cyber security Crossword Puzzles

The Security & Exchange Acts Legacy 2025-02-13

The Security & Exchange Acts Legacy crossword puzzle
Across
  1. regulates the exchanges on which securities are ____
  2. This act also helped regulate the ____ ______, enforce federal security laws, and required full disclosure of stock information.
  3. The Security & Exchange Acts Is still ____.
  4. this is about the _______ & exchange act
Down
  1. regulates secondary financial markets to ensure a transparent and fair _________ for investors. create transparency in the financial statements of corporations.
  2. The Security & Exchange Act was formed on ____ ___, 1934
  3. The Security & Exchange Act was considered a ______
  4. It is now one of many laws that control securities offerings in the ______.
  5. The Acts formation and purpose was to help prevent another Wall Street ____.
  6. register, regulate, and oversee brokerage firms, ______ agents, and clearing.

10 Clues: this is about the _______ & exchange actThe Security & Exchange Acts Is still ____.The Security & Exchange Act was considered a ______regulates the exchanges on which securities are ____The Security & Exchange Act was formed on ____ ___, 1934It is now one of many laws that control securities offerings in the ______....

Cyber Bullying 2020-03-08

Cyber Bullying crossword puzzle
Across
  1. recognize as being
  2. a person who pleads for a person, cause, or idea
  3. Interactive web journal or diary,the contents of which are posted online and which others can view
  4. an unfortunate person who suffers from adverse circumstances
  5. revenge
Down
  1. think about carefully; weigh
  2. The application of a set of criteria against which internet content is judged acceptable or not
  3. doctoring digital images so that the main subject is placed in a compromising or embarrassing situation.
  4. Someone who harms another through electronic devices
  5. to threaten, frighten, scare, coerce, terrify, and to alarm

10 Clues: revengerecognize as beingthink about carefully; weigha person who pleads for a person, cause, or ideaSomeone who harms another through electronic devicesto threaten, frighten, scare, coerce, terrify, and to alarman unfortunate person who suffers from adverse circumstances...

Cyber-Bullying 2021-04-27

Cyber-Bullying crossword puzzle
Across
  1. Something that no one should experience
  2. Do not share false ________ about someone
  3. Do not share any personal
  4. When online make sure you are _______ at all times
  5. Make sure you have _______ permission when online
  6. An individual that constantly bothers you in a repeated manner
Down
  1. Never accept or communicate with _______
  2. Social _______ has it's positives and negatives
  3. Cyberbullying can have a _______ affect on you
  4. If you view a form of cyberbullying make sure you _______ it

10 Clues: Do not share any personalSomething that no one should experienceNever accept or communicate with _______Do not share false ________ about someoneCyberbullying can have a _______ affect on youSocial _______ has it's positives and negativesMake sure you have _______ permission when onlineWhen online make sure you are _______ at all times...

Cyber Crime 2021-05-19

Cyber Crime crossword puzzle
Across
  1. a criminal activity conducted using computers and the internet. This includes fraud, internet scams, and identiy theft
  2. A technique used by hackers to redirect users to false websites without their knowledge.
  3. a scheme aimed at tricking you into providing sensitive information to scammers
  4. a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
  5. Computers that have been penetrated , compromised, and programmed to operate on the commands of an unauthorized remote user
Down
  1. theft When someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud
  2. Software that compromises computers or networks with the intention of disrupting their intended functions or operations.
  3. A engineered attempt by malicious actors to deceive internet users into providing personal information such as usernames, passwords etc.
  4. The scrambling of information so that it is unreadable to those who do not have the code to unscramble.
  5. A verb meaning to gain unauthorized access into a computer system.
  6. pretending to be someone else to demand money, information or something of value

11 Clues: A verb meaning to gain unauthorized access into a computer system.a scheme aimed at tricking you into providing sensitive information to scammerspretending to be someone else to demand money, information or something of valueA technique used by hackers to redirect users to false websites without their knowledge....

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  2. process of converting information into a digital
  3. Web page to summon different elements from diverse pages or servers to create a new Web page
  4. The communication via any electronic device of false data that damages a person's reputation
Down
  1. Using a computer to steal personal data
  2. the making, altering, use, or possession of a false writing in order to commit a fraud
  3. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  4. when someone forcefully takes control of a website by cracking the password and later changing it
  5. Make sure a buyer and seller can identify themselves
  6. Business conducted electronically (buying/selling on web)

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

Cyber Crimes 2022-03-24

Cyber Crimes crossword puzzle
Across
  1. Illegally preventing others to gain access to their personal accounts or websites
  2. Pretending to be someone else by using their personal information.
  3. Transferring money from one account to another without the permission of the account holder.
  4. Illegally copying and selling games or software.
Down
  1. Using a device to annoy, harass, intimidate or threaten a person online.
  2. Gaining unauthorized access into a computer network or someone's personal computer.
  3. Damaging information by deleting, adding false information or hiding it.
  4. using a device to intercept another person's device.
  5. Using the computer to create false documents such as cheques, legal documents and counterfeiting.
  6. Setting up fake websites to await unsuspecting persons to take the bait.

10 Clues: Illegally copying and selling games or software.using a device to intercept another person's device.Pretending to be someone else by using their personal information.Using a device to annoy, harass, intimidate or threaten a person online.Damaging information by deleting, adding false information or hiding it....

Cyber Foundations 2022-04-07

Cyber Foundations crossword puzzle
Across
  1. The slide currrently selected or displayed
  2. The preset amount of time between slides as they advance automatically during a slide show
  3. The template will appear along with traditional information on how the template could be used
  4. A feature that allows you to create a show from scratch
Down
  1. Where you will find commands to perform common tasks in PowerPoint
  2. The visual appearance or images of something when looked at in a certain way
  3. an item of illustrative matter
  4. A graphic tool that allows you to create a visual representation of information and ideas
  5. A graphical computer display that can be superimposed on another
  6. The figure that appears when you are adding text to a slide

10 Clues: an item of illustrative matterThe slide currrently selected or displayedA feature that allows you to create a show from scratchThe figure that appears when you are adding text to a slideA graphical computer display that can be superimposed on anotherWhere you will find commands to perform common tasks in PowerPoint...

Cyber Safety 2022-04-12

Cyber Safety crossword puzzle
Across
  1. A virus that modifies and deletes files
  2. A set of characters that grant admission
  3. To harm someone through the internet
  4. A virus that slows down your computer
  5. A virus that secretly damages your computer
Down
  1. A piece of code capable of a bad effects
  2. To copy from one computer system to another
  3. A virus that steals your information
  4. To scan through a website to gain info
  5. Software that is designed to disrupt

10 Clues: A virus that steals your informationTo harm someone through the internetSoftware that is designed to disruptA virus that slows down your computerTo scan through a website to gain infoA virus that modifies and deletes filesA piece of code capable of a bad effectsA set of characters that grant admissionTo copy from one computer system to another...

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber Bullying 2013-02-12

Cyber Bullying crossword puzzle
Across
  1. Casual or unconstrained conversation or reports about other people, typically involving details that are not confirmed as being true.
  2. A widely held but fixed and oversimplified image or idea of a particular type of person or thing.
  3. social media site many people use.
  4. when someone wont leave you alone and says mean or hurtful things.
Down
  1. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone.
  2. A secret word or phrase that must be used to gain admission to something.
  3. the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.
  4. causing distress or injury: to say hurtful things.
  5. social media site that you "tweet" on.
  6. boldly assertive and forward; pushy.

10 Clues: social media site many people use.boldly assertive and forward; pushy.social media site that you "tweet" on.causing distress or injury: to say hurtful things.when someone wont leave you alone and says mean or hurtful things.A secret word or phrase that must be used to gain admission to something....

Cyber safety 2024-05-02

Cyber safety crossword puzzle
Across
  1. the person making unkind comments
  2. places like instagram and snapchat
  3. where you go to get information from (not google)
  4. how you interact with a situation
  5. how you interact safely online
Down
  1. unkind or aggressive comments made over the internet
  2. the person who is being bullied
  3. given from other people to make you feel safe
  4. a good and fair action
  5. telling someone what is happening

10 Clues: a good and fair actionhow you interact safely onlinethe person who is being bulliedthe person making unkind commentshow you interact with a situationtelling someone what is happeningplaces like instagram and snapchatgiven from other people to make you feel safewhere you go to get information from (not google)...

Cyber bullying 2024-06-14

Cyber bullying crossword puzzle
Across
  1. Do you feel s
  2. a form of social media that makes the same sound as a clock
  3. What is it called when you speak to someone
  4. What is it called when you message people on your phone
  5. A safe person to go to
Down
  1. A device that you call on
  2. Someone that you t
  3. A big device that you do lots of gaming on
  4. A form of social media that starts with s
  5. A word you can say when your stuck somewhere and it starts with the letter h

10 Clues: Do you feel sSomeone that you tA safe person to go toA device that you call onA form of social media that starts with sA big device that you do lots of gaming onWhat is it called when you speak to someoneWhat is it called when you message people on your phonea form of social media that makes the same sound as a clock...

Cyber bullying 2024-06-11

Cyber bullying crossword puzzle
Across
  1. Do you feel s
  2. a form of social media that makes the same sound as a clock
  3. A form of social media that starts with s
  4. What is it called when you message people on your phone
Down
  1. A device that you call on
  2. Whats it called when you speak to someone
  3. A big device that you do lots of gaming on
  4. A safe person to go to
  5. A word you can say when your stuck somewhere and it starts with the letter h
  6. Someone that you t

10 Clues: Do you feel sSomeone that you tA safe person to go toA device that you call onWhats it called when you speak to someoneA form of social media that starts with sA big device that you do lots of gaming onWhat is it called when you message people on your phonea form of social media that makes the same sound as a clock...

