14) A login method requiring two or more verification factors. (Technical control)
  3. Actions taken to reduce the impact of a threat. (Incident Review & Security Report)
  4. The probability that a threat will exploit a vulnerability. (Risk Assessment)
  5. (10,8) Steps implemented to stop incidents before they occur. (Incident Review & Security Report)
  6. Critical impact causing severe operational or financial loss. (Risk severity)
  7. (8,6,3,4) UK law criminalizing unauthorized access and misuse of computer systems.(compliance framework)
  8. (8,4) The remaining risk after controls have been applied. (Incident Review & Security Report)
  9. The process of converting data into a coded format to prevent unauthorized reading. (Technical control)
  10. control Procedures that define who can view or use resources.(Administrative controls)
  11. (6-5)Designed to prevent unauthorized alteration. (Reliability)
  12. A network security device that filters traffic to block unauthorized access. (Technical control)
  13. A date and time marker showing when an event occurred. (Forensic Analysis)
  14. Minimal impact on operations; easily managed. (Risk severity)

31 Clues: Verification that data or evidence is genuine. (Reliability)Minimal impact on operations; easily managed. (Risk severity)(6-5)Designed to prevent unauthorized alteration. (Reliability)(8,6) A trustworthy origin of information or evidence. (Reliability)Noticeable disruption but recoverable without major cost. (Risk severity)...

5-3 B, C 2023-04-20

5-3 B, C crossword puzzle
Across
  1. The objective of this step is the closing of security gaps.
  2. The assessment of critical servers, which may be vulnerable to attacks if not adequately tested or not generated from a tested machine image.
  3. are software packages used on information systems or networks to scan looking for weaknesses like open port exploitations, weak passwords, and security configuration errors leading to potential misuse and abuse.
  4. It performs configuration scans of servers, network devices and databases to test for specific policy settings and can check internal security policy compliance. Nessus® can perform scans of ports, firewall configurations, network devices (i.e. routers, switches, etc.), and provides reports back to the system administrator.
  5. The identifying of security vulnerabilities in web applications and their source code by automated scans on the front-end or static/dynamic analysis of source code.
  6. Monitors the network in real-time, continuously looking for new hosts, applications and new vulnerabilities without requiring the need for active scanning.
  7. The objective of this step is the prioritizing of vulnerabilities
  8. provides network administrators and security personnel with mechanisms to prevent, detect, track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks and information systems.
Down
  1. The assessment of policies and practices to prevent unauthorized access to private or public networks and network-accessible resources.
  2. The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one.
  3. The assessment of databases or big data systems for vulnerabilities and misconfigurations, identifying rogue databases or insecure dev/test environments, and classifying sensitive data across an organization’s infrastructure.
  4. tool automatically identifies configuration vulnerabilities threatening the security of the DoD's computer systems
  5. is designed to support a faster pace of system updating and patch management for our network connected Windows devices. Quick and efficient delivery of high and critical security updates will ensure that you meet your compliance deadlines for TCNO and MTO’s.
  6. Single console access used by ACAS managing Nessus® scans at the enterprise network level. Security Center provides real-time detection of network anomalies and is scalable, meaning it can grow to accommodate as many scanners as needed to cover the entire network
  7. A DoD information system used to record, track, and disseminate critical vulnerability information throughout the DoD Enterprise network.
  8. The objective of this step is to draft a comprehensive list of an application’s vulnerabilities.

16 Clues: The objective of this step is the closing of security gaps.The objective of this step is the prioritizing of vulnerabilitiesThe objective of this step is to draft a comprehensive list of an application’s vulnerabilities.The objective of this step is to identify the source and root cause of the vulnerabilities identified in step one....

IPO 2021-06-10

IPO crossword puzzle
Across
  1. opinion (Plato)
  2. a three-tier complex world (Nye)
  3. author of an offensive or provocative post
  4. acquisition of relatively stable PO
  5. democratic theory(active citizens)
  6. a type of power that affects identities
Down
  1. society governed by the wealthy
  2. power in direct interactions
  3. a symptom of state erosion (Dasgupta)
  4. the biggest cyber crime offender (country)
  5. a contextual message about the information
  6. Friedman's definition of interdependent wo
  7. int users that don't contribute any content
  8. reiterative information (confirmation bias)
  9. a kind of manipulated political talk

15 Clues: opinion (Plato)power in direct interactionssociety governed by the wealthya three-tier complex world (Nye)democratic theory(active citizens)acquisition of relatively stable POa kind of manipulated political talka symptom of state erosion (Dasgupta)a type of power that affects identitiesthe biggest cyber crime offender (country)...

pastbin 2020-12-22

pastbin crossword puzzle
Across
  1. Points on a star
  2. Kind of car
  3. The Spanish word for open
  4. Put something on top of
  5. 3d image formed by light from a laser
  6. Everybody has 2
  7. In a car
  8. The state you live in
Down
  1. Not physically existing but appears to do so
  2. Inormation technology
  3. Text files with small pieces of data
  4. The Spanish word for green
  5. High social class
  6. How many spent years in high school
  7. A fact of being who or what a person is

15 Clues: In a carKind of carEverybody has 2Points on a starHigh social classInormation technologyThe state you live inPut something on top ofThe Spanish word for openThe Spanish word for greenHow many spent years in high schoolText files with small pieces of data3d image formed by light from a laserA fact of being who or what a person is...

multimedia 2013-10-20

multimedia crossword puzzle
Across
  1. used to represent the shots planned for a film or television production
  2. a layout/ template used for designing
  3. according or agreeing
  4. photographs, pictures
  5. a program used to design multimedia
  6. a cyber ‘portal’
  7. 6 words, rhymes with clear
  8. anywhere on a paper which has no picture or text
  9. opposite of internal link
Down
  1. sound
  2. changing from one slide to another
  3. used for presentations
  4. I can record _ _ _ _ _
  5. text that when clicked on opens a new page
  6. images which are rapidly shown

15 Clues: sounda cyber ‘portal’according or agreeingphotographs, picturesused for presentationsI can record _ _ _ _ _opposite of internal link6 words, rhymes with clearimages which are rapidly shownchanging from one slide to anothera program used to design multimediaa layout/ template used for designingtext that when clicked on opens a new page...

BCS reveiw noah 2015-11-13

BCS reveiw noah crossword puzzle
Across
  1. computer screen
  2. something that you move and click stuff with
  3. proper technique
  4. being safe on thee interwebs
  5. a message sender thing that send messages to people
  6. something you can access the web on
  7. micro soft excel
  8. a group of computers
Down
  1. a plan u pick that limits sertan thing
  2. web page maker
  3. ware stuff that makes up a computer
  4. asdfjkl;'
  5. bully bully on the internet
  6. publisher greating cards
  7. a small slip of buttons at the top of a Microsoft thing

15 Clues: asdfjkl;'web page makercomputer screenproper techniquemicro soft excela group of computerspublisher greating cardsbully bully on the internetbeing safe on thee interwebsware stuff that makes up a computersomething you can access the web ona plan u pick that limits sertan thingsomething that you move and click stuff with...

Cyberbezpieczeństwo 2025-04-09

Cyberbezpieczeństwo crossword puzzle
Across
  1. Program lub urządzenie blokujące nieautoryzowany dostęp do sieci .
  2. Proces szyfrowania danych .
  3. Kopia zapasowa danych .
  4. Program,który chroni komputer przed wirusami .
  5. Nazwa użytkownika potrzebna do zalogowania się .
  6. forma złośliwego oprogramowania, które żąda okupu.
Down
  1. Złośliwe oprogramowanie podszywające się pod coś użytycznego .
  2. Może zawierać litery, cyfry i znaki specjalne .
  3. Zabezpieczenie dostępu np.login.
  4. Chroni tożsamość w internecie .
  5. Ogólna nazwa dla złośliwego orpogramowania .
  6. Fałszywa wiadomość podszywająca się pod zaufane żródłó.
  7. Sieć WI-FI bez hasła .
  8. DDoS Cyber atak polegający na zalaniu serwera.
  9. Krótkie potwierdzenie logowania .

15 Clues: Sieć WI-FI bez hasła .Kopia zapasowa danych .Proces szyfrowania danych .Chroni tożsamość w internecie .Zabezpieczenie dostępu np.login.Krótkie potwierdzenie logowania .Ogólna nazwa dla złośliwego orpogramowania .Program,który chroni komputer przed wirusami .Może zawierać litery, cyfry i znaki specjalne ....

Juni 1 2024-06-13

Juni 1 crossword puzzle
Across
  1. Thank you for always coming with me
  2. We still don't know what it means
  3. The reason we whisper
  4. Rice Krispies...
  5. Doha Fried Chicken
  6. The tree I actually know
  7. If she can do cyber, so can you
Down
  1. My favourite orange vegetable
  2. I make it well, you make it even better
  3. Watchuwannamanna
  4. Swiss brand
  5. Food fit for BC
  6. The highest restaurant in Africa
  7. The best ice cream I've ever had
  8. Your fav Hyatt staff member

15 Clues: Swiss brandFood fit for BCWatchuwannamannaRice Krispies...Doha Fried ChickenThe reason we whisperThe tree I actually knowYour fav Hyatt staff memberMy favourite orange vegetableIf she can do cyber, so can youThe highest restaurant in AfricaThe best ice cream I've ever hadWe still don't know what it meansThank you for always coming with me...

