cyber security Crossword Puzzles

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Someone stealing an authors original work.
  2. Stealing others Identity's.
  3. Sending threats or going through their online accounts.
  4. Using technology to harm others.
Down
  1. A virus on a computer.
  2. On line fights using technology.
  3. The practice of following actionable guidlines on the internet.
  4. Geting private information about someone and sharing it with other people online.
  5. Intentionally keeping someone out of somthing.
  6. Sharing another persons secrets online.

10 Clues: A virus on a computer.Stealing others Identity's.On line fights using technology.Using technology to harm others.Sharing another persons secrets online.Someone stealing an authors original work.Intentionally keeping someone out of somthing.Sending threats or going through their online accounts....

cyber safety 2023-05-22

cyber safety crossword puzzle
Across
  1. repeated, intense harassment denigration
  2. online fights using electronic messages
  3. it is a form of selling someone's identify online
  4. sending nasty, mean and insulting messages
  5. there will look for almost anyone to harass
Down
  1. intestinally and cruelly excluding someone from on online group
  2. "dissing" someone online
  3. talking someone into revealing secrets or embarrassing information
  4. pretending to be someone else online
  5. sharing someone's secrets or embarrassing information

10 Clues: "dissing" someone onlinepretending to be someone else onlineonline fights using electronic messagesrepeated, intense harassment denigrationsending nasty, mean and insulting messagesthere will look for almost anyone to harassit is a form of selling someone's identify onlinesharing someone's secrets or embarrassing information...

Cyber Safety 2022-03-01

Cyber Safety crossword puzzle
Across
  1. I can keep myself __________ online by not giving out my personal information.
  2. I should not use personal information such as __________ and birthdates as your password.
  3. I should __________ an adult if someone or something makes me feel uncomfortable.
  4. Do not write down or __________ your password with anyone.
  5. I should check if the information I find online is __________ before I believe it.
Down
  1. I should not meet up with __________ I have talked online to.
  2. You should include at least one __________ letter when you create a password.
  3. I should include numbers, letters and ___________ when creating a password.
  4. My password should include __________ characters or more.
  5. I should not __________ suspicious files or pictures online.

10 Clues: My password should include __________ characters or more.Do not write down or __________ your password with anyone.I should not __________ suspicious files or pictures online.I should not meet up with __________ I have talked online to.I should include numbers, letters and ___________ when creating a password....

Cyber Foundations 2022-04-26

Cyber Foundations crossword puzzle
Across
  1. a short account of an incident
  2. anything that obstructs accurate communicate of a message
  3. key assertions made by a speaker to develop his or her central idea
Down
  1. the quality of which a speaker appears
  2. words that refer to ideas or concepts
  3. final statement of your speech
  4. adjusting one's materials and delivery to meet the needs of the listeners
  5. verbal and nonverbal responses provided by an audience to a speaker
  6. words that name persons and things that we can know by our five senses
  7. reasoning from specific to general

10 Clues: final statement of your speecha short account of an incidentreasoning from specific to generalwords that refer to ideas or conceptsthe quality of which a speaker appearsanything that obstructs accurate communicate of a messageverbal and nonverbal responses provided by an audience to a speaker...

Cyber 2 2023-12-04

Cyber 2 crossword puzzle
Across
  1. Updating software for security
  2. Disguised malware
  3. Captures typed keystrokes
  4. Floods server with traffic
  5. Advertising-supported software
Down
  1. Targeted email scam
  2. Faking identity or data
  3. Network of infected devices
  4. Dual authentication method
  5. Unauthorized access point

10 Clues: Disguised malwareTargeted email scamFaking identity or dataUnauthorized access pointCaptures typed keystrokesDual authentication methodFloods server with trafficNetwork of infected devicesUpdating software for securityAdvertising-supported software

Cyber Safety 2024-03-27

Cyber Safety crossword puzzle
Across
  1. bullying people online
  2. Mobile _ _ _ _
  3. people who use computers to gain unauthorised access to data
  4. a piece of code that is capable of copying itself and usually has a detrimental effect, like corrupting the system or destroying data.
  5. a global computer network providing a variety of information and communication facilities
Down
  1. When somebody pretends to be someone or something else to acquire personal information about you.
  2. networked computing facilities providing remote data storage and processing services via the internet.
  3. something that you enter to protect your information or accounts
  4. the abbreviation of the words malicious software
  5. a computer program with a graphical user interface for displaying and navigating between web pages.

10 Clues: Mobile _ _ _ _bullying people onlinethe abbreviation of the words malicious softwarepeople who use computers to gain unauthorised access to datasomething that you enter to protect your information or accountsa global computer network providing a variety of information and communication facilities...

