cyber security Crossword Puzzles
noun 2021-03-23
Across
- He takes great _____.
- The plural of bacterium
- Sit on the ______ ______(Chair/office).
- In the cyber are a lot of _______.
- The plural of fungus
Down
- Today he has his first ______ ______(interview/job).
- Plural of woman.
- The ______ met after the court.
- In the desert are a lot of ______.
- They built a _____ _____(house/bricks).
- Pass me the ____ ______(spoon/soup).
- Mister beast ______ has a lot of views.
- The plural of fry
- I used to watch super hero _____.
14 Clues: Plural of woman. • The plural of fry • The plural of fungus • He takes great _____. • The plural of bacterium • The ______ met after the court. • I used to watch super hero _____. • In the desert are a lot of ______. • In the cyber are a lot of _______. • Pass me the ____ ______(spoon/soup). • They built a _____ _____(house/bricks). • Mister beast ______ has a lot of views. • ...
The Enterprise Report 2021-11-15
Across
- The ____ Guy sets up at the Village on Wednesdays
- Monday after Black Friday
- open ____ has ended for the year 2021-2022
- Wednesday before Thanksgiving, at Salish Coast
- featured Employee of the Month
- people honored on Nov. 11
Down
- keeps your hands warm
- "busy" animal
- may participate in Salish Coast's Coloring Contest
- energy drink sold by the Coffee Point
- Swinomish Market at the _____
- 11th month of the year
- fuels your car
- manager at the Village
14 Clues: "busy" animal • fuels your car • keeps your hands warm • 11th month of the year • manager at the Village • Monday after Black Friday • people honored on Nov. 11 • Swinomish Market at the _____ • featured Employee of the Month • energy drink sold by the Coffee Point • open ____ has ended for the year 2021-2022 • Wednesday before Thanksgiving, at Salish Coast • ...
Saferinternet 2024-03-01
7 Clues: Identitätsdiebstahl • Ein soziales Netzwerk • Das schädliche Programm • Die schädliche Software • Cyberbullying,Beschimpfungen • Der Sammelbegriff des Browsers • Gefälschte Fan-Seiten, Klickbetrug
Security Verification 2013-07-19
Across
- True or False? If a customer wants us to provide them with their account center User ID, I verify primary security information only.
- Can an account holder change their monther's maiden name to a secuirty word?
- If an account holder wants to close a CD or do an early withdrawal and they did a change of address in the last two months, how many Account Level questions must they answer?
- If an account holder wants to have ATM access removed from their Money Market account AND they want to Remove Backup withholding, do I have to ask just two Account Level questions?
- What Money Page article should you refer to if you have questions regarding account verification?
Down
- If you are verifying a customer whose mother's maiden name is shortened to four characters, you should update the system with the full name. True or False?
- If an account holder wants an official checked mailed out but they have changed their address with you today, what verification are you required to do?
- If an account holder can only verify one piece of their primary security, the call should be transferred where?
- If an account holder wants to remove a POA from their account, what type of verification is required?
- What program should I use if a customer can verify two primary security questions and one account level question?
- Beside the account holders name, how many pieces of information are you required to verify prior to releasing account-specific information?
11 Clues: Can an account holder change their monther's maiden name to a secuirty word? • What Money Page article should you refer to if you have questions regarding account verification? • If an account holder wants to remove a POA from their account, what type of verification is required? • ...
security technology 2014-07-07
13 Clues: risk • layer • layer • layer • system • private network • reads your mail • key distribution • control protocol • encryption scheme • protocol/internet layer • mail and sign your name • intercepts your mail and modify
IT SECURITY 2022-10-27
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the process of converting information or data into a code, especially to prevent unauthorized access.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- network security device that monitors and filters incoming and outgoing network traffic
- good privacy an open source and freely available software package for email security
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- The conversion of encrypted data into its original form
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
11 Clues: The conversion of encrypted data into its original form • good privacy an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • the process of converting information or data into a code, especially to prevent unauthorized access. • ...
Network Security 2024-01-30
Across
- these are attached to a document or spreadsheet and use the macro/ scripting function
- this is a self-replicating computer program
- regular backups should be made so data can be ___________
- these will lie dormant until a specific piece of program code is activated
Down
- these are assigned to each user to ensure they may only access certain files
- word to describe programs that can steal/ alter data
- passwords can be guessed as users _____ passwords
- these will prevent unauthorised access to data
- where a user can take a copy of a file it is ____ & ____ access
- a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
- these replicate without the use of a host file
11 Clues: this is a self-replicating computer program • these will prevent unauthorised access to data • these replicate without the use of a host file • passwords can be guessed as users _____ passwords • word to describe programs that can steal/ alter data • regular backups should be made so data can be ___________ • ...
Security SOP 2024-10-07
Across
- The "go to" Security notebook
- Everyone must wear Safety ________ (plural)
- Tell supervisor the ________ for a fire alarm
- Who to call on weekends for Dry Air alarms
- Acronym for Panasonic Energy Corporation of America
- Allowed only in designated area
Down
- Required Eye Personal Protective Equipment
- Federal Agency responsible for Workplace Safety
- Safety Representative for PECA
- First thing to pull out during any alarm
- Third element on Periodic table
11 Clues: The "go to" Security notebook • Safety Representative for PECA • Third element on Periodic table • Allowed only in designated area • First thing to pull out during any alarm • Required Eye Personal Protective Equipment • Who to call on weekends for Dry Air alarms • Everyone must wear Safety ________ (plural) • Tell supervisor the ________ for a fire alarm • ...
Food Security 2024-12-17
Across
- The act of growing only one type of crop on a farm.
- What is needed to grow crops, often affected by drought.
- The lack of enough nutritious food to stay healthy
- A food preservation method using low temperatures.
Down
- Lack of consistent access to food.
- A person who grows crops or raises animals or food.
- A shortage of rain over a long time.
- Farming done in cities often in small spaces.
- A crop commonly used to make bread
- Food that is grown without using harmful chemicals
- A grain that is common food in many Asian countries.
11 Clues: Lack of consistent access to food. • A crop commonly used to make bread • A shortage of rain over a long time. • Farming done in cities often in small spaces. • Food that is grown without using harmful chemicals • The lack of enough nutritious food to stay healthy • A food preservation method using low temperatures. • A person who grows crops or raises animals or food. • ...
Food Security 2024-12-18
Across
- Felling you get when you have no food.
- A grain that feeds millions of people worldwide.
- Essential for growing crops.
- What we eat to stay alive.
- A place where food is grown.
- What you call breakfast,lunch or dinner
Down
- When people have little or no money to buy food.
- A common grain used to make bread.
- Plants grown in large amounts for food.
- Help given to countries during food crises.
- A time when there is no food in an entire region.
11 Clues: What we eat to stay alive. • Essential for growing crops. • A place where food is grown. • A common grain used to make bread. • Felling you get when you have no food. • Plants grown in large amounts for food. • What you call breakfast,lunch or dinner • Help given to countries during food crises. • When people have little or no money to buy food. • ...
Food security 2024-11-28
11 Clues: END OF LIFE • NAME TAG • OPPOSITE OF TIDY • OPPOSITE OF CLEAN • CAN BE FOUND IN CURD • SOURCE OF MULTIVITAMIN • MEDICINE TO REMOVE PESTS • GOOD FOR DIGESTIVE SYSTEM • MANDATORY ACTIVITY BEFORE EATING • PROCESS OF REMOVING INFECTIOUS THINGS • SIGNIFICANT MEASURES TO PREVENT FROM HARM
Security Adobe 2025-10-17
11 Clues: zk8NJgAOqc4= • FTeB5SkrOZM= • dA8D8OYD55E= • L3uQHNDF6Mw= • yxzNxPIsFno= • WlMTLimQ5b4= • WqflwJFYW3+PszVFZo1Ggg== • 2aZl4Ouarwm52NYYI936YQ== • L8qbAD3jl3jSPm/keox4fA== • vp6d18mfGL+5n2auThm2+Q== • 7Z6uMyq9bpxe1EB7HijrBQ==
DC9111 2024-08-09
Across
- A framework used to manage and mitigate cybersecurity risks.
- A cybersecurity tool used to monitor, detect, and respond to threats.
- - The process of converting data into a code to prevent unauthorized access.
- The practice of finding and fixing security flaws.
- A common online attack method involving fraudulent emails.
- A network security device that monitors and filters incoming and outgoing traffic.
- An open-source intelligence gathering technique.
- A term for ethically hacking a system.
- An organized event where hackers test their skills.
- The art of disguising communication within another medium.
- A type of malware that demands payment for the return of stolen data.
- The practice of attacking a system to test its security.
- A person who finds and reports security vulnerabilities for rewards.
- A malicious program that spreads across systems and networks.
- A type of attack where multiple systems flood a target with traffic.
Down
- The exploitation of software vulnerabilities by malicious hackers.
- The unauthorized access of data in transit.
- A cryptographic key used in public key cryptography.
- A protocol used for secure internet communication.
- The process of analyzing network traffic for malicious activity.
- An organization that sets standards for securing information systems.