Chapter 2 2014-10-19

Chapter 2 crossword puzzle
Across
  1. A security principle that makes sure that information and systems are not modified maliciously or accidentally.
  2. An instance of being exposed to losses from a threat. A weakness or vul-nerability can cause an organization to be exposed to possible damages.
  3. The reliability and accessibility of data and resources to authorized individuals in a timely manner.
  4. Two or more people working together to carry out a fraudulent activity. More than one person would need to work together to cause some type of destruction or fraud; this drastically reduces its probability.
  5. Detailed step-by-step instructions to achieve a certain task, which are used by users, IT staff, operations staff, security members, and others.
  6. A security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.
  7. The act of tricking another person into providing confidential information by posing as an individual who is authorized to receive that information.
  8. High level document that outlines senior managemetn security directives
  9. A group decision method used to ensure that each member of a group gives an honest and anonymous opinion pertaining to the company’s risks.
  10. When a safeguard is not implemented, an organization is faced with the total risk of that particular vulnerability.
  11. Rellying on the secrecy or complexity of an item as its security instead of practicing instead of proacticing solid securyty practices
  12. An assessment that is performed to ensure that the cost of a safeguard does not outweigh the benefit of the safeguard. Spending more to protect an asset than the asset is actually worth does not make good business sense. All possible safeguards must be evaluated to ensure that the most security-effective and cost-effective choice is made.
  13. When a person looks over another person’s shoulder and watches keystrokes or watches data as it appears on the screen in order to uncover information in an unauthorized manner.
  14. A risk analysis method that attempts to use percentages in damage estimations and assigns real numbers to the costs of countermeasures for particular risks and the amount of damage that could result from the risk. Compare to qualitative risk analysis.
  15. An individual who is responsible for the maintenance and protection of the data. This role is usually filled by the IT department (usually the network administrator). The duties include performing regular backups of the data, implementing security mechanisms, periodically validating the integrity of the data, restoring data from backup media, and fulfilling the requirements specified in the company’s security policy, standards, and guidelines that pertain to information security and data protection.
Down
  1. Any potential danger that a vulnerability will be exploited by a threat agent.
  2. An entity that can exploit a vulnerability.
  3. Detective/administrative control used to uncover potential fraudulet activities
  4. Organizational, Issue specific, and system specific are _____ (2 words)
  5. A risk analysis method that uses intuition and experience to judge an organization’s exposure to risks. It uses scenarios and ratings systems. Compare to quantitative risk analysis.
  6. A dollar amount that is assigned to a single event that represents the company’s potential loss amount if a specific threat were to take place.
  7. A dollar amount that estimates the loss potential from a risk in a span of a year.
  8. Rules indicating how hardware and software should be implemented, used, and maintained. Standards provide a means to ensure that specific technologies, asset value × exposure factor = SLE applications, parameters, and procedures are carried out in a uniform way across the organization. They are compulsory.
  9. Safeguard that is put in place to reduce risk. Also called a countermeasure.
  10. Regulatory, Advisory, Informative are ____ (3 words)
  11. analysis Assigning confidence level values to data elements
  12. Individual respponsible for the protection and classification of a specific data set
  13. The remaining risk after the security controls have been applied. The conceptual formulas that explain the difference between total and residual risk are threats × vulnerability × asset value = total risk(threats × vulnerability × asset value) × controls gap = residual risk
  14. The absence or weakness of a safeguard that could be exploited.
  15. The likelihood of a threat agent taking advantage of a vulnerability and the resulting business impact. A risk is the loss potential, or probability, that a threat will exploit a vulnerability.
  16. A security principle that works to ensure that information is not disclosed to unauthorized subjects.
  17. Recommended actions and operational guides for users, IT staff, operations staff, and others when a specific standard does not apply.
  18. accept, transfer, mitigate, avoid are ways to _____ (2 words)

33 Clues: An entity that can exploit a vulnerability.Regulatory, Advisory, Informative are ____ (3 words)analysis Assigning confidence level values to data elementsaccept, transfer, mitigate, avoid are ways to _____ (2 words)The absence or weakness of a safeguard that could be exploited.Organizational, Issue specific, and system specific are _____ (2 words)...

It's Fall Y'all 2021-10-12

It's Fall Y'all crossword puzzle
Across
  1. Delicious when roasted
  2. Given in November
  3. ___ Monday
  4. Turning and falling
  5. Major autumn sport
  6. Sign of candy availability
  7. The other part of a classic choice
  8. For lattes or carving
  9. Fall weather type
  10. Traditional last-minute costume
  11. Cooler autumn sport
  12. Adult warm-up beverage
  13. Parade sponsor
Down
  1. Roasted over fires
  2. Preferable type of house
  3. Door-knock outcome
  4. The star of the dinner
  5. Canned or homemade
  6. Spooky season pinnacle
  7. Winter, Spring, Summer, ___
  8. Popular picking destination
  9. Predominant fall color
  10. Door decoration
  11. One part of a classic choice
  12. Beloved pie
  13. October movie genre
  14. Ideal fall food

27 Clues: ___ MondayBeloved pieParade sponsorDoor decorationIdeal fall foodGiven in NovemberFall weather typeRoasted over firesDoor-knock outcomeCanned or homemadeMajor autumn sportTurning and fallingOctober movie genreCooler autumn sportFor lattes or carvingDelicious when roastedThe star of the dinnerSpooky season pinnaclePredominant fall color...

Friday Fun - Do you know your Acronyms? 2022-02-03

Friday Fun - Do you know your Acronyms? crossword puzzle
Across
  1. The T in TPP
  2. The I in DPIA
  3. The C in DSCA
  4. The Q in QSealC
  5. The L in OBL
  6. The G in GDPR
  7. The A in OPA
  8. The D in PSD2
  9. The T in QTSP
  10. The I in PISP
  11. The C in CPS
Down
  1. The I in AISP
  2. The P in ERP
  3. The A in QWAC
  4. The first U in UUID
  5. The first S in ASPSP
  6. The O in DSOP
  7. The L in AML
  8. The E in OBIE
  9. The C in CDC
  10. The S in QTSP
  11. The N in JSON
  12. The B in CBPII

23 Clues: The T in TPPThe P in ERPThe L in OBLThe L in AMLThe C in CDCThe A in OPAThe C in CPSThe I in AISPThe A in QWACThe I in DPIAThe O in DSOPThe C in DSCAThe G in GDPRThe E in OBIEThe S in QTSPThe N in JSONThe D in PSD2The T in QTSPThe I in PISPThe B in CBPIIThe Q in QSealCThe first U in UUIDThe first S in ASPSP

Movie Titles 1 2023-09-04

Movie Titles 1 crossword puzzle
Across
  1. - Tarantino's crime saga
  2. - Death row redemption
  3. - A blue-skinned alien adventure
  4. - Rules don't talk about it
  5. - Hannibal Lecter thriller
  6. - Scarlett's Civil War tale
  7. - A shipwrecked romance
  8. - Saving Jews in WWII
  9. - Rick's cafe locale
  10. - Underdog boxer
  11. - All work and no play
  12. - Neo's cyber journey
  13. - Batman's brooding sequel
  14. - Musical love story
  15. - Life is like a box of chocolates
Down
  1. - Dream within a dream
  2. - Dinosaurs run amok
  3. - A great white menace
  4. - Alien meets boy
  5. - Maximus seeks revenge
  6. - Space-time odyssey
  7. - Mobsters' rise and fall
  8. - Simba's Hakuna Matata
  9. - William Wallace's epic
  10. - Mafia family drama

25 Clues: - Underdog boxer- Alien meets boy- Dinosaurs run amok- Space-time odyssey- Rick's cafe locale- Mafia family drama- Musical love story- Saving Jews in WWII- Neo's cyber journey- Dream within a dream- Death row redemption- A great white menace- All work and no play- Maximus seeks revenge- Simba's Hakuna Matata- A shipwrecked romance...

EXTREME SPORTS 2021-09-24

EXTREME SPORTS crossword puzzle
Across
  1. what happens each sport
  2. is main in all sports
  3. It's a winged suit used for gliding
  4. used in canyoning sport
  5. flying is skydiving that consists of flying using an airsuit
  6. occurs in all sports
  7. sports security means
  8. is a movement in which a living being propels through the air along a ballistic trajectory
Down
  1. ideal for all sports especially for wingsuit security is taken into account in all extreme sports
  2. consiste principalmente en el descenso de barrancos
  3. important security means
  4. board on snow
  5. it is the technique of launching human beings

13 Clues: board on snowoccurs in all sportsis main in all sportssports security meanswhat happens each sportused in canyoning sportimportant security meansIt's a winged suit used for glidingit is the technique of launching human beingsconsiste principalmente en el descenso de barrancosflying is skydiving that consists of flying using an airsuit...

dudes 2023-01-30

dudes crossword puzzle
Across
  1. People you don't know that are watching you
  2. selected or organized knowledge
  3. keeping things to yourself
  4. Lasting a long time
  5. stealing someones identity
  6. online feet
Down
  1. info leading to your identity
  2. Sharing stuff you will regret
  3. flag feeling a bad feeling about something
  4. a trick to steal peoples money
  5. bully an online bully
  6. somone trying to steal your identity
  7. out chosing not to do something

13 Clues: online feetLasting a long timebully an online bullykeeping things to yourselfstealing someones identityinfo leading to your identitySharing stuff you will regreta trick to steal peoples moneyselected or organized knowledgeout chosing not to do somethingsomone trying to steal your identityflag feeling a bad feeling about something...