CYBER CLUES 2023-04-27

CYBER CLUES crossword puzzle
Across
  1. a type of programming language that is designed to create dynamic web content
  2. A type of database that stores data in a hierarchical structure
  3. computer network designed for communication between devices in close proximity
  4. A technology used for creating and storing digital currency in a decentralized manner
  5. a type of memory that stores frequently accessed data for quick access by the CPU
Down
  1. A type of programming language used for creating mobile applications for Apple's iOS platform
  2. A data structure that stores a collection of key-value pairs in no particular order.
  3. A type of database that stores data in tables
  4. cyber attack that disguises as a legitimate email to trick users.
  5. A keyword used to indicate that a method or variable belongs to the class itself, not an instance of the class

10 Clues: A type of database that stores data in tablesA type of database that stores data in a hierarchical structurecyber attack that disguises as a legitimate email to trick users.a type of programming language that is designed to create dynamic web contentcomputer network designed for communication between devices in close proximity...

Cyber Safety 2023-05-18

Cyber Safety crossword puzzle
Across
  1. Online fights using electronic messages with angry and vulgar language.
  2. Repeatedly sending nasty, mean and insulting messages.
  3. People that bully others online, mean comments, pictures, sharing information.
  4. Talking to someone into give personal information or embarrassing secrets.
  5. Intentionally and cruelly excluding someone from an online group.
Down
  1. People that steal your information.
  2. Pretending other peoples work and things are yours.
  3. Sharing someone's secrets embarrassing information or images online.
  4. Something that comes up to stop you doing something or trying to make you do something.
  5. Repeated, intense harassment and denigration that include threats or creates significant fear.

10 Clues: People that steal your information.Pretending other peoples work and things are yours.Repeatedly sending nasty, mean and insulting messages.Intentionally and cruelly excluding someone from an online group.Sharing someone's secrets embarrassing information or images online.Online fights using electronic messages with angry and vulgar language....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Something that infects and spreads through your compute
  2. Repeated harassment and denigration that includes threats
  3. Trying to steal someone's private info
  4. Purposely and cruelly excluding someone
Down
  1. Posting rumours about a person
  2. Online fights using vulgar language
  3. Someone who is mean or aggressive
  4. Stealing someone's work and not crediting them
  5. Talking someone into revealing secrets
  6. Sharing someone's embarrassing information or images online

10 Clues: Posting rumours about a personSomeone who is mean or aggressiveOnline fights using vulgar languageTrying to steal someone's private infoTalking someone into revealing secretsPurposely and cruelly excluding someoneStealing someone's work and not crediting themSomething that infects and spreads through your compute...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. An illness for computers.
  2. Getting someone to reveal their secrets and personal information and sharing it online.
  3. The stealing of someone's personal information.
  4. Intentionally and cruelly excluding someone from an online group.
  5. A type of online fighting using angry and inappropriate language.
  6. Using somebody else's work as your own.
Down
  1. Repeated, intense threats and harassment that create fear.
  2. The repeated sending of mean, nasty and insulting online messages.
  3. When someone shares another person's secrets or images online.
  4. Bullying someone online.

10 Clues: Bullying someone online.An illness for computers.Using somebody else's work as your own.The stealing of someone's personal information.Repeated, intense threats and harassment that create fear.When someone shares another person's secrets or images online.Intentionally and cruelly excluding someone from an online group....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. When someone or a group of people is bullying you online.
  2. When someone steals your work or ideas and makes it their own.
  3. Sharing someone's secrets or embarrassing information or images online.
  4. Repeatedly sending nasty, mean messages.
  5. Talking someone into revealing secrets or information and posting it online.
  6. A type of software that spreads between computers and causes damage yo data and software.
Down
  1. Pretending to be someone else and sending or posting material to get someone in trouble.
  2. Intentionally and cruelly excluding someone from an online group.
  3. Online fights using mean language.
  4. When someone steals your identity and pretends to be you.

10 Clues: Online fights using mean language.Repeatedly sending nasty, mean messages.When someone or a group of people is bullying you online.When someone steals your identity and pretends to be you.When someone steals your work or ideas and makes it their own.Intentionally and cruelly excluding someone from an online group....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. repeated, intense harassment denigration
  2. online fights using electronic messages
  3. it is a form of selling someone's identify online
  4. sending nasty, mean and insulting messages
  5. there will look for almost anyone to harass
Down
  1. intestinally and cruelly excluding someone from on online group
  2. "dissing" someone online
  3. talking someone into revealing secrets or embarrassing information
  4. pretending to be someone else online
  5. sharing someone's secrets or embarrassing information

10 Clues: "dissing" someone onlinepretending to be someone else onlineonline fights using electronic messagesrepeated, intense harassment denigrationsending nasty, mean and insulting messagesthere will look for almost anyone to harassit is a form of selling someone's identify onlinesharing someone's secrets or embarrassing information...

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. to help someone
  2. someone hurting someone else
  3. hurtful person
  4. something you go on
  5. Hacking
  6. looking out for someone
Down
  1. something you use in everyday life
  2. knowing your on a device
  3. hurting someone online
  4. mentally attacking someone

10 Clues: Hackinghurtful personto help someonesomething you go onhurting someone onlinelooking out for someoneknowing your on a devicementally attacking someonesomeone hurting someone elsesomething you use in everyday life

Cyber Safety 2024-10-10

Cyber Safety crossword puzzle
Across
  1. This involves the exchange of information through electronic channels, such as emails, instant messaging, or social media.
  2. _____________ means taking part in an online community safely, ethically and respectfully.
  3. It’s an obligation or duty which you have towards yourself and to others.
  4. Avoid connecting to ______________ public wifi networks.
  5. To fully participate in society which uses electronic devices and the internet.
Down
  1. It is the process of learning and teaching about technology and how to use it effectively.
  2. It refers to the buying and selling of goods using electronic means, like online shopping.
  3. Protect your personal information with strong _____________.
  4. ___________________ means being secure online.
  5. The continuing and spreading results of an event or an action.

10 Clues: ___________________ means being secure online.Avoid connecting to ______________ public wifi networks.Protect your personal information with strong _____________.The continuing and spreading results of an event or an action.It’s an obligation or duty which you have towards yourself and to others....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

cyber bullying 2025-06-19

cyber bullying crossword puzzle
Across
  1. something from you
  2. is someone who stands up for you and saying stop
  3. is something that happens online like people saying hurtfull comments
  4. is someome getting bullied over and over again
  5. is telling the teacher or adult what happend
  6. is something that you get exculded from a group
  7. is somthing they pick on you about
Down
  1. is something online if you need help you can talk to them
  2. a person just standing and watching pointing and laughing
  3. say hurtfull things

10 Clues: something from yousay hurtfull thingsis somthing they pick on you aboutis telling the teacher or adult what happendis someome getting bullied over and over againis something that you get exculded from a groupis someone who stands up for you and saying stopis something online if you need help you can talk to them...

Cyber Ethics 2025-06-06

Cyber Ethics crossword puzzle
Across
  1. Legal term for ownership of creative work.
  2. Legal rights over creations of the mind.
  3. Copying someone's work and calling it your own.
  4. Unwanted bulk emails from unknown sources.
Down
  1. The trace a person leaves online.
  2. Behaving responsibly and ethically on the internet.
  3. Moral principles for using computers and the internet.
  4. Copying and using software illegally.
  5. Right to control information about yourself.
  6. Illegally accessing a computer system.

10 Clues: The trace a person leaves online.Copying and using software illegally.Illegally accessing a computer system.Legal rights over creations of the mind.Legal term for ownership of creative work.Unwanted bulk emails from unknown sources.Right to control information about yourself.Copying someone's work and calling it your own....

Cyber ethics 2025-05-29

Cyber ethics crossword puzzle
Across
  1. Scrambling data to protect it from unauthorized access.
  2. – Respecting personal data and not accessing others’ information.
  3. A cybercrime where someone is tricked into giving personal information.
  4. Legal protection for original work.
  5. Bullying someone online.
Down
  1. Malicious software like viruses or worms.
  2. Online etiquette or good behavior on the internet.
  3. A secret word or phrase used for authentication.
  4. Unauthorized access to data or systems.
  5. Unwanted or junk email.

10 Clues: Unwanted or junk email.Bullying someone online.Legal protection for original work.Unauthorized access to data or systems.Malicious software like viruses or worms.A secret word or phrase used for authentication.Online etiquette or good behavior on the internet.Scrambling data to protect it from unauthorized access....

cyber addiction 2025-10-19

cyber addiction crossword puzzle
Across
  1. The act of being compelled to check devices or social media, often without conscious intent.
  2. The state of being distracted or overwhelmed by too much information or stimuli.
  3. The gradual decline in cognitive function due to excessive screen time.
  4. The amount of time or frequency someone spends on digital devices or apps.
  5. The brain's ability to reorganize itself by forming new neural connections.
Down
  1. The fundamental units of the brain and nervous system, responsible for transmitting information.
  2. A type of reinforcement where rewards are given at unpredictable intervals, making behavior more resistant to extinction.
  3. The process of taking over or dominating someone's attention, often used in the context of digital platforms.
  4. A neurotransmitter associated with pleasure and reward, often linked to addictive behaviors.
  5. The feeling of wanting something strongly, especially something that is hard to resist.

10 Clues: The gradual decline in cognitive function due to excessive screen time.The amount of time or frequency someone spends on digital devices or apps.The brain's ability to reorganize itself by forming new neural connections.The state of being distracted or overwhelmed by too much information or stimuli....

Ασφάλεια στο διαδύκτιο 2024-02-15

Ασφάλεια στο διαδύκτιο crossword puzzle
Across
  1. positive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα
  2. Reputation Διαδικτυακή Φήμη
  3. Κακόβουλο Λογισμικό
  4. Passwords Κωδικοί Πρόσβασης
  5. Addiction Εθισμόσ στο διαδιίκτυο
  6. Scams Ηλεκτρονικές Απάτες
Down
  1. Piracy Πειρατεία Λογισμικού
  2. Διαδικτυακός Εκφοβισμός
  3. news Ψευδής Ειδήσεις
  4. gaming Παιχνίδια στο Διαδίκτυο

10 Clues: Κακόβουλο Λογισμικόnews Ψευδής ΕιδήσειςΔιαδικτυακός ΕκφοβισμόςScams Ηλεκτρονικές ΑπάτεςPiracy Πειρατεία ΛογισμικούReputation Διαδικτυακή ΦήμηPasswords Κωδικοί Πρόσβασηςgaming Παιχνίδια στο ΔιαδίκτυοAddiction Εθισμόσ στο διαδιίκτυοpositive Εικόνεσ Σώματοσ , Κοινωνικά Δίκτυα

Cyber Safety 2022-10-27

Cyber Safety crossword puzzle
Across
  1. Never give out personal ______ online
  2. It is important to not ____ fake news.
  3. A person who instigates conflict online.
  4. Bullying online is called?
Down
  1. ___ you visit are a part of your digital footprint.
  2. If you see cyberbullying you should ____ it right away.
  3. Trolling can be considered _____.
  4. Check the ___ in order to determine if the website is reliable
  5. Never tell anyone your ___, not even your friend's
  6. It is encouraged to only speak the ____ online.