- A type of attack that overwhelms a system with traffic.
- A hidden malicious software that provides backdoor access.
- A form of social engineering to manipulate users into giving up confidential information.
- A global, decentralized group known for hacktivism.
- A popular TV series about a hacker with dissociative identity disorder.
26 Clues: A term for ethically hacking a system. • The unauthorized access of data in transit. • An open-source intelligence gathering technique. • The practice of finding and fixing security flaws. • A protocol used for secure internet communication. • An organized event where hackers test their skills. • A global, decentralized group known for hacktivism. • ...
Ethnic Studies 5.5 (Redlining) 2024-08-15
Across
- maps developed by the Home Owners’ Loan Corporation showing mortgage lending risks in different neighborhoods
- 1968 act banning refusal to sell or rent a dwelling to any person because of marginalized status
- racial segregation that is required by law or policy
- residential security maps category for the "riskiest" neighborhoods
- in 2016, White families had 8 and 10 times more wealth than Black and Hispanic families, respectively
- residential security maps category for "still desirable" neighborhoods
- upgrading low-income neighborhoods, causing higher costs of living and resident displacement
- reduced economic mobility for people of color
- nonviolent protests in which participants sit and refuse to leave, often resulting in their arrest
- residential security maps category for "declining" neighborhoods
Down
- racially restrictive covenants became increasingly common around the United States
- residential security maps category for affluent suburbs
- denying a person the right to buy or rent a home due because of marginalized status
- 1926 Supreme Court case that affirmed the constitutionality of racially restrictive covenants
- encouraging owners to sell their properties because people of color are moving into a neighborhood
- banks refusing to make loans to people living in certain geographic locations
- non-white people
- segregation of people into separate areas by fact rather than by law or policy
- provisions in real estate deeds prohibiting sales to people from marginalized groups
- between 1946-1959, 2% of homes insured by the Federal Housing Administration were available to people of color
20 Clues: non-white people • reduced economic mobility for people of color • racial segregation that is required by law or policy • residential security maps category for affluent suburbs • residential security maps category for "declining" neighborhoods • residential security maps category for the "riskiest" neighborhoods • ...
Disability specialist week crossword 2021-06-13
Across
- Who is the current president of WADE
- What state children's disability program does WI administer?
- What year did the disability program start?
- Who is the current vice president of WADE
- How many NADE presidents have been from Wisconsin?
- What is the Social Security region that WI DDS reports to
- What program besides Social Security disability does WI DDS make decisions for?
- what is your state disability examiner association
- lakes Which region does WI NADE chapter belong to?
Down
- How many years has NADE been in existence?
- What is the NADEs newsletter called?
- Before Michelle, who was previous DDS administrator?
- How many years has NADE been in existence?
- How many regions does Social Security have?
- How many dollars does it cost to be a member of NADE?
- How many NADE presidents have been from Wisconsin?
- Who is the current treasurer of WADE
- Who is the current secretary of WADE
- What is your national association of disability examiners
- Who does NADE represent?
- What are the initials for the office that reviews the quality of disability decisions
21 Clues: Who does NADE represent? • Who is the current president of WADE • What is the NADEs newsletter called? • Who is the current treasurer of WADE • Who is the current secretary of WADE • Who is the current vice president of WADE • How many years has NADE been in existence? • How many years has NADE been in existence? • How many regions does Social Security have? • ...
TEKA-TEKI silang 2025-06-03
Across
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- peraturan yang melindungi data pribadi (16h)
- pencurian hak cipta (11 h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- aturan dan norma berperilaku baik di media sosial (11 h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
Down
- perbuatan melanggar hukum didunia maya (10 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- penyebaran informasi palsu yang meluas (4 huruf)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- perilaku tidak sopan/kasar didunia maya (10 h)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- menjaga keamanan data pribadi di internet (13h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- internet tindakan kriminal yang dilakukan melalui internet (14h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
Tatler Crossword Week 6 2023-11-27
Across
- Popular girl scout cookie
- Journalist ___ B. Wells
- Shortest Grizzlies player(last name)
- Best time to buy online is ______ Monday,
- Woman's name that sounds like its first and third letters
Down
- The largest city in the world.
- Boy band with the 2000 hit "Bye Bye Bye"
- first animal in space
- Home to the Alhambra
- Knight's title
- Santa's workers
11 Clues: Knight's title • Santa's workers • Home to the Alhambra • first animal in space • Journalist ___ B. Wells • Popular girl scout cookie • The largest city in the world. • Shortest Grizzlies player(last name) • Boy band with the 2000 hit "Bye Bye Bye" • Best time to buy online is ______ Monday, • Woman's name that sounds like its first and third letters
Sosiologi Tentang Globalisasi 2025-08-25
Across
- jenis serangan cyber yang berbahaya
- nilai-nilai yang di anut oleh suatu masyarakat
- indikator keberhasilan ekonomi suatu negara
- metode pembelajaran yang menggunakan ekonomi
- proses pembelajaran yang berpusat pada siswa
Down
- jenis hukum yang berlaku di Indonesia
- sistem ekonomi yang berdasarkan
- bentuk komunikasi yang tidak langsung
- jenis teknologi yang digunakan untuk mengakses internet
- perusahaan teknologi yang terkenal
- kepemilikan swasta
- bahasa pemrograman yang populer
12 Clues: kepemilikan swasta • sistem ekonomi yang berdasarkan • bahasa pemrograman yang populer • perusahaan teknologi yang terkenal • jenis serangan cyber yang berbahaya • jenis hukum yang berlaku di Indonesia • bentuk komunikasi yang tidak langsung • indikator keberhasilan ekonomi suatu negara • metode pembelajaran yang menggunakan ekonomi • ...
Study 2025-09-23
Across
- Weakness in a system
- Protects sensitive information
- Security-related event
- Permission to use resources
- Ensures systems are accessible
- Testing for security weaknesses
- Ensures data is accurate and unaltered
- Restriction of access
- Potential cause of harm
Down
- Notification of suspicious activity
- Action taken after an incident
- Adherence to regulations
- Observing system activity
- Restoring after a breach
- Takes advantage of a vulnerability
15 Clues: Weakness in a system • Restriction of access • Security-related event • Potential cause of harm • Adherence to regulations • Restoring after a breach • Observing system activity • Permission to use resources • Action taken after an incident • Protects sensitive information • Ensures systems are accessible • Testing for security weaknesses • Takes advantage of a vulnerability • ...
Computer Science 2022-11-08
Across
- central Processing Unit
- a part of something
- continues messages
- a device
- a barrier that separates your private network from the internet
- internet manners
- solid state drives
- random access memory
- A Universal Serial Bus
Down
- protected by a legal agreement
- use lets you use copyrighted material with permission from the owner
- wide area network
- Copying someone’s work without permission
- hard disk drives
- local area network
- Drive similar to USB
- Security protects your data and network from malware and security breaches
17 Clues: a device • hard disk drives • internet manners • wide area network • continues messages • local area network • solid state drives • a part of something • random access memory • A Universal Serial Bus • central Processing Unit • Drive similar to USB • protected by a legal agreement • Copying someone’s work without permission • ...
Cybersecurity Vocab 2022-03-10
Security crossword 2022-07-21
Across
- is a nonprofit foundation dedicated to improving software security
- is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
- Place to store high privilege passwords
- IT Governance framework from ISACA
- Unplanned downtime of IT resources
- Information security triad
Down
- Need to impart to everyone to protect the organization
- process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
- is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default
- seamless integration of security testing and protection throughout the software development and deployment lifecycle
- is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
11 Clues: Information security triad • IT Governance framework from ISACA • Unplanned downtime of IT resources • Place to store high privilege passwords • Need to impart to everyone to protect the organization • is a nonprofit foundation dedicated to improving software security • ...