Y13 Water Security 2023-09-19

Y13 Water Security crossword puzzle
Across
  1. also known as paleowater or ancient groundwater, refers to groundwater that has been stored in underground aquifers for an extended period, often thousands to millions of years. It is a non-renewable water resource.
  2. is the water stored beneath the Earth's surface in porous rock formations and aquifers. It is a vital source of freshwater for drinking, agriculture, and industrial purposes.
  3. is the phase transition in which water changes directly from a solid (ice) to a gas (water vapor) without passing through the liquid phase. It commonly occurs in cold and dry conditions.
  4. is the process by which water changes from its liquid state to vapor or gas when exposed to heat or sunlight. It primarily occurs from open water surfaces, such as lakes and oceans, and moist land areas.
  5. refers to the rate of flow or transfer of water through a specific area or volume. It quantifies the movement of water in various parts of the hydrological system.
  6. Radiation is the energy emitted by the sun in the form of electromagnetic waves. It plays a significant role in driving the processes of evaporation, transpiration, and heating of the Earth's surface, affecting the water cycle.
  7. represents the movement of water within natural or artificial channels, such as rivers, streams, and pipelines. It is characterized by the volume of water passing through a specific point over time.
  8. is the deliberate application of water to land or soil to assist in the growth of crops and vegetation. It is commonly used in agriculture to supplement natural rainfall.
  9. is the process by which water soaks into the ground, entering the soil and eventually recharging underground aquifers. It is a crucial aspect of groundwater replenishment.
Down
  1. Cycle also called the water cycle, is the continuous and interconnected process by which water circulates through the Earth's atmosphere, surface, and subsurface. It includes evaporation, condensation, precipitation, runoff, and groundwater flow.
  2. refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams.
  3. is the combined process of water vapor being released into the atmosphere through two primary mechanisms: evaporation from surfaces like soil and water bodies and transpiration from plants through their leaves. It represents the total loss of water from the Earth's surface to the atmosphere.
  4. is the energy possessed by water due to its elevation above a reference point, typically the Earth's surface. It is a key factor influencing the movement of water in rivers and streams.
  5. is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources.
  6. also known as a watershed or catchment area, is an area of land that collects and channels water, including rainfall and runoff, into a central point, such as a river or lake.
  7. refers to any form of water, such as rain, snow, sleet, or hail, that falls from the atmosphere to the Earth's surface. It is a critical component of the water cycle and contributes to replenishing water resources.
  8. is a systematic assessment of the inflows and outflows of water within a specific region or system. It helps in understanding the availability and usage of water resources and can guide sustainable water management.
  9. is the flow of water that occurs when excess rainwater or melted snow does not infiltrate into the soil but instead flows over the land surface, eventually entering streams, rivers, and other water bodies.

18 Clues: refers to a reservoir or storage compartment where water is held temporarily, such as lakes, aquifers, or dams.is the downward movement of water through soil or porous rock layers, allowing water to infiltrate into underground aquifers or recharge groundwater resources....

Compliance & Security Week 2024-11-13

Compliance & Security Week crossword puzzle
Across
  1. An email that tricks you into clicking on a link or opening an attachment
  2. Bad software installed on a computer to damage or harm it. Examples are viruses, ransomware, spyware, etc.
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket.
  4. Unwanted emails or messages that usually try to sell you something
  5. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  6. What type of information must be secured and protected?
  7. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip though.
  8. Who is the person you should report any HIPAA breaches?
  9. If you receive a suspicious ___ hover over it with your mouse before clicking to make sure it is real
  10. It's like your underwear; don't share it with anyone and change it at least every 90 days
  11. How often does DDID require HIPAA training?
Down
  1. What program is Shane in control of?
  2. The process of transforming and encoding information to pass information securely
  3. Unauthorized user with malicious intent
  4. What is the private network you log into make you anonymous on the intranet?
  5. Always ___ your devices and software when the newest version is available
  6. What HIPAA rule protects individual rights
  7. When multiple devices are connected together to share information. They are together in a ____.

18 Clues: What program is Shane in control of?Unauthorized user with malicious intentWhat HIPAA rule protects individual rightsHow often does DDID require HIPAA training?What type of information must be secured and protected?Who is the person you should report any HIPAA breaches?Unwanted emails or messages that usually try to sell you something...

Web Security p212-214, 252 2021-07-15

Web Security p212-214, 252 crossword puzzle
Across
  1. bad hacker, evil
  2. outdated & unreliable - untrustworthy technology
  3. Person --> "known knowns, ...know we don't know, ...don't know we don't know"
  4. criminal scamming & harvesting info often by gaining illegitimate access
  5. software attack, also what birds eat
  6. hacking methods may cross legal or ethical lines
  7. take advantage of vulnerability (a weakness) in software
  8. Chief Information security officer
  9. denial of service
  10. plan to prevent, detect and respond to any attempts to breach security
  11. a combination of confidentiality, integrity and availability
Down
  1. motivated by ideology to undertake maximum disruption to computer systems
  2. 'malicious software' infiltrating /damaging computer systems, without authorisation
  3. ethical hacker
  4. attacks that leave no time to prepare for or defend against an attack
  5. employee attacking company from the inside
  6. taking of data, physical assets or IP (intellectual property)
  7. espionage targets specific computer installations to steal data without being detected

18 Clues: ethical hackerbad hacker, evildenial of serviceChief Information security officersoftware attack, also what birds eatemployee attacking company from the insideoutdated & unreliable - untrustworthy technologyhacking methods may cross legal or ethical linestake advantage of vulnerability (a weakness) in software...

CryotoMaze 2 2024-12-09

CryotoMaze 2 crossword puzzle
Across
  1. Standard for information security management systems.
  2. Malware that demands payment to restore access.
  3. Strategies to prevent data loss or misuse.
  4. Secret key used for decryption in asymmetric encryption.
  5. Process of converting data into a fixed-size string of characters for integrity verification.
  6. Device that monitors and controls network traffic.
  7. Testing to identify vulnerabilities in a system.
  8. To verify the identity of a user or system.
  9. Reverse process of converting ciphertext back to plaintext.
  10. Protocol ensuring secure communications over networks.
  11. Centralized unit managing security operations.
  12. Security mechanism requiring multiple forms of verification.
Down
  1. Assurance that one cannot deny the validity of their actions.
  2. Key used in asymmetric encryption, shared publicly.
  3. Decentralized ledger technology for secure transactions.
  4. A weakness in a system that can be exploited.
  5. Handling cryptographic keys throughout their lifecycle.
  6. Process of converting plaintext into ciphertext.

18 Clues: Strategies to prevent data loss or misuse.To verify the identity of a user or system.A weakness in a system that can be exploited.Centralized unit managing security operations.Malware that demands payment to restore access.Testing to identify vulnerabilities in a system.Process of converting plaintext into ciphertext....

CLOUD AND DATA SECURITY 2025-02-15

CLOUD AND DATA SECURITY crossword puzzle
Across
  1. The practice of defining who can access what in cloud services
  2. The process of giving permissions to users in cloud environments
  3. A system that manages users’ access to cloud services
  4. The main reason organizations use IAM
  5. A key component of IAM that ensures secure user authentication
  6. The practice of defining and managing user roles and privileges
Down
  1. The boundary that separates trusted and untrusted systems
  2. A key challenge in IAM that involves controlling multiple access points
  3. A security mechanism that verifies the identity of a user before granting access
  4. A security method ensuring that only authorized individuals can access data
  5. A widely used authentication standard for cloud services
  6. The process of verifying a user's identity before granting access
  7. The act of reducing risks related to data breaches
  8. The organization responsible for cloud security

14 Clues: The main reason organizations use IAMThe organization responsible for cloud securityThe act of reducing risks related to data breachesA system that manages users’ access to cloud servicesA widely used authentication standard for cloud servicesThe boundary that separates trusted and untrusted systems...

Australia's Defence 2016-05-03

Australia's Defence crossword puzzle
Across
  1. Provides land operations that include surveillance and special recovery.
  2. The principle security forum in the Asia-Pacific region, this fosters dialogue on political and security issues of common concern.
  3. For military training.
  4. For humanitarian relief to people affected by conflict.
  5. This is an informal agreement entered into with New Zealand during the 1990's to emphasize intelligence sharing and joint exercises between the two countries.
  6. The international use or threat of violence against civilians or civilian targets in order to achieve political ends.
  7. These served in China during the Boxer Rebellion, in South Africa during the Boer War and in both World Wars.
  8. An NGO that provides support for families that have lost someone from serving in the army.
  9. An NGO which presents information to parliament on defence and security issues.
  10. Three services that enable Australians to live in one of the most secure countries in the world.
  11. For people smuggling and terrorism.
  12. Provides maritime forces that operates ships, guided missile destroyers, patrol boats and submarines.
  13. This force is trained for unconventional warfare and counter-terrorism.
  14. For boarder protection.
Down
  1. Play a role in air surveillance and intelligence gathering.
  2. eight humanitarian development goals to be achieved by 2015
  3. This group is trained to conduct counter-terrorism activities including the recovery of hostages.
  4. For gathering information about criminal activity or security threats.
  5. This arrangement between the United Kingdom, Australia, New Zealand, Malaysia and Singapore was adopted in 1971. It involves consulting each other if there is a threat to attack Malaysia or Singapore.
  6. This regiment responds to chemical, biological, radiological, nuclear and explosive incidents.
  7. Intergovernmental organisation that promotes equity, human rights, peace and ecologically sustainable environments.
  8. Beginning in 1952, this treaty promotes regional(Australia, New Zealand and United States) security through peaceful means.