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. abuse a hurtful person online
  2. a bad person
  3. acting like someone that is not the real person
  4. To protect something like its your life
  5. smart and online tech
Down
  1. to offend someone of their normalities
  2. hacking basically
  3. connected to the interenet
  4. make it atleast 8 characters long
  5. A person who helps a person being bullied

10 Clues: a bad personhacking basicallysmart and online techconnected to the interenetabuse a hurtful person onlinemake it atleast 8 characters longto offend someone of their normalitiesTo protect something like its your lifeA person who helps a person being bulliedacting like someone that is not the real person

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. someone who teases someone else online
  2. hurting someone on the internet
  3. someone doing something to hurt someone
  4. people that try to join the group to hurt others
  5. hacking
  6. something that you go on
Down
  1. something you use to help someone
  2. someone who is being mean to you
  3. hurting someone mentally
  4. looking out for someone

10 Clues: hackinglooking out for someonehurting someone mentallysomething that you go onhurting someone on the internetsomeone who is being mean to yousomething you use to help someonesomeone who teases someone else onlinesomeone doing something to hurt someonepeople that try to join the group to hurt others

CYBER BULLYING 2025-03-11

CYBER BULLYING crossword puzzle
Across
  1. PRETENDING TO BE A PERSON YOU ARENT
  2. MAKING FUN OF
  3. CALLING PEOPLE NAMES
  4. BULLYING
Down
  1. TAKING ACTION AGAINST SOMEONE
  2. TO HARRASS OR FRIGHTEN SOMEONE
  3. SPREADING SOMETHING AROUND
  4. SAYING RUDE WORDS
  5. SEND A MESSAGE INDISCRAMENTLY
  6. RAID A FORM OF ATTACK

10 Clues: BULLYINGMAKING FUN OFSAYING RUDE WORDSCALLING PEOPLE NAMESRAID A FORM OF ATTACKSPREADING SOMETHING AROUNDTAKING ACTION AGAINST SOMEONESEND A MESSAGE INDISCRAMENTLYTO HARRASS OR FRIGHTEN SOMEONEPRETENDING TO BE A PERSON YOU ARENT

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. HURTING SOMEONE EMOTIONALY
  2. REPLYING TO SOMEONE
  3. PRETENDING TO BE SOMEONE YOU ARENT
  4. BEING MEAN ON THE INTERNET
  5. BEING ACTIVE ON THE INTERNET
Down
  1. FAKE STORIES ABOUT SOMEONE
  2. THE USE OF TECHNOLOGY TO HARRASS SOMEONE
  3. BEING VERY RUDE
  4. HARMING SOMEONE
  5. A WAY TO NOT SEE UNWANTED MESSAGES

10 Clues: BEING VERY RUDEHARMING SOMEONEREPLYING TO SOMEONEFAKE STORIES ABOUT SOMEONEHURTING SOMEONE EMOTIONALYBEING MEAN ON THE INTERNETBEING ACTIVE ON THE INTERNETPRETENDING TO BE SOMEONE YOU ARENTA WAY TO NOT SEE UNWANTED MESSAGESTHE USE OF TECHNOLOGY TO HARRASS SOMEONE

Cyber Bullying 2025-03-11

Cyber Bullying crossword puzzle
Across
  1. To post things to bait emotions, mainly anger.
  2. A type of abuse which contains gained sexual content by force and discomfort.
  3. To abuse someone on the internet.
  4. Anything that involves messaging.
Down
  1. To defend something/someone.
  2. To publish info about someone on the web; usually with malicious intent.
  3. The internet.
  4. To repeatedly abuse someone.
  5. to do something bad to someone.
  6. to send an overload of messages to someone.

10 Clues: The internet.To defend something/someone.To repeatedly abuse someone.to do something bad to someone.To abuse someone on the internet.Anything that involves messaging.to send an overload of messages to someone.To post things to bait emotions, mainly anger.To publish info about someone on the web; usually with malicious intent....

Cyber Crossword 2025-10-13

Cyber Crossword crossword puzzle
Across
  1. Use strong password or __________ to better protect your accounts and keep your information safe.
  2. Software______ boost security and performance
  3. One effective way to protect against impersonation scams, such as Business Email Compromise (BEC), is to ______ the identity of the email sender through an out-of-band channel—such as a trusted phone call—especially when financial transactions are involved.
  4. Be mindful of your 'digital _______' when post online.
Down
  1. Cybercriminals use AI to mimic images or videos to trick people into sharing money or personal data
  2. One of the follow-up actions to perform for suspicious emails after clicking the "Report Phishing" button in Outlook
  3. One of the common phishing signs.
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  5. One of the tips for stronger passwords
  6. Acronym for authentication method requiring two or more forms of verification.