Arciniegas 2022-02-10
Across
- officer: he commands the duty officer
- officer: He is in charge of intelligence at the school
- the camp: school garden manager
Down
- Security of people
- technical officer: school weapon manager
- police: martiality
- commander: Security school
- no duty: service of company
- soldiers Security
- officer: send to school services
10 Clues: soldiers Security • Security of people • police: martiality • commander: Security school • no duty: service of company • the camp: school garden manager • officer: send to school services • officer: he commands the duty officer • technical officer: school weapon manager • officer: He is in charge of intelligence at the school
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
ZAJEDNO ZA BOLJI INTERNET 2023-02-15
Across
- ne objavljivanje sadržaja koji nije
- prijatelji osobe s kojima se sprijateljiš a ne
- seksualno uznemiravanje na internetu
- slike slanje slika koje ne smiješ nikome slat
- vijesti širenje nečega za što nisi siguran
- ljudima
- profila praviti se da si netko tko nisi
Down
- bulling nasilje na internetu
- ignoriranje neželjnog sadržaja
- paukova mreža
- pričanje u žio s ljudima koje ne poznaješ
- stavljanje računa na privatni
- kometari rečenice koje izriču mržnju i ljubomoru
- za tvoju dob
- ih u živo
- tok aplikacija na kojoj se najviše susrećemo s
16 Clues: ljudima • ih u živo • za tvoju dob • paukova mreža • bulling nasilje na internetu • stavljanje računa na privatni • ignoriranje neželjnog sadržaja • ne objavljivanje sadržaja koji nije • seksualno uznemiravanje na internetu • profila praviti se da si netko tko nisi • pričanje u žio s ljudima koje ne poznaješ • vijesti širenje nečega za što nisi siguran • ...
crossword 2012-11-15
Across
- logo 2
- logo 3
- brand ambassador of sony cyber shot
- ceo of virgin atlantic
- parent company of minute maid
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse
- logo 4
- highest grossing hollywood movie
Down
- the ultimate driving machine
- full form of P&G
- artist with the highest number of views for his\her video on youtube
- one world many states
- subsidiary company of adidas which makes sportswear, apparel and accessories
- towards excellence
- logo 1
- world's local bank
16 Clues: logo 2 • logo 3 • logo 1 • logo 4 • full form of P&G • towards excellence • world's local bank • one world many states • ceo of virgin atlantic • the ultimate driving machine • parent company of minute maid • highest grossing hollywood movie • brand ambassador of sony cyber shot • artist with the highest number of views for his\her video on youtube • ...
j808 4.1 types of threats 2019-01-09
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- any software that shows adverts
- Software that encrypts programs and data until a ransom is paid to remove it.
- When someone deceives by pretending to be someone else in order to get personal data.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Criminals make a promise of goods in return for details, such as offering a free music download.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
Down
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- A type of Malware that locates and saves data from users without them knowing about it
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Collection of captured bot computers
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- malware that allows a cyber-security attacker to take control of an infected computer
- An error in a program that prevents the program from running as expected.
- horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
15 Clues: any software that shows adverts • Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Online Identity Crossword 2024-09-12
Across
- Addiction When people can't go without the internet
- Purchase Buying things online
- Thinking What you need to do when using technology
- A Delicious Treat
- Spiders make this site
- Shows who you are online
- Use How you spend time on a computer
Down
- Information What hackers have done
- Media Platforms with social environments
- What's saved on your devices
- Shopping Browsing on the internet for personal items
- Online Villain
- Personalized for your technological devices
- Psychology How users behave online
- Phones, TV, Computers
- Who you are
- Use When users associate with internet
17 Clues: Who you are • Online Villain • A Delicious Treat • Phones, TV, Computers • Spiders make this site • Shows who you are online • What's saved on your devices • Purchase Buying things online • Information What hackers have done • Psychology How users behave online • Use How you spend time on a computer • Use When users associate with internet • Media Platforms with social environments • ...
Online Identity Crossword 2024-09-12
Across
- Addiction When people can't go without the internet
- Purchase Buying things online
- Thinking What you need to do when using technology
- A Delicious Treat
- Spiders make this site
- Shows who you are online
- Use How you spend time on a computer
Down
- Information What hackers have done
- Media Platforms with social environments
- What's saved on your devices
- Shopping Browsing on the internet for personal items
- Online Villain
- Personalized for your technological devices
- Psychology How users behave online
- Phones, TV, Computers
- Who you are
- Use When users associate with internet
17 Clues: Who you are • Online Villain • A Delicious Treat • Phones, TV, Computers • Spiders make this site • Shows who you are online • What's saved on your devices • Purchase Buying things online • Information What hackers have done • Psychology How users behave online • Use How you spend time on a computer • Use When users associate with internet • Media Platforms with social environments • ...
Casino 2024-02-29
Across
- team, who fills Kiosk
- What color is the security thread in a 100
- currency is made of linen and
- Card for veterans
- Finance Director
- who's portrait is on a 20 dollar bill
- eyes in the sky
- 21
- one arm bandit
Down
- provides an escort
- Fake currency
- Coin counter
- Highest Card Status
- one of four service drivers
- Another name for ATM
- what color is a 10's strap
16 Clues: 21 • Coin counter • Fake currency • one arm bandit • eyes in the sky • Finance Director • Card for veterans • provides an escort • Highest Card Status • Another name for ATM • team, who fills Kiosk • what color is a 10's strap • one of four service drivers • currency is made of linen and • who's portrait is on a 20 dollar bill • What color is the security thread in a 100
15.1 Understanding Money Created by Yash Gupta 2024-05-09
Across
- is a transfer of money from one bank account to another
- the mechanism a nation uses to provide and manage money for itself
- money received today can be invested or deposited in the bank to earn interest
- allows customers to pay for purchases directly from their checking account
- action taken to manage the supply of money and interest rates in an economy
- a security that pays interest over terms of ten to thirty years
- money can be saved and used at a later date
- coins or banknotes that must be accepted if offered in payment of a debt.
- Anything of value that is accepted in return for goods and services
- is a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
- the process of transferring money from one individual or organization to another
- is a security that matures in a year or less
- is a security that pays interest over terms ranging from two to ten years
- money is used in exchange for goods and services needed by individuals, businesses, and governments
- money is a common measure of the worth or price of a good or service
- a type of financial investment issued by a corporation, government, or organization
- a type of a document guaranteeing the payment of a specific amount of money
- banks that are part of the Federal Reserve Systems
- exchange one good or service for another good or service
- another name for money
20 Clues: another name for money • money can be saved and used at a later date • is a security that matures in a year or less • banks that are part of the Federal Reserve Systems • is a transfer of money from one bank account to another • exchange one good or service for another good or service • a security that pays interest over terms of ten to thirty years • ...
Network requirements. 2024-08-07
Across
- Network is able to perform required functions without failing
- Distributing network traffic across many servers to optimize resource use and avoid overload
- Network is able to handle an increase in the number of users
- The physical or logical arrangement of network devices and connections.
- Policies that restrict network access to authorized users often involving authentication
- Rules set in place to protect network from attacks
- Additional pathways that ensure network availability in case of a failure
- Security devices that monitor and control incoming or outgoing network traffic based on security rules
- The process of converting data into a coded format to prevent unauthorized access
Down
- Techniques used to control network bandwidth to ensure optimal performance
- Measurement of a network(in Mbps or Gbps)
- Tools used to control network traffic for suspicious activity and take action to prevent or mitigate attacks
- The aberration in packet arrival times
- Making sure the network meets industry standards related to data handling and privacy
- Dividing a network into smaller segments to improve performance and security
- A delay in signals being received or sent. Crucial for gaming and video conferences
- Manners used to categorizing certain types of traffic to ensure performance of applications
- Creating virtual versions of network resources such as servers or switches to optimize flexibility
- Different systems and devices working together within a network ensuring a seamless communication
- The rate of successful data transfer across a network
20 Clues: The aberration in packet arrival times • Measurement of a network(in Mbps or Gbps) • Rules set in place to protect network from attacks • The rate of successful data transfer across a network • Network is able to handle an increase in the number of users • Network is able to perform required functions without failing • ...
Slande Cheridor 2024-12-07
Across
- testers who are paid to probe networks and report vulnerabilities
- what the user has (smart card or key)
- a server role that makes it possible for administrators to take control of Microsoft product updates
- The most widely used method for encrypting data
- security features that enable administrators to control who has access to the network
- an industry-standard client/server protocol that offers centralized control
- security features that enable administrators to control what users can do after they are logged on to the network
- used in a Windows domain environment and provides mutual authentication
- backs up the disk sector by sector to create an exact image of the disk’s contents
- framework for other protocols that provide encryption and authentication
- A common tool used by many Linux administrators
- a good security enhancement for servers that aren’t physically secure
Down
- can be set in the Local Security Policy console found in Administrative Tools
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- tool used to delete unneeded files in Windows
- disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- a unique biometric identifying trait. What the user is
- document that describes the rules governing access to an organization’s information resources
- creates a barrier between two entities
- prevents people from using eavesdropping technology
20 Clues: what the user has (smart card or key) • creates a barrier between two entities • tool used to delete unneeded files in Windows • The most widely used method for encrypting data • A common tool used by many Linux administrators • prevents people from using eavesdropping technology • a unique biometric identifying trait. What the user is • ...
The Global Village 2024-11-12
Across
- the whole world together
- quicker
- hitting, fighting or calling someone names
- less hard or harsh
- energy that will never run out
- to make fun of someone to hurt them
- to do with friendship and relationships
- words used to communicate
- made by humans, not nature
Down
- to make someone angry
- making used things into new things
- make someone feel sad or worried
- something done on the internet
- when you end a fight or argument
- an accent that is easier to understand than another
- fighting with words
16 Clues: quicker • less hard or harsh • fighting with words • to make someone angry • the whole world together • words used to communicate • made by humans, not nature • something done on the internet • energy that will never run out • make someone feel sad or worried • when you end a fight or argument • making used things into new things • to make fun of someone to hurt them • ...
Cyber Crime 2020-07-05
Across
- /phrase used for authenticating a system
- / first person to be found guilty of cyber crime
- / breaking into your computer without your knowledge or consent
- /fake links or fake software
- /a type of spyware that records keyboard activities
Down
- /large volume of emails sent to the victim for the webserver crash.