22 Clues: For military training.For boarder protection.For people smuggling and terrorism.For humanitarian relief to people affected by conflict.Play a role in air surveillance and intelligence gathering.eight humanitarian development goals to be achieved by 2015For gathering information about criminal activity or security threats....

BFCM Crossword 2023-11-13

BFCM Crossword crossword puzzle
Across
  1. Count of Transylvania
  2. 007 loves it dry
  3. The opposite of hot
  4. German automotive manufacturer
  5. Gotta catch them all
  6. She is having the Eras Tour
  7. 25th of December
  8. It goes with Plushes in the MVD
Down
  1. Gotham is a safe place with him
  2. She decides when it's tiiiime to celebrate Christmas
  3. Please provide your ... what marketing team is always asking for
  4. These ... are made for walking
  5. Familiar to Loch Ness
  6. It's Cyber the 27th

14 Clues: 007 loves it dry25th of DecemberThe opposite of hotIt's Cyber the 27thGotta catch them allCount of TransylvaniaFamiliar to Loch NessShe is having the Eras TourGerman automotive manufacturerThese ... are made for walkingGotham is a safe place with himIt goes with Plushes in the MVDShe decides when it's tiiiime to celebrate Christmas...

Community Safety Crossword 2025-09-16

Community Safety Crossword crossword puzzle
Across
  1. Always close and lock all _ _ _ _ _ _ _ when you leave your home.
  2. Always wear your _ _ _ _ _ _ when biking.
  3. Always lock your _ _ _ when parked.
  4. Never open emails from _ _ _ _ _ _ _ senders.
  5. Install a smoke _ _ _ _ _ in every room.
  6. Residents can use the _ _ _ _ _ _ it portal on the Town's website to report any issues or concerns.
  7. Community outreach services _ _ _ _ _ _ _ people to appropriate support services.
  8. Never share personal _ _ _ _ _ _ _ _ _ _ _ with strangers.
  9. Install _ _ _ _ _ _ _ _ devices for added home safety.
  10. You can report anonymously to _ _ _ _ _ stoppers on 1800 333 000.
Down
  1. Over 1,000 community responses shaped The Safer _ _ _ _ _ _ _ _ _ _ _ _ _ Plan at the Town.
  2. Remove all _ _ _ _ _ _ _ _ _ from your car.
  3. Did you know you can get rebates for security devices through the Town's Security _ _ _ _ _ _ _ _ _ Scheme?
  4. Do not answer the door to _ _ _ _ _ _ _ _ _.
  5. Walk with a _ _ _ _ _ _ at night.
  6. Report all suspicious activity to the _ _ _ _ _ _ on 131 444.
  7. In an emergency, stay _ _ _ _ and call for help.
  8. The Town provides rebates for _ _ _ _ through the CCTV Partnership Program.

18 Clues: Walk with a _ _ _ _ _ _ at night.Always lock your _ _ _ when parked.Install a smoke _ _ _ _ _ in every room.Always wear your _ _ _ _ _ _ when biking.Remove all _ _ _ _ _ _ _ _ _ from your car.Do not answer the door to _ _ _ _ _ _ _ _ _.Never open emails from _ _ _ _ _ _ _ senders.In an emergency, stay _ _ _ _ and call for help....

La spéciale Phebusa 2023-12-02

La spéciale Phebusa crossword puzzle
Across
  1. Jamais sans les Faber Castel
  2. Là où sont les vocaux de qualité
  3. Ton fruit préféré
  4. L'ensemble de la communauté
  5. En direct de Pandaland
  6. Ton métier sur Twitch
  7. Utile pour le lancé de carapaces
  8. We are constructors Ahou Ahou Ahou !
Down
  1. La DA de la chaine
  2. Apporte du soleil dans la vie
  3. Une reine ne sort jamais sans
  4. Boris, Chiken, ou même la Zumba en font partie
  5. Un panda, un renard et une coccinelle
  6. One shot
  7. Ton objet préféré dans les Sims

15 Clues: One shotTon fruit préféréLa DA de la chaineTon métier sur TwitchEn direct de PandalandL'ensemble de la communautéJamais sans les Faber CastelApporte du soleil dans la vieUne reine ne sort jamais sansTon objet préféré dans les SimsLà où sont les vocaux de qualitéUtile pour le lancé de carapacesWe are constructors Ahou Ahou Ahou !...

TTS Kata Serapan 2025-08-06

TTS Kata Serapan crossword puzzle
Across
  1. kata asing yang mengalami penyesuaian dalam pelafalan dan/atau ejaan agar sesuai dengan kaidah bahasa indonesia
  2. google translate
  3. warung makan sederhana
  4. ss
  5. rodanya ada 3
  6. penyerapan kata asing tanpa ada perubahan
Down
  1. minuman khas betawi
  2. berasal dari bahasa asing (foto foto)
  3. masuk karena pengaruh sejarah (penjajahan, perdagangan, agama) بيضة
  4. makanan daging ditusuk dan di panggang
  5. masakan daging sapi dengan santan dan rempah rempah
  6. salad khas betawi
  7. dunia maya (cyber world), ahli psikologi (psychologist)
  8. 🥚
  9. berasal dari kata portugis

15 Clues: 🥚ssrodanya ada 3google translatesalad khas betawiminuman khas betawiwarung makan sederhanaberasal dari kata portugisberasal dari bahasa asing (foto foto)makanan daging ditusuk dan di panggangpenyerapan kata asing tanpa ada perubahanmasakan daging sapi dengan santan dan rempah rempahdunia maya (cyber world), ahli psikologi (psychologist)...

bullying- Loretta 2023-11-28

bullying- Loretta crossword puzzle
Across
  1. fighting between parties
  2. repetitive abuse
  3. punch or physical
  4. someone who teases others
Down
  1. he shows _______ when he punched the wall.
  2. a friend of a victim
  3. online
  4. hurt by a bully

8 Clues: onlinehurt by a bullyrepetitive abusepunch or physicala friend of a victimfighting between partiessomeone who teases othershe shows _______ when he punched the wall.

Ασφαλές Διαδίκτυο 2024-02-12

Ασφαλές Διαδίκτυο crossword puzzle
Across
  1. scams ηλεκτρονικές απάτες
  2. addiction εθισμός στο διαδίκτυο
  3. positive εικόνα σώματος και κοινωνικά δίκτυα
  4. news ψευδείς ειδήσεις
  5. on the internet άγνωστοι στο διαδίκτυο
  6. reputation διαδικτυακή φήμη
Down
  1. διαδικτυακός εκφοβισμός
  2. κακόβουλο λογισμικό
  3. piracy πειρατεία λογισμικού
  4. privacy προστασία προσωπικών δεδομένων

10 Clues: κακόβουλο λογισμικόnews ψευδείς ειδήσειςδιαδικτυακός εκφοβισμόςscams ηλεκτρονικές απάτεςpiracy πειρατεία λογισμικούreputation διαδικτυακή φήμηaddiction εθισμός στο διαδίκτυοprivacy προστασία προσωπικών δεδομένωνon the internet άγνωστοι στο διαδίκτυοpositive εικόνα σώματος και κοινωνικά δίκτυα

Cyber Crossword 2016-08-04

Cyber Crossword crossword puzzle
Across
  1. The ECS organization is built around this framework
  2. Team that secures and manages access to information assets
  3. Helps developers prevent security vulnerabilities in applications
  4. An extra layer of security
  5. The frequency of Penetration Testing varies based on ____ profile
Down
  1. Team that safeguards Customer data and Investments
  2. The act of acquiring sensitive data for use in fraudulent activities
  3. Team that detects adversaries, responds to their activities, and contains them
  4. The new corporate standard for mobile phones
  5. Some forms of ____________encrypt files on a system’s hard drive

10 Clues: An extra layer of securityThe new corporate standard for mobile phonesTeam that safeguards Customer data and InvestmentsThe ECS organization is built around this frameworkTeam that secures and manages access to information assetsSome forms of ____________encrypt files on a system’s hard drive...

Cyber Safety 2016-08-26

Cyber Safety crossword puzzle
Across
  1. a person who breaks into computers to steal information
  2. a video camera attached to a computer
  3. media a digital platform on which you can communicate with people from around the world
  4. when criminals set up mock websites to steal information
  5. irrelevant messages which can be sources of criminal or advertising activity
Down
  1. web a collection of web-addresses which hide their IP addresses
  2. a malicious computer program which hacks a computer by lying about its intent
  3. repeatedly hurting someone emotionally online
  4. a software which can control your camera, delete your files
  5. an unwanted, self-opening browser window

10 Clues: a video camera attached to a computeran unwanted, self-opening browser windowrepeatedly hurting someone emotionally onlinea person who breaks into computers to steal informationwhen criminals set up mock websites to steal informationa software which can control your camera, delete your files...

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber Safety 2013-11-07

Cyber Safety crossword puzzle
Across
  1. A type of malware that spies on what you do on the Internet and can steal information about you from your computer.
  2. Someone who bullies others in Cyberspace.
  3. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  4. A type of chat slang
  5. A defensive software program that acts like a security guard and monitors and controls the traffic coming into and out of your machine from a network.
Down
  1. A person who hacks into computers to view or alter information that they don't have access to.
  2. Identity Your identity in cyberspace, who you are on the Internet.
  3. The physical components of a computer, usually contained within the computer's main case or tower.
  4. Something that can damage a living organism.
  5. Containing a combination of different types of content, like text, still images, audio, animations, videos and interactive content.