10 Clues: One of the common phishing signs.One of the tips for stronger passwordsSoftware______ boost security and performanceBe mindful of your 'digital _______' when post online.Acronym for authentication method requiring two or more forms of verification.Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity....

Cyber-safety 2026-02-20

Cyber-safety crossword puzzle
Across
  1. A software that detects and fights malwares.
  2. A program that copies itself in the target device and spreads itself to other devices.
  3. A malicious program whose goal is to damage the target.
  4. A program that hides data transmission from the host computer to the device in control.
Down
  1. Attempt at violating and getting into a digital system.
  2. A cyber attack that overflows the target's data traffic and blocks the connection.
  3. A program that demands payment in order to not lose your files.
  4. A program disguised as a legitimate software.
  5. A software or device that controls the internet traffic flow.
  6. A service that creates encrypted connections between devices.

10 Clues: A software that detects and fights malwares.A program disguised as a legitimate software.Attempt at violating and getting into a digital system.A malicious program whose goal is to damage the target.A software or device that controls the internet traffic flow.A service that creates encrypted connections between devices....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. MAXIMUM PURCHASE QUANTITY
  2. HOLDS YOUR SELECTED ITEMS
  3. WHAT YOU WANT TO ACHIEVE
  4. REMOVING ITEMS FROM STOCK
  5. BUYING MANY ITEMS
  6. TO LOOK THROUGH ITEMS
Down
  1. WHAT YOU MAKE TO ORGANIZE SHOPPING
  2. ACTION FOR SELECTING ONLINE
  3. WORTH OF AN ITEM
  4. TO KEEP MONEY UNSPENT

10 Clues: WORTH OF AN ITEMBUYING MANY ITEMSTO LOOK THROUGH ITEMSTO KEEP MONEY UNSPENTWHAT YOU WANT TO ACHIEVEMAXIMUM PURCHASE QUANTITYHOLDS YOUR SELECTED ITEMSREMOVING ITEMS FROM STOCKACTION FOR SELECTING ONLINEWHAT YOU MAKE TO ORGANIZE SHOPPING

Cyber Monday 2024-11-28

Cyber Monday crossword puzzle
Across
  1. Additional cost
  2. Where you shop online
  3. Symbol of a country on items
  4. Simple shopping experience
  5. Popular items
Down
  1. Part of a website
  2. Picture of an item
  3. List of desired items
  4. To arrange by category
  5. Price for travel or shipping

10 Clues: Popular itemsAdditional costPart of a websitePicture of an itemWhere you shop onlineList of desired itemsTo arrange by categorySimple shopping experienceSymbol of a country on itemsPrice for travel or shipping

Cyber Safety 2024-07-25

Cyber Safety crossword puzzle
Across
  1. gets bullyed by bully
  2. how to be safe online
  3. people who stand up for the victim
  4. WWW stands for
  5. what to do about mean people or scammers
  6. id for internet
Down
  1. someone thats there when someone is being bullyed
  2. bulying+cybyer=
  3. leaking private info about someone online as a bullying tactic
  4. dot commercial

10 Clues: WWW stands fordot commercialbulying+cybyer=id for internetgets bullyed by bullyhow to be safe onlinepeople who stand up for the victimwhat to do about mean people or scammerssomeone thats there when someone is being bullyedleaking private info about someone online as a bullying tactic

CYBER-BULLYING 2024-07-25

CYBER-BULLYING crossword puzzle
Across
  1. - staying safe online from bullies and hackers
  2. - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. - careful investigation into a crime or mystery
  4. - a witness of the bullying
Down
  1. - an electronic communications network that connects computer networks and organizational computer facilities around the world
  2. - bullying but online
  3. - a secret word or phrase that must be used to gain admission to a place.
  4. - Someone who stands up to the bullies
  5. - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. - the address of a unique resource on the internet

10 Clues: - bullying but online- a witness of the bullying- Someone who stands up to the bullies- staying safe online from bullies and hackers- careful investigation into a crime or mystery- the address of a unique resource on the internet- a secret word or phrase that must be used to gain admission to a place....

Cyber Safety 2024-11-05

Cyber Safety crossword puzzle
Across
  1. ff
  2. qq
  3. pp
  4. mm
Down
  1. kk
  2. sx
  3. aa
  4. ss
  5. gg
  6. jj

10 Clues: ffkksxaaqqssppggjjmm