cyber security Crossword Puzzles

noun 2021-03-23

noun crossword puzzle
Across
  1. He takes great _____.
  2. The plural of bacterium
  3. Sit on the ______ ______(Chair/office).
  4. In the cyber are a lot of _______.
  5. The plural of fungus
Down
  1. Today he has his first ______ ______(interview/job).
  2. Plural of woman.
  3. The ______ met after the court.
  4. In the desert are a lot of ______.
  5. They built a _____ _____(house/bricks).
  6. Pass me the ____ ______(spoon/soup).
  7. Mister beast ______ has a lot of views.
  8. The plural of fry
  9. I used to watch super hero _____.

14 Clues: Plural of woman.The plural of fryThe plural of fungusHe takes great _____.The plural of bacteriumThe ______ met after the court.I used to watch super hero _____.In the desert are a lot of ______.In the cyber are a lot of _______.Pass me the ____ ______(spoon/soup).They built a _____ _____(house/bricks).Mister beast ______ has a lot of views....

The Enterprise Report 2021-11-15

The Enterprise Report crossword puzzle
Across
  1. The ____ Guy sets up at the Village on Wednesdays
  2. Monday after Black Friday
  3. open ____ has ended for the year 2021-2022
  4. Wednesday before Thanksgiving, at Salish Coast
  5. featured Employee of the Month
  6. people honored on Nov. 11
Down
  1. keeps your hands warm
  2. "busy" animal
  3. may participate in Salish Coast's Coloring Contest
  4. energy drink sold by the Coffee Point
  5. Swinomish Market at the _____
  6. 11th month of the year
  7. fuels your car
  8. manager at the Village

14 Clues: "busy" animalfuels your carkeeps your hands warm11th month of the yearmanager at the VillageMonday after Black Fridaypeople honored on Nov. 11Swinomish Market at the _____featured Employee of the Monthenergy drink sold by the Coffee Pointopen ____ has ended for the year 2021-2022Wednesday before Thanksgiving, at Salish Coast...

Saferinternet 2024-03-01

Saferinternet crossword puzzle
Across
  1. Die schädliche Software
  2. Gefälschte Fan-Seiten, Klickbetrug
  3. Ein soziales Netzwerk
  4. Identitätsdiebstahl
Down
  1. Das schädliche Programm
  2. Der Sammelbegriff des Browsers
  3. Cyberbullying,Beschimpfungen

7 Clues: IdentitätsdiebstahlEin soziales NetzwerkDas schädliche ProgrammDie schädliche SoftwareCyberbullying,BeschimpfungenDer Sammelbegriff des BrowsersGefälschte Fan-Seiten, Klickbetrug

Security Verification 2013-07-19

Security Verification crossword puzzle
Across
  1. True or False? If a customer wants us to provide them with their account center User ID, I verify primary security information only.
  2. Can an account holder change their monther's maiden name to a secuirty word?
  3. If an account holder wants to close a CD or do an early withdrawal and they did a change of address in the last two months, how many Account Level questions must they answer?
  4. If an account holder wants to have ATM access removed from their Money Market account AND they want to Remove Backup withholding, do I have to ask just two Account Level questions?
  5. What Money Page article should you refer to if you have questions regarding account verification?
Down
  1. If you are verifying a customer whose mother's maiden name is shortened to four characters, you should update the system with the full name. True or False?
  2. If an account holder wants an official checked mailed out but they have changed their address with you today, what verification are you required to do?
  3. If an account holder can only verify one piece of their primary security, the call should be transferred where?
  4. If an account holder wants to remove a POA from their account, what type of verification is required?
  5. What program should I use if a customer can verify two primary security questions and one account level question?
  6. Beside the account holders name, how many pieces of information are you required to verify prior to releasing account-specific information?

11 Clues: Can an account holder change their monther's maiden name to a secuirty word?What Money Page article should you refer to if you have questions regarding account verification?If an account holder wants to remove a POA from their account, what type of verification is required?...

security technology 2014-07-07

security technology crossword puzzle
Across
  1. layer
  2. encryption scheme
  3. system
  4. control protocol
  5. reads your mail
Down
  1. layer
  2. private network
  3. key distribution
  4. layer
  5. protocol/internet layer
  6. intercepts your mail and modify
  7. mail and sign your name
  8. risk

13 Clues: risklayerlayerlayersystemprivate networkreads your mailkey distributioncontrol protocolencryption schemeprotocol/internet layermail and sign your nameintercepts your mail and modify

IT SECURITY 2022-10-27

IT SECURITY crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. network security device that monitors and filters incoming and outgoing network traffic
  7. good privacy an open source and freely available software package for email security
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. The conversion of encrypted data into its original form
  3. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

11 Clues: The conversion of encrypted data into its original formgood privacy an open source and freely available software package for email securitynetwork security device that monitors and filters incoming and outgoing network trafficthe process of converting information or data into a code, especially to prevent unauthorized access....

Network Security 2024-01-30

Network Security crossword puzzle
Across
  1. these are attached to a document or spreadsheet and use the macro/ scripting function
  2. this is a self-replicating computer program
  3. regular backups should be made so data can be ___________
  4. these will lie dormant until a specific piece of program code is activated
Down
  1. these are assigned to each user to ensure they may only access certain files
  2. word to describe programs that can steal/ alter data
  3. passwords can be guessed as users _____ passwords
  4. these will prevent unauthorised access to data
  5. where a user can take a copy of a file it is ____ & ____ access
  6. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
  7. these replicate without the use of a host file

11 Clues: this is a self-replicating computer programthese will prevent unauthorised access to datathese replicate without the use of a host filepasswords can be guessed as users _____ passwordsword to describe programs that can steal/ alter dataregular backups should be made so data can be ___________...

Security SOP 2024-10-07

Security SOP crossword puzzle
Across
  1. The "go to" Security notebook
  2. Everyone must wear Safety ________ (plural)
  3. Tell supervisor the ________ for a fire alarm
  4. Who to call on weekends for Dry Air alarms
  5. Acronym for Panasonic Energy Corporation of America
  6. Allowed only in designated area
Down
  1. Required Eye Personal Protective Equipment
  2. Federal Agency responsible for Workplace Safety
  3. Safety Representative for PECA
  4. First thing to pull out during any alarm
  5. Third element on Periodic table

11 Clues: The "go to" Security notebookSafety Representative for PECAThird element on Periodic tableAllowed only in designated areaFirst thing to pull out during any alarmRequired Eye Personal Protective EquipmentWho to call on weekends for Dry Air alarmsEveryone must wear Safety ________ (plural)Tell supervisor the ________ for a fire alarm...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The act of growing only one type of crop on a farm.
  2. What is needed to grow crops, often affected by drought.
  3. The lack of enough nutritious food to stay healthy
  4. A food preservation method using low temperatures.
Down
  1. Lack of consistent access to food.
  2. A person who grows crops or raises animals or food.
  3. A shortage of rain over a long time.
  4. Farming done in cities often in small spaces.
  5. A crop commonly used to make bread
  6. Food that is grown without using harmful chemicals
  7. A grain that is common food in many Asian countries.

11 Clues: Lack of consistent access to food.A crop commonly used to make breadA shortage of rain over a long time.Farming done in cities often in small spaces.Food that is grown without using harmful chemicalsThe lack of enough nutritious food to stay healthyA food preservation method using low temperatures.A person who grows crops or raises animals or food....

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Felling you get when you have no food.
  2. A grain that feeds millions of people worldwide.
  3. Essential for growing crops.
  4. What we eat to stay alive.
  5. A place where food is grown.
  6. What you call breakfast,lunch or dinner
Down
  1. When people have little or no money to buy food.
  2. A common grain used to make bread.
  3. Plants grown in large amounts for food.
  4. Help given to countries during food crises.
  5. A time when there is no food in an entire region.

11 Clues: What we eat to stay alive.Essential for growing crops.A place where food is grown.A common grain used to make bread.Felling you get when you have no food.Plants grown in large amounts for food.What you call breakfast,lunch or dinnerHelp given to countries during food crises.When people have little or no money to buy food....

Food security 2024-11-28

Food security crossword puzzle
Across
  1. CAN BE FOUND IN CURD
  2. OPPOSITE OF TIDY
  3. SIGNIFICANT MEASURES TO PREVENT FROM HARM
  4. GOOD FOR DIGESTIVE SYSTEM
  5. OPPOSITE OF CLEAN
Down
  1. MEDICINE TO REMOVE PESTS
  2. NAME TAG
  3. PROCESS OF REMOVING INFECTIOUS THINGS
  4. MANDATORY ACTIVITY BEFORE EATING
  5. END OF LIFE
  6. SOURCE OF MULTIVITAMIN

11 Clues: END OF LIFENAME TAGOPPOSITE OF TIDYOPPOSITE OF CLEANCAN BE FOUND IN CURDSOURCE OF MULTIVITAMINMEDICINE TO REMOVE PESTSGOOD FOR DIGESTIVE SYSTEMMANDATORY ACTIVITY BEFORE EATINGPROCESS OF REMOVING INFECTIOUS THINGSSIGNIFICANT MEASURES TO PREVENT FROM HARM

Security Adobe 2025-10-17

Security Adobe crossword puzzle
Across
  1. FTeB5SkrOZM=
  2. vp6d18mfGL+5n2auThm2+Q==
  3. dA8D8OYD55E=
  4. L3uQHNDF6Mw=
  5. 7Z6uMyq9bpxe1EB7HijrBQ==
Down
  1. WqflwJFYW3+PszVFZo1Ggg==
  2. 2aZl4Ouarwm52NYYI936YQ==
  3. zk8NJgAOqc4=
  4. L8qbAD3jl3jSPm/keox4fA==
  5. yxzNxPIsFno=
  6. WlMTLimQ5b4=

11 Clues: zk8NJgAOqc4=FTeB5SkrOZM=dA8D8OYD55E=L3uQHNDF6Mw=yxzNxPIsFno=WlMTLimQ5b4=WqflwJFYW3+PszVFZo1Ggg==2aZl4Ouarwm52NYYI936YQ==L8qbAD3jl3jSPm/keox4fA==vp6d18mfGL+5n2auThm2+Q==7Z6uMyq9bpxe1EB7HijrBQ==

DC9111 2024-08-09

DC9111 crossword puzzle
Across
  1. A framework used to manage and mitigate cybersecurity risks.
  2. A cybersecurity tool used to monitor, detect, and respond to threats.
  3. - The process of converting data into a code to prevent unauthorized access.
  4. The practice of finding and fixing security flaws.
  5. A common online attack method involving fraudulent emails.
  6. A network security device that monitors and filters incoming and outgoing traffic.
  7. An open-source intelligence gathering technique.
  8. A term for ethically hacking a system.
  9. An organized event where hackers test their skills.
  10. The art of disguising communication within another medium.
  11. A type of malware that demands payment for the return of stolen data.
  12. The practice of attacking a system to test its security.
  13. A person who finds and reports security vulnerabilities for rewards.
  14. A malicious program that spreads across systems and networks.
  15. A type of attack where multiple systems flood a target with traffic.
Down
  1. The exploitation of software vulnerabilities by malicious hackers.
  2. The unauthorized access of data in transit.
  3. A cryptographic key used in public key cryptography.
  4. A protocol used for secure internet communication.
  5. The process of analyzing network traffic for malicious activity.
  6. An organization that sets standards for securing information systems.
  7. A type of attack that overwhelms a system with traffic.
  8. A hidden malicious software that provides backdoor access.
  9. A form of social engineering to manipulate users into giving up confidential information.
  10. A global, decentralized group known for hacktivism.
  11. A popular TV series about a hacker with dissociative identity disorder.