10 Clues: A type of chat slangSomeone who bullies others in Cyberspace.Something that can damage a living organism.Identity Your identity in cyberspace, who you are on the Internet.A person who hacks into computers to view or alter information that they don't have access to....

cyber safety 2021-09-16

cyber safety crossword puzzle
Across
  1. constant messages or something shared
  2. something affecting your computer
  3. what you leave on the internet
  4. someone who will have unwanted information
  5. the platforms that this is all performed on
Down
  1. a security device
  2. what people can see when online with you
  3. private information
  4. something that is personal to you
  5. your address

10 Clues: your addressa security deviceprivate informationwhat you leave on the internetsomething affecting your computersomething that is personal to youconstant messages or something sharedwhat people can see when online with yousomeone who will have unwanted informationthe platforms that this is all performed on

Cyber Bullying 2022-04-18

Cyber Bullying crossword puzzle
Across
  1. WHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE
  2. WHAT COLOUR WAS THE GOO IN THE VIDEO
  3. SPREADING FALSE INFORMATION ONLINE
  4. IF YOU HAVE HURT SOMEONE ONLINE SAY
  5. IF YOU ARE BULLIED ONLINE KEEP
Down
  1. CYBERBULLYING CAN FOLLOW YOU
  2. BULLYING CAN MAKE YOU FEEL
  3. THE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ART
  4. ALWAYS ASK FOR HELP
  5. BULLYING ONLINE IS CALLED

10 Clues: ALWAYS ASK FOR HELPBULLYING ONLINE IS CALLEDBULLYING CAN MAKE YOU FEELCYBERBULLYING CAN FOLLOW YOUIF YOU ARE BULLIED ONLINE KEEPSPREADING FALSE INFORMATION ONLINEIF YOU HAVE HURT SOMEONE ONLINE SAYWHAT COLOUR WAS THE GOO IN THE VIDEOTHE MAIN CHARACTER WAS GOOD AT WHAT TYPE OF ARTWHAT SHOULD YOU DO BEFORE SENDING ANY MESSAGE ONLINE

Cyber Safety 2021-04-07

Cyber Safety crossword puzzle
Across
  1. Who to talk to if your worried?
  2. What should we get before posting photos of others?
  3. How long can things we put online last?
  4. We need to communicate politely, clearly & what? on the internet.
Down
  1. What do we call online bullying?
  2. Who should know our passwords?
  3. Illegally downloading movies breaks what laws?
  4. People we shouldn't talk to online?
  5. What kind of passwords should we have?
  6. People who are cyber bullied can become d........

10 Clues: Who should know our passwords?Who to talk to if your worried?What do we call online bullying?People we shouldn't talk to online?What kind of passwords should we have?How long can things we put online last?Illegally downloading movies breaks what laws?People who are cyber bullied can become d...........

Cyber Bullying 2021-05-03

Cyber Bullying crossword puzzle
Across
  1. Where people are able to make groups online
  2. The action of repeatedly sending offensive and insulting messages.
  3. The recording of everything accessed through the internet.
  4. Stopping the access of particular areas on the web.
Down
  1. When a group of people excludes someone intentionally.
  2. Bullying through online resources
  3. The act of engaging and following someone constantly where it breaches the victim's safety.
  4. When pretending to be someone else online
  5. Websites or application where people share content and messages
  6. Those who are under the age of 18.

10 Clues: Bullying through online resourcesThose who are under the age of 18.When pretending to be someone else onlineWhere people are able to make groups onlineStopping the access of particular areas on the web.When a group of people excludes someone intentionally.The recording of everything accessed through the internet....

cyber crossword 2021-05-10

cyber crossword crossword puzzle
Across
  1. relating to or involving computers and computing
  2. the practice of sending fraudulent communications that appear to come from a reputable source, intended to manipulate a victim into taking a desired action or giving up information.
  3. wrongful or criminal deception intended to result in financial or personal gain.
  4. a mail and calendering server developed by Microsoft
  5. a computer-software vulnerability unknown to those responsible for mitigation
Down
  1. a fix to a program that eliminates a vulnerability
  2. a type of malicious software that blocks access to a computer system until a sum of money is paid
  3. a computer that provides a services to other computers (clients)
  4. a person or thing likely to cause damage or danger
  5. attackes impersonate a vendor or supplier, often in an attempt to initiaate fraudulent payment.

10 Clues: relating to or involving computers and computinga fix to a program that eliminates a vulnerabilitya person or thing likely to cause damage or dangera mail and calendering server developed by Microsofta computer that provides a services to other computers (clients)a computer-software vulnerability unknown to those responsible for mitigation...

Cyber Bullying 2020-03-08

Cyber Bullying crossword puzzle
Across
  1. a person who pleads for a person, cause, or idea
  2. think about carefully; weigh
  3. The application of a set of criteria against which internet content is judged acceptable or not
  4. doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
  5. revenge
  6. an unfortunate person who suffers from adverse circumstances
  7. Someone who harms another through electronic devices
Down
  1. recognize as being
  2. Interactive web journal or diary,the contents of which are posted online and which others can view
  3. to threaten, frighten, scare, coerce, terrify, and to alarm

10 Clues: revengerecognize as beingthink about carefully; weigha person who pleads for a person, cause, or ideaSomeone who harms another through electronic devicesto threaten, frighten, scare, coerce, terrify, and to alarman unfortunate person who suffers from adverse circumstances...

cyber safety 2024-03-27

cyber safety crossword puzzle
Across
  1. Personall stuff
  2. Type of device
  3. Trying to make the most of you
Down
  1. Person trying to get your private info
  2. Something htat needs Wifi
  3. Old person pretending to be young
  4. Secret info
  5. Not doing stupid stuff
  6. On A device
  7. Personal Information

10 Clues: Secret infoOn A deviceType of devicePersonall stuffPersonal InformationNot doing stupid stuffSomething htat needs WifiTrying to make the most of youOld person pretending to be youngPerson trying to get your private info

cyber bullying 2024-06-13

cyber bullying crossword puzzle
Across
  1. if someone is bullying us, we should ask for
  2. what is a social media platform you can get bullied
  3. who can we go to if being bullied at school
  4. another word for messaging
Down
  1. talk to a trusted adult when you don't feel
  2. where can you get hacked on
  3. what app can people send harmful images
  4. if you have personal information, you should not
  5. if someone is bothering you what can you do
  6. what can you be bullied on

10 Clues: what can you be bullied onanother word for messagingwhere can you get hacked onwhat app can people send harmful imagestalk to a trusted adult when you don't feelif someone is bothering you what can you dowho can we go to if being bullied at schoolif someone is bullying us, we should ask forif you have personal information, you should not...

sample cyber 2024-10-03

sample cyber crossword puzzle
Across
  1. splash
  2. three
  3. key
  4. rivest
Down
  1. power
  2. kumar
  3. pokemon
  4. harold
  5. warriors
  6. ash

10 Clues: ashkeypowerkumarthreesplashharoldrivestpokemonwarriors

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Online fights using electronic messages with angry and vulgar language.
  2. The wrongful approximation and purloining and publication of another's authors language, thoughts, ideas, or expressions, and the representation of them as one's own original work.
  3. The use of the internet and related technologies to harm other people in a deliberate, repeated and hostie manner.
  4. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  5. A form of steeling someone's identity in which someone pretends to be someone else by assuming that persons identity.
Down
  1. Intentionally and cruelly excluding someone from an online group.
  2. Repeatedly sending nasty, mean, and insulting messages.
  3. Sharing someone's secrets or embarrassing information or images online.
  4. A computer virus is a computer program that can replicate itself and spread from one computer to another.
  5. Repeated, intense harassment and denigration that includes threats or creates significant fear.

10 Clues: Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Online fights using electronic messages with angry and vulgar language.Sharing someone's secrets or embarrassing information or images online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Repeatedly sending nasty, mean and insulting messages
  2. Only talking to someone into revealing secrets or embarrassing information the sharing it.
  3. Repeated harassment.
  4. Pretending to be someone else online and sending or posting others material.
  5. Internally and cruelly excluding someone from an online group.
Down
  1. Using internet and technologies to harm people.
  2. When someone pretends to be someone they are not.
  3. Fights online that use messages with angry and inappropriate language.
  4. The 'dissing' of someone online.
  5. Sharing someone's secrets or embarrassing information online.

10 Clues: Repeated harassment.The 'dissing' of someone online.Using internet and technologies to harm people.When someone pretends to be someone they are not.Repeatedly sending nasty, mean and insulting messagesSharing someone's secrets or embarrassing information online.Internally and cruelly excluding someone from an online group....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. make sure u have no info of ur personal life
  2. make someone scared (e.g.i will come and kill u)
  3. make fun of someone online
  4. to make someone feel uncomfy
Down
  1. to harrass someone online
  2. to not listen to someone
  3. opposite of rudeness
  4. to tell on a cyber bully to police
  5. a way to ignore unwanted messages
  6. send some messages over and over without stoping

10 Clues: opposite of rudenessto not listen to someoneto harrass someone onlinemake fun of someone onlineto make someone feel uncomfya way to ignore unwanted messagesto tell on a cyber bully to policemake sure u have no info of ur personal lifemake someone scared (e.g.i will come and kill u)send some messages over and over without stoping

CYBER ETHICS 2025-05-31

CYBER ETHICS crossword puzzle
Across
  1. The process of transforming data into a reatable code
  2. Also known as a digital dossier
  3. The unwanted bulk emails that come from unknown sources
  4. An act of harming,harrising and targetting a person using internet in deliberate manner
  5. Refers to a set of procedures,moral principles and ethical practices that regulates the use of a computer and the internet
Down
  1. Legal right granted by law to the creator for his original one
  2. piracy When a software is copied and destructed illegally it is called
  3. refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet
  4. An illegal intrusion into a computer system or network is known
  5. The simplest way to prevent plagiarism

10 Clues: Also known as a digital dossierThe simplest way to prevent plagiarismThe process of transforming data into a reatable codeThe unwanted bulk emails that come from unknown sourcesLegal right granted by law to the creator for his original oneAn illegal intrusion into a computer system or network is known...