10 Clues: Bullying online is called?Trolling can be considered _____.Never give out personal ______ onlineIt is important to not ____ fake news.A person who instigates conflict online.It is encouraged to only speak the ____ online.Never tell anyone your ___, not even your friend's___ you visit are a part of your digital footprint....

CYBER LAW 2021-09-05

CYBER LAW crossword puzzle
Across
  1. stranger has broken into your computer systems without your knowledge and has tampered with confidential data.
  2. a form of malware that prevents you from accessing files on your computer.
  3. defensive technology designed to keep the hackers out.
  4. hacking attack that tricks victims into clicking on an unintended link.
Down
  1. data that is used to describe large amounts of other Internet data.
  2. lure individuals into revealing login information.
  3. hackers that break into the network to steal information that will be used to harm the owner.
  4. false ATM cards used by criminals for their monetary benefits.
  5. a malicious application that can be used to take advantage of a computer’s vulnerability.
  6. program that masks something harmful,that carries it into a device.

10 Clues: lure individuals into revealing login information.defensive technology designed to keep the hackers out.false ATM cards used by criminals for their monetary benefits.data that is used to describe large amounts of other Internet data.program that masks something harmful,that carries it into a device....

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  2. Web page to summon different elements from diverse pages or servers to create a new Web page
  3. The communication via any electronic device of false data that damages a person's reputation
  4. Make sure a buyer and seller can identify themselves
  5. Business conducted electronically (buying/selling on web)
Down
  1. process of converting information into a digital
  2. Using a computer to steal personal data
  3. when someone forcefully takes control of a website by cracking the password and later changing it
  4. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  5. the making, altering, use, or possession of a false writing in order to commit a fraud

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. like a sickness for a computer
  2. Repeatedly sending nasty, mean, and insulting messages.
  3. keep your things safe with a ________
  4. Repeated, intense harassment and denigration that includes threats or creates significant fear.
  5. Online fights using electronic messages with angry and vulgar language
Down
  1. bullying online
  2. Talking someone into revealing secrets or embarrassing information, then sharing it online.
  3. Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  4. Intentionally and cruelly excluding someone from an online group.
  5. Sharing someone's secrets or embarrassing information or images online.

10 Clues: bullying onlinelike a sickness for a computerkeep your things safe with a ________Repeatedly sending nasty, mean, and insulting messages.Intentionally and cruelly excluding someone from an online group.Online fights using electronic messages with angry and vulgar languageSharing someone's secrets or embarrassing information or images online....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Someone stealing an authors original work.
  2. Stealing others Identity's.
  3. Sending threats or going through their online accounts.
  4. Using technology to harm others.
Down
  1. A virus on a computer.
  2. On line fights using technology.
  3. The practice of following actionable guidlines on the internet.
  4. Geting private information about someone and sharing it with other people online.
  5. Intentionally keeping someone out of somthing.
  6. Sharing another persons secrets online.

10 Clues: A virus on a computer.Stealing others Identity's.On line fights using technology.Using technology to harm others.Sharing another persons secrets online.Someone stealing an authors original work.Intentionally keeping someone out of somthing.Sending threats or going through their online accounts....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. repeated, intense harassment denigration
  2. online fights using electronic messages
  3. it is a form of selling someone's identify online
  4. sending nasty, mean and insulting messages
  5. there will look for almost anyone to harass
Down
  1. intestinally and cruelly excluding someone from on online group
  2. "dissing" someone online
  3. talking someone into revealing secrets or embarrassing information
  4. pretending to be someone else online
  5. sharing someone's secrets or embarrassing information

10 Clues: "dissing" someone onlinepretending to be someone else onlineonline fights using electronic messagesrepeated, intense harassment denigrationsending nasty, mean and insulting messagesthere will look for almost anyone to harassit is a form of selling someone's identify onlinesharing someone's secrets or embarrassing information...

Cyber Safety 2022-03-01

Cyber Safety crossword puzzle
Across
  1. I can keep myself __________ online by not giving out my personal information.
  2. I should not use personal information such as __________ and birthdates as your password.
  3. I should __________ an adult if someone or something makes me feel uncomfortable.
  4. Do not write down or __________ your password with anyone.
  5. I should check if the information I find online is __________ before I believe it.
Down
  1. I should not meet up with __________ I have talked online to.
  2. You should include at least one __________ letter when you create a password.
  3. I should include numbers, letters and ___________ when creating a password.
  4. My password should include __________ characters or more.
  5. I should not __________ suspicious files or pictures online.

10 Clues: My password should include __________ characters or more.Do not write down or __________ your password with anyone.I should not __________ suspicious files or pictures online.I should not meet up with __________ I have talked online to.I should include numbers, letters and ___________ when creating a password....

Cyber Foundations 2022-04-26

Cyber Foundations crossword puzzle
Across
  1. a short account of an incident
  2. anything that obstructs accurate communicate of a message
  3. key assertions made by a speaker to develop his or her central idea
Down
  1. the quality of which a speaker appears
  2. words that refer to ideas or concepts
  3. final statement of your speech
  4. adjusting one's materials and delivery to meet the needs of the listeners
  5. verbal and nonverbal responses provided by an audience to a speaker
  6. words that name persons and things that we can know by our five senses
  7. reasoning from specific to general

10 Clues: final statement of your speecha short account of an incidentreasoning from specific to generalwords that refer to ideas or conceptsthe quality of which a speaker appearsanything that obstructs accurate communicate of a messageverbal and nonverbal responses provided by an audience to a speaker...

Cyber 2 2023-12-04

Cyber 2 crossword puzzle
Across
  1. Updating software for security
  2. Disguised malware
  3. Captures typed keystrokes
  4. Floods server with traffic
  5. Advertising-supported software
Down
  1. Targeted email scam
  2. Faking identity or data
  3. Network of infected devices
  4. Dual authentication method
  5. Unauthorized access point

10 Clues: Disguised malwareTargeted email scamFaking identity or dataUnauthorized access pointCaptures typed keystrokesDual authentication methodFloods server with trafficNetwork of infected devicesUpdating software for securityAdvertising-supported software

Cyber Safety 2024-03-27

Cyber Safety crossword puzzle
Across
  1. bullying people online
  2. Mobile _ _ _ _
  3. people who use computers to gain unauthorised access to data
  4. a piece of code that is capable of copying itself and usually has a detrimental effect, like corrupting the system or destroying data.
  5. a global computer network providing a variety of information and communication facilities
Down
  1. When somebody pretends to be someone or something else to acquire personal information about you.
  2. networked computing facilities providing remote data storage and processing services via the internet.
  3. something that you enter to protect your information or accounts
  4. the abbreviation of the words malicious software
  5. a computer program with a graphical user interface for displaying and navigating between web pages.

10 Clues: Mobile _ _ _ _bullying people onlinethe abbreviation of the words malicious softwarepeople who use computers to gain unauthorised access to datasomething that you enter to protect your information or accountsa global computer network providing a variety of information and communication facilities...

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber Monday 2024-11-28

Cyber Monday crossword puzzle
Across
  1. Additional cost
  2. Where you shop online
  3. Symbol of a country on items
  4. Simple shopping experience
  5. Popular items
Down
  1. Part of a website
  2. Picture of an item
  3. List of desired items
  4. To arrange by category
  5. Price for travel or shipping

10 Clues: Popular itemsAdditional costPart of a websitePicture of an itemWhere you shop onlineList of desired itemsTo arrange by categorySimple shopping experienceSymbol of a country on itemsPrice for travel or shipping

Cyber Safety 2024-07-25

Cyber Safety crossword puzzle
Across
  1. gets bullyed by bully
  2. how to be safe online
  3. people who stand up for the victim
  4. WWW stands for
  5. what to do about mean people or scammers
  6. id for internet
Down
  1. someone thats there when someone is being bullyed
  2. bulying+cybyer=
  3. leaking private info about someone online as a bullying tactic
  4. dot commercial

10 Clues: WWW stands fordot commercialbulying+cybyer=id for internetgets bullyed by bullyhow to be safe onlinepeople who stand up for the victimwhat to do about mean people or scammerssomeone thats there when someone is being bullyedleaking private info about someone online as a bullying tactic

CYBER-BULLYING 2024-07-25

CYBER-BULLYING crossword puzzle
Across
  1. - staying safe online from bullies and hackers
  2. - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. - careful investigation into a crime or mystery
  4. - a witness of the bullying
Down
  1. - an electronic communications network that connects computer networks and organizational computer facilities around the world
  2. - bullying but online
  3. - a secret word or phrase that must be used to gain admission to a place.
  4. - Someone who stands up to the bullies
  5. - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. - the address of a unique resource on the internet

10 Clues: - bullying but online- a witness of the bullying- Someone who stands up to the bullies- staying safe online from bullies and hackers- careful investigation into a crime or mystery- the address of a unique resource on the internet- a secret word or phrase that must be used to gain admission to a place....