26 Clues: A term for ethically hacking a system.The unauthorized access of data in transit.An open-source intelligence gathering technique.The practice of finding and fixing security flaws.A protocol used for secure internet communication.An organized event where hackers test their skills.A global, decentralized group known for hacktivism....

Ethnic Studies 5.5 (Redlining) 2024-08-15

Ethnic Studies 5.5 (Redlining) crossword puzzle
Across
  1. maps developed by the Home Owners’ Loan Corporation showing mortgage lending risks in different neighborhoods
  2. 1968 act banning refusal to sell or rent a dwelling to any person because of marginalized status
  3. racial segregation that is required by law or policy
  4. residential security maps category for the "riskiest" neighborhoods
  5. in 2016, White families had 8 and 10 times more wealth than Black and Hispanic families, respectively
  6. residential security maps category for "still desirable" neighborhoods
  7. upgrading low-income neighborhoods, causing higher costs of living and resident displacement
  8. reduced economic mobility for people of color
  9. nonviolent protests in which participants sit and refuse to leave, often resulting in their arrest
  10. residential security maps category for "declining" neighborhoods
Down
  1. racially restrictive covenants became increasingly common around the United States
  2. residential security maps category for affluent suburbs
  3. denying a person the right to buy or rent a home due because of marginalized status
  4. 1926 Supreme Court case that affirmed the constitutionality of racially restrictive covenants
  5. encouraging owners to sell their properties because people of color are moving into a neighborhood
  6. banks refusing to make loans to people living in certain geographic locations
  7. non-white people
  8. segregation of people into separate areas by fact rather than by law or policy
  9. provisions in real estate deeds prohibiting sales to people from marginalized groups
  10. between 1946-1959, 2% of homes insured by the Federal Housing Administration were available to people of color

20 Clues: non-white peoplereduced economic mobility for people of colorracial segregation that is required by law or policyresidential security maps category for affluent suburbsresidential security maps category for "declining" neighborhoodsresidential security maps category for the "riskiest" neighborhoods...

Disability specialist week crossword 2021-06-13

Disability specialist week crossword crossword puzzle
Across
  1. Who is the current president of WADE
  2. What state children's disability program does WI administer?
  3. What year did the disability program start?
  4. Who is the current vice president of WADE
  5. How many NADE presidents have been from Wisconsin?
  6. What is the Social Security region that WI DDS reports to
  7. What program besides Social Security disability does WI DDS make decisions for?
  8. what is your state disability examiner association
  9. lakes Which region does WI NADE chapter belong to?
Down
  1. How many years has NADE been in existence?
  2. What is the NADEs newsletter called?
  3. Before Michelle, who was previous DDS administrator?
  4. How many years has NADE been in existence?
  5. How many regions does Social Security have?
  6. How many dollars does it cost to be a member of NADE?
  7. How many NADE presidents have been from Wisconsin?
  8. Who is the current treasurer of WADE
  9. Who is the current secretary of WADE
  10. What is your national association of disability examiners
  11. Who does NADE represent?
  12. What are the initials for the office that reviews the quality of disability decisions

21 Clues: Who does NADE represent?Who is the current president of WADEWhat is the NADEs newsletter called?Who is the current treasurer of WADEWho is the current secretary of WADEWho is the current vice president of WADEHow many years has NADE been in existence?How many years has NADE been in existence?How many regions does Social Security have?...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. perbuatan menyebar informasi yang merugikan orang lain (18h)
  2. program kecil yang dapat merusak sistem komputer (5 huruf)
  3. peraturan yang melindungi data pribadi (16h)
  4. pencurian hak cipta (11 h)
  5. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  6. tindakan menyebar informasi yang salah secara sengaja (14h)
  7. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  8. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  9. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  10. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  11. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  12. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  13. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  14. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  15. aturan dan norma berperilaku baik di media sosial (11 h)
  16. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
Down
  1. perbuatan melanggar hukum didunia maya (10 huruf)
  2. informasi yang mengidentifikasi seseorang secara unik (12h)
  3. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  4. penyebaran informasi palsu yang meluas (4 huruf)
  5. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  6. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  7. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  8. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  9. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  10. perilaku tidak sopan/kasar didunia maya (10 h)
  11. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  12. menjaga keamanan data pribadi di internet (13h)
  13. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  14. internet tindakan kriminal yang dilakukan melalui internet (14h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

Tatler Crossword Week 6 2023-11-27

Tatler Crossword Week 6 crossword puzzle
Across
  1. Popular girl scout cookie
  2. Journalist ___ B. Wells
  3. Shortest Grizzlies player(last name)
  4. Best time to buy online is ______ Monday,
  5. Woman's name that sounds like its first and third letters
Down
  1. The largest city in the world.
  2. Boy band with the 2000 hit "Bye Bye Bye"
  3. first animal in space
  4. Home to the Alhambra
  5. Knight's title
  6. Santa's workers

11 Clues: Knight's titleSanta's workersHome to the Alhambrafirst animal in spaceJournalist ___ B. WellsPopular girl scout cookieThe largest city in the world.Shortest Grizzlies player(last name)Boy band with the 2000 hit "Bye Bye Bye"Best time to buy online is ______ Monday,Woman's name that sounds like its first and third letters

Sosiologi Tentang Globalisasi 2025-08-25

Sosiologi Tentang Globalisasi crossword puzzle
Across
  1. jenis serangan cyber yang berbahaya
  2. nilai-nilai yang di anut oleh suatu masyarakat
  3. indikator keberhasilan ekonomi suatu negara
  4. metode pembelajaran yang menggunakan ekonomi
  5. proses pembelajaran yang berpusat pada siswa
Down
  1. jenis hukum yang berlaku di Indonesia
  2. sistem ekonomi yang berdasarkan
  3. bentuk komunikasi yang tidak langsung
  4. jenis teknologi yang digunakan untuk mengakses internet
  5. perusahaan teknologi yang terkenal
  6. kepemilikan swasta
  7. bahasa pemrograman yang populer

12 Clues: kepemilikan swastasistem ekonomi yang berdasarkanbahasa pemrograman yang populerperusahaan teknologi yang terkenaljenis serangan cyber yang berbahayajenis hukum yang berlaku di Indonesiabentuk komunikasi yang tidak langsungindikator keberhasilan ekonomi suatu negarametode pembelajaran yang menggunakan ekonomi...

Study 2025-09-23

Study crossword puzzle
Across
  1. Weakness in a system
  2. Protects sensitive information
  3. Security-related event
  4. Permission to use resources
  5. Ensures systems are accessible
  6. Testing for security weaknesses
  7. Ensures data is accurate and unaltered
  8. Restriction of access
  9. Potential cause of harm
Down
  1. Notification of suspicious activity
  2. Action taken after an incident
  3. Adherence to regulations
  4. Observing system activity
  5. Restoring after a breach
  6. Takes advantage of a vulnerability

15 Clues: Weakness in a systemRestriction of accessSecurity-related eventPotential cause of harmAdherence to regulationsRestoring after a breachObserving system activityPermission to use resourcesAction taken after an incidentProtects sensitive informationEnsures systems are accessibleTesting for security weaknessesTakes advantage of a vulnerability...

Computer Science 2022-11-08

Computer Science crossword puzzle
Across
  1. central Processing Unit
  2. a part of something
  3. continues messages
  4. a device
  5. a barrier that separates your private network from the internet
  6. internet manners
  7. solid state drives
  8. random access memory
  9. A Universal Serial Bus
Down
  1. protected by a legal agreement
  2. use lets you use copyrighted material with permission from the owner
  3. wide area network
  4. Copying someone’s work without permission
  5. hard disk drives
  6. local area network
  7. Drive similar to USB
  8. Security protects your data and network from malware and security breaches

17 Clues: a devicehard disk drivesinternet mannerswide area networkcontinues messageslocal area networksolid state drivesa part of somethingrandom access memoryA Universal Serial Buscentral Processing UnitDrive similar to USBprotected by a legal agreementCopying someone’s work without permission...

Cybersecurity Vocab 2022-03-10

Cybersecurity Vocab crossword puzzle
Across
  1. Credit and Copyright
  2. Cipher
  3. Your Own Device (BYOD)
  4. Stalking
Down
  1. Certificate
  2. Triad
  3. Hygiene

7 Clues: TriadCipherHygieneStalkingCertificateCredit and CopyrightYour Own Device (BYOD)

Security crossword 2022-07-21

Security crossword crossword puzzle
Across
  1. is a nonprofit foundation dedicated to improving software security
  2. is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
  3. Place to store high privilege passwords
  4. IT Governance framework from ISACA
  5. Unplanned downtime of IT resources
  6. Information security triad
Down
  1. Need to impart to everyone to protect the organization
  2. process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
  3. is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default
  4. seamless integration of security testing and protection throughout the software development and deployment lifecycle
  5. is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.