Cyber Ethics 2025-06-08

Cyber Ethics crossword puzzle
Across
  1. It refers to unwanted bulk messages or emails
  2. Illegal activity that is done using computers, the internet, or other digital devices
  3. When someone uses the internet digital technologies to threaten, harass, embarrass, or hurt another person
  4. It is a type of cybercrime where someone tries to trick you into giving your personal information
Down
  1. The guidelines to be aware of behaving properly and appropriately on internet or while online
  2. The illegal copying and distribution of videos, software etc ad sharing or distributing without the permission of copyright holder
  3. Breaking into a computer network, or online account without permission to access or steal information
  4. It stop others from copying, stealing, or using someone’s work without permission
  5. It is a secret word or code to lock and unlock your accounts on computers, phones etc to protect personal information
  6. keeping your personal information, activities, and choices safe and protected from others

10 Clues: It refers to unwanted bulk messages or emailsIt stop others from copying, stealing, or using someone’s work without permissionIllegal activity that is done using computers, the internet, or other digital deviceskeeping your personal information, activities, and choices safe and protected from others...

Cyber crime 2025-12-12

Cyber crime crossword puzzle
Across
  1. network protection barrier
  2. coding data for security
  3. malware that demands payment
Down
  1. software that secretly collects data
  2. harmful software
  3. network of infected devices
  4. breaking into a computer system
  5. malicious program disguised as legitimate
  6. online fraud to steal personal information
  7. unauthorized access to data

10 Clues: harmful softwarecoding data for securitynetwork protection barriernetwork of infected devicesunauthorized access to datamalware that demands paymentbreaking into a computer systemsoftware that secretly collects datamalicious program disguised as legitimateonline fraud to steal personal information

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. pencurian hak cipta (11 h)
  2. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  3. perbuatan menyebar informasi yang merugikan orang lain (18h)
  4. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  5. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  6. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  7. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. menjaga keamanan data pribadi di internet (13h)
  9. penyebaran informasi palsu yang meluas (4 huruf)
  10. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  11. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  12. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  13. program kecil yang dapat merusak sistem komputer (5 huruf)
  14. informasi yang mengidentifikasi seseorang secara unik (12h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
Down
  1. aturan dan norma berperilaku baik di media sosial (11 h)
  2. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. perbuatan melanggar hukum didunia maya (10 huruf)
  5. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  6. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  7. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  8. perilaku tidak sopan/kasar didunia maya (10 h)
  9. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  10. peraturan yang melindungi data pribadi (16h)
  11. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  12. internet tindakan kriminal yang dilakukan melalui internet (14h)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  14. tindakan menyebar informasi yang salah secara sengaja (14h)
  15. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  2. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. informasi yang mengidentifikasi seseorang secara unik (12h)
  5. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  6. perbuatan melanggar hukum didunia maya (10 huruf)
  7. peraturan yang melindungi data pribadi (16h)
  8. program kecil yang dapat merusak sistem komputer (5 huruf)
  9. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  10. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  11. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  12. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  13. aturan dan norma berperilaku baik di media sosial (11 h)
  14. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
Down
  1. menjaga keamanan data pribadi di internet (13h)
  2. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  3. internet tindakan kriminal yang dilakukan melalui internet (14h)
  4. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  5. perbuatan menyebar informasi yang merugikan orang lain (18h)
  6. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  7. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  8. tindakan menyebar informasi yang salah secara sengaja (14h)
  9. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  10. perilaku tidak sopan/kasar didunia maya (10 h)
  11. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  12. penyebaran informasi palsu yang meluas (4 huruf)
  13. pencurian hak cipta (11 h)
  14. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  16. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

dave crossword ig (lottie) 2021-11-03

dave crossword ig (lottie) crossword puzzle
Across
  1. codes into your device
  2. somthing you would need a password for
  3. a secret code you use foe websites,accounts more
Down
  1. comes before the word safety in "cyber safety"
  2. the electronic you are on right now

5 Clues: codes into your devicethe electronic you are on right nowsomthing you would need a password forcomes before the word safety in "cyber safety"a secret code you use foe websites,accounts more

Cybersecurity puzzle 2023-12-04

Cybersecurity puzzle crossword puzzle
Across
  1. A common tactic in scams, creating a sense of immediate action needed.
  2. Online harassment that can breach your mental health
  3. Malware that encrypts files, demanding payment for decryption.
  4. A scam method using emails to trick users into revealing personal information
  5. The process of confirming a user's identity in a security system.
  6. A general term for deceitful practices to gain financial or personal gain.
  7. adding a unique string to a password before hashing it for added security.
  8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A safer payment method for online purchases due to fraud protection.
  10. A type of malware that attaches itself to programs and corrupts or modifies files.
  11. Data-tracking files that should be disabled to enhance online privacy
  12. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
  1. A method where hardware is used to record keystrokes and steal passwords.
  2. Malware that secretly observes the user's actions.
  3. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
  4. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
  5. Everything you do on the internet that stays with you, even when you turn off your devices
  6. Harmful software that scammers might install through tech support scams.
  7. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
  8. Autonomous malware that replicates and spreads through network vulnerabilities.
  9. Software designed to detect and remove malicious software like viruses and malware.
  10. A popular brand of antivirus software.
  11. Using more than one method of authentication for enhanced security.
  12. When personal information is accessed and stolen by unauthorized individuals
  13. The method of converting passwords into gibberish to protect them in password files.
  14. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.

26 Clues: A popular brand of antivirus software.Malware that secretly observes the user's actions.Online harassment that can breach your mental healthMalware that encrypts files, demanding payment for decryption.The process of confirming a user's identity in a security system.Using more than one method of authentication for enhanced security....

trial1-rm 2022-08-22

trial1-rm crossword puzzle
Across
  1. This aerospace manufacturer announced that open source, hybrid cloud and AI technologies from IBM and Red Hat are part of its second mission.
  2. Form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
  3. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
  4. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was ___
  5. A Person who uses technology to gain unauthorized access to data is called a ___ .
  6. To avoid ____________, user input should not be put directly into a database.
  7. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers.
  8. A group of protocols used to encrypt data between two communication points.
  9. A protocol used for directory services authentication that was first developed in 1993.
  10. The _____________ ransomware group recently hacked a networking giant by compromising an employee’s personal google account.
  11. “Never trust, always verify” is the first defining principle of which model
Down
  1. I have a dual role in MaaS Architecture –CDN and WAF. Which vendor are we talking about?
  2. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships.
  3. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
  4. Cross-site scripting standing in front of amirror
  5. Vast Strides –I help in identifying Security Vulnerabilities
  6. One-way street to persisting top secrets
  7. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  8. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
  9. Recent IBM security acquisition of an endpoint security company.

20 Clues: One-way street to persisting top secretsCross-site scripting standing in front of amirrorVast Strides –I help in identifying Security VulnerabilitiesRecent IBM security acquisition of an endpoint security company.A group of protocols used to encrypt data between two communication points....

Crossword - Voltedge 2019-09-05

Crossword - Voltedge crossword puzzle
Across
  1. Portal to view security emergency contact and other security info
  2. Which technology is used; searching from 41+ million tags?
  3. System that makes automated calls from security
  4. CDA application is hosted here
  5. Re-tag in TCT can be done by?
Down
  1. What is the SOX Compliant application under EHS
  2. 50th percentile
  3. Library in Python that helps exceute Deep Learning
  4. Source data ($) for deriving $ Thresholds?
  5. Security model used by most of the ERP applications

10 Clues: 50th percentileRe-tag in TCT can be done by?CDA application is hosted hereSource data ($) for deriving $ Thresholds?What is the SOX Compliant application under EHSSystem that makes automated calls from securityLibrary in Python that helps exceute Deep LearningSecurity model used by most of the ERP applications...

EXTREME SPORTS 2021-09-24

EXTREME SPORTS crossword puzzle
Across
  1. what happens each sport
  2. is main in all sports
  3. It's a winged suit used for gliding
  4. used in canyoning sport
  5. flying is skydiving that consists of flying using an airsuit
  6. occurs in all sports
  7. sports security means
  8. is a movement in which a living being propels through the air along a ballistic trajectory
Down
  1. ideal for all sports especially for wingsuit security is taken into account in all extreme sports
  2. consiste principalmente en el descenso de barrancos
  3. important security means
  4. board on snow
  5. it is the technique of launching human beings

13 Clues: board on snowoccurs in all sportsis main in all sportssports security meanswhat happens each sportused in canyoning sportimportant security meansIt's a winged suit used for glidingit is the technique of launching human beingsconsiste principalmente en el descenso de barrancosflying is skydiving that consists of flying using an airsuit...