Cyber Safety 2024-11-05

Cyber Safety crossword puzzle
Across
  1. ff
  2. qq
  3. pp
  4. mm
Down
  1. kk
  2. sx
  3. aa
  4. ss
  5. gg
  6. jj

10 Clues: ffkksxaaqqssppggjjmm

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. abuse a hurtful person online
  2. a bad person
  3. acting like someone that is not the real person
  4. To protect something like its your life
  5. smart and online tech
Down
  1. to offend someone of their normalities
  2. hacking basically
  3. connected to the interenet
  4. make it atleast 8 characters long
  5. A person who helps a person being bullied

10 Clues: a bad personhacking basicallysmart and online techconnected to the interenetabuse a hurtful person onlinemake it atleast 8 characters longto offend someone of their normalitiesTo protect something like its your lifeA person who helps a person being bulliedacting like someone that is not the real person

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. someone who teases someone else online
  2. hurting someone on the internet
  3. someone doing something to hurt someone
  4. people that try to join the group to hurt others
  5. hacking
  6. something that you go on
Down
  1. something you use to help someone
  2. someone who is being mean to you
  3. hurting someone mentally
  4. looking out for someone

10 Clues: hackinglooking out for someonehurting someone mentallysomething that you go onhurting someone on the internetsomeone who is being mean to yousomething you use to help someonesomeone who teases someone else onlinesomeone doing something to hurt someonepeople that try to join the group to hurt others

CYBER BULLYING 2025-03-11

CYBER BULLYING crossword puzzle
Across
  1. PRETENDING TO BE A PERSON YOU ARENT
  2. MAKING FUN OF
  3. CALLING PEOPLE NAMES
  4. BULLYING
Down
  1. TAKING ACTION AGAINST SOMEONE
  2. TO HARRASS OR FRIGHTEN SOMEONE
  3. SPREADING SOMETHING AROUND
  4. SAYING RUDE WORDS
  5. SEND A MESSAGE INDISCRAMENTLY
  6. RAID A FORM OF ATTACK

10 Clues: BULLYINGMAKING FUN OFSAYING RUDE WORDSCALLING PEOPLE NAMESRAID A FORM OF ATTACKSPREADING SOMETHING AROUNDTAKING ACTION AGAINST SOMEONESEND A MESSAGE INDISCRAMENTLYTO HARRASS OR FRIGHTEN SOMEONEPRETENDING TO BE A PERSON YOU ARENT

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. HURTING SOMEONE EMOTIONALY
  2. REPLYING TO SOMEONE
  3. PRETENDING TO BE SOMEONE YOU ARENT
  4. BEING MEAN ON THE INTERNET
  5. BEING ACTIVE ON THE INTERNET
Down
  1. FAKE STORIES ABOUT SOMEONE
  2. THE USE OF TECHNOLOGY TO HARRASS SOMEONE
  3. BEING VERY RUDE
  4. HARMING SOMEONE
  5. A WAY TO NOT SEE UNWANTED MESSAGES

10 Clues: BEING VERY RUDEHARMING SOMEONEREPLYING TO SOMEONEFAKE STORIES ABOUT SOMEONEHURTING SOMEONE EMOTIONALYBEING MEAN ON THE INTERNETBEING ACTIVE ON THE INTERNETPRETENDING TO BE SOMEONE YOU ARENTA WAY TO NOT SEE UNWANTED MESSAGESTHE USE OF TECHNOLOGY TO HARRASS SOMEONE

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. To post things to bait emotions, mainly anger.
  2. A type of abuse which contains gained sexual content by force and discomfort.
  3. To abuse someone on the internet.
  4. Anything that involves messaging.
Down
  1. To defend something/someone.
  2. To publish info about someone on the web; usually with malicious intent.
  3. The internet.
  4. To repeatedly abuse someone.
  5. to do something bad to someone.
  6. to send an overload of messages to someone.

10 Clues: The internet.To defend something/someone.To repeatedly abuse someone.to do something bad to someone.To abuse someone on the internet.Anything that involves messaging.to send an overload of messages to someone.To post things to bait emotions, mainly anger.To publish info about someone on the web; usually with malicious intent....

Cyber Crossword 2025-10-13

Cyber Crossword crossword puzzle
Across
  1. Use strong password or __________ to better protect your accounts and keep your information safe.
  2. Software______ boost security and performance
  3. One effective way to protect against impersonation scams, such as Business Email Compromise (BEC), is to ______ the identity of the email sender through an out-of-band channel—such as a trusted phone call—especially when financial transactions are involved.
  4. Be mindful of your 'digital _______' when post online.
Down
  1. Cybercriminals use AI to mimic images or videos to trick people into sharing money or personal data
  2. One of the follow-up actions to perform for suspicious emails after clicking the "Report Phishing" button in Outlook
  3. One of the common phishing signs.
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  5. One of the tips for stronger passwords
  6. Acronym for authentication method requiring two or more forms of verification.

10 Clues: One of the common phishing signs.One of the tips for stronger passwordsSoftware______ boost security and performanceBe mindful of your 'digital _______' when post online.Acronym for authentication method requiring two or more forms of verification.Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity....

Don't Travel Without 2022-01-21

Don't Travel Without crossword puzzle
Across
  1. the piece of paper that lets you on the plane
  2. the people who work in the plane with passengers
  3. when security checks your person
  4. what you pass through at security
  5. the official document that lets you travel
  6. the area you go to pick up your luggage
Down
  1. the person flying the airplane
  2. what your luggage goes through at security
  3. the luggage you take on a plane
  4. telling the airline you're here for your flight
  5. the area you pass through when traveling in a new country
  6. moving from one flight to another
  7. a square piece of luggage
  8. the cart used to carry luggage

14 Clues: a square piece of luggagethe person flying the airplanethe cart used to carry luggagethe luggage you take on a planewhen security checks your personmoving from one flight to anotherwhat you pass through at securitythe area you go to pick up your luggagewhat your luggage goes through at securitythe official document that lets you travel...

Tatler Crossword Week 6 2023-11-27

Tatler Crossword Week 6 crossword puzzle
Across
  1. Popular girl scout cookie
  2. Journalist ___ B. Wells
  3. Shortest Grizzlies player(last name)
  4. Best time to buy online is ______ Monday,
  5. Woman's name that sounds like its first and third letters
Down
  1. The largest city in the world.
  2. Boy band with the 2000 hit "Bye Bye Bye"
  3. first animal in space
  4. Home to the Alhambra
  5. Knight's title
  6. Santa's workers

11 Clues: Knight's titleSanta's workersHome to the Alhambrafirst animal in spaceJournalist ___ B. WellsPopular girl scout cookieThe largest city in the world.Shortest Grizzlies player(last name)Boy band with the 2000 hit "Bye Bye Bye"Best time to buy online is ______ Monday,Woman's name that sounds like its first and third letters

KAREN'S RETIREMENT 2022-11-07

KAREN'S RETIREMENT crossword puzzle
Across
  1. at Roller King
  2. next vacation spot
  3. seagoing travel
  4. financial security
  5. Friday supper
  6. baby ___
  7. retirement as known in Cancun
  8. you are getting old if they have your number
  9. November 18
  10. ten letter word for busier than ever
  11. holiday travel
  12. knitting, pickleball, beekeeping etc
Down
  1. spending time with ___ not coworkers
  2. Friday night hydration
  3. good wishes for retirement
  4. what you are now
  5. opportunity afforded by free time
  6. goodbye anxiety
  7. afternoon activity
  8. no longer needed
  9. related group
  10. work for fun
  11. escape from schedules
  12. previous contribution to medical security
  13. at Lake Tahoe

25 Clues: baby ___November 18work for funFriday supperrelated groupat Lake Tahoeat Roller Kingholiday travelseagoing travelgoodbye anxietywhat you are nowno longer needednext vacation spotfinancial securityafternoon activityescape from schedulesFriday night hydrationgood wishes for retirementretirement as known in Cancunopportunity afforded by free time...

Teneequas crossword 2021-02-11

Teneequas crossword crossword puzzle
Across
  1. longest runway in the world
  2. I’m not as close to the airport
  3. before security
  4. aircraft parking
  5. also known as aircraft Marshall
  6. is illegal
  7. makes your flight feel bumpy because of bad weather
  8. provides meals for the aircraft
  9. I charge more when you use me
  10. you need me and travel docs
Down
  1. fills aircraft with water
  2. moving the aircraft away from the gate
  3. sniffs drugs
  4. TBU
  5. where is JFK
  6. fills the aircraft with gas
  7. empties waste
  8. after security
  9. helps unload and load carago and baggage
  10. evacuates passengers

20 Clues: TBUis illegalsniffs drugswhere is JFKempties wasteafter securitybefore securityaircraft parkingevacuates passengersfills aircraft with waterlongest runway in the worldfills the aircraft with gasyou need me and travel docsI charge more when you use meI’m not as close to the airportalso known as aircraft Marshallprovides meals for the aircraft...

Banking 2020-06-21

Banking crossword puzzle
Across
  1. savings
  2. bill
  3. exchange
  4. advances
  5. share
  6. debt
  7. clearing
  8. allowance
  9. loan
  10. overdraft
  11. discount
  12. bond
  13. capital
  14. coupon
  15. funds
  16. equity
  17. broker
  18. agent
  19. charge
  20. cash
  21. clerk
  22. cheque
  23. audit
  24. retail
  25. debit
  26. mortgage
  27. ingot
  28. inflation
  29. currency
Down
  1. dividend
  2. signature
  3. cashier
  4. guinea
  5. credit
  6. balance
  7. branch
  8. crown
  9. insurance
  10. statement
  11. corporate
  12. deposit
  13. ledger
  14. cent
  15. income
  16. bankrupt
  17. receipt
  18. account
  19. security
  20. lending
  21. interest
  22. transfer
  23. note

52 Clues: billdebtloanbondcentcashnotesharecrownfundsagentclerkauditdebitingotguineacreditbranchledgercouponequityincomebrokerchargechequeretailsavingscashierbalancedepositcapitalreceiptaccountlendingdividendexchangeadvancesclearingdiscountbankruptsecurityinteresttransfermortgagecurrencysignatureinsurancestatementallowanceoverdraftcorporateinflation