11 Clues: Information security triadIT Governance framework from ISACAUnplanned downtime of IT resourcesPlace to store high privilege passwordsNeed to impart to everyone to protect the organizationis a nonprofit foundation dedicated to improving software security...

Arciniegas 2022-02-10

Arciniegas crossword puzzle
Across
  1. officer: he commands the duty officer
  2. officer: He is in charge of intelligence at the school
  3. the camp: school garden manager
Down
  1. Security of people
  2. technical officer: school weapon manager
  3. police: martiality
  4. commander: Security school
  5. no duty: service of company
  6. soldiers Security
  7. officer: send to school services

10 Clues: soldiers SecuritySecurity of peoplepolice: martialitycommander: Security schoolno duty: service of companythe camp: school garden managerofficer: send to school servicesofficer: he commands the duty officertechnical officer: school weapon managerofficer: He is in charge of intelligence at the school

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

ZAJEDNO ZA BOLJI INTERNET 2023-02-15

ZAJEDNO ZA BOLJI INTERNET crossword puzzle
Across
  1. ne objavljivanje sadržaja koji nije
  2. prijatelji osobe s kojima se sprijateljiš a ne
  3. seksualno uznemiravanje na internetu
  4. slike slanje slika koje ne smiješ nikome slat
  5. vijesti širenje nečega za što nisi siguran
  6. ljudima
  7. profila praviti se da si netko tko nisi
Down
  1. bulling nasilje na internetu
  2. ignoriranje neželjnog sadržaja
  3. paukova mreža
  4. pričanje u žio s ljudima koje ne poznaješ
  5. stavljanje računa na privatni
  6. kometari rečenice koje izriču mržnju i ljubomoru
  7. za tvoju dob
  8. ih u živo
  9. tok aplikacija na kojoj se najviše susrećemo s

16 Clues: ljudimaih u živoza tvoju dobpaukova mrežabulling nasilje na internetustavljanje računa na privatniignoriranje neželjnog sadržajane objavljivanje sadržaja koji nijeseksualno uznemiravanje na internetuprofila praviti se da si netko tko nisipričanje u žio s ljudima koje ne poznaješvijesti širenje nečega za što nisi siguran...

crossword 2012-11-15

crossword crossword puzzle
Across
  1. logo 2
  2. logo 3
  3. brand ambassador of sony cyber shot
  4. ceo of virgin atlantic
  5. parent company of minute maid
  6. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse
  7. logo 4
  8. highest grossing hollywood movie
Down
  1. the ultimate driving machine
  2. full form of P&G
  3. artist with the highest number of views for his\her video on youtube
  4. one world many states
  5. subsidiary company of adidas which makes sportswear, apparel and accessories
  6. towards excellence
  7. logo 1
  8. world's local bank

16 Clues: logo 2logo 3logo 1logo 4full form of P&Gtowards excellenceworld's local bankone world many statesceo of virgin atlanticthe ultimate driving machineparent company of minute maidhighest grossing hollywood moviebrand ambassador of sony cyber shotartist with the highest number of views for his\her video on youtube...

j808 4.1 types of threats 2019-01-09

j808 4.1 types of threats crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. any software that shows adverts
  3. Software that encrypts programs and data until a ransom is paid to remove it.
  4. When someone deceives by pretending to be someone else in order to get personal data.
  5. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  6. Criminals make a promise of goods in return for details, such as offering a free music download.
  7. Program that hides in a computer and allows someone from a remote location to take full control of the computer
Down
  1. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  2. A type of Malware that locates and saves data from users without them knowing about it
  3. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. Collection of captured bot computers
  5. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  6. malware that allows a cyber-security attacker to take control of an infected computer
  7. An error in a program that prevents the program from running as expected.
  8. horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer

15 Clues: any software that shows advertsCollection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

Online Identity Crossword 2024-09-12

Online Identity Crossword crossword puzzle
Across
  1. Addiction When people can't go without the internet
  2. Purchase Buying things online
  3. Thinking What you need to do when using technology
  4. A Delicious Treat
  5. Spiders make this site
  6. Shows who you are online
  7. Use How you spend time on a computer
Down
  1. Information What hackers have done
  2. Media Platforms with social environments
  3. What's saved on your devices
  4. Shopping Browsing on the internet for personal items
  5. Online Villain
  6. Personalized for your technological devices
  7. Psychology How users behave online
  8. Phones, TV, Computers
  9. Who you are
  10. Use When users associate with internet

17 Clues: Who you areOnline VillainA Delicious TreatPhones, TV, ComputersSpiders make this siteShows who you are onlineWhat's saved on your devicesPurchase Buying things onlineInformation What hackers have donePsychology How users behave onlineUse How you spend time on a computerUse When users associate with internetMedia Platforms with social environments...

Online Identity Crossword 2024-09-12

Online Identity Crossword crossword puzzle
Across
  1. Addiction When people can't go without the internet
  2. Purchase Buying things online
  3. Thinking What you need to do when using technology
  4. A Delicious Treat
  5. Spiders make this site
  6. Shows who you are online
  7. Use How you spend time on a computer
Down
  1. Information What hackers have done
  2. Media Platforms with social environments
  3. What's saved on your devices
  4. Shopping Browsing on the internet for personal items
  5. Online Villain
  6. Personalized for your technological devices
  7. Psychology How users behave online
  8. Phones, TV, Computers
  9. Who you are
  10. Use When users associate with internet

17 Clues: Who you areOnline VillainA Delicious TreatPhones, TV, ComputersSpiders make this siteShows who you are onlineWhat's saved on your devicesPurchase Buying things onlineInformation What hackers have donePsychology How users behave onlineUse How you spend time on a computerUse When users associate with internetMedia Platforms with social environments...

Casino 2024-02-29

Casino crossword puzzle
Across
  1. team, who fills Kiosk
  2. What color is the security thread in a 100
  3. currency is made of linen and
  4. Card for veterans
  5. Finance Director
  6. who's portrait is on a 20 dollar bill
  7. eyes in the sky
  8. 21
  9. one arm bandit
Down
  1. provides an escort
  2. Fake currency
  3. Coin counter
  4. Highest Card Status
  5. one of four service drivers
  6. Another name for ATM
  7. what color is a 10's strap

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skyFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMteam, who fills Kioskwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

15.1 Understanding Money Created by Yash Gupta 2024-05-09

15.1 Understanding Money Created by Yash Gupta crossword puzzle
Across
  1. is a transfer of money from one bank account to another
  2. the mechanism a nation uses to provide and manage money for itself
  3. money received today can be invested or deposited in the bank to earn interest
  4. allows customers to pay for purchases directly from their checking account
  5. action taken to manage the supply of money and interest rates in an economy
  6. a security that pays interest over terms of ten to thirty years
  7. money can be saved and used at a later date
  8. coins or banknotes that must be accepted if offered in payment of a debt.
  9. Anything of value that is accepted in return for goods and services
  10. is a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
  1. the process of transferring money from one individual or organization to another
  2. is a security that matures in a year or less
  3. is a security that pays interest over terms ranging from two to ten years
  4. money is used in exchange for goods and services needed by individuals, businesses, and governments
  5. money is a common measure of the worth or price of a good or service
  6. a type of financial investment issued by a corporation, government, or organization
  7. a type of a document guaranteeing the payment of a specific amount of money
  8. banks that are part of the Federal Reserve Systems
  9. exchange one good or service for another good or service
  10. another name for money

20 Clues: another name for moneymoney can be saved and used at a later dateis a security that matures in a year or lessbanks that are part of the Federal Reserve Systemsis a transfer of money from one bank account to anotherexchange one good or service for another good or servicea security that pays interest over terms of ten to thirty years...

Network requirements. 2024-08-07

Network requirements. crossword puzzle
Across
  1. Network is able to perform required functions without failing
  2. Distributing network traffic across many servers to optimize resource use and avoid overload
  3. Network is able to handle an increase in the number of users
  4. The physical or logical arrangement of network devices and connections.
  5. Policies that restrict network access to authorized users often involving authentication
  6. Rules set in place to protect network from attacks
  7. Additional pathways that ensure network availability in case of a failure
  8. Security devices that monitor and control incoming or outgoing network traffic based on security rules
  9. The process of converting data into a coded format to prevent unauthorized access
Down
  1. Techniques used to control network bandwidth to ensure optimal performance
  2. Measurement of a network(in Mbps or Gbps)
  3. Tools used to control network traffic for suspicious activity and take action to prevent or mitigate attacks
  4. The aberration in packet arrival times
  5. Making sure the network meets industry standards related to data handling and privacy
  6. Dividing a network into smaller segments to improve performance and security
  7. A delay in signals being received or sent. Crucial for gaming and video conferences
  8. Manners used to categorizing certain types of traffic to ensure performance of applications
  9. Creating virtual versions of network resources such as servers or switches to optimize flexibility
  10. Different systems and devices working together within a network ensuring a seamless communication
  11. The rate of successful data transfer across a network

20 Clues: The aberration in packet arrival timesMeasurement of a network(in Mbps or Gbps)Rules set in place to protect network from attacksThe rate of successful data transfer across a networkNetwork is able to handle an increase in the number of usersNetwork is able to perform required functions without failing...

Slande Cheridor 2024-12-07

Slande Cheridor crossword puzzle
Across
  1. testers who are paid to probe networks and report vulnerabilities
  2. what the user has (smart card or key)
  3. a server role that makes it possible for administrators to take control of Microsoft product updates
  4. The most widely used method for encrypting data
  5. security features that enable administrators to control who has access to the network
  6. an industry-standard client/server protocol that offers centralized control
  7. security features that enable administrators to control what users can do after they are logged on to the network
  8. used in a Windows domain environment and provides mutual authentication
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
  10. framework for other protocols that provide encryption and authentication
  11. A common tool used by many Linux administrators
  12. a good security enhancement for servers that aren’t physically secure
Down
  1. can be set in the Local Security Policy console found in Administrative Tools
  2. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  3. tool used to delete unneeded files in Windows
  4. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. a unique biometric identifying trait. What the user is
  6. document that describes the rules governing access to an organization’s information resources
  7. creates a barrier between two entities
  8. prevents people from using eavesdropping technology

20 Clues: what the user has (smart card or key)creates a barrier between two entitiestool used to delete unneeded files in WindowsThe most widely used method for encrypting dataA common tool used by many Linux administratorsprevents people from using eavesdropping technologya unique biometric identifying trait. What the user is...