Security 2021-08-10

Security crossword puzzle
Across
  1. General term for malicious software that changes the target system's behavior, destroys data, or spies on the user. Can also propagate across a network.
  2. Trying multiple combinations of credentials against a target system
  3. Hidding malicious software inside seemingly legitimate software
  4. An email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion
Down
  1. An attack where the victim is asked to pay a ransom to do not have their data publicly shared, or to unlock a system that is being held by malicious software (and thus, rendered useless)
  2. Intercepting network traffic in an attempt to find sensitive information (Hint: it's the same name as if you were listening to your neighbors having a private conversation)
  3. one of the most important things you should do on your system to prevent attacks. The sysadmin and security teams will appreciate if you do this

7 Clues: Hidding malicious software inside seemingly legitimate softwareTrying multiple combinations of credentials against a target systemAn email sent from a seemingly trusted, legitimate source in an attempt to grab sensitive information or with a harmful download suggestion...

security 2024-02-06

security crossword puzzle
Across
  1. Secure Communications
  2. Official and Sensitive
  3. Two Factor, Let’s make sure it’s you
  4. “You’re a Winner!’ email, often
Down
  1. Fake email, looking for your data
  2. Computer and Internet Related
  3. Key to a lock, you should never write this down

7 Clues: Secure CommunicationsOfficial and SensitiveComputer and Internet Related“You’re a Winner!’ email, oftenFake email, looking for your dataTwo Factor, Let’s make sure it’s youKey to a lock, you should never write this down

United Nation Councils 2025-05-24

United Nation Councils crossword puzzle
Across
  1. These missions are sent by the Security Council to help calm conflicts.
  2. Group that works on issues like health, education, and equality
  3. One of the five permanent members of the Security Council. (Hint: large country in Asia)
  4. The number of permanent members on the Security Council
Down
  1. The General Assembly gives every country one of these.
  2. The group where all countries meet to discuss global problems
  3. The council that focuses on money, jobs, and reducing poverty
  4. This word means all countries have one equal say in voting
  5. The United Nations group that works to keep peace around the world.
  6. A way the Security Council can pressure countries, like stopping trade

10 Clues: The General Assembly gives every country one of these.The number of permanent members on the Security CouncilThis word means all countries have one equal say in votingThe group where all countries meet to discuss global problemsThe council that focuses on money, jobs, and reducing poverty...

Quarta Rivoluzione industriale 2024-02-05

Quarta Rivoluzione industriale crossword puzzle
Across
  1. ne saranno capaci Le macchine
  2. Sono state create…intelligenti
  3. Industrial
  4. contiene 4 elementi chiave
Down
  1. aumento dell’uso
  2. come sono le macchine
  3. rende più…il lavoro
  4. Sono sistemi di produzione

8 Clues: Industrialaumento dell’usorende più…il lavorocome sono le macchineSono sistemi di produzionecontiene 4 elementi chiavene saranno capaci Le macchineSono state create…intelligenti

public safty words. 2024-08-08

public safty words. crossword puzzle
Across
  1. keeps order in the court.
  2. Clerk
  3. figers
  4. united States Drug Enforcement Administration.
  5. protecting our borders from outside threats.
  6. a formal inquiry or investagation.
  7. capture and track documents
  8. a first responder
  9. writes everything in the court
  10. health prevents diseases
  11. send to location
Down
  1. helps you in courts
  2. you have the right to______
  3. the activity of some members of government
  4. manages a emergency area.
  5. Federal Bureau of Investigation.
  6. fingers
  7. fingers
  8. a man meant to guard a area or person.
  9. transportation security

20 Clues: Clerkfigersfingersfingerssend to locationa first responderhelps you in courtstransportation securitykeeps order in the court.manages a emergency area.you have the right to______capture and track documentshealth prevents diseaseswrites everything in the courtFederal Bureau of Investigation.a formal inquiry or investagation....

Official Secrets 2026-03-18

Official Secrets crossword puzzle
Across
  1. Spying for political or military purposes
  2. Monitoring of individuals or data
  3. Management of international relations
  4. Secret communication systems
  5. Protection of the nation from threats
  6. Act of revealing secret information
  7. Method of encrypting messages
  8. Restricted official information
  9. State of keeping information hidden
Down
  1. Limited access security label
  2. Person exposing hidden wrongdoing
  3. Secret authentication key
  4. Government-protected information category
  5. Agent secretly gathering intelligence
  6. Unauthorized release of information
  7. Process of securing data digitally
  8. Secret state information gathering
  9. Highest level of classification
  10. Military protection of a country

19 Clues: Secret authentication keySecret communication systemsLimited access security labelMethod of encrypting messagesHighest level of classificationRestricted official informationMilitary protection of a countryPerson exposing hidden wrongdoingMonitoring of individuals or dataProcess of securing data digitallySecret state information gathering...

public safty crossword 2024-08-20

public safty crossword crossword puzzle
Across
  1. control, to protect dangered animals and control thm
  2. to protect the city and people
  3. watch over an area
  4. protected
  5. security of things online
  6. to watch out for
  7. help minor injuries
  8. sound for an emergency
  9. to be quiet and away from windows
Down
  1. danger
  2. unexpected dangerous situation
  3. a statement that could mean possible danger
  4. to protect
  5. let someone know something important
  6. saving someone from danger
  7. flames
  8. to be kept safe
  9. to clear out quickly
  10. health, health of the population
  11. medical attention on the move
  12. being protected

21 Clues: dangerflamesprotectedto protectto be kept safebeing protectedto watch out forwatch over an areahelp minor injuriesto clear out quicklysound for an emergencysecurity of things onlinesaving someone from dangermedical attention on the moveunexpected dangerous situationto protect the city and peoplehealth, health of the population...

Safe Computing 2025-08-29

Safe Computing crossword puzzle
Across
  1. Locks data for ransom
  2. Hidden malicious web clicks
  3. containing suspicious files in isolation
  4. Hidden data in files
  5. Fixes security vulnerabilities
  6. Scrambles data for security
  7. Fake system traps hackers
Down
  1. Block unauthorized network
  2. records keyboard keystrokes
  3. Secure encrypted online tunnel
  4. Damage to system becomes unusable
  5. Unauthorized data transfer
  6. Malicious software program
  7. Secret system access method
  8. Fake emails to trick victim
  9. Secretly monitors user activity
  10. Self-spreading malicious code
  11. Network of infected devices
  12. Displays unwanted pop ads
  13. Converts data into digest
  14. Disguised program carrying hidden threat

21 Clues: Hidden data in filesLocks data for ransomDisplays unwanted pop adsConverts data into digestFake system traps hackersBlock unauthorized networkUnauthorized data transferMalicious software programrecords keyboard keystrokesHidden malicious web clicksSecret system access methodFake emails to trick victimNetwork of infected devices...

bullying- luana 2023-03-21

bullying- luana crossword puzzle
Across
  1. Online Bullying
  2. someone who is affected by bullying
  3. Witnesses bullying
  4. a person or group repeatedly hurts or intimidates
Down
  1. Long term effect from bullying
  2. spreading rumors
  3. stalking
  4. when someone says negative words

8 Clues: stalkingOnline Bullyingspreading rumorsWitnesses bullyingLong term effect from bullyingwhen someone says negative wordssomeone who is affected by bullyinga person or group repeatedly hurts or intimidates

Cyber Hackers & Cybersecurity 2023-06-01

Cyber Hackers & Cybersecurity crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
  3. A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
  4. Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  5. Software designed to detect and destroy computer viruses
  6. Interconnected computing devices that can exchange data and share resources with each other
  7. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
  3. It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
  4. Creation of a false identity by a cybercriminal with the intention of defrauding a victim
  5. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  6. Software that automatically displays or downloads advertising material (often unwanted) when a user is online
  7. Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
  8. Baiting a trap for hackers
  9. The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th

16 Clues: Baiting a trap for hackersSoftware designed to detect and destroy computer virusesCreation of a false identity by a cybercriminal with the intention of defrauding a victimInterconnected computing devices that can exchange data and share resources with each other...

GDPR 2023-02-13

GDPR crossword puzzle
Across
  1. data protection authority
  2. information security
  3. confidential
  4. basis of processing
Down
  1. personal data
  2. omission
  3. security breach
  4. privacy filter
  5. penalty fee
  6. professional secrecy
  7. privacy statement

11 Clues: omissionpenalty feeconfidentialpersonal dataprivacy filtersecurity breachprivacy statementbasis of processingprofessional secrecyinformation securitydata protection authority

Health Final Exam Review 2020-12-07

Health Final Exam Review crossword puzzle
Across
  1. good health here shown by expressing feeling
  2. starve yourself
  3. good health here shown by respecting others
  4. bullying that hurts your body
  5. gives more energy
  6. the S in SMART goal
Down
  1. at least 8 hours a day
  2. eat then throw up
  3. cause of stress
  4. well being of physical mental social
  5. hormone that prepares body to act
  6. bullying that happens online
  7. happens to you if under stress for long time
  8. bullying that hurts mentally
  9. talking to friend (3 "out" ways to handle stress

15 Clues: cause of stressstarve yourselfeat then throw upgives more energythe S in SMART goalat least 8 hours a daybullying that happens onlinebullying that hurts mentallybullying that hurts your bodyhormone that prepares body to actwell being of physical mental socialgood health here shown by respecting othersgood health here shown by expressing feeling...