Cybersecurity Terms 2025-03-09

Cybersecurity Terms crossword puzzle
Across
  1. Encoding data for security reasons
  2. Harmful software that damages computers
  3. Unauthorized access to data
  4. Falsifying identity or source
  5. Software that monitors for malware
  6. Algorithm for encrypting data
  7. Network entry point for traffic
  8. Access granted to perform actions
  9. Ethical hacking to find vulnerabilities
  10. Malware locks files for money
  11. Network security barrier
Down
  1. Facial recognition to grant access
  2. Hidden entry for unauthorized access
  3. List of blocked entities
  4. Network of infected computers
  5. Converting ciphertext into plaintext
  6. Machine learning and thinking
  7. Verifying user identity
  8. Scam emails that trick users
  9. Software displaying unwanted ads

20 Clues: Verifying user identityList of blocked entitiesNetwork security barrierUnauthorized access to dataScam emails that trick usersNetwork of infected computersFalsifying identity or sourceAlgorithm for encrypting dataMachine learning and thinkingMalware locks files for moneyNetwork entry point for trafficSoftware displaying unwanted ads...

cyberscurity puzzule 2024-01-29

cyberscurity puzzule crossword puzzle
Across
  1. - Copy of data stored separately for recovery in case of loss.
  2. - Process of converting data into a format that cannot be easily accessed by unauthorized users.
  3. - Device or node connected to a network.
  4. - Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  5. - Malware that encrypts files and demands payment for their release.
  6. - Vulnerability that is exploited before the vendor releases a patch.
  7. - Unforeseen event that disrupts normal operations and compromises security.
  8. - Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  9. - Network security system that monitors and controls incoming and outgoing network traffic.
  10. - Set of rules and procedures governing how an organization manages and protects its data.
Down
  1. - Testing method used to identify security weaknesses in a system
  2. - Weakness in a system that can be exploited by threats to compromise security.
  3. - Authentication method requiring two forms of identification for access.
  4. - Software designed to detect and remove malicious software.
  5. - Segmentation - Dividing a network into smaller segments to reduce attack surface.
  6. - of Service (DoS) - Attack that disrupts services by overwhelming a system with traffic.
  7. - Update to a computer program or its supporting data designed to fix or improve it.
  8. - Process of verifying the identity of a user or system.
  9. - Engineering tactic that manipulates individuals into divulging confidential information.
  10. - Breach - Unauthorized access to sensitive or confidential information.
  11. - Unauthorized access to a computer system or network.

21 Clues: - Device or node connected to a network.- Unauthorized access to a computer system or network.- Process of verifying the identity of a user or system.- Software designed to detect and remove malicious software.- Copy of data stored separately for recovery in case of loss.- Testing method used to identify security weaknesses in a system...

CASP Exercise 1.1 2024-05-21

CASP Exercise 1.1 crossword puzzle
Across
  1. Rogue access points can intercept data flowing through the network, including
  2. is a process that identifies a cellular phone or any other radio transmitter by the?
  3. uses rules and heuristics to identify suspicious patterns of network behavior.
  4. firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
  5. has two security modes
  6. uses open protocols to control the virtual and physical devices responsible for routing the data packets.
  7. locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
  8. Rogue devices can spoof?
  9. allows good traffic and blocks all other.
  10. Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
  1. Wireless attack tool
  2. vulnerability where an attacker inserts malicious SQL code into an application’s input fields
  3. This security tool runs on Windows Server and can process packet capture files generated by Snort.
  4. analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
  5. monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
  6. It messes with Wi-Fi signals.
  7. allows all traffic and only blocks known bad traffic.
  8. It spies on nearby networks.
  9. Not only does it detect suspicious activity, but it also actively prevents attacks.
  10. ensures only authorized users and trusted devices can enter a network.
  11. Benefits are Privacy, Security, Access

21 Clues: Wireless attack toolhas two security modesRogue devices can spoof?It spies on nearby networks.It messes with Wi-Fi signals.Benefits are Privacy, Security, Accessallows good traffic and blocks all other.allows all traffic and only blocks known bad traffic.ensures only authorized users and trusted devices can enter a network....

Prem Thapa, 12/09/2024 2024-12-07

Prem Thapa, 12/09/2024 crossword puzzle
Across
  1. A method that uses hard drive space when your computer runs out of RAM
  2. A shared secret key used to securely connect devices on a network
  3. Rules set to track and record activities on a system to ensure security and compliance
  4. Converting data into a secure format to prevent unauthorized access
  5. A Linux tool that manages network traffic rules and firewall settings
  6. Rules that explain how a company collects, uses, and protects your personal information
  7. A framework of protocols used to secure data exchanged over an IP network by providing encryption, authentication, and data integrity
  8. Verifying identity using credentials
  9. An ethical hacker improving security
  10. The process of granting permission to access resources or perform actions
Down
  1. Unique mark left behind, often used to identify a person
  2. A security system that monitors and controls network traffic to block unauthorized access.
  3. Steps taken to keep your personal information safe from being stolen or lost
  4. A tool in Windows that secures data on a server by encrypting it
  5. A barrier on the OS that blocks harmful data from entering or leaving the computer
  6. A small unit of data that is monitored and filtered by the firewall to control network access
  7. Rules that define how passwords should be created, used, and updated for security
  8. Crating a copy of data for recovery
  9. A hacker with malicious intent
  10. Firewall rules that control data allowed into the server or device
  11. Malicious software designed to harm or exploit systems

21 Clues: A hacker with malicious intentCrating a copy of data for recoveryVerifying identity using credentialsAn ethical hacker improving securityMalicious software designed to harm or exploit systemsUnique mark left behind, often used to identify a personA tool in Windows that secures data on a server by encrypting it...

Investing - Angelina Guzman Cardenas 2025-03-24

Investing - Angelina Guzman Cardenas crossword puzzle
Across
  1. measures the price performance of a basket of securities
  2. Social security and medicare together are called…
  3. A sum of money saved or made available for a particular purpose.
  4. A digital ledger of transactions that is duplicated and distributed across a network.
  5. How old do you have to be to invest in crypto?
  6. Traditional IRA contributions are made…
  7. An example of fiat money is the…Bill
  8. Before investing in crypto only invest what you're willing to…
  9. Roth IRA contributions are made…
  10. Don't rely on … for retirement!
  11. Currencies that are created and backed by the government, but not tied to or backed by the value of any physical commodity.
  12. Investing all the money you have available at that given time, and putting it into the market
  13. If you leave your company you can… your funds to your new companies.
  14. Required Minimum Distributions must start at age…
  15. What category does crypto fall under?
  16. Before investing in crypto build a … fund.
Down
  1. Often times if you have one of these you don't pay social security tax.
  2. The biggest financial fraud in U.S history was the … scandal
  3. a strategy in which you invest your money in equal amounts, at regular intervals.
  4. Warren Buffets first rule…
  5. Social security is funded by…
  6. A pension is managed by…
  7. What president created social security…
  8. the availability of cash or the ease with which an asset can be converted to cash
  9. Crypto is a … risk Investment

25 Clues: A pension is managed by…Warren Buffets first rule…Social security is funded by…Crypto is a … risk InvestmentDon't rely on … for retirement!Roth IRA contributions are made…An example of fiat money is the…BillWhat category does crypto fall under?Traditional IRA contributions are made…What president created social security…...

Security Awareness Week- 2025 2025-09-10

Security Awareness Week- 2025 crossword puzzle
Across
  1. Tool used for receiving C-Return shipments
  2. Annual Evaluation of site compliance
  3. Replaced HID
  4. Navigate sites via interactive maps and device placement.
  5. No details of the unit
  6. Name of Video Management System
  7. An official repository of critical information and resources with regard to a site
  8. Used for Flagging/Unflagging of ASINs as HRV/Non-HRV
  9. Provides External access to roof
  10. Application used to identify employees on site during an emergency.
  11. Shows Process Path Rollup and Employee details including permissions and activity
  12. Zone 5 area
  13. Tool used for salvaging Orphan shipments
  14. Access Management Tool used for addition and removal of access levels.
  15. Used to link security devices with the Milestone video system.
Down
  1. Entity Dealing with Customer Returns
  2. Web based replacement for Lenel OnGuard's Alarm Monitoring.
  3. Replacement of Lenel Security Access System
  4. Tool used to handle orphan shipments
  5. Allows addition and removal of badges, access levels and badge photos.
  6. Present at Reception and used to alert control room about emergency.
  7. Required for maintenance of Security equipments and done on quarterly cadence
  8. Device Arming/Disarming Tool
  9. Facilitating entry/exit to/from the site
  10. Portal for driver verification and yard pass generation
  11. Tool to fetch access control reports
  12. Replacement of Right Crowd
  13. This is in three colors
  14. Biometric Authentication for Associates
  15. Virtual Monitoring team
  16. Tool/interface used for processing C-Return shipments
  17. Audit/certification for verifying Facility Security Requirements

32 Clues: Zone 5 areaReplaced HIDNo details of the unitThis is in three colorsVirtual Monitoring teamReplacement of Right CrowdDevice Arming/Disarming ToolName of Video Management SystemProvides External access to roofEntity Dealing with Customer ReturnsTool used to handle orphan shipmentsAnnual Evaluation of site compliance...

Chapter 11 CIS 25 2024-10-26

Chapter 11 CIS 25 crossword puzzle
Across
  1. Controls user and computer settings in domains
  2. Secure network authentication protocol for encrypted connections
  3. Encryption tool for protecting drive data security
  4. Application set to open specific file types
  5. Navigates and manages files and folders
  6. Command-line tool for task automation and scripting
  7. Enables file access without network connectivity
  8. Displays open applications, shortcuts, and notifications
  9. Security prompt for administrative privilege actions
  10. Monitors applications, processes, and system performance
  11. Web-based platform for collaboration and document management
  12. Database of system and application configuration settings
  13. Properties defining file characteristics and access permissions
  14. Hierarchical arrangement of files and folders
  15. Diagnoses DirectX issues and system hardware specifications
  16. Logs failed security events, unauthorized access attempts
  17. Remote access protocols
Down
  1. Hosts management tools for system administration tasks
  2. Analyzes real-time system performance and resource usage
  3. Logs, reviews system and application event information
  4. Caches files locally, reducing WAN bandwidth usage
  5. Manages installed hardware devices and driver software
  6. Identifiers for file types and associated programs
  7. Directory service managing users, computers, network resources
  8. Graphical interface for interacting with Windows system
  9. Peer-to-peer network without centralized authentication control
  10. Network structure grouping computers, users, security policies
  11. Text-based interface for executing system commands
  12. Encrypts files, ensuring only authorized access
  13. Tool for viewing, editing Windows registry settings database
  14. Hidden network share for system management purposes
  15. Configuration hub for Windows system settings customization
  16. Combines multiple drives for redundancy, speed improvements

33 Clues: Remote access protocolsNavigates and manages files and foldersApplication set to open specific file typesHierarchical arrangement of files and foldersControls user and computer settings in domainsEncrypts files, ensuring only authorized accessEnables file access without network connectivityEncryption tool for protecting drive data security...