The Global Village 2024-11-12

The Global Village crossword puzzle
Across
  1. the whole world together
  2. quicker
  3. hitting, fighting or calling someone names
  4. less hard or harsh
  5. energy that will never run out
  6. to make fun of someone to hurt them
  7. to do with friendship and relationships
  8. words used to communicate
  9. made by humans, not nature
Down
  1. to make someone angry
  2. making used things into new things
  3. make someone feel sad or worried
  4. something done on the internet
  5. when you end a fight or argument
  6. an accent that is easier to understand than another
  7. fighting with words

16 Clues: quickerless hard or harshfighting with wordsto make someone angrythe whole world togetherwords used to communicatemade by humans, not naturesomething done on the internetenergy that will never run outmake someone feel sad or worriedwhen you end a fight or argumentmaking used things into new thingsto make fun of someone to hurt them...

Cyber Crime 2020-07-05

Cyber Crime crossword puzzle
Across
  1. /phrase used for authenticating a system
  2. / first person to be found guilty of cyber crime
  3. / breaking into your computer without your knowledge or consent
  4. /fake links or fake software
  5. /a type of spyware that records keyboard activities
Down
  1. /large volume of emails sent to the victim for the webserver crash.
  2. /Vital Information Resource under seize
  3. / selling of pirated software through physical media or electronic downloads.
  4. / politically motivated hacking to conduct sabotage and espionage
  5. /a method to promote sextortion

10 Clues: /fake links or fake software/a method to promote sextortion/Vital Information Resource under seize/phrase used for authenticating a system/ first person to be found guilty of cyber crime/a type of spyware that records keyboard activities/ breaking into your computer without your knowledge or consent...

CYBER CROSSWORD 2023-02-13

CYBER CROSSWORD crossword puzzle
Across
  1. Activez l’ ______ multifactorielle sur tous vos appareils quand elle est disponible
  2. Type de cyberattaque qui verrouille vos données et vos appareils
  3. Changez toujours le _______ de passe par défaut de votre réseau domestique
  4. Logiciel malveillant conçu pour avoir accès à vos appareils
  5. Vous devriez utiliser un VPN si vous naviguez sur un réseau Wi-Fi _______
Down
  1. Des mots de passe sécurisés, c’est bien, mais des _______ de passe c’estmieux
  2. Vous devriez______ tous les appareils qui se connectent en ligne
  3. Faites des _____ à jour régulièrement pour sécuriser vos logiciels
  4. Installez un logiciel ______ pour protéger votre ordinateur
  5. ______ criminels

10 Clues: ______ criminelsInstallez un logiciel ______ pour protéger votre ordinateurLogiciel malveillant conçu pour avoir accès à vos appareilsVous devriez______ tous les appareils qui se connectent en ligneType de cyberattaque qui verrouille vos données et vos appareilsFaites des _____ à jour régulièrement pour sécuriser vos logiciels...

Cyber crossword 2022-12-06

Cyber crossword crossword puzzle
Across
  1. The arrangement of the various elements (computers, routers, switches, etc) of a network.
  2. Analyze something without interfering or affecting it.
  3. A computer, typically one on a network.
  4. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
Down
  1. The way an organization structures and organizes the information that is required by their employees and/or customers.
  2. An agreed-upon method for communication.
  3. Typically, the last two elements of a URL. With domain names, organizations can build URLs.
  4. ervice can have two meanings in computer terminology:
  5. A computer that delivers files forming web pages across a network to requesting clients.
  6. A starting point for data analysis. It is the initial data set used in later comparisons.

10 Clues: A computer, typically one on a network.An agreed-upon method for communication.ervice can have two meanings in computer terminology:Analyze something without interfering or affecting it.A computer that delivers files forming web pages across a network to requesting clients....

Cyber Safety 2020-12-17

Cyber Safety crossword puzzle
Across
  1. a duty you have to yourself or others
  2. a secret string of letters, symbols, and numbers that you can use to restrict who can access something digital
  3. the acceptable way of communicating on the internet
  4. a group of people who share the same interests or goals
  5. things having to do with computers or the internet
Down
  1. a worldwide network that connects people using computers, phones, or other devices
  2. a picture you take of of yourself, usually with a phone
  3. different parts of your culture, experiences, and interests that make you unique
  4. a character other than a number or letter, such as #, !, or @.
  5. a name you create to sign into a website, app, or game

10 Clues: a duty you have to yourself or othersthings having to do with computers or the internetthe acceptable way of communicating on the interneta name you create to sign into a website, app, or gamea picture you take of of yourself, usually with a phonea group of people who share the same interests or goals...

Cyber 101 2021-04-15

Cyber 101 crossword puzzle
Across
  1. designed to keep the bad guys out
  2. enables several devices to communicate on the same network
  3. tells a computer to perform a task
  4. I'll never tell
  5. collection of zombie computers
Down
  1. malicious software to wreak havoc
  2. allows cybercriminals to remotely control your computer
  3. remain anonymous by masking the location and encrypting traffic
  4. I see you
  5. denied

10 Clues: deniedI see youI'll never tellcollection of zombie computersmalicious software to wreak havocdesigned to keep the bad guys outtells a computer to perform a taskallows cybercriminals to remotely control your computerenables several devices to communicate on the same networkremain anonymous by masking the location and encrypting traffic

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. the making, altering, use, or possession of a false writing in order to commit a fraud
  2. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  3. The communication via any electronic device of false data that damages a person's reputation
  4. process of converting information into a digital
  5. Business conducted electronically (buying/selling on web)
  6. Web page to summon different elements from diverse pages or servers to create a new Web page
Down
  1. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  2. Using a computer to steal personal data
  3. when someone forcefully takes control of a website by cracking the password and later changing it
  4. Make sure a buyer and seller can identify themselves

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

CYBER LAW 2021-09-04

CYBER LAW crossword puzzle
Across
  1. sending a fake email to steal other people's information
  2. offence where a hacker gains access and control over someone else's website
  3. buying and selling of goods and services over internet
  4. process of recognizing a user's identity
  5. process of displaying a graphic file on one website that originates at another
  6. use of defamatory statement over social networking sites
Down
  1. conversion of information into digital format
  2. selling, registering or using a domain name with an intention of earning profit from someone else's trademark
  3. material alteration of a legal instruments with an intention of doing fraud
  4. using social networking tools and platforms to share and broadcast mottos and messages and to interact with netizens

10 Clues: process of recognizing a user's identityconversion of information into digital formatbuying and selling of goods and services over internetsending a fake email to steal other people's informationuse of defamatory statement over social networking sitesoffence where a hacker gains access and control over someone else's website...

Cyber Crime 2022-11-14

Cyber Crime crossword puzzle
Across
  1. a virus on your computer that is intstalled when you open/download something that harvests your information
  2. when people are contacted and are tricked into giving the scammer money
  3. the first real cyber attack in 1971, it was a virus
  4. the first anti-virus software that hunted down the creeper
  5. stealing other people's identities
Down
  1. connecting a device to your phone so you can secretly listen to other people's calls
  2. making a perfect pitch to confuse a phone to give you a free call
  3. similar to phishing, but it runs a code on your computer, without you clicking a link.
  4. presenting a fake situation to the victim to either get money or information from them
  5. a virus that scammed over 80 million USD from people at a time

10 Clues: stealing other people's identitiesthe first real cyber attack in 1971, it was a virusthe first anti-virus software that hunted down the creepera virus that scammed over 80 million USD from people at a timemaking a perfect pitch to confuse a phone to give you a free callwhen people are contacted and are tricked into giving the scammer money...

Cyber Crime 2022-09-07

Cyber Crime crossword puzzle
Across
  1. redirects you to bad website
  2. someone who tests secure sites
  3. uses email to trick you
  4. reliable website has this in url line
  5. information about who you are
  6. produce 80% damage
Down
  1. deep technical skills
  2. wannabe hacker
  3. promise of goods is never made
  4. to steal something

10 Clues: wannabe hackerto steal somethingproduce 80% damagedeep technical skillsuses email to trick youredirects you to bad websiteinformation about who you aresomeone who tests secure sitespromise of goods is never madereliable website has this in url line

Cyber Mobbing 2019-05-03

Cyber Mobbing crossword puzzle
Across
  1. Belästigung im …
  2. Was solltest du machen wenn dich eine Person belästigt?
  3. Mit welcher Person solltest du als erstes reden?
  4. Belästigung im Internet
  5. Meist wir aus "Spaß" und … gemobbt!
  6. nicht gewollt
Down
  1. hinter einem stehen
  2. Verrate niemals deine persönlichen …
  3. Person die andere Menschen Belästigt
  4. Bei wem kannst du die Belästigung einer Person melden?

10 Clues: nicht gewolltBelästigung im …hinter einem stehenBelästigung im InternetMeist wir aus "Spaß" und … gemobbt!Verrate niemals deine persönlichen …Person die andere Menschen BelästigtMit welcher Person solltest du als erstes reden?Bei wem kannst du die Belästigung einer Person melden?Was solltest du machen wenn dich eine Person belästigt?