- /Vital Information Resource under seize
- / selling of pirated software through physical media or electronic downloads.
- / politically motivated hacking to conduct sabotage and espionage
- /a method to promote sextortion
10 Clues: /fake links or fake software • /a method to promote sextortion • /Vital Information Resource under seize • /phrase used for authenticating a system • / first person to be found guilty of cyber crime • /a type of spyware that records keyboard activities • / breaking into your computer without your knowledge or consent • ...
CYBER CROSSWORD 2023-02-13
Across
- Activez l’ ______ multifactorielle sur tous vos appareils quand elle est disponible
- Type de cyberattaque qui verrouille vos données et vos appareils
- Changez toujours le _______ de passe par défaut de votre réseau domestique
- Logiciel malveillant conçu pour avoir accès à vos appareils
- Vous devriez utiliser un VPN si vous naviguez sur un réseau Wi-Fi _______
Down
- Des mots de passe sécurisés, c’est bien, mais des _______ de passe c’estmieux
- Vous devriez______ tous les appareils qui se connectent en ligne
- Faites des _____ à jour régulièrement pour sécuriser vos logiciels
- Installez un logiciel ______ pour protéger votre ordinateur
- ______ criminels
10 Clues: ______ criminels • Installez un logiciel ______ pour protéger votre ordinateur • Logiciel malveillant conçu pour avoir accès à vos appareils • Vous devriez______ tous les appareils qui se connectent en ligne • Type de cyberattaque qui verrouille vos données et vos appareils • Faites des _____ à jour régulièrement pour sécuriser vos logiciels • ...
Cyber crossword 2022-12-06
Across
- The arrangement of the various elements (computers, routers, switches, etc) of a network.
- Analyze something without interfering or affecting it.
- A computer, typically one on a network.
- A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
Down
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- An agreed-upon method for communication.
- Typically, the last two elements of a URL. With domain names, organizations can build URLs.
- ervice can have two meanings in computer terminology:
- A computer that delivers files forming web pages across a network to requesting clients.
- A starting point for data analysis. It is the initial data set used in later comparisons.
10 Clues: A computer, typically one on a network. • An agreed-upon method for communication. • ervice can have two meanings in computer terminology: • Analyze something without interfering or affecting it. • A computer that delivers files forming web pages across a network to requesting clients. • ...
Cyber Safety 2020-12-17
Across
- a duty you have to yourself or others
- a secret string of letters, symbols, and numbers that you can use to restrict who can access something digital
- the acceptable way of communicating on the internet
- a group of people who share the same interests or goals
- things having to do with computers or the internet
Down
- a worldwide network that connects people using computers, phones, or other devices
- a picture you take of of yourself, usually with a phone
- different parts of your culture, experiences, and interests that make you unique
- a character other than a number or letter, such as #, !, or @.
- a name you create to sign into a website, app, or game
10 Clues: a duty you have to yourself or others • things having to do with computers or the internet • the acceptable way of communicating on the internet • a name you create to sign into a website, app, or game • a picture you take of of yourself, usually with a phone • a group of people who share the same interests or goals • ...
Cyber 101 2021-04-15
Across
- designed to keep the bad guys out
- enables several devices to communicate on the same network
- tells a computer to perform a task
- I'll never tell
- collection of zombie computers
Down
- malicious software to wreak havoc
- allows cybercriminals to remotely control your computer
- remain anonymous by masking the location and encrypting traffic
- I see you
- denied
10 Clues: denied • I see you • I'll never tell • collection of zombie computers • malicious software to wreak havoc • designed to keep the bad guys out • tells a computer to perform a task • allows cybercriminals to remotely control your computer • enables several devices to communicate on the same network • remain anonymous by masking the location and encrypting traffic
CYBER LAW 2021-09-03
Across
- the making, altering, use, or possession of a false writing in order to commit a fraud
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- The communication via any electronic device of false data that damages a person's reputation
- process of converting information into a digital
- Business conducted electronically (buying/selling on web)
- Web page to summon different elements from diverse pages or servers to create a new Web page
Down
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- Using a computer to steal personal data
- when someone forcefully takes control of a website by cracking the password and later changing it
- Make sure a buyer and seller can identify themselves
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
CYBER LAW 2021-09-04
Across
- sending a fake email to steal other people's information
- offence where a hacker gains access and control over someone else's website
- buying and selling of goods and services over internet
- process of recognizing a user's identity
- process of displaying a graphic file on one website that originates at another
- use of defamatory statement over social networking sites
Down
- conversion of information into digital format
- selling, registering or using a domain name with an intention of earning profit from someone else's trademark
- material alteration of a legal instruments with an intention of doing fraud
- using social networking tools and platforms to share and broadcast mottos and messages and to interact with netizens
10 Clues: process of recognizing a user's identity • conversion of information into digital format • buying and selling of goods and services over internet • sending a fake email to steal other people's information • use of defamatory statement over social networking sites • offence where a hacker gains access and control over someone else's website • ...
Cyber Crime 2022-11-14
Across
- a virus on your computer that is intstalled when you open/download something that harvests your information
- when people are contacted and are tricked into giving the scammer money
- the first real cyber attack in 1971, it was a virus
- the first anti-virus software that hunted down the creeper
- stealing other people's identities
Down
- connecting a device to your phone so you can secretly listen to other people's calls
- making a perfect pitch to confuse a phone to give you a free call
- similar to phishing, but it runs a code on your computer, without you clicking a link.
- presenting a fake situation to the victim to either get money or information from them
- a virus that scammed over 80 million USD from people at a time
10 Clues: stealing other people's identities • the first real cyber attack in 1971, it was a virus • the first anti-virus software that hunted down the creeper • a virus that scammed over 80 million USD from people at a time • making a perfect pitch to confuse a phone to give you a free call • when people are contacted and are tricked into giving the scammer money • ...
Cyber Crime 2022-09-07
10 Clues: wannabe hacker • to steal something • produce 80% damage • deep technical skills • uses email to trick you • redirects you to bad website • information about who you are • someone who tests secure sites • promise of goods is never made • reliable website has this in url line
Cyber Mobbing 2019-05-03
Across
- Belästigung im …
- Was solltest du machen wenn dich eine Person belästigt?
- Mit welcher Person solltest du als erstes reden?
- Belästigung im Internet
- Meist wir aus "Spaß" und … gemobbt!
- nicht gewollt
Down
- hinter einem stehen
- Verrate niemals deine persönlichen …
- Person die andere Menschen Belästigt
- Bei wem kannst du die Belästigung einer Person melden?
10 Clues: nicht gewollt • Belästigung im … • hinter einem stehen • Belästigung im Internet • Meist wir aus "Spaß" und … gemobbt! • Verrate niemals deine persönlichen … • Person die andere Menschen Belästigt • Mit welcher Person solltest du als erstes reden? • Bei wem kannst du die Belästigung einer Person melden? • Was solltest du machen wenn dich eine Person belästigt?
CYBER SAFTY 2019-09-24
Across
- trying to break into computer system
- being harassed or threatened online
- flag feeling when you feel in danger or in pain by what someone did
- someone who intentionally and illegally hacks into another person's system to obtain information
- protection for your computer
Down
- something you shouldn't give online.
- software protecting computers from danger
- being pursed by someone online trough social media
- someone who has knowledge on programing and on computers
- sending a fake e-mail to get others personal information
10 Clues: protection for your computer • being harassed or threatened online • something you shouldn't give online. • trying to break into computer system • software protecting computers from danger • being pursed by someone online trough social media • someone who has knowledge on programing and on computers • sending a fake e-mail to get others personal information • ...
Cyber Safety 2023-05-22
Across
- Talking someone into revealing secrets or embarrassing information, then sharing it online
- intentionally or cruelly excluding someone from an online group
- a disease that spreads through the computer
- sharing someone secrets or embarassing info
- Repeated, intense harassment that includes threats or creates significant fear.
Down
- Using someones work without their permission
- Repeated mean, rude and insulting
- Online messages with angry language
- Bullying Online
- Theft When someone steals another Persons identity
10 Clues: Bullying Online • Repeated mean, rude and insulting • Online messages with angry language • a disease that spreads through the computer • sharing someone secrets or embarassing info • Using someones work without their permission • Theft When someone steals another Persons identity • intentionally or cruelly excluding someone from an online group • ...
Cyber Safety 2023-05-22
Across
- stalking repeated intense harrasment
- to share someone else secerets or information ofimages online
- pretending to be someone or posting vidoes online to get them introuble
- to trick someone to reveal secrets or embarrisingInfromation online
- means to diss someone or spread rumors.
Down
- intentionally and cruely exculuding someone froman online group
- theft means to stels someones identity
- means to send mean or insulting messages.
- means to use angry and vulgar launage online
- denigration that includes threats and significant fear
10 Clues: stalking repeated intense harrasment • theft means to stels someones identity • means to diss someone or spread rumors. • means to send mean or insulting messages. • means to use angry and vulgar launage online • denigration that includes threats and significant fear • to share someone else secerets or information ofimages online • ...