INFANT SAFETY/ABDUTION 2023-03-02

INFANT SAFETY/ABDUTION crossword puzzle
Across
  1. Check the contents
  2. Call Security STAT
  3. #still not found
  4. Watch out
  5. Opposite of pro-active
  6. Mom & Dad
  7. Infant Security Measure
Down
  1. Mom's loving hug
  2. Emergency formerly known as
  3. Baby ID band spot
  4. Gender
  5. Tiniest Patient

12 Clues: GenderWatch outMom & DadTiniest PatientMom's loving hug#still not foundBaby ID band spotCheck the contentsCall Security STATOpposite of pro-activeInfant Security MeasureEmergency formerly known as

Law, Public Safety, Corrections & Safety 2023-01-25

Law, Public Safety, Corrections & Safety crossword puzzle
Across
  1. Having higher education may give you a higher --.
  2. Pathways of this career cluster are Correction Services, Emergency and Fire -- Services, Security and Protective Services, Law Enforcement Services, and Legal Services.
  3. About -- million people are employed in this career cluster.
  4. Depending on how serious the career is, a -- degree may be needed in order to practice.
  5. Police officers, firefighters, and EMTs respond to -- situations, risking their lives.
  6. Being a good -- speaker is an important skill to have in this cluster.
  7. -- degree or certificate programs qualify workers for work as firefighters, police patrol officers, and many more.
  8. An attorney needs this many years of law school.
  9. There are -- thousand police agencies in the U.S.
Down
  1. A -- degree is needed to qualify as a game warden and private detective.
  2. This career cluster focuses on --, managing, and providing public safety, legal, protective services, and homeland security.
  3. -- Bar Association is a degree needed to be a lawyer or judge.
  4. Only -- percent of police officers are women.
  5. Careers associated with this cluster often require specialized skills and ---.
  6. Careers in this cluster may have -- hours.
  7. Knowing multiple -- is a good skill to have in this career cluster.
  8. Security -- require a high school diploma or equivalent.
  9. This career cluster has a lot of --, and being able to overcome them is very important.
  10. The fastest growing occupation in this career cluster is this type of guard.

19 Clues: Careers in this cluster may have -- hours.Only -- percent of police officers are women.An attorney needs this many years of law school.Having higher education may give you a higher --.There are -- thousand police agencies in the U.S.Security -- require a high school diploma or equivalent.About -- million people are employed in this career cluster....

3B macchine e energia-3 2024-01-29

3B macchine e energia-3 crossword puzzle
Across
  1. creatore martello a vapore
  2. anno dei maggiori cambiamenti 4 rivoluzione
  3. anno creazione motore 2 tempi
  4. principale innovazione 4 rivoluzione industriale
  5. inventore della fotografia
Down
  1. inventore telegrafo
  2. anno creazione martello a vapore
  3. energia 2 rivoluzione industriale
  4. denominazione della 3 rivoluzione industriale

9 Clues: inventore telegrafocreatore martello a vaporeinventore della fotografiaanno creazione motore 2 tempianno creazione martello a vaporeenergia 2 rivoluzione industrialeanno dei maggiori cambiamenti 4 rivoluzionedenominazione della 3 rivoluzione industrialeprincipale innovazione 4 rivoluzione industriale

Children vs. The Cyberspace 2024-10-15

Children vs. The Cyberspace crossword puzzle
Across
  1. Overly active _____ laws can cause danger
  2. Can shape a children's perspective about the internet
  3. Online threats are _____
  4. Is always changing and growing
  5. Spreading _____ promotes change
Down
  1. Online Behavior and _____
  2. Bullying,Threats
  3. Most children access this on the daily
  4. Type of addiction

9 Clues: Bullying,ThreatsType of addictionOnline threats are _____Online Behavior and _____Is always changing and growingSpreading _____ promotes changeMost children access this on the dailyOverly active _____ laws can cause dangerCan shape a children's perspective about the internet

WCG&R Trivia Crossword Puzzle 2021-06-09

WCG&R Trivia Crossword Puzzle crossword puzzle
Across
  1. 3rd Line of Defense
  2. Type of risk that can potentially harm the Bank's Brand
  3. New __ Product Approval
  4. Third Party _ Risk Management
Down
  1. _Risk Event
  2. __ Identification program
  3. Process Risk __ Self Assessment
  4. _ Anti-Money Laundering
  5. Risk of having insufficient cash or collateral to meet financial obligations
  6. Type of Risk Assessment

10 Clues: _Risk Event3rd Line of Defense_ Anti-Money LaunderingType of Risk AssessmentNew __ Product Approval__ Identification programThird Party _ Risk ManagementProcess Risk __ Self AssessmentType of risk that can potentially harm the Bank's BrandRisk of having insufficient cash or collateral to meet financial obligations

Periodisasi Sastra 2022-10-10

Periodisasi Sastra crossword puzzle
Across
  1. Zaman sekarang itu zaman yang apa?
  2. Mengandung makna "zaman rusak"
  3. Buku ini bertema pendidikan
  4. Lahir pada tanggal 26 April 1982
  5. Namanya dimulai dengan huruf "K"
  6. Karya Ayu Utami
Down
  1. Ada 6 seri supernova
  2. Sastrawan yang hidup di abad ke-17
  3. Sastra di Internet
  4. Jatuhnya rezim Presiden Soeharto

10 Clues: Karya Ayu UtamiSastra di InternetAda 6 seri supernovaBuku ini bertema pendidikanMengandung makna "zaman rusak"Lahir pada tanggal 26 April 1982Jatuhnya rezim Presiden SoehartoNamanya dimulai dengan huruf "K"Zaman sekarang itu zaman yang apa?Sastrawan yang hidup di abad ke-17

Crossword-2 2019-06-30

Crossword-2 crossword puzzle
Across
  1. initiative for Multi-lingual Internet
  2. smarter banking alternatives
  3. Regional Internet Registry
  4. reason for being
  5. ISOC Palestine initiative on online sexual harassment
Down
  1. UNICEF Report on IG and Child rights
  2. Cyber Hygiene initiative by ISOC...Chapter?
  3. Key ICANN focus area
  4. category of top level domains
  5. Internet Governance Academy

10 Clues: reason for beingKey ICANN focus areaRegional Internet RegistryInternet Governance Academysmarter banking alternativescategory of top level domainsUNICEF Report on IG and Child rightsinitiative for Multi-lingual InternetCyber Hygiene initiative by ISOC...Chapter?ISOC Palestine initiative on online sexual harassment

Cyberbullying 2019-12-03

Cyberbullying crossword puzzle
Across
  1. GETS BULLIED ON THE INTERNET
  2. A ELECTRONIC THAT TENNAGERS HAVE
  3. presedent DONALD TRUMP HAS A ACCOUNT ON THIS APP
  4. little KIDS HAS THIS ELETRONIC
  5. TO PUT SOMETHING ON THE INTERNET
Down
  1. adults HAVE THIS APP
  2. its A MOTHER BOARD OF APPS
  3. HAS A KEYBORD
  4. MEAN TO DO
  5. you CAN SNAP PITHURES
  6. THIS IS WHAT GETS BULLIED

11 Clues: MEAN TO DOHAS A KEYBORDadults HAVE THIS APPyou CAN SNAP PITHURESTHIS IS WHAT GETS BULLIEDits A MOTHER BOARD OF APPSGETS BULLIED ON THE INTERNETlittle KIDS HAS THIS ELETRONICA ELECTRONIC THAT TENNAGERS HAVETO PUT SOMETHING ON THE INTERNETpresedent DONALD TRUMP HAS A ACCOUNT ON THIS APP

Security 2024-09-11

Security crossword puzzle
Across
  1. Used to secure doors
  2. Head of a team
  3. Test, test
  4. Uniformed security officers
  5. text, Test
Down
  1. Should be worn at all times within IRS facility
  2. Used to complete IRS work
  3. Very important to IRS success
  4. test, text

9 Clues: Test, testtest, texttext, TestHead of a teamUsed to secure doorsUsed to complete IRS workUniformed security officersVery important to IRS successShould be worn at all times within IRS facility

Security 2025-10-22

Security crossword puzzle
Across
  1. korrupciyag'a qarsi
  2. jasirin elonomika
  3. zulimliq
  4. indikator
Down
  1. soc/q-ek/q qawip qaterler
  2. alip keliw ha'm alip
  3. xaliqaraliq organ

7 Clues: zulimliqindikatorxaliqaraliq organjasirin elonomikakorrupciyag'a qarsialip keliw ha'm alipsoc/q-ek/q qawip qaterler

Safety Week 2024 2024-10-01

Safety Week 2024 crossword puzzle
Across
  1. Animal to emulate when walking on icy ground
  2. A symbol indicating dangerous biological substances
  3. A practice exercise to prepare for a potential emergency situation
  4. A collection of supplies and equipment for use in giving medical treatment
  5. See something ___ something
  6. A service providing emergency medical care and transportation
  7. Being ready and able to deal with emergencies
  8. Practice of following others through security checkpoint without access badge
  9. DMU's Chief Compliance Officer is highly ____ averse
  10. Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
  11. Action to take for a rapid, orderly process to exit building
  12. A portable device used to treat sudden cardiac arrest
Down
  1. Homeland Security model used by DMU for active threat response
  2. DMU encourages annual vaccines to prevent this common infection
  3. Document required by Clery Act to inform community on safety statistics
  4. DMUs emergency notification system
  5. Something one should always be aware of
  6. Campus department to contact if you witness suspicious activity
  7. DMU's avatar for emergency messaging

19 Clues: See something ___ somethingDMUs emergency notification systemDMU's avatar for emergency messagingSomething one should always be aware ofAnimal to emulate when walking on icy groundBeing ready and able to deal with emergenciesA symbol indicating dangerous biological substancesDMU's Chief Compliance Officer is highly ____ averse...