CYBER SAFTY 2019-09-24

CYBER SAFTY crossword puzzle
Across
  1. trying to break into computer system
  2. being harassed or threatened online
  3. flag feeling when you feel in danger or in pain by what someone did
  4. someone who intentionally and illegally hacks into another person's system to obtain information
  5. protection for your computer
Down
  1. something you shouldn't give online.
  2. software protecting computers from danger
  3. being pursed by someone online trough social media
  4. someone who has knowledge on programing and on computers
  5. sending a fake e-mail to get others personal information

10 Clues: protection for your computerbeing harassed or threatened onlinesomething you shouldn't give online.trying to break into computer systemsoftware protecting computers from dangerbeing pursed by someone online trough social mediasomeone who has knowledge on programing and on computerssending a fake e-mail to get others personal information...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Talking someone into revealing secrets or embarrassing information, then sharing it online
  2. intentionally or cruelly excluding someone from an online group
  3. a disease that spreads through the computer
  4. sharing someone secrets or embarassing info
  5. Repeated, intense harassment that includes threats or creates significant fear.
Down
  1. Using someones work without their permission
  2. Repeated mean, rude and insulting
  3. Online messages with angry language
  4. Bullying Online
  5. Theft When someone steals another Persons identity

10 Clues: Bullying OnlineRepeated mean, rude and insultingOnline messages with angry languagea disease that spreads through the computersharing someone secrets or embarassing infoUsing someones work without their permissionTheft When someone steals another Persons identityintentionally or cruelly excluding someone from an online group...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. stalking repeated intense harrasment
  2. to share someone else secerets or information ofimages online
  3. pretending to be someone or posting vidoes online to get them introuble
  4. to trick someone to reveal secrets or embarrisingInfromation online
  5. means to diss someone or spread rumors.
Down
  1. intentionally and cruely exculuding someone froman online group
  2. theft means to stels someones identity
  3. means to send mean or insulting messages.
  4. means to use angry and vulgar launage online
  5. denigration that includes threats and significant fear

10 Clues: stalking repeated intense harrasmenttheft means to stels someones identitymeans to diss someone or spread rumors.means to send mean or insulting messages.means to use angry and vulgar launage onlinedenigration that includes threats and significant fearto share someone else secerets or information ofimages online...

CYBER SAFTEY 2023-05-18

CYBER SAFTEY crossword puzzle
Across
  1. LIKE A HUMAN VIRUS BUT FPR COMPUTERS
  2. YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
  3. IT IS WHAT IS YOURS
  4. WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.
  5. KEEPS EVERYTHING OF YOURS SAFE
Down
  1. ONLINE BULLYING
  2. WHEN PEOPLE BOTHER YOU OVER AND OVER
  3. HAPPENS TO KIDS ALL AROUND THE WORLD
  4. STALKING PEOPLE ONLINE
  5. USE THEM TO KEEP ONLINE THINGS SAFE

10 Clues: ONLINE BULLYINGIT IS WHAT IS YOURSSTALKING PEOPLE ONLINEKEEPS EVERYTHING OF YOURS SAFEUSE THEM TO KEEP ONLINE THINGS SAFEWHEN PEOPLE BOTHER YOU OVER AND OVERLIKE A HUMAN VIRUS BUT FPR COMPUTERSHAPPENS TO KIDS ALL AROUND THE WORLDWHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU

CYBER ATTACK 2024-01-22

CYBER ATTACK crossword puzzle
Across
  1. to put at the disposal of; furnish or supply
  2. to gain unauthorized access to another computer system
  3. to stop something from happening or someone from doing something
  4. deliberate publication of private information for personal or corporate interest
Down
  1. in addition
  2. fabricated or deliberately manipulated audio or visual content
  3. observe and check the progress or quality of
  4. to regard as probable or likely; anticipate
  5. unintentional mistakes suh as inaccurate dates, statistics
  6. serve as evidence or proof that something exists or is the case

10 Clues: in additionto regard as probable or likely; anticipateto put at the disposal of; furnish or supplyobserve and check the progress or quality ofto gain unauthorized access to another computer systemunintentional mistakes suh as inaccurate dates, statisticsfabricated or deliberately manipulated audio or visual content...

CYBER ATTACK 2024-01-22

CYBER ATTACK crossword puzzle
Across
  1. to put at the disposal of; furnish or supply
  2. to gain unauthorized access to another computer system
  3. to stop something from happening or someone from doing something
  4. deliberate publication of private information for personal or corporate interest
Down
  1. in addition
  2. fabricated or deliberately manipulated audio or visual content
  3. observe and check the progress or quality of
  4. to regard as probable or likely; anticipate
  5. unintentional mistakes suh as inaccurate dates, statistics
  6. serve as evidence or proof that something exists or is the case

10 Clues: in additionto regard as probable or likely; anticipateto put at the disposal of; furnish or supplyobserve and check the progress or quality ofto gain unauthorized access to another computer systemunintentional mistakes suh as inaccurate dates, statisticsfabricated or deliberately manipulated audio or visual content...

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

Cyber Month! 2023-09-19

Cyber Month! crossword puzzle
Across
  1. Name of the person who knows a lot about Big Risk because he IS a Big Risk
  2. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
  3. Animal you played during last week's Knowbe4 training
  4. Password storing software available to CAMPUS employees
  5. it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
  6. Clearly the best type of ice cream, don't argue
Down
  1. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
  2. The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
  3. A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
  4. secret combination of characters, numbers, or symbols that you use to access something

10 Clues: Clearly the best type of ice cream, don't argueAnimal you played during last week's Knowbe4 trainingPassword storing software available to CAMPUS employeesName of the person who knows a lot about Big Risk because he IS a Big Risksecret combination of characters, numbers, or symbols that you use to access something...

Cyber Safety 2024-06-24

Cyber Safety crossword puzzle
Across
  1. Being tracked or followed online which makes you feel uncomfortable
  2. Online apps focused on communication eg.snapchat,tiktok
  3. someone who is repeatedly mean to someone online
  4. Faking an online identity to manipulate others
  5. Spending too much time on online gaming
Down
  1. online devices eg phone,ipad
  2. somewhere you can go if you need help
  3. Being safe online
  4. When someone tries to steal your identity
  5. A romantic relationship with someone online

10 Clues: Being safe onlineonline devices eg phone,ipadsomewhere you can go if you need helpSpending too much time on online gamingWhen someone tries to steal your identityA romantic relationship with someone onlineFaking an online identity to manipulate otherssomeone who is repeatedly mean to someone online...

Cyber crossword 2024-06-01

Cyber crossword crossword puzzle
Across
  1. |Email indesiderata che spesso contiene pubblicità o truffe.
  2. |Una copia di sicurezza dei file importanti.
  3. |Un programma dannoso che può infettare un computer.
  4. |Un programma che protegge il computer bloccando i cattivi accessi.
  5. |Una persona che cerca di entrare nei computer senza permesso.
Down
  1. |Software dannoso progettato per danneggiare il computer.
  2. |Un messaggio inviato da un computer a un altro attraverso internet.
  3. |Una parola segreta usata per accedere a un computer o a un sito web.
  4. |Un miglioramento o correzione per un programma del computer.
  5. |Un trucco per ottenere informazioni personali come password e numeri di carta di credito.

10 Clues: |Una copia di sicurezza dei file importanti.|Un programma dannoso che può infettare un computer.|Software dannoso progettato per danneggiare il computer.|Email indesiderata che spesso contiene pubblicità o truffe.|Un miglioramento o correzione per un programma del computer.|Una persona che cerca di entrare nei computer senza permesso....

Cyber Crossword 2024-10-24

Cyber Crossword crossword puzzle
Across
  1. A tool that helps block unauthorized access to networks.
  2. Software that collects data from your device without consent.
  3. Verifying your identity, often with passwords or biometrics.
  4. False information spread to deceive or manipulate people.
Down
  1. Malicious software that harms devices or steals data.
  2. Encoding data to keep it secure from unauthorized access.
  3. Your login details needed to access accounts.
  4. Information that must be protected from unauthorized access.
  5. An incident where data is accessed without permission.
  6. A deceptive attempt to steal personal data through fake emails or SMS.

10 Clues: Your login details needed to access accounts.Malicious software that harms devices or steals data.An incident where data is accessed without permission.A tool that helps block unauthorized access to networks.Encoding data to keep it secure from unauthorized access.False information spread to deceive or manipulate people....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. to help someone
  2. someone hurting someone else
  3. hurtful person
  4. something you go on
  5. Hacking
  6. looking out for someone
Down
  1. something you use in everyday life
  2. knowing your on a device
  3. hurting someone online
  4. mentally attacking someone

10 Clues: Hackinghurtful personto help someonesomething you go onhurting someone onlinelooking out for someoneknowing your on a devicementally attacking someonesomeone hurting someone elsesomething you use in everyday life

Cyber Ehics 2025-06-16

Cyber Ehics crossword puzzle
Across
  1. simplest way to prevent plagiarism
  2. criminal activities
  3. malicious software
  4. unwanted bulk emails
  5. set of programs that disrupts the functioning
  6. sending bulk emails till the server gets full
  7. combination of voice and phishing
Down
  1. a security system that prevents unauthorisation
  2. legal rules for online users
  3. hacking done for a good cause

10 Clues: malicious softwarecriminal activitiesunwanted bulk emailslegal rules for online usershacking done for a good causecombination of voice and phishingsimplest way to prevent plagiarismset of programs that disrupts the functioningsending bulk emails till the server gets fulla security system that prevents unauthorisation

Cyber Ethics 2025-06-16

Cyber Ethics crossword puzzle
Across
  1. a simple way of preventing plagiarism
  2. criminal activities
  3. malicious software
  4. unwanted bulk emails
  5. a set of programs that disrupts the functioning
  6. sending bulk emails until the server gets full
  7. combination of voice and phishing
Down
  1. a security system that prevents un authorisation
  2. rules for online users
  3. hacking done for a good cause

10 Clues: malicious softwarecriminal activitiesunwanted bulk emailsrules for online usershacking done for a good causecombination of voice and phishinga simple way of preventing plagiarismsending bulk emails until the server gets fulla set of programs that disrupts the functioninga security system that prevents un authorisation

Cyber Ethics 2025-06-06

Cyber Ethics crossword puzzle
Across
  1. Unwanted bulk emails from unknown sources
  2. Behaving responsibly and ethically on the internet
  3. Legal term for ownership of creative work
  4. Illegally accessing a computer system
  5. Legal rights over creations of the mind
Down
  1. Copying someone’s work and calling it your own
  2. The trace a person leaves online.
  3. Right to control information about yourself
  4. 💻 Moral principles for using computers and the internet
  5. Copying and using software illegally

10 Clues: The trace a person leaves online.Copying and using software illegallyIllegally accessing a computer systemLegal rights over creations of the mindUnwanted bulk emails from unknown sourcesLegal term for ownership of creative workRight to control information about yourselfCopying someone’s work and calling it your own...