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. mogućnost slanja pošte putem interneta
  2. tragovi koji nisu bezobrazni,ne vrjeđaju nikog
  3. nasilničko ponašanje
  4. tragovi koji vrijeđaju nekog
  5. prividna stvarnost nastala pomoću računala
  6. skup podataka s pripisanim značenjem
  7. male datoteke
Down
  1. zbirka elektroničkih dokaza
  2. tragovi koje bez namjere ostavimo na internetu
  3. nosimo ih na dan protiv nasilja
  4. svrha je poniziti drugu osobu
  5. informacije koje ostavljamo na internetu
  6. neželjena pošta
  7. pošta koju šaljemo internetom i ostavljamo digitalne tragove
  8. tragovi koje namjerno ostavimo na internetu

15 Clues: male datotekeneželjena poštanasilničko ponašanjezbirka elektroničkih dokazatragovi koji vrijeđaju nekogsvrha je poniziti drugu osobunosimo ih na dan protiv nasiljaskup podataka s pripisanim značenjemmogućnost slanja pošte putem internetainformacije koje ostavljamo na internetuprividna stvarnost nastala pomoću računala...

Vocabulary Review Weeks 1-4 2025-04-28

Vocabulary Review Weeks 1-4 crossword puzzle
Across
  1. synonym of earn
  2. antonym of cowardice
  3. the sale of goods to the public
  4. synonym of modern
  5. when you work extra hours
  6. condition that happens when your blood sugar is too high
  7. involving, using, or relating to computers, especially the internet.
Down
  1. synonym of vital
  2. process of taking in food and using it for growth
  3. every second one
  4. restrain or keep in check
  5. encourage someone
  6. cut down on something
  7. positive outlook of life
  8. synonym of speed

15 Clues: synonym of earnsynonym of vitalevery second onesynonym of speedencourage someonesynonym of modernantonym of cowardicecut down on somethingpositive outlook of liferestrain or keep in checkwhen you work extra hoursthe sale of goods to the publicprocess of taking in food and using it for growthcondition that happens when your blood sugar is too high...

Mesleki İngilizce İnternet Terimleri 2022-11-18

Mesleki İngilizce İnternet Terimleri crossword puzzle
Across
  1. web sayfası
  2. tıklanma oranı
  3. İndirme
  4. Alt alan adı
  5. Etkileşimli Web Sitesi
  6. Zincir Mail
  7. Alan adı
  8. Sanal alem, sanal gerçeklik
  9. ziyaretçi defteri
  10. kodlama, şifreleme
  11. çerez
  12. kablosuz bağlantı noktası
  13. sohbet sunucusu
  14. Etiket
  15. Kara liste
  16. alışveriş
  17. kırık link
  18. internet günlüğü
  19. Reklam bandı
  20. bağlantı çiftliği
Down
  1. işaret kutusu
  2. takipçi
  3. Yüklemek
  4. Otomatik Tamamlama
  5. arama
  6. Yemleme
  7. kullanıcı
  8. sohbet
  9. İstenmeyen
  10. siber
  11. yer imi
  12. Barındırma
  13. güvenlik kodu
  14. gözatmak
  15. Ana sayfa
  16. köprü
  17. kalıcı bağlantı
  18. derin ağı
  19. ziyaretçi
  20. İnternette gezinme
  21. bağlantı
  22. çevrimdışı

42 Clues: aramasiberçerezköprüsohbetEtikettakipçiİndirmeYemlemeyer imiYüklemekAlan adıgözatmakbağlantıkullanıcıAna sayfaderin ağıziyaretçialışverişİstenmeyenBarındırmaKara listekırık linkçevrimdışıweb sayfasıZincir MailAlt alan adıReklam bandıişaret kutusugüvenlik kodutıklanma oranıkalıcı bağlantısohbet sunucusuinternet günlüğüziyaretçi defteri...

Through the years 2022-12-05

Through the years crossword puzzle
Across
  1. A Childs dream
  2. Cyber sleuth
  3. They call me Moose
  4. I feel the need for speed
  5. I can’t see, but I can
  6. Found any missing planes lately?
  7. Chonker
  8. Splitting lanes
  9. Jump!
  10. Born on Cupid’s Day
  11. I like it black
  12. Lucky Roulette
Down
  1. Friday night football
  2. Fishing from the skies
  3. Honeymoon smooth sailing
  4. How deep can you go?
  5. Low wing
  6. Not the hibernating kind
  7. Afraid of my own shadow
  8. Japanese treat
  9. Night Shift
  10. 43 feet of luxury
  11. The World on Time
  12. Retired killer
  13. Surfing and Tacos
  14. Elvis was here

26 Clues: Jump!ChonkerLow wingNight ShiftCyber sleuthA Childs dreamJapanese treatRetired killerElvis was hereLucky RouletteSplitting lanesI like it black43 feet of luxuryThe World on TimeSurfing and TacosThey call me MooseBorn on Cupid’s DayHow deep can you go?Friday night footballFishing from the skiesI can’t see, but I canAfraid of my own shadow...

KnowBe4 Security Crossword 2020-11-03

KnowBe4 Security Crossword crossword puzzle
Across
  1. Trick into visiting malicious websites
  2. File sent to a web browser & stored on Computer A programmable electrinic device
  3. Criminal activity through PC or internet
  4. Extends private network across public one
  5. Software to obtain covert info
  6. State of being free from danger
  7. Knowledge of situation or fact
  8. Members allowed to communicate with others
  9. Programs that damage computers/steal info
Down
  1. Network that links computers globally
  2. Protection of physical systems
  3. Program that runs on your computer
  4. System that monitors incoming/outgoing Networktraffic Amount/type of activity on a network
  5. Code that multiplies and corrupts systems
  6. Letter/numbers,etc. used to access device
  7. Transfer data from one computer to another
  8. Text
  9. Irrelevant messages sent on the internet

18 Clues: TextProtection of physical systemsSoftware to obtain covert infoKnowledge of situation or factState of being free from dangerProgram that runs on your computerNetwork that links computers globallyTrick into visiting malicious websitesCriminal activity through PC or internetIrrelevant messages sent on the internet...

AscTech Security Crossword 2022-03-15

AscTech Security Crossword crossword puzzle
Across
  1. A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
  2. A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
  3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  5. Another kind of malware that allows cybercriminals to remotely control your computer. Phishing A technique used by hackers to obtain sensitive information.
  6. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  7. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
  8. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
  9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  10. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  11. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Down
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
  3. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
  4. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  5. An internet version of a home address for your computer, which is identified when it communicates over a network
  6. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
  7. Refers to a company security policy that allows for employees’ personal devices to be used in business.

18 Clues: The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.Refers to a company security policy that allows for employees’ personal devices to be used in business....

CYBER SMART 2014-04-07

CYBER SMART crossword puzzle
Across
  1. thief someone that try's to steal your identity
  2. another word for inteligent
  3. a way of peir pressuring someone
  4. a way to call someone from a distance
  5. sending nudes from phone
Down
  1. bullying socially
  2. way to send messages
  3. someones veiw of you
  4. someone that harms you
  5. another word for protection

10 Clues: bullying sociallyway to send messagessomeones veiw of yousomeone that harms yousending nudes from phoneanother word for inteligentanother word for protectiona way of peir pressuring someonea way to call someone from a distancethief someone that try's to steal your identity

Cyber Safety 2020-02-23

Cyber Safety crossword puzzle
Across
  1. He told me to stop playing computer games and start exercising. This was good _____.
  2. The new recharging cable was not ___, so it caused a fire
  3. Scaring or intimidating someone to make they do something.
  4. Send messages over the intenet like paper letters.
  5. If you spend 5 hours every day playing computer games, you have bad _____.
Down
  1. He showed __________when he told the teacher about the bullies
  2. I help my sister with homework because it's my _______.
  3. A global network of computers.
  4. connected to the internet.
  5. We used this machine to do math calculations and to send messages. machine does calculations and

10 Clues: connected to the internet.A global network of computers.Send messages over the intenet like paper letters.I help my sister with homework because it's my _______.The new recharging cable was not ___, so it caused a fireScaring or intimidating someone to make they do something.He showed __________when he told the teacher about the bullies...

Cyber Crimes 2021-01-28

Cyber Crimes crossword puzzle
Across
  1. A computer hacker whose activity is aimed at promoting a social or political cause
  2. software or code intended to damage or disable computers and computer systems
  3. Scams that usually offer the victims large returns with minimal risk
  4. Type of fraud where a perpetrator deceives a victim into believing the the perpetrator and victim have a trust relationship and the victim is persuaded to send money
  5. Unlawful extraction of money or property through intimidation or undue exercise of authority
Down
  1. The perpetrator informs a victim that they qualified for a large loan or won large amount of money, but they have to first pay money first to get it
  2. An individual is sent a payment and instructed to keep a portion and send the remainder to another person or business
  3. contact information is deliberately falsified to mislead and appear to be from a legitimate source
  4. Type of attack that floods a network with multiple requests, slowing down or interrupting service
  5. type of malicious software designed to block access to a computer system until money is paid

10 Clues: Scams that usually offer the victims large returns with minimal risksoftware or code intended to damage or disable computers and computer systemsA computer hacker whose activity is aimed at promoting a social or political causetype of malicious software designed to block access to a computer system until money is paid...

Cyber bullying 2019-07-11

Cyber bullying crossword puzzle
Across
  1. Holt
  2. answer someones question
  3. being hurt constantly
  4. private to you
  5. not tell the truth
  6. like a cold
Down
  1. something you use to access messages and internet
  2. to hold up
  3. someone who is mean to someone else
  4. texting and communicating

10 Clues: Holtto hold uplike a coldprivate to younot tell the truthbeing hurt constantlyanswer someones questiontexting and communicatingsomeone who is mean to someone elsesomething you use to access messages and internet