CYBER SAFTEY 2023-05-18
Across
- LIKE A HUMAN VIRUS BUT FPR COMPUTERS
- YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
- IT IS WHAT IS YOURS
- WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.
- KEEPS EVERYTHING OF YOURS SAFE
Down
- ONLINE BULLYING
- WHEN PEOPLE BOTHER YOU OVER AND OVER
- HAPPENS TO KIDS ALL AROUND THE WORLD
- STALKING PEOPLE ONLINE
- USE THEM TO KEEP ONLINE THINGS SAFE
10 Clues: ONLINE BULLYING • IT IS WHAT IS YOURS • STALKING PEOPLE ONLINE • KEEPS EVERYTHING OF YOURS SAFE • USE THEM TO KEEP ONLINE THINGS SAFE • WHEN PEOPLE BOTHER YOU OVER AND OVER • LIKE A HUMAN VIRUS BUT FPR COMPUTERS • HAPPENS TO KIDS ALL AROUND THE WORLD • WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT. • YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
CYBER ATTACK 2024-01-22
Across
- to put at the disposal of; furnish or supply
- to gain unauthorized access to another computer system
- to stop something from happening or someone from doing something
- deliberate publication of private information for personal or corporate interest
Down
- in addition
- fabricated or deliberately manipulated audio or visual content
- observe and check the progress or quality of
- to regard as probable or likely; anticipate
- unintentional mistakes suh as inaccurate dates, statistics
- serve as evidence or proof that something exists or is the case
10 Clues: in addition • to regard as probable or likely; anticipate • to put at the disposal of; furnish or supply • observe and check the progress or quality of • to gain unauthorized access to another computer system • unintentional mistakes suh as inaccurate dates, statistics • fabricated or deliberately manipulated audio or visual content • ...
CYBER ATTACK 2024-01-22
Across
- to put at the disposal of; furnish or supply
- to gain unauthorized access to another computer system
- to stop something from happening or someone from doing something
- deliberate publication of private information for personal or corporate interest
Down
- in addition
- fabricated or deliberately manipulated audio or visual content
- observe and check the progress or quality of
- to regard as probable or likely; anticipate
- unintentional mistakes suh as inaccurate dates, statistics
- serve as evidence or proof that something exists or is the case
10 Clues: in addition • to regard as probable or likely; anticipate • to put at the disposal of; furnish or supply • observe and check the progress or quality of • to gain unauthorized access to another computer system • unintentional mistakes suh as inaccurate dates, statistics • fabricated or deliberately manipulated audio or visual content • ...
Cyber bullying 2023-10-26
Across
- , sending messages from a mobile phone
- , form of cyber bullying
- , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
- , a social media app that lets you take and upload photos for people to like, comment on and share
- , social media website beginning with F
Down
- , intentional emotional harm through devices like computers and phones
- , a wireless handheld device used for calls and messaging
- , making a statement of intention to cause harm to someone
- , an image showing what is on a phone or computer screen
- , words or actions intended to annoy, or abuse others
10 Clues: , form of cyber bullying • , sending messages from a mobile phone • , social media website beginning with F • , words or actions intended to annoy, or abuse others • , an image showing what is on a phone or computer screen • , a wireless handheld device used for calls and messaging • ...
Cyber Month! 2023-09-19
Across
- Name of the person who knows a lot about Big Risk because he IS a Big Risk
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- Animal you played during last week's Knowbe4 training
- Password storing software available to CAMPUS employees
- it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
- Clearly the best type of ice cream, don't argue
Down
- The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
- The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
- A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
- secret combination of characters, numbers, or symbols that you use to access something
10 Clues: Clearly the best type of ice cream, don't argue • Animal you played during last week's Knowbe4 training • Password storing software available to CAMPUS employees • Name of the person who knows a lot about Big Risk because he IS a Big Risk • secret combination of characters, numbers, or symbols that you use to access something • ...
Cyber Safety 2024-06-24
Across
- Being tracked or followed online which makes you feel uncomfortable
- Online apps focused on communication eg.snapchat,tiktok
- someone who is repeatedly mean to someone online
- Faking an online identity to manipulate others
- Spending too much time on online gaming
Down
- online devices eg phone,ipad
- somewhere you can go if you need help
- Being safe online
- When someone tries to steal your identity
- A romantic relationship with someone online
10 Clues: Being safe online • online devices eg phone,ipad • somewhere you can go if you need help • Spending too much time on online gaming • When someone tries to steal your identity • A romantic relationship with someone online • Faking an online identity to manipulate others • someone who is repeatedly mean to someone online • ...
Cyber crossword 2024-06-01
Across
- |Email indesiderata che spesso contiene pubblicità o truffe.
- |Una copia di sicurezza dei file importanti.
- |Un programma dannoso che può infettare un computer.
- |Un programma che protegge il computer bloccando i cattivi accessi.
- |Una persona che cerca di entrare nei computer senza permesso.
Down
- |Software dannoso progettato per danneggiare il computer.
- |Un messaggio inviato da un computer a un altro attraverso internet.
- |Una parola segreta usata per accedere a un computer o a un sito web.
- |Un miglioramento o correzione per un programma del computer.
- |Un trucco per ottenere informazioni personali come password e numeri di carta di credito.
10 Clues: |Una copia di sicurezza dei file importanti. • |Un programma dannoso che può infettare un computer. • |Software dannoso progettato per danneggiare il computer. • |Email indesiderata che spesso contiene pubblicità o truffe. • |Un miglioramento o correzione per un programma del computer. • |Una persona che cerca di entrare nei computer senza permesso. • ...
Cyber Crossword 2024-10-24
Across
- A tool that helps block unauthorized access to networks.
- Software that collects data from your device without consent.
- Verifying your identity, often with passwords or biometrics.
- False information spread to deceive or manipulate people.
Down
- Malicious software that harms devices or steals data.
- Encoding data to keep it secure from unauthorized access.
- Your login details needed to access accounts.
- Information that must be protected from unauthorized access.
- An incident where data is accessed without permission.
- A deceptive attempt to steal personal data through fake emails or SMS.
10 Clues: Your login details needed to access accounts. • Malicious software that harms devices or steals data. • An incident where data is accessed without permission. • A tool that helps block unauthorized access to networks. • Encoding data to keep it secure from unauthorized access. • False information spread to deceive or manipulate people. • ...
Cyber monday 2024-11-28
10 Clues: NO CHARGE • CURRENCY USED • MAKER OF ITEMS • TOTAL YOU SPEND • SHIPPING SERVICE • SPEED OF DELIVERY • WHAT YOU DO ONLINE • USED TO CARRY ITEMS • DISCOUNT IDENTIFIER • RECEIPT OR PAYMENT NOTE
Cyber monday 2024-11-28
10 Clues: PHYSICAL MONEY • PART OF A WEBSITE • A SHORT-TERM SALE • A METHOD OF PAYMENT • THE NAME OF A COMPANY • A PLACE ONLINE TO SHOP • SOMETHING WITH NO COST • WHERE YOUR MONEY IS KEPT • A LINE OR LIST OF WAITING ITEMS • WHAT YOU NEED TO ACCESS A WEBSITE
Cyber monday 2024-11-28
10 Clues: HOLDS YOUR CASH • A WAITING GROUP • A DEAL OR DISCOUNT • THE COST OF AN ITEM • NEEDED TO SHOP ONLINE • A PROMOTIONAL MESSAGE • AVAILABILITY OF ITEMS • PLAN FOR SPENDING MONEY • TO GIVE MONEY FOR SOMETHING • TO VERIFY ITEMS IN YOUR CART
Cyber monday 2024-11-28
10 Clues: NO CHARGE • CURRENCY USED • MAKER OF ITEMS • TOTAL YOU SPEND • SHIPPING SERVICE • SPEED OF DELIVERY • WHAT YOU DO ONLINE • USED TO CARRY ITEMS • DISCOUNT IDENTIFIER • RECEIPT OR PAYMENT NOTE
cyber bullying 2025-03-11
10 Clues: Hacking • hurtful person • to help someone • something you go on • hurting someone online • looking out for someone • knowing your on a device • mentally attacking someone • someone hurting someone else • something you use in everyday life
Cyber Ehics 2025-06-16
Across
- simplest way to prevent plagiarism
- criminal activities
- malicious software
- unwanted bulk emails
- set of programs that disrupts the functioning
- sending bulk emails till the server gets full
- combination of voice and phishing
Down
- a security system that prevents unauthorisation
- legal rules for online users
- hacking done for a good cause
10 Clues: malicious software • criminal activities • unwanted bulk emails • legal rules for online users • hacking done for a good cause • combination of voice and phishing • simplest way to prevent plagiarism • set of programs that disrupts the functioning • sending bulk emails till the server gets full • a security system that prevents unauthorisation
Cyber Ethics 2025-06-16
Across
- a simple way of preventing plagiarism
- criminal activities
- malicious software
- unwanted bulk emails
- a set of programs that disrupts the functioning
- sending bulk emails until the server gets full
- combination of voice and phishing
Down
- a security system that prevents un authorisation
- rules for online users
- hacking done for a good cause
10 Clues: malicious software • criminal activities • unwanted bulk emails • rules for online users • hacking done for a good cause • combination of voice and phishing • a simple way of preventing plagiarism • sending bulk emails until the server gets full • a set of programs that disrupts the functioning • a security system that prevents un authorisation
Cyber Ethics 2025-06-06
Across
- Unwanted bulk emails from unknown sources
- Behaving responsibly and ethically on the internet
- Legal term for ownership of creative work
- Illegally accessing a computer system
- Legal rights over creations of the mind
Down
- Copying someone’s work and calling it your own
- The trace a person leaves online.
- Right to control information about yourself
- 💻 Moral principles for using computers and the internet
- Copying and using software illegally
10 Clues: The trace a person leaves online. • Copying and using software illegally • Illegally accessing a computer system • Legal rights over creations of the mind • Unwanted bulk emails from unknown sources • Legal term for ownership of creative work • Right to control information about yourself • Copying someone’s work and calling it your own • ...
Cyber Search 2025-06-24
Across
- Impersonation attack on the web
- System‑weakness hunt
- Network barrier that screens traffic
- Scrambling data for secrecy
Down
- Process of identity verification
- Malicious code demanding money
- Fake‑site fraud to steal data
- Virus‑killing program
- Unintentional human error causing breach
- Secret string for access
10 Clues: System‑weakness hunt • Virus‑killing program • Secret string for access • Scrambling data for secrecy • Fake‑site fraud to steal data • Malicious code demanding money • Impersonation attack on the web • Process of identity verification • Network barrier that screens traffic • Unintentional human error causing breach
Cyber Ethics 2025-05-21
Across
- ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic.
- ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software that blocks access to a computer system or data until a sum of money is paid.
- ㅤㅤㅤㅤ ㅤㅤㅤ A scam attempting to acquire sensitive information by masquerading as a trustworthy entity.
- ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.
- ㅤㅤㅤㅤ ㅤㅤㅤ The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- password ㅤㅤㅤㅤ A combination of uppercase and lowercase letters, numbers, and symbols, difficult to guess.
Down
- ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.
- ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.
- ㅤㅤㅤㅤ ㅤㅤㅤ The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something.
10 Clues: ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet. • ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software. • ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose. • ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic. • ...
Cyber Crossword 2025-10-21
10 Clues: Attack • Password • Phishing • Data leak • Protection • To encrypt data • To report a scam • Person who breaks into systems • The practice of protecting systems • Protects computers from unauthorized access
Chapter 8 & 9 Vocabulary 2013-04-01
Across
- President may not legally hold office and can exercise power as if he were president
- top officials, advisors, and administrators of large bureaucracies appointed by the President
- Succession- president after current one
- appointment to political office
- Security Advisors- a special assistant for national security affairs
- votes of each State
- postponement of legal punishment
- president puts aside or refuses to spend, money congress put aside for a specific purpose
- group pardon for an offense against government
- voters of electoral vote (congress)
- delivery disclosed information
Down
- formal agreements between the government of two or more countries
- salary determined by congress
- medium for discussion
- privilege- the right of the president and other high ranking officials to refuse to provide information
- release from legal punishment
- expressed will of people
- Security- one of the Presidents top assistants who is in charge of Media Relations.
- Clearance- also reviews all legislature proposals executive agencies prepare
19 Clues: votes of each State • medium for discussion • expressed will of people • salary determined by congress • release from legal punishment • delivery disclosed information • appointment to political office • postponement of legal punishment • voters of electoral vote (congress) • Succession- president after current one • group pardon for an offense against government • ...
airport terminology 2019-02-28
Across
- its only accessible to passengers who are travelling
- a persons belongings that have to be checked in
- a series of actions conducted in a certain manner
- you need to declare these goods to be able to bring them into the country
- something that's required to be used for a specific purpose eg toilets or smoking areas
- carry on bag
- the area before you pass through security
- require international passengers to complete a departure card and show passport before entry
- arriving in a country on a plane
- helping someone with their needs
Down
- leaving the airport in the plane
- prevents potential risks from international trade and travel
- place to obtain boarding pass
- a compulsory need for eligibility
- you cannot bring these into the country without a permit
- screens passengers and their baggage
- a place to purchase items without tax or gst
- location where aviation transport takes off and lands
- passengers purchase their tickets, transfer their luggage and go through security
19 Clues: carry on bag • place to obtain boarding pass • leaving the airport in the plane • arriving in a country on a plane • helping someone with their needs • a compulsory need for eligibility • screens passengers and their baggage • the area before you pass through security • a place to purchase items without tax or gst • a persons belongings that have to be checked in • ...
Infant Safety/Abduction 2023-02-24
12 Clues: Gender • Mom & Dad • Watch out • Tiniest patient • Mom's loving hug • # still not found • Baby ID band spot • Call Security STAT • Check the contents • Opposite of pro-active • Infant security measure • Emergency formerly known as
Week 16 puzzle 2022-03-24
Across
- shortened form of malicious software
- very cruel _ _ _ _ A L
- describes good gardener, a green _ _ _ _ _
- to divide, p _ _ _ _ I Z E
- word used in question about possession
- digital currency, _ _ _ _ _ _ CURRENCY
Down
- fraud to steal someone's money
- idiom:understanding of something unclear
- idiom: lots of 'paperwork', bureaucracy
- online 'attack' _ _ _ _ _ W A R
- idiom: surprise, out of the _ _ _ _
- phrase used in a culture,not literal
12 Clues: very cruel _ _ _ _ A L • to divide, p _ _ _ _ I Z E • fraud to steal someone's money • online 'attack' _ _ _ _ _ W A R • idiom: surprise, out of the _ _ _ _ • shortened form of malicious software • phrase used in a culture,not literal • word used in question about possession • digital currency, _ _ _ _ _ _ CURRENCY • idiom: lots of 'paperwork', bureaucracy • ...
puzzle 2023-07-15
Across
- Has a trunk
- which one is first web browser invented is 1990?
- what is short from of star cyber secure user?
- Flying mammal
- where is iant regional office?
- what is collection of facts and figures?
- Man's best friend
Down
- how many digit enter the password?
- what is used to secure our phone?
- an open source operating system?
- Likes to chase mice
- Large marsupial
12 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • where is iant regional office? • an open source operating system? • what is used to secure our phone? • how many digit enter the password? • what is collection of facts and figures? • what is short from of star cyber secure user? • which one is first web browser invented is 1990?
TEKA-TEKI silang 2025-06-03
Across
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- penyebaran informasi palsu yang meluas (4 huruf)
- aturan dan norma berperilaku baik di media sosial (11 h)
- pencurian hak cipta (11 h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
- informasi yang mengidentifikasi seseorang secara unik (12h)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- peraturan yang melindungi data pribadi (16h)
- menjaga keamanan data pribadi di internet (13h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
coding club 2022-12-02
13 Clues: the coo • the ceo • the retiree • the clubs name • what we code on • whats the maskot • the main security • the do nothing guy • our lead supervisor • the clubs best coder • one of the activities • the classroom we code in • the cfo/assintant security
Security meeting 2021-08-31
Across
- the best of the H&M departments
- It's used to fight against fire.
- It's used for employee to create and improve awareness and knowledge.
- It's used to align the company commitment and company principles.
- Those are used to identify or highlight a security/emergency equipment.
Down
- It will be a problem if a lack of_ exist.
- It's a situation where it's necessary to react quickly.
- It's used to measure the security compliance level.
- it's a situation where you have to put yourself secure.
- It affects all around the world.
- We have to be prepared to manage it, creating clear routines and guidelines also training for employees.
11 Clues: the best of the H&M departments • It's used to fight against fire. • It affects all around the world. • It will be a problem if a lack of_ exist. • It's used to measure the security compliance level. • It's a situation where it's necessary to react quickly. • it's a situation where you have to put yourself secure. • ...
Security Guide 2021-09-10
Across
- checklist used during bomb threat call
- Where do we find the security guide?
- How should we remain during a robbery?
- Member's information is always kept "________"
- # of Months pass to replace all-clear (non-numerical)
Down
- "Hi can I speak to __________?"
- Sym duress code
- where do we meet in emergencies?
- Item inside vault box
- Fabric Item inside vault box
- money kept inside drawer at all times
11 Clues: Sym duress code • Item inside vault box • Fabric Item inside vault box • "Hi can I speak to __________?" • where do we meet in emergencies? • Where do we find the security guide? • money kept inside drawer at all times • checklist used during bomb threat call • How should we remain during a robbery? • Member's information is always kept "________" • ...
Network Security 2024-01-30
Across
- these are attached to a document or spreadsheet and use the macro/ scripting function
- this is a self-replicating computer program
- regular backups should be made so data can be ___________
- these will lie dormant until a specific piece of program code is activated
Down
- these are assigned to each user to ensure they may only access certain files
- word to describe programs that can steal/ alter data
- passwords can be guessed as users _____ passwords
- these will prevent unauthorised access to data
- where a user can take a copy of a file it is ____ & ____ access
- a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
- these replicate without the use of a host file
11 Clues: this is a self-replicating computer program • these will prevent unauthorised access to data • these replicate without the use of a host file • passwords can be guessed as users _____ passwords • word to describe programs that can steal/ alter data • regular backups should be made so data can be ___________ • ...
Food Security 2024-02-05
Across
- State with most food insecure people
- The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is
- Most devastating famine faced by India
- The price at which foodgrains are distributed in the deficit areas and among the poor strata of the society.
- Antyodaya card is meant for people below
Down
- Who emphasized access to food security?
- co-operative societies working in Dehli
- Which government organisation buys foodgrains from the farmers and supplies to the fair price shops?
- A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as
- co-operative societies working in Gujrat
- The acronym for government program ensuring food security
11 Clues: State with most food insecure people • Most devastating famine faced by India • Who emphasized access to food security? • co-operative societies working in Dehli • co-operative societies working in Gujrat • Antyodaya card is meant for people below • The acronym for government program ensuring food security • ...
Network Security 2022-08-03
Across
- This decides what areas of the network you can access. For example, you have full access to your home drive (documents area), but you can only read some documents on the classwork area. There are some drives you can't even see (3 words)
- The method for encrypting the plaintext (2 words)
- Provides extra security for the word or term used to log on. Some companies insist this word must include letters, number, symbols and be at least 8 characters long (2 words)
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow it or block it (1 word)
- A sequence of numbers used to encrypt or decrypt, often using a mathematical formula (1 word)
- The encrypted message (1 word)
- The original message to be encrypted (1 word)
Down
- A way of identifying if the user trying to access the system is genuine and authorised
- A method to determine which devices are allowed to access the network (1 word)
- The process of converting cyphertext into plaintext (1 word)
- The process of converting plaintext into ciphertext (1 word)
11 Clues: The encrypted message (1 word) • The original message to be encrypted (1 word) • The method for encrypting the plaintext (2 words) • The process of converting cyphertext into plaintext (1 word) • The process of converting plaintext into ciphertext (1 word) • A method to determine which devices are allowed to access the network (1 word) • ...
Security Crosswords 2022-10-27
Across
- Test which verifies that unexpected input cannot affect the system in an unpredictable way.
- A set of measures to be taken to protect our product.
- A process used by the software industry to design, develop and test high quality software.
- Person who uses their technical computer skill to breach computer system.
- Reactive approach used in Nokia to build secure product.
- Designing a new product or defining a new software, the three security elements shall always be considered: Confidentiality, Integrity, and Availability
Down
- Process which has it's own phases that run in parallel with SDLC phases
- design for security.
- Nokia has a process for developing secure products and systems.
- Attacker sends a bogus requests to exhaust system resources.
- Proactive process used in Nokia to build secure product.
- User require to enter multiple credentials for login.
12 Clues: design for security. • A set of measures to be taken to protect our product. • User require to enter multiple credentials for login. • Proactive process used in Nokia to build secure product. • Reactive approach used in Nokia to build secure product. • Attacker sends a bogus requests to exhaust system resources. • ...
IT SECURITY 2022-10-27
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the process of converting information or data into a code, especially to prevent unauthorized access.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- network security device that monitors and filters incoming and outgoing network traffic
- good privacy an open source and freely available software package for email security
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- The conversion of encrypted data into its original form
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
11 Clues: The conversion of encrypted data into its original form • good privacy an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
Business Security 2024-06-10
Across
- Process to void a lost or stolen check
- Initials of state agency to recover expired money owed to someone
- What this unit is responsible for detecting daily
- Type of check that goes out when a lost check affidavit is received
- Something that occurs when a lost check is cashed for example
Down
- State of Oregon bank
- ___ checks must be entered into the SinglePoint system in order for the recipient to cash them.
- annual process to expire checks greater than 2 years old
- The name synonomous with the crossword title
- Type of checks field offices use for emergencies
- Payment ___ are set to flag cancelled checks to avoid overpayments
11 Clues: State of Oregon bank • Process to void a lost or stolen check • The name synonomous with the crossword title • Type of checks field offices use for emergencies • What this unit is responsible for detecting daily • annual process to expire checks greater than 2 years old • Something that occurs when a lost check is cashed for example • ...
FOOD SECURITY 2024-12-17
Across
- what is a green vegetable that is good for eyes ?
- What is the name of the fruit that is yellow, round, and grows on a tree?
- Which vegetable is white, long, and we use it to make mashed potatoes?
- Which vegetable is green, leafy, and we use it to make pesto?
- Which vegetable is red, round, and we use it to make tomato sauce?
Down
- What is the name of the fruit that is green, bumpy, and has small black seeds?
- what do you eat drink that comes from cow and colour is white ?
- what is green and crunchy that can eat in a salad ?
- What is the name of the fruit that is yellow, oval-shaped, and grows on a tree?
- which is orange colour and use in salad ?
- What is the name of the fruit that is purple, oval-shaped, and has a stone inside?
11 Clues: which is orange colour and use in salad ? • what is a green vegetable that is good for eyes ? • what is green and crunchy that can eat in a salad ? • Which vegetable is green, leafy, and we use it to make pesto? • what do you eat drink that comes from cow and colour is white ? • Which vegetable is red, round, and we use it to make tomato sauce? • ...
Food Security 2024-12-17
Across
- A type of climate event that causes a long period without rain, making hard to grow food
- a yellow fruit that monkeys love to eat
- A problem that happens when people dont get enough food to eat
- This is used to grow plants and crops. It is found in gardens and fields
- A small insect that damages crops and reduces food supply
- the process of growing food without using harmful chemicals
Down
- a place where fruits, vegetables, or grains are planted and harvested
- A major food crop grown in field, often used to make bread
- A nut that is good for heart and brain
- This system is used to bring water to crops in dry areas
- The word that means enough food for everyone to stay healthy and strong
11 Clues: A nut that is good for heart and brain • a yellow fruit that monkeys love to eat • This system is used to bring water to crops in dry areas • A small insect that damages crops and reduces food supply • A major food crop grown in field, often used to make bread • the process of growing food without using harmful chemicals • ...
hello 2025-06-11
Across
- Unité de base d’une image numérique
- Intelligence Artificielle
- L’acte d’observer des activités ou un lieu
- Simulation perçue comme réalité
- Le premier film du genre cyber-punk
- Graphisme sans perte de qualité
- Commande pour annuler une action
Down
- Nom principale de l’affiche à la page 87
- L’action d’accéder illégalement à un système
- Code malveillant qui infecte et altère les systèmes
- groupe musique
- L’abréviation de Portable Document Format
- Bug visuel, effet prisé en design
- Lumière vive typique des villes futurists
- Temps à venir, souvent inquiétant ici
- Moitié Homme, Moitié Robot
16 Clues: groupe musique • Intelligence Artificielle • Moitié Homme, Moitié Robot • Simulation perçue comme réalité • Graphisme sans perte de qualité • Commande pour annuler une action • Bug visuel, effet prisé en design • Unité de base d’une image numérique • Le premier film du genre cyber-punk • Temps à venir, souvent inquiétant ici • Nom principale de l’affiche à la page 87 • ...
Casino 2024-02-29
Across
- team, who fills Kiosk
- What color is the security thread in a 100
- currency is made of linen and
- Card for veterans
- Finance Director
- who's portrait is on a 20 dollar bill
- eyes in the sky
- 21
- one arm bandit
Down
- provides an escort
- Fake currency
- Coin counter
- Highest Card Status
- one of four service drivers
- Another name for ATM
- what color is a 10's strap
16 Clues: 21 • Coin counter • Fake currency • one arm bandit • eyes in the sky • Finance Director • Card for veterans • provides an escort • Highest Card Status • Another name for ATM • team, who fills Kiosk • what color is a 10's strap • one of four service drivers • currency is made of linen and • who's portrait is on a 20 dollar bill • What color is the security thread in a 100
The Department of Homeland Security Crossword 2024-12-09
Across
- The main mission of DHS is to stop this threat.
- CISA, stands for ___________ and Infrastructure Security Agency.
- ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
- DHS operates at the ______ level.
- One weakness of the DHS is the __________ jurisdiction.
- The DHS Oversees ______ security and lawful immigration.
Down
- One of the DHS agencies.
- The person who appoints the Secretary of Homeland Security.
- DHS works to help communities recover through ________.
- The DHS is the newest _______-level department.
10 Clues: One of the DHS agencies. • DHS operates at the ______ level. • The main mission of DHS is to stop this threat. • The DHS is the newest _______-level department. • DHS works to help communities recover through ________. • One weakness of the DHS is the __________ jurisdiction. • The DHS Oversees ______ security and lawful immigration. • ...
SOUTH SLP SAW'23 2023-09-20
Across
- Facilitating anyone's entry/exit known as ------.
- --------is an official repository of critical information and resources with regard to a site.
- --------is the web-based application to digitize various registers used to capture data by SLP team in physical form at each site.
- All amazon vehicles should be checked by security as per the -------.
- --------allows you to link the physical alerts generated by Access Control Devices (Lenel) and pushes them to Milestone VMS.