Arciniegas 2022-02-10

Arciniegas crossword puzzle
Across
  1. officer: he commands the duty officer
  2. officer: He is in charge of intelligence at the school
  3. the camp: school garden manager
Down
  1. Security of people
  2. technical officer: school weapon manager
  3. police: martiality
  4. commander: Security school
  5. no duty: service of company
  6. soldiers Security
  7. officer: send to school services

10 Clues: soldiers SecuritySecurity of peoplepolice: martialitycommander: Security schoolno duty: service of companythe camp: school garden managerofficer: send to school servicesofficer: he commands the duty officertechnical officer: school weapon managerofficer: He is in charge of intelligence at the school

Meraki IDE Bundle Crossword Puzzle 2020-03-26

Meraki IDE Bundle Crossword Puzzle crossword puzzle
Across
  1. Reliable _______________ connection up to 400 mbps
  2. ___________ path control networking
  3. Type of firewall protection included with Meraki IDE bundle
  4. ______________ based security
Down
  1. Connectivity backup for critical applications
  2. High Availability ________________
  3. Technical Support & Concierge “White Glove” Service
  4. Type of software and security updates delivered from the cloud
  5. __________ prevention security
  6. Cisco __________ IDE Bundle

10 Clues: Cisco __________ IDE Bundle______________ based security__________ prevention securityHigh Availability ___________________________ path control networkingConnectivity backup for critical applicationsReliable _______________ connection up to 400 mbpsTechnical Support & Concierge “White Glove” Service...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

life skills 1 2023-03-22

life skills 1 crossword puzzle
Across
  1. bullying Sharing mean pictures
  2. to speak or talk
  3. a person you know and like
  4. relaxed state
  5. settings hiding your profile
  6. a planned meeting
  7. to talk with someone
  8. paper to be filled out
  9. things that you like
  10. copy, when you can't see the copy
Down
  1. copy, an exact copy of the original
  2. a person you don't know well
  3. coming off the street with no appointment
  4. mail that is not junk
  5. good at something
  6. when someone gets into your accounts
  7. not talking or using words
  8. to save a time and a place for something

18 Clues: relaxed stateto speak or talka planned meetinggood at somethingto talk with someonethings that you likemail that is not junkpaper to be filled outa person you know and likenot talking or using wordsa person you don't know wellsettings hiding your profilebullying Sharing mean picturescopy, when you can't see the copy...

ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2024-02-12

ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ crossword puzzle
Across
  1. Positive εικόνα σώματος και κοινωνικά δίκτυα
  2. Passwords κωδικοί πρόσβασης
  3. News ψευδείς ειδήσεις
  4. Reputation διαδικτυακή φήμη
  5. Scams ηλεκτρονικές απάτες
Down
  1. διαδικτυακός εκφοβισμός
  2. Gaming παιχνίδια στο διαδίκτυο
  3. κακόβουλο λογισμικό
  4. Addiction εθισμός στο διαδίκτυο
  5. Piracy πειρατεία λογισμικού

10 Clues: κακόβουλο λογισμικόNews ψευδείς ειδήσειςδιαδικτυακός εκφοβισμόςScams ηλεκτρονικές απάτεςPasswords κωδικοί πρόσβασηςPiracy πειρατεία λογισμικούReputation διαδικτυακή φήμηGaming παιχνίδια στο διαδίκτυοAddiction εθισμός στο διαδίκτυοPositive εικόνα σώματος και κοινωνικά δίκτυα

TTS 2022-02-10

TTS crossword puzzle
Across
  1. mengucilkan, mengabaikan dan
  2. menyoraki, dan menjuluki.
  3. Fisik : memukul, menampar, memalak,
  4. Verbal : memaki, memfitnah, mengejek,
Down
  1. , menjambak dan menginjak.
  2. Psikologis (Mental) : Memandang sinis,
  3. Bullying : Menyebarkan video,
  4. mencubit, mencakar, melempar,

8 Clues: menyoraki, dan menjuluki., menjambak dan menginjak.mengucilkan, mengabaikan danBullying : Menyebarkan video,mencubit, mencakar, melempar,Fisik : memukul, menampar, memalak,Verbal : memaki, memfitnah, mengejek,Psikologis (Mental) : Memandang sinis,

Secure Your Universe 2025-09-09

Secure Your Universe crossword puzzle
Across
  1. A software update that fixes security flaws
  2. Worn to identify employees and grant access
  3. Cameras or monitoring systems for physical security
  4. A secure tunnel for your internet traffic
  5. A login method that uses a password and a code
  6. Verifying your identity before granting access
  7. A security measure to restrict movement during a threat
  8. Software that detects and removes harmful programs
Down
  1. A secret word or phrase used to access something
  2. When unauthorized access to data occurs
  3. Software designed to harm or exploit a system
  4. Scrambles data so only authorized users can read it
  5. Uses fingerprints or facial recognition for access
  6. A fake email that tricks you into giving up personal info
  7. A digital barrier that blocks unauthorized access
  8. Engineering Tricking people into revealing confidential information

16 Clues: When unauthorized access to data occursA secure tunnel for your internet trafficA software update that fixes security flawsWorn to identify employees and grant accessSoftware designed to harm or exploit a systemA login method that uses a password and a codeVerifying your identity before granting access...

Cyber safety- Claire Williams 2016-06-08

Cyber safety- Claire Williams crossword puzzle
Across
  1. . Something you do
  2. Being mean online
  3. . When you right on your iPad
  4. .don't tell people it
  5. . A family member that is a female
Down
  1. important member in your family
  2. . Helps you learn
  3. . something you need too be
  4. When someone is trick you

9 Clues: . Helps you learnBeing mean online. Something you do.don't tell people itWhen someone is trick you. something you need too be. When you right on your iPadimportant member in your family. A family member that is a female

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. pencurian hak cipta (11 h)
  2. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  3. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  4. penyebaran informasi palsu yang meluas (4 huruf)
  5. informasi yang mengidentifikasi seseorang secara unik (12h)
  6. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  7. peraturan yang melindungi data pribadi (16h)
  8. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  9. menjaga keamanan data pribadi di internet (13h)
  10. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  11. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  12. program kecil yang dapat merusak sistem komputer (5 huruf)
  13. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  14. internet tindakan kriminal yang dilakukan melalui internet (14h)
  15. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  16. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  17. perbuatan melanggar hukum didunia maya (10 huruf)
  18. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  19. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
  1. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  2. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  3. aturan dan norma berperilaku baik di media sosial (11 h)
  4. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  5. perilaku tidak sopan/kasar didunia maya (10 h)
  6. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  8. perbuatan menyebar informasi yang merugikan orang lain (18h)
  9. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  10. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  11. tindakan menyebar informasi yang salah secara sengaja (14h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

Siloviki 2025-06-03

Siloviki crossword puzzle
Across
  1. Secretary of the Security Council, a key Siloviki ideologue
  2. A primary goal of the Siloviki, maintaining stability
  3. Russia's military intelligence directorate
  4. Abbreviation for the Security Council of Russia
  5. Current President, whose background is in the KGB
  6. The main domestic security and counter-intelligence agency
  7. A core value and source of cohesion for this elite group
  8. CEO of Rosneft, a prominent "Silogarch"
Down
  1. Russia's foreign intelligence service
  2. Governor of Tula, ex-FSO/GRU, often tipped as successor
  3. State-owned oil giant often linked to Siloviki interests
  4. Soviet predecessor to the FSB and SVR
  5. Ideology prioritizing a strong, centralized state
  6. The "men of force" faction in Russian politics

14 Clues: Russia's foreign intelligence serviceSoviet predecessor to the FSB and SVRCEO of Rosneft, a prominent "Silogarch"Russia's military intelligence directorateThe "men of force" faction in Russian politicsAbbreviation for the Security Council of RussiaIdeology prioritizing a strong, centralized stateCurrent President, whose background is in the KGB...

Fraud Crossword 2018-11-08

Fraud Crossword crossword puzzle
Across
  1. A man who cheats or tricks someone by gaining their trust and persuading them to believe something that is not true.
  2. A not-for-profit organisation working to reduce and prevent fraud and financial crime
  3. The action or offence of giving a false or misleading account of the nature of something.
  4. Something that is offered to a customer to protect them.
  5. Wrongful or criminal deception intended to result in financial or personal gain.
Down
  1. An act of pretending to be another person for the purpose of entertainment or fraud.
  2. Someone who has been defrauded or become a.....
  3. A system we use within Experian
  4. The UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime in England, Wales and Northern Ireland.

9 Clues: A system we use within ExperianSomeone who has been defrauded or become a.....Something that is offered to a customer to protect them.Wrongful or criminal deception intended to result in financial or personal gain.An act of pretending to be another person for the purpose of entertainment or fraud....

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Casino 2024-02-29

Casino crossword puzzle
Across
  1. Coin counter
  2. provides an escort
  3. one of four service drivers
  4. what color is a 10's strap
  5. Card for veterans
  6. eyes in the sky
  7. 21
  8. who's portrait is on a 20 dollar bill
Down
  1. Finance Director
  2. Fake currency
  3. Highest Card Status
  4. one arm bandit
  5. Another name for ATM
  6. What color is the security thread in a 100
  7. currency is made of linen and
  8. who fills Kiosk

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skywho fills KioskFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

Cyber Ethics,Class 8 2025-06-14

Cyber Ethics,Class 8 crossword puzzle
Across
  1. When someone lies or tricks others to get money, property, or an unfair advantage.
  2. A set of rules and proper behavior expected from individuals when interacting with other users online.
  3. Tye act of using someone else's words, ideas, or work without giving proper credit.
  4. Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
  5. A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
  6. When someone takes a website name that belongs to someone else.
  7. Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
  1. The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
  2. Individual pieces of information.
  3. A cyber attack that takes users to fake websites to steal personal information.
  4. Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
  5. When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
  6. The right to keep your personal information, actions, or space protected from others' access or interference.
  7. A type of malicious software that spreads itself through networks without needing to attach to other programs.
  8. A global network that connects computers and allows people to share information and communicate.