Cyber Search 2025-06-24

Cyber Search crossword puzzle
Across
  1. Impersonation attack on the web
  2. System‑weakness hunt
  3. Network barrier that screens traffic
  4. Scrambling data for secrecy
Down
  1. Process of identity verification
  2. Malicious code demanding money
  3. Fake‑site fraud to steal data
  4. Virus‑killing program
  5. Unintentional human error causing breach
  6. Secret string for access

10 Clues: System‑weakness huntVirus‑killing programSecret string for accessScrambling data for secrecyFake‑site fraud to steal dataMalicious code demanding moneyImpersonation attack on the webProcess of identity verificationNetwork barrier that screens trafficUnintentional human error causing breach

Cyber Ethics 2025-05-21

Cyber Ethics crossword puzzle
Across
  1. ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic.
  2. ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software that blocks access to a computer system or data until a sum of money is paid.
  3. ㅤㅤㅤㅤ ㅤㅤㅤ A scam attempting to acquire sensitive information by masquerading as a trustworthy entity.
  4. ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.
  5. ㅤㅤㅤㅤ ㅤㅤㅤ The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  6. password ㅤㅤㅤㅤ A combination of uppercase and lowercase letters, numbers, and symbols, difficult to guess.
Down
  1. ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.
  3. ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.
  4. ㅤㅤㅤㅤ ㅤㅤㅤ The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something.

10 Clues: ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic....

Cyber Crossword 2025-10-21

Cyber Crossword crossword puzzle
Across
  1. Data leak
  2. To encrypt data
  3. Phishing
  4. Attack
Down
  1. The practice of protecting systems
  2. Protects computers from unauthorized access
  3. Protection
  4. Person who breaks into systems
  5. To report a scam
  6. Password

10 Clues: AttackPasswordPhishingData leakProtectionTo encrypt dataTo report a scamPerson who breaks into systemsThe practice of protecting systemsProtects computers from unauthorized access

Chapter 8 & 9 Vocabulary 2013-04-01

Chapter 8 & 9 Vocabulary crossword puzzle
Across
  1. President may not legally hold office and can exercise power as if he were president
  2. top officials, advisors, and administrators of large bureaucracies appointed by the President
  3. Succession- president after current one
  4. appointment to political office
  5. Security Advisors- a special assistant for national security affairs
  6. votes of each State
  7. postponement of legal punishment
  8. president puts aside or refuses to spend, money congress put aside for a specific purpose
  9. group pardon for an offense against government
  10. voters of electoral vote (congress)
  11. delivery disclosed information
Down
  1. formal agreements between the government of two or more countries
  2. salary determined by congress
  3. medium for discussion
  4. privilege- the right of the president and other high ranking officials to refuse to provide information
  5. release from legal punishment
  6. expressed will of people
  7. Security- one of the Presidents top assistants who is in charge of Media Relations.
  8. Clearance- also reviews all legislature proposals executive agencies prepare

19 Clues: votes of each Statemedium for discussionexpressed will of peoplesalary determined by congressrelease from legal punishmentdelivery disclosed informationappointment to political officepostponement of legal punishmentvoters of electoral vote (congress)Succession- president after current onegroup pardon for an offense against government...

airport terminology 2019-02-28

airport terminology crossword puzzle
Across
  1. its only accessible to passengers who are travelling
  2. a persons belongings that have to be checked in
  3. a series of actions conducted in a certain manner
  4. you need to declare these goods to be able to bring them into the country
  5. something that's required to be used for a specific purpose eg toilets or smoking areas
  6. carry on bag
  7. the area before you pass through security
  8. require international passengers to complete a departure card and show passport before entry
  9. arriving in a country on a plane
  10. helping someone with their needs
Down
  1. leaving the airport in the plane
  2. prevents potential risks from international trade and travel
  3. place to obtain boarding pass
  4. a compulsory need for eligibility
  5. you cannot bring these into the country without a permit
  6. screens passengers and their baggage
  7. a place to purchase items without tax or gst
  8. location where aviation transport takes off and lands
  9. passengers purchase their tickets, transfer their luggage and go through security

19 Clues: carry on bagplace to obtain boarding passleaving the airport in the planearriving in a country on a planehelping someone with their needsa compulsory need for eligibilityscreens passengers and their baggagethe area before you pass through securitya place to purchase items without tax or gsta persons belongings that have to be checked in...

Infant Safety/Abduction 2023-02-24

Infant Safety/Abduction crossword puzzle
Across
  1. Call Security STAT
  2. Gender
  3. Baby ID band spot
  4. Mom & Dad
  5. Infant security measure
  6. Watch out
Down
  1. Tiniest patient
  2. Emergency formerly known as
  3. # still not found
  4. Opposite of pro-active
  5. Mom's loving hug
  6. Check the contents

12 Clues: GenderMom & DadWatch outTiniest patientMom's loving hug# still not foundBaby ID band spotCall Security STATCheck the contentsOpposite of pro-activeInfant security measureEmergency formerly known as

Week 16 puzzle 2022-03-24

Week 16 puzzle crossword puzzle
Across
  1. shortened form of malicious software
  2. very cruel _ _ _ _ A L
  3. describes good gardener, a green _ _ _ _ _
  4. to divide, p _ _ _ _ I Z E
  5. word used in question about possession
  6. digital currency, _ _ _ _ _ _ CURRENCY
Down
  1. fraud to steal someone's money
  2. idiom:understanding of something unclear
  3. idiom: lots of 'paperwork', bureaucracy
  4. online 'attack' _ _ _ _ _ W A R
  5. idiom: surprise, out of the _ _ _ _
  6. phrase used in a culture,not literal

12 Clues: very cruel _ _ _ _ A Lto divide, p _ _ _ _ I Z Efraud to steal someone's moneyonline 'attack' _ _ _ _ _ W A Ridiom: surprise, out of the _ _ _ _shortened form of malicious softwarephrase used in a culture,not literalword used in question about possessiondigital currency, _ _ _ _ _ _ CURRENCYidiom: lots of 'paperwork', bureaucracy...

puzzle 2023-07-15

puzzle crossword puzzle
Across
  1. Has a trunk
  2. which one is first web browser invented is 1990?
  3. what is short from of star cyber secure user?
  4. Flying mammal
  5. where is iant regional office?
  6. what is collection of facts and figures?
  7. Man's best friend
Down
  1. how many digit enter the password?
  2. what is used to secure our phone?
  3. an open source operating system?
  4. Likes to chase mice
  5. Large marsupial

12 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase micewhere is iant regional office?an open source operating system?what is used to secure our phone?how many digit enter the password?what is collection of facts and figures?what is short from of star cyber secure user?which one is first web browser invented is 1990?

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. internet tindakan kriminal yang dilakukan melalui internet (14h)
  2. perbuatan menyebar informasi yang merugikan orang lain (18h)
  3. tindakan menyebar informasi yang salah secara sengaja (14h)
  4. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  5. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  6. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  8. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  9. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  10. penyebaran informasi palsu yang meluas (4 huruf)
  11. aturan dan norma berperilaku baik di media sosial (11 h)
  12. pencurian hak cipta (11 h)
  13. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  14. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  15. perbuatan melanggar hukum didunia maya (10 huruf)
  16. program kecil yang dapat merusak sistem komputer (5 huruf)
  17. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
  1. informasi yang mengidentifikasi seseorang secara unik (12h)
  2. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  3. peraturan yang melindungi data pribadi (16h)
  4. menjaga keamanan data pribadi di internet (13h)
  5. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  6. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  7. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  9. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  10. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  11. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  12. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  13. perilaku tidak sopan/kasar didunia maya (10 h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

coding club 2022-12-02

coding club crossword puzzle
Across
  1. the main security
  2. the do nothing guy
  3. the retiree
  4. whats the maskot
  5. the cfo/assintant security
  6. our lead supervisor
Down
  1. one of the activities
  2. the coo
  3. the ceo
  4. what we code on
  5. the clubs best coder
  6. the clubs name
  7. the classroom we code in

13 Clues: the coothe ceothe retireethe clubs namewhat we code onwhats the maskotthe main securitythe do nothing guyour lead supervisorthe clubs best coderone of the activitiesthe classroom we code inthe cfo/assintant security

Security meeting 2021-08-31

Security meeting crossword puzzle
Across
  1. the best of the H&M departments
  2. It's used to fight against fire.
  3. It's used for employee to create and improve awareness and knowledge.
  4. It's used to align the company commitment and company principles.
  5. Those are used to identify or highlight a security/emergency equipment.
Down
  1. It will be a problem if a lack of_ exist.
  2. It's a situation where it's necessary to react quickly.
  3. It's used to measure the security compliance level.
  4. it's a situation where you have to put yourself secure.
  5. It affects all around the world.
  6. We have to be prepared to manage it, creating clear routines and guidelines also training for employees.

11 Clues: the best of the H&M departmentsIt's used to fight against fire.It affects all around the world.It will be a problem if a lack of_ exist.It's used to measure the security compliance level.It's a situation where it's necessary to react quickly.it's a situation where you have to put yourself secure....

Security Guide 2021-09-10

Security Guide crossword puzzle
Across
  1. checklist used during bomb threat call
  2. Where do we find the security guide?
  3. How should we remain during a robbery?
  4. Member's information is always kept "________"
  5. # of Months pass to replace all-clear (non-numerical)
Down
  1. "Hi can I speak to __________?"
  2. Sym duress code
  3. where do we meet in emergencies?
  4. Item inside vault box
  5. Fabric Item inside vault box
  6. money kept inside drawer at all times

11 Clues: Sym duress codeItem inside vault boxFabric Item inside vault box"Hi can I speak to __________?"where do we meet in emergencies?Where do we find the security guide?money kept inside drawer at all timeschecklist used during bomb threat callHow should we remain during a robbery?Member's information is always kept "________"...

Network Security 2024-01-30

Network Security crossword puzzle
Across
  1. these are attached to a document or spreadsheet and use the macro/ scripting function
  2. this is a self-replicating computer program
  3. regular backups should be made so data can be ___________
  4. these will lie dormant until a specific piece of program code is activated
Down
  1. these are assigned to each user to ensure they may only access certain files
  2. word to describe programs that can steal/ alter data
  3. passwords can be guessed as users _____ passwords
  4. these will prevent unauthorised access to data
  5. where a user can take a copy of a file it is ____ & ____ access
  6. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
  7. these replicate without the use of a host file

11 Clues: this is a self-replicating computer programthese will prevent unauthorised access to datathese replicate without the use of a host filepasswords can be guessed as users _____ passwordsword to describe programs that can steal/ alter dataregular backups should be made so data can be ___________...

Food Security 2024-02-05

Food Security crossword puzzle
Across
  1. State with most food insecure people
  2. The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is
  3. Most devastating famine faced by India
  4. The price at which foodgrains are distributed in the deficit areas and among the poor strata of the society.
  5. Antyodaya card is meant for people below
Down
  1. Who emphasized access to food security?
  2. co-operative societies working in Dehli
  3. Which government organisation buys foodgrains from the farmers and supplies to the fair price shops?
  4. A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as
  5. co-operative societies working in Gujrat
  6. The acronym for government program ensuring food security

11 Clues: State with most food insecure peopleMost devastating famine faced by IndiaWho emphasized access to food security?co-operative societies working in Dehlico-operative societies working in GujratAntyodaya card is meant for people belowThe acronym for government program ensuring food security...

Network Security 2022-08-03

Network Security crossword puzzle
Across
  1. This decides what areas of the network you can access. For example, you have full access to your home drive (documents area), but you can only read some documents on the classwork area. There are some drives you can't even see (3 words)
  2. The method for encrypting the plaintext (2 words)
  3. Provides extra security for the word or term used to log on. Some companies insist this word must include letters, number, symbols and be at least 8 characters long (2 words)
  4. A network security device that monitors incoming and outgoing network traffic and decides whether to allow it or block it (1 word)
  5. A sequence of numbers used to encrypt or decrypt, often using a mathematical formula (1 word)
  6. The encrypted message (1 word)
  7. The original message to be encrypted (1 word)
Down
  1. A way of identifying if the user trying to access the system is genuine and authorised
  2. A method to determine which devices are allowed to access the network (1 word)
  3. The process of converting cyphertext into plaintext (1 word)
  4. The process of converting plaintext into ciphertext (1 word)

11 Clues: The encrypted message (1 word)The original message to be encrypted (1 word)The method for encrypting the plaintext (2 words)The process of converting cyphertext into plaintext (1 word)The process of converting plaintext into ciphertext (1 word)A method to determine which devices are allowed to access the network (1 word)...

Security Crosswords 2022-10-27

Security Crosswords crossword puzzle
Across
  1. Test which verifies that unexpected input cannot affect the system in an unpredictable way.
  2. A set of measures to be taken to protect our product.
  3. A process used by the software industry to design, develop and test high quality software.
  4. Person who uses their technical computer skill to breach computer system.
  5. Reactive approach used in Nokia to build secure product.
  6. Designing a new product or defining a new software, the three security elements shall always be considered: Confidentiality, Integrity, and Availability
Down
  1. Process which has it's own phases that run in parallel with SDLC phases
  2. design for security.
  3. Nokia has a process for developing secure products and systems.
  4. Attacker sends a bogus requests to exhaust system resources.
  5. Proactive process used in Nokia to build secure product.
  6. User require to enter multiple credentials for login.

12 Clues: design for security.A set of measures to be taken to protect our product.User require to enter multiple credentials for login.Proactive process used in Nokia to build secure product.Reactive approach used in Nokia to build secure product.Attacker sends a bogus requests to exhaust system resources....

IT SECURITY 2022-10-27

IT SECURITY crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. network security device that monitors and filters incoming and outgoing network traffic
  7. good privacy an open source and freely available software package for email security
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. The conversion of encrypted data into its original form
  3. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

11 Clues: The conversion of encrypted data into its original formgood privacy an open source and freely available software package for email securitynetwork security device that monitors and filters incoming and outgoing network trafficsoftware that is designed to disrupt, damage, or gain unauthorized access to a computer system....

Business Security 2024-06-10

Business Security crossword puzzle
Across
  1. Process to void a lost or stolen check
  2. Initials of state agency to recover expired money owed to someone
  3. What this unit is responsible for detecting daily
  4. Type of check that goes out when a lost check affidavit is received
  5. Something that occurs when a lost check is cashed for example
Down
  1. State of Oregon bank
  2. ___ checks must be entered into the SinglePoint system in order for the recipient to cash them.
  3. annual process to expire checks greater than 2 years old
  4. The name synonomous with the crossword title
  5. Type of checks field offices use for emergencies
  6. Payment ___ are set to flag cancelled checks to avoid overpayments

11 Clues: State of Oregon bankProcess to void a lost or stolen checkThe name synonomous with the crossword titleType of checks field offices use for emergenciesWhat this unit is responsible for detecting dailyannual process to expire checks greater than 2 years oldSomething that occurs when a lost check is cashed for example...

FOOD SECURITY 2024-12-17

FOOD SECURITY crossword puzzle
Across
  1. what is a green vegetable that is good for eyes ?
  2. What is the name of the fruit that is yellow, round, and grows on a tree?
  3. Which vegetable is white, long, and we use it to make mashed potatoes?
  4. Which vegetable is green, leafy, and we use it to make pesto?
  5. Which vegetable is red, round, and we use it to make tomato sauce?
Down
  1. What is the name of the fruit that is green, bumpy, and has small black seeds?
  2. what do you eat drink that comes from cow and colour is white ?
  3. what is green and crunchy that can eat in a salad ?
  4. What is the name of the fruit that is yellow, oval-shaped, and grows on a tree?
  5. which is orange colour and use in salad ?
  6. What is the name of the fruit that is purple, oval-shaped, and has a stone inside?

11 Clues: which is orange colour and use in salad ?what is a green vegetable that is good for eyes ?what is green and crunchy that can eat in a salad ?Which vegetable is green, leafy, and we use it to make pesto?what do you eat drink that comes from cow and colour is white ?Which vegetable is red, round, and we use it to make tomato sauce?...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. A type of climate event that causes a long period without rain, making hard to grow food
  2. a yellow fruit that monkeys love to eat
  3. A problem that happens when people dont get enough food to eat
  4. This is used to grow plants and crops. It is found in gardens and fields
  5. A small insect that damages crops and reduces food supply
  6. the process of growing food without using harmful chemicals
Down
  1. a place where fruits, vegetables, or grains are planted and harvested
  2. A major food crop grown in field, often used to make bread
  3. A nut that is good for heart and brain
  4. This system is used to bring water to crops in dry areas
  5. The word that means enough food for everyone to stay healthy and strong

11 Clues: A nut that is good for heart and braina yellow fruit that monkeys love to eatThis system is used to bring water to crops in dry areasA small insect that damages crops and reduces food supplyA major food crop grown in field, often used to make breadthe process of growing food without using harmful chemicals...

hello 2025-06-11

hello crossword puzzle
Across
  1. Unité de base d’une image numérique
  2. Intelligence Artificielle
  3. L’acte d’observer des activités ou un lieu
  4. Simulation perçue comme réalité
  5. Le premier film du genre cyber-punk
  6. Graphisme sans perte de qualité
  7. Commande pour annuler une action
Down
  1. Nom principale de l’affiche à la page 87
  2. L’action d’accéder illégalement à un système
  3. Code malveillant qui infecte et altère les systèmes
  4. groupe musique
  5. L’abréviation de Portable Document Format
  6. Bug visuel, effet prisé en design
  7. Lumière vive typique des villes futurists
  8. Temps à venir, souvent inquiétant ici
  9. Moitié Homme, Moitié Robot

16 Clues: groupe musiqueIntelligence ArtificielleMoitié Homme, Moitié RobotSimulation perçue comme réalitéGraphisme sans perte de qualitéCommande pour annuler une actionBug visuel, effet prisé en designUnité de base d’une image numériqueLe premier film du genre cyber-punkTemps à venir, souvent inquiétant iciNom principale de l’affiche à la page 87...

Casino 2024-02-29

Casino crossword puzzle
Across
  1. team, who fills Kiosk
  2. What color is the security thread in a 100
  3. currency is made of linen and
  4. Card for veterans
  5. Finance Director
  6. who's portrait is on a 20 dollar bill
  7. eyes in the sky
  8. 21
  9. one arm bandit
Down
  1. provides an escort
  2. Fake currency
  3. Coin counter
  4. Highest Card Status
  5. one of four service drivers
  6. Another name for ATM
  7. what color is a 10's strap

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skyFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMteam, who fills Kioskwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

The Department of Homeland Security Crossword 2024-12-09

The Department of Homeland Security Crossword crossword puzzle
Across
  1. The main mission of DHS is to stop this threat.
  2. CISA, stands for ___________ and Infrastructure Security Agency.
  3. ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
  4. DHS operates at the ______ level.
  5. One weakness of the DHS is the __________ jurisdiction.
  6. The DHS Oversees ______ security and lawful immigration.
Down
  1. One of the DHS agencies.
  2. The person who appoints the Secretary of Homeland Security.
  3. DHS works to help communities recover through ________.
  4. The DHS is the newest _______-level department.

10 Clues: One of the DHS agencies.DHS operates at the ______ level.The main mission of DHS is to stop this threat.The DHS is the newest _______-level department.DHS works to help communities recover through ________.One weakness of the DHS is the __________ jurisdiction.The DHS Oversees ______ security and lawful immigration....

SOUTH SLP SAW'23 2023-09-20

SOUTH SLP SAW'23 crossword puzzle
Across
  1. Facilitating anyone's entry/exit known as ------.
  2. --------is an official repository of critical information and resources with regard to a site.
  3. --------is the web-based application to digitize various registers used to capture data by SLP team in physical form at each site.
  4. All amazon vehicles should be checked by security as per the -------.
  5. --------allows you to link the physical alerts generated by Access Control Devices (Lenel) and pushes them to Milestone VMS.
  6. --------replaced rightcrowd for all Operation Sites globally.
  7. "If you see something,say something" Report all-------to security or managers.
  8. If you believe an incident has occurred that impacts life safety, operations, or the Amazon brand------should be notified.
  9. --------is defined as a spectrum of behaviors including acts of intentional or targeted violence, threats, and other conduct that generates a reasonable concern for future violence that threatens safety within the workplace.
  10. Stay --------and always be on the lookout for security incidents.
Down
  1. -------- is a search engine for AMZL operations.
  2. Never share your------to anyone.
  3. In the event of an emergency evacuation, security should not conduct -------.
  4. Amazon data should be kept under------classification.
  5. --------is used for masking/unmasking the alarm.
  6. --------is a one stop solution for AMZL recommended financial recovery.