- --------replaced rightcrowd for all Operation Sites globally.
- "If you see something,say something" Report all-------to security or managers.
- If you believe an incident has occurred that impacts life safety, operations, or the Amazon brand------should be notified.
- --------is defined as a spectrum of behaviors including acts of intentional or targeted violence, threats, and other conduct that generates a reasonable concern for future violence that threatens safety within the workplace.
- Stay --------and always be on the lookout for security incidents.
Down
- -------- is a search engine for AMZL operations.
- Never share your------to anyone.
- In the event of an emergency evacuation, security should not conduct -------.
- Amazon data should be kept under------classification.
- --------is used for masking/unmasking the alarm.
- --------is a one stop solution for AMZL recommended financial recovery.
16 Clues: Never share your------to anyone. • -------- is a search engine for AMZL operations. • --------is used for masking/unmasking the alarm. • Facilitating anyone's entry/exit known as ------. • Amazon data should be kept under------classification. • --------replaced rightcrowd for all Operation Sites globally. • ...
Jargon 4: Revenge of the Kev 2023-09-06
Across
- Security protocol used in wifi networks that offers greater protection through data encryption
- process of encoding information to a unrecognizable form.
- Part of an application that performs a task not apparent to the user
- A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
- document sent with an email message
- Basic unit of information in computing.
- load and initialize the operating system on a computer
Down
- Physical place where a computer stores information, also known as its HDD.
- Network security system that monitors and controls incoming and outgoing traffic
- Hardware or Software component that stores data so future requests can be served faster
- a set of computers sharing resources located on a node
- application that provides a way to look at and interact with information on the Internet
- any goal-oriented activity requiring computer machinery
- Small blocks of data created by a web server while browsing a website
14 Clues: document sent with an email message • Basic unit of information in computing. • a set of computers sharing resources located on a node • load and initialize the operating system on a computer • any goal-oriented activity requiring computer machinery • process of encoding information to a unrecognizable form. • ...
Vyper Language 2025-07-31
Across
- Interface that lets other applications interact with smart contracts
- A key blockchain feature — cannot be changed once deployed
- The unit of computation cost on Ethereum
- A piece of code that runs on Ethereum
- A system without a central authority
- Pythonic smart contract language focused on security
Down
- Where users and contracts live on the blockchain
- A thorough security check of a smart contract
- The syntax style that Vyper is inspired by
- The top priority in Vyper design philosophy
- Used in Vyper for error-checking
- A digital asset created on a blockchain
- Blockchain platform where Vyper contracts are deployed
13 Clues: Used in Vyper for error-checking • A system without a central authority • A piece of code that runs on Ethereum • A digital asset created on a blockchain • The unit of computation cost on Ethereum • The syntax style that Vyper is inspired by • The top priority in Vyper design philosophy • A thorough security check of a smart contract • ...
Employment Vocabulary 2022-09-02
Across
- How an employer pays an employee who is not salary.
- Considered working 40 hours per week.
- Form a potential employee fills out to obtain a job.
- Paid vacation and paid sick time.
- How many digits your Social Security number is.
- Social Security and Medicare rates are expressed as this.
- The largest health insurance program for people 65 and older.
- 24 paychecks per year.
Down
- A benefit for employees that helps cover health, life, and disability.
- When a worker stops working permanently.
- Medicare and Social Security combined.
- Another word for commission.
- A job that receives royalties.
13 Clues: 24 paychecks per year. • Another word for commission. • A job that receives royalties. • Paid vacation and paid sick time. • Considered working 40 hours per week. • Medicare and Social Security combined. • When a worker stops working permanently. • How many digits your Social Security number is. • How an employer pays an employee who is not salary. • ...
Jared's Crossword, 2 2014-04-23
8 Clues: classroom environment • cruel, or physical harm • service with instruction • unwanted sexual advances • a sense of common purpose • social and academic learning • bullying threw electronic means • with instruction and reflection
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
Cyber Safety Crossword 2013-11-03
Across
- When a computer calls out to another computer to see if it is active.
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
- Free software that can be downloaded from the internet.
- A computer that has been hacked into and is used to launch malicious attacks
- Buying products on the Internet using credit cards or other electronic payments
- A type of malware that spies on what you do on the internet and can steal information about you
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- Small text files that websites save in your web browser to store information like your username and password.
- Marking something or someone as suspicious or inappropriate.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The internet version of Junk mail
- Short for Random Access Memory
- The last part of a URL eg;.gov .com
- A name you use to identify yourself on a computer or website.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Cyber Cross-Word 2022-05-19
Across
- secret - cb5ceb103977f1271d0763ac75fcd8e9
- firewall keeps track of com sessions
- packet analyzer
- software/hardware that creates/runs VM
- type of AV-based thats unusual for the user
- software that displays unwanted ad
- SIEM tool that enable to search, analyze...
Down
- attract attackers
- tool that uses multiple antivirus engines
- shortest-path-first routing protocol
- secure communications techniques
- transmission media with cables
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- interaction between snmp agent manager
- an open-source EDR
15 Clues: packet analyzer • attract attackers • an open-source EDR • transmission media with cables • secure communications techniques • 8e8c92b1c360cbe3cd2b40d6b29278d5 • software that displays unwanted ad • firewall keeps track of com sessions • shortest-path-first routing protocol • software/hardware that creates/runs VM • interaction between snmp agent manager • ...
Cyber safety Edwin 2016-06-08
Across
- media is when people be so mean.
- opposite of dangerous.
- ups silly things come up on your device.
- pictures.
- can be rude.
- there can be a problem.
- educational apps only,no violence
Down
- it is safe like the dictionary.
- information-people can hack.
- don't write anything that is rude.
- people can interrupt it.
- same as unsafe to the internet.
- its a virus.
- it is private.
- makes you're device bad.
15 Clues: pictures. • its a virus. • can be rude. • it is private. • opposite of dangerous. • there can be a problem. • makes you're device bad. • people can interrupt it. • information-people can hack. • it is safe like the dictionary. • same as unsafe to the internet. • media is when people be so mean. • educational apps only,no violence • don't write anything that is rude. • ...
GLOBAL FOOD SECURITY 2025-06-16
Across
- | A condition caused by lack of food |
- | Poor nutrition from lack of food or unbalanced diet
- | The way food is used and absorbed by the body
- | Not having enough food to be healthy
- | One of the main pillars of food security, referring to having enough food
- | Food security also depends on this over time
- | Essential nutrient found in meat and legumes |
- | When there is not enough of a resource like food or water
- | Vitamins and minerals needed in small amounts |
Down
- | Energy unit found in food |
- | A basic food like rice or wheat |
- | Key pillar of food security: physical and economic ______ to food
- | Process of adding nutrients to food |
- | Capacity to recover from food shocks
- | Extreme scarcity of food
15 Clues: | Extreme scarcity of food • | Not having enough food to be healthy • | Capacity to recover from food shocks • | Food security also depends on this over time • | The way food is used and absorbed by the body • | Energy unit found in food | • | A basic food like rice or wheat | • | Process of adding nutrients to food | • ...
SDL Crossword 2019-06-05
Across
- What code is for Kapiti Coast?
- How will the expansion of Auckland Airport impact on the local region?
- By 2025 what does Auckland Airport hope to have?
- How many passenger terminals does Auckland Airport have?
- After security means what?
- What is the city for the code NSN?
- How many baggage claim belts does Auckland Airport have?
- Screening passengers and their carry-on baggage is what step for Aviation Security?
Down
- What is the city for the code ZQN?
- Can anyone be on landside?
- How many cargo terminals do Auckland Airport have?
- Passport, e-ticket and ______ is what Customer Service Offices would need you to present to them after landing?
- Before security means what?
- Can anyone be on airside?
- How far away is Auckland city from the airport?
- What is 1900 in 24 hour clock?
- What code is for Hamilton?
17 Clues: Can anyone be on airside? • Can anyone be on landside? • After security means what? • What code is for Hamilton? • Before security means what? • What code is for Kapiti Coast? • What is 1900 in 24 hour clock? • What is the city for the code ZQN? • What is the city for the code NSN? • How far away is Auckland city from the airport? • ...
SS13/14 Terminology 2025-11-02
Across
- Security Department
- The unofficial mascot
- What cargo does every shift
- What sec does every shift
- What security ignores
- A squad of 3-6 agents destroying the station. Slang.
- What science does every shift
- Evolutionary cousin of the Space Carp
- The helpful tip delivering clown!
Down
- When the singularity is loose
- A man-eating beast, taking inspiration from the movie "The Thing"
- Genetics Subdepartment
- An evil version of the clown
- Med Department
- Science Department
- What med does every shift
- Engineering Department
- Traitor, slang.
18 Clues: Med Department • Traitor, slang. • Science Department • Security Department • The unofficial mascot • What security ignores • Genetics Subdepartment • Engineering Department • What sec does every shift • What med does every shift • What cargo does every shift • An evil version of the clown • When the singularity is loose • What science does every shift • The helpful tip delivering clown! • ...