15 Clues: Individual pieces of information.When someone takes a website name that belongs to someone else.A cyber attack that takes users to fake websites to steal personal information.Any illegal activity that involves a digital device to harm, steal, or disrupt.When someone lies or tricks others to get money, property, or an unfair advantage....

security 2022-05-05

security crossword puzzle
Across
  1. is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply sending the same message over and over to the same user.
  2. is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer.
  3. is a computer program used to prevent, detect, and remove malware.
Down
  1. is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
  2. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  3. is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy.
  4. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.

7 Clues: is a computer program used to prevent, detect, and remove malware.is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer....

Cybersecurity 2022-07-08

Cybersecurity crossword puzzle
Across
  1. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. Type of assessments that are the cornerstone of every program for cybersecurity
  3. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. Protecting information is vital for the normal functioning of organizations
  5. Is an advanced security control that reduces the chance of it being stolen
Down
  1. Systems that are no longer supported by the manufacturer
  2. is a significant threat to the confidentiality, integrity and availability of information
  3. A key stakeholder that may not recognize how to securely communicate with their provider
  4. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. Type of phishing email specific employee within an organization
  6. Most significant security incident
  7. This stakeholder may have lax security policies compromising your system

12 Clues: Most significant security incidentSystems that are no longer supported by the manufacturerType of phishing email specific employee within an organizationThis stakeholder may have lax security policies compromising your systemIs an advanced security control that reduces the chance of it being stolen...

Investment Course Lesson 11 Investment Trusts 2023-03-03

Investment Course Lesson 11 Investment Trusts crossword puzzle
Across
  1. The amount that a derivative moves, per $1 movement in the underlying asset
  2. A type of security based on the ownership of real estate rental properties
  3. when a security price and moving average crossover each other on the chart, indicating strong or weak investor confidence
  4. having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others
  5. The rise and fall of markets on a repeated basis
  6. a narrow or defined classification of a company’s profile
  7. shows how two moving averages in a particular security are related
Down
  1. strategies designed to reduce short term impact on the price of securities
  2. A type of investment trust with more than one type of share.
  3. when the price of a security moves contrary to other data
  4. a large section of the overall economy used to identify a company’s profile
  5. The average selling price of a security over a time period

12 Clues: The rise and fall of markets on a repeated basiswhen the price of a security moves contrary to other dataa narrow or defined classification of a company’s profileThe average selling price of a security over a time periodA type of investment trust with more than one type of share.shows how two moving averages in a particular security are related...

technology 2021-12-06

technology crossword puzzle
Across
  1. a device made by Apple
  2. a foldable computer
  3. a computer part that clicks
  4. the picture for your background
  5. for example, Google Chrome, Opera, Safari
  6. a cyber criminal
  7. helps you keep your device running
Down
  1. another word for device
  2. the long button on your keyboard
  3. screen with sensors

10 Clues: a cyber criminala foldable computerscreen with sensorsanother word for devicea device made by Applea computer part that clicksthe picture for your backgroundthe long button on your keyboardhelps you keep your device runningfor example, Google Chrome, Opera, Safari

Aiden Dominko 2021-06-24

Aiden Dominko crossword puzzle
Across
  1. to be feeling a way
  2. to be smiling and feeling _____
  3. to be unhappy and feeling _____
  4. to use the internet to bully someone
  5. a girl grown up
  6. to be a bad way to someone
Down
  1. to harm someone with strength
  2. watching someone getting bullied
  3. repeatedly being mean
  4. a boy grown up

10 Clues: a boy grown upa girl grown upto be feeling a wayrepeatedly being meanto be a bad way to someoneto harm someone with strengthto be smiling and feeling _____to be unhappy and feeling _____watching someone getting bulliedto use the internet to bully someone

2022 Employee Appreciation Week Crossword Puzzle 2022-06-07

2022 Employee Appreciation Week Crossword Puzzle crossword puzzle
Across
  1. Customer ____ Program
  2. Leaf of TD Framework
  3. Example of Second Line of Defense
  4. Legal ___ Compliance & Conduct Risk (LRCC)
  5. Privacy ____ Assessment
  6. Third Party ___ Risk Management
  7. Mission is to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation.
Down
  1. Enterprise Data ___ Office
  2. Third Line of Defense
  3. New ___ Product Approval (NBPA)

10 Clues: Leaf of TD FrameworkCustomer ____ ProgramThird Line of DefensePrivacy ____ AssessmentEnterprise Data ___ OfficeNew ___ Product Approval (NBPA)Third Party ___ Risk ManagementExample of Second Line of DefenseLegal ___ Compliance & Conduct Risk (LRCC)...

Crossword-2 2019-06-30

Crossword-2 crossword puzzle
Across
  1. Regional Internet Registry
  2. reason for being
  3. initiative for Multi-lingual Internet
  4. smarter banking alternatives
Down
  1. UNICEF Report on IG and Child rights
  2. Internet Governance Academy
  3. Cyber Hygiene initiative by ISOC...Chapter?
  4. ISOC Palestine initiative on online sexual harassment
  5. Key ICANN focus area
  6. category of top level domains

10 Clues: reason for beingKey ICANN focus areaRegional Internet RegistryInternet Governance Academysmarter banking alternativescategory of top level domainsUNICEF Report on IG and Child rightsinitiative for Multi-lingual InternetCyber Hygiene initiative by ISOC...Chapter?ISOC Palestine initiative on online sexual harassment

Security Cat's Easy Crossword 2016-08-29

Security Cat's Easy Crossword crossword puzzle
Across
  1. You can always ask them questions or talk to them when you don’t understand something. They are here to help you.
  2. Emails or messages that try to trick you into giving away personal information or clicking on something you shouldn’t. Often they use bad grammar and spelling, or look like they come from a real person.
  3. Treat your passwords like your __________: never share them with anyone and change them often!
  4. Be careful what you ________ online. When in doubt, it’s best to say less.
  5. You should always know where your _________ devices are, and make sure you have a lockscreen with a password on it. Some examples of these devices include iPhones, tablets, and laptops.
  6. Think before you _______! You don’t want to download malware by accident!
Down
  1. Ask your parents for _______ whenever you need it.
  2. This protects your online accounts from the bad guys. It should be long and hard to guess.
  3. Never talk to these people in real life or online!
  4. What happens here, stays here, so be careful about what you share! Once you post something here it stays here forever!
  5. Security ____ is your online buddy who helps keep humas safe and secure on the internet!
  6. Don’t be a cyber _______! This means you shouldn’t say mean things about or to anyone online. If you see someone being one of these, be sure to tell a parent or teacher right away.

12 Clues: Ask your parents for _______ whenever you need it.Never talk to these people in real life or online!Think before you _______! You don’t want to download malware by accident!Be careful what you ________ online. When in doubt, it’s best to say less.Security ____ is your online buddy who helps keep humas safe and secure on the internet!...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. pencurian hak cipta (11 h)
  2. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  3. perbuatan menyebar informasi yang merugikan orang lain (18h)
  4. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  5. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  6. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  7. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. menjaga keamanan data pribadi di internet (13h)
  9. penyebaran informasi palsu yang meluas (4 huruf)
  10. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  11. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  12. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  13. program kecil yang dapat merusak sistem komputer (5 huruf)
  14. informasi yang mengidentifikasi seseorang secara unik (12h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
Down
  1. aturan dan norma berperilaku baik di media sosial (11 h)
  2. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. perbuatan melanggar hukum didunia maya (10 huruf)
  5. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  6. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  7. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  8. perilaku tidak sopan/kasar didunia maya (10 h)
  9. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  10. peraturan yang melindungi data pribadi (16h)
  11. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  12. internet tindakan kriminal yang dilakukan melalui internet (14h)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  14. tindakan menyebar informasi yang salah secara sengaja (14h)
  15. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  2. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. informasi yang mengidentifikasi seseorang secara unik (12h)
  5. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  6. perbuatan melanggar hukum didunia maya (10 huruf)
  7. peraturan yang melindungi data pribadi (16h)
  8. program kecil yang dapat merusak sistem komputer (5 huruf)
  9. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  10. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  11. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  12. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  13. aturan dan norma berperilaku baik di media sosial (11 h)
  14. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
Down
  1. menjaga keamanan data pribadi di internet (13h)
  2. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  3. internet tindakan kriminal yang dilakukan melalui internet (14h)
  4. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  5. perbuatan menyebar informasi yang merugikan orang lain (18h)
  6. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  7. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  8. tindakan menyebar informasi yang salah secara sengaja (14h)
  9. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  10. perilaku tidak sopan/kasar didunia maya (10 h)
  11. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  12. penyebaran informasi palsu yang meluas (4 huruf)
  13. pencurian hak cipta (11 h)
  14. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  16. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

noun 2021-03-23

noun crossword puzzle
Across
  1. He takes great _____.
  2. The plural of bacterium
  3. Sit on the ______ ______(Chair/office).
  4. In the cyber are a lot of _______.
  5. The plural of fungus
Down
  1. Today he has his first ______ ______(interview/job).
  2. Plural of woman.
  3. The ______ met after the court.
  4. In the desert are a lot of ______.
  5. They built a _____ _____(house/bricks).
  6. Pass me the ____ ______(spoon/soup).
  7. Mister beast ______ has a lot of views.
  8. The plural of fry
  9. I used to watch super hero _____.

14 Clues: Plural of woman.The plural of fryThe plural of fungusHe takes great _____.The plural of bacteriumThe ______ met after the court.I used to watch super hero _____.In the desert are a lot of ______.In the cyber are a lot of _______.Pass me the ____ ______(spoon/soup).They built a _____ _____(house/bricks).Mister beast ______ has a lot of views....