16 Clues: Never share your------to anyone.-------- is a search engine for AMZL operations.--------is used for masking/unmasking the alarm.Facilitating anyone's entry/exit known as ------.Amazon data should be kept under------classification.--------replaced rightcrowd for all Operation Sites globally....

Jargon 4: Revenge of the Kev 2023-09-06

Jargon 4: Revenge of the Kev crossword puzzle
Across
  1. Security protocol used in wifi networks that offers greater protection through data encryption
  2. process of encoding information to a unrecognizable form.
  3. Part of an application that performs a task not apparent to the user
  4. A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
  5. document sent with an email message
  6. Basic unit of information in computing.
  7. load and initialize the operating system on a computer
Down
  1. Physical place where a computer stores information, also known as its HDD.
  2. Network security system that monitors and controls incoming and outgoing traffic
  3. Hardware or Software component that stores data so future requests can be served faster
  4. a set of computers sharing resources located on a node
  5. application that provides a way to look at and interact with information on the Internet
  6. any goal-oriented activity requiring computer machinery
  7. Small blocks of data created by a web server while browsing a website

14 Clues: document sent with an email messageBasic unit of information in computing.a set of computers sharing resources located on a nodeload and initialize the operating system on a computerany goal-oriented activity requiring computer machineryprocess of encoding information to a unrecognizable form....

Vyper Language 2025-07-31

Vyper Language crossword puzzle
Across
  1. Interface that lets other applications interact with smart contracts
  2. A key blockchain feature — cannot be changed once deployed
  3. The unit of computation cost on Ethereum
  4. A piece of code that runs on Ethereum
  5. A system without a central authority
  6. Pythonic smart contract language focused on security
Down
  1. Where users and contracts live on the blockchain
  2. A thorough security check of a smart contract
  3. The syntax style that Vyper is inspired by
  4. The top priority in Vyper design philosophy
  5. Used in Vyper for error-checking
  6. A digital asset created on a blockchain
  7. Blockchain platform where Vyper contracts are deployed

13 Clues: Used in Vyper for error-checkingA system without a central authorityA piece of code that runs on EthereumA digital asset created on a blockchainThe unit of computation cost on EthereumThe syntax style that Vyper is inspired byThe top priority in Vyper design philosophyA thorough security check of a smart contract...

Employment Vocabulary 2022-09-02

Employment Vocabulary crossword puzzle
Across
  1. How an employer pays an employee who is not salary.
  2. Considered working 40 hours per week.
  3. Form a potential employee fills out to obtain a job.
  4. Paid vacation and paid sick time.
  5. How many digits your Social Security number is.
  6. Social Security and Medicare rates are expressed as this.
  7. The largest health insurance program for people 65 and older.
  8. 24 paychecks per year.
Down
  1. A benefit for employees that helps cover health, life, and disability.
  2. When a worker stops working permanently.
  3. Medicare and Social Security combined.
  4. Another word for commission.
  5. A job that receives royalties.

13 Clues: 24 paychecks per year.Another word for commission.A job that receives royalties.Paid vacation and paid sick time.Considered working 40 hours per week.Medicare and Social Security combined.When a worker stops working permanently.How many digits your Social Security number is.How an employer pays an employee who is not salary....

Jared's Crossword, 2 2014-04-23

Jared's Crossword, 2 crossword puzzle
Across
  1. service with instruction
  2. bullying threw electronic means
  3. social and academic learning
  4. cruel, or physical harm
Down
  1. a sense of common purpose
  2. classroom environment
  3. unwanted sexual advances
  4. with instruction and reflection

8 Clues: classroom environmentcruel, or physical harmservice with instructionunwanted sexual advancesa sense of common purposesocial and academic learningbullying threw electronic meanswith instruction and reflection

Life Skill 2023-07-20

Life Skill crossword puzzle
Across
  1. the way it is organised
  2. path in which a person going
  3. use time wisely
  4. involving computer networks
Down
  1. exchanging information between two people
  2. manners respecting each other
  3. bad for your health
  4. very useful

8 Clues: very usefuluse time wiselybad for your healththe way it is organisedinvolving computer networkspath in which a person goingmanners respecting each otherexchanging information between two people

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. When a computer calls out to another computer to see if it is active.
  2. Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
  3. Free software that can be downloaded from the internet.
  4. A computer that has been hacked into and is used to launch malicious attacks
  5. Buying products on the Internet using credit cards or other electronic payments
  6. A type of malware that spies on what you do on the internet and can steal information about you
  7. Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
  1. From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
  2. Small text files that websites save in your web browser to store information like your username and password.
  3. Marking something or someone as suspicious or inappropriate.
  4. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  5. The internet version of Junk mail
  6. Short for Random Access Memory
  7. The last part of a URL eg;.gov .com
  8. A name you use to identify yourself on a computer or website.

15 Clues: Short for Random Access MemoryThe internet version of Junk mailThe last part of a URL eg;.gov .comFree software that can be downloaded from the internet.Marking something or someone as suspicious or inappropriate.A name you use to identify yourself on a computer or website.When a computer calls out to another computer to see if it is active....

Cyber Cross-Word 2022-05-19

Cyber Cross-Word crossword puzzle
Across
  1. secret - cb5ceb103977f1271d0763ac75fcd8e9
  2. firewall keeps track of com sessions
  3. packet analyzer
  4. software/hardware that creates/runs VM
  5. type of AV-based thats unusual for the user
  6. software that displays unwanted ad
  7. SIEM tool that enable to search, analyze...
Down
  1. attract attackers
  2. tool that uses multiple antivirus engines
  3. shortest-path-first routing protocol
  4. secure communications techniques
  5. transmission media with cables
  6. 8e8c92b1c360cbe3cd2b40d6b29278d5
  7. interaction between snmp agent manager
  8. an open-source EDR

15 Clues: packet analyzerattract attackersan open-source EDRtransmission media with cablessecure communications techniques8e8c92b1c360cbe3cd2b40d6b29278d5software that displays unwanted adfirewall keeps track of com sessionsshortest-path-first routing protocolsoftware/hardware that creates/runs VMinteraction between snmp agent manager...

Cyber safety Edwin 2016-06-08

Cyber safety Edwin crossword puzzle
Across
  1. media is when people be so mean.
  2. opposite of dangerous.
  3. ups silly things come up on your device.
  4. pictures.
  5. can be rude.
  6. there can be a problem.
  7. educational apps only,no violence
Down
  1. it is safe like the dictionary.
  2. information-people can hack.
  3. don't write anything that is rude.
  4. people can interrupt it.
  5. same as unsafe to the internet.
  6. its a virus.
  7. it is private.
  8. makes you're device bad.

15 Clues: pictures.its a virus.can be rude.it is private.opposite of dangerous.there can be a problem.makes you're device bad.people can interrupt it.information-people can hack.it is safe like the dictionary.same as unsafe to the internet.media is when people be so mean.educational apps only,no violencedon't write anything that is rude....

GLOBAL FOOD SECURITY 2025-06-16

GLOBAL FOOD SECURITY crossword puzzle
Across
  1. | A condition caused by lack of food |
  2. | Poor nutrition from lack of food or unbalanced diet
  3. | The way food is used and absorbed by the body
  4. | Not having enough food to be healthy
  5. | One of the main pillars of food security, referring to having enough food
  6. | Food security also depends on this over time
  7. | Essential nutrient found in meat and legumes |
  8. | When there is not enough of a resource like food or water
  9. | Vitamins and minerals needed in small amounts |
Down
  1. | Energy unit found in food |
  2. | A basic food like rice or wheat |
  3. | Key pillar of food security: physical and economic ______ to food
  4. | Process of adding nutrients to food |
  5. | Capacity to recover from food shocks
  6. | Extreme scarcity of food

15 Clues: | Extreme scarcity of food| Not having enough food to be healthy| Capacity to recover from food shocks| Food security also depends on this over time| The way food is used and absorbed by the body| Energy unit found in food || A basic food like rice or wheat || Process of adding nutrients to food |...

SDL Crossword 2019-06-05

SDL Crossword crossword puzzle
Across
  1. What code is for Kapiti Coast?
  2. How will the expansion of Auckland Airport impact on the local region?
  3. By 2025 what does Auckland Airport hope to have?
  4. How many passenger terminals does Auckland Airport have?
  5. After security means what?
  6. What is the city for the code NSN?
  7. How many baggage claim belts does Auckland Airport have?
  8. Screening passengers and their carry-on baggage is what step for Aviation Security?
Down
  1. What is the city for the code ZQN?
  2. Can anyone be on landside?
  3. How many cargo terminals do Auckland Airport have?
  4. Passport, e-ticket and ______ is what Customer Service Offices would need you to present to them after landing?
  5. Before security means what?
  6. Can anyone be on airside?
  7. How far away is Auckland city from the airport?
  8. What is 1900 in 24 hour clock?
  9. What code is for Hamilton?

17 Clues: Can anyone be on airside?Can anyone be on landside?After security means what?What code is for Hamilton?Before security means what?What code is for Kapiti Coast?What is 1900 in 24 hour clock?What is the city for the code ZQN?What is the city for the code NSN?How far away is Auckland city from the airport?...

SS13/14 Terminology 2025-11-02

SS13/14 Terminology crossword puzzle
Across
  1. Security Department
  2. The unofficial mascot
  3. What cargo does every shift
  4. What sec does every shift
  5. What security ignores
  6. A squad of 3-6 agents destroying the station. Slang.
  7. What science does every shift
  8. Evolutionary cousin of the Space Carp
  9. The helpful tip delivering clown!
Down
  1. When the singularity is loose
  2. A man-eating beast, taking inspiration from the movie "The Thing"
  3. Genetics Subdepartment
  4. An evil version of the clown
  5. Med Department
  6. Science Department
  7. What med does every shift
  8. Engineering Department
  9. Traitor, slang.

18 Clues: Med DepartmentTraitor, slang.Science DepartmentSecurity DepartmentThe unofficial mascotWhat security ignoresGenetics SubdepartmentEngineering DepartmentWhat sec does every shiftWhat med does every shiftWhat cargo does every shiftAn evil version of the clownWhen the singularity is looseWhat science does every shiftThe helpful tip delivering clown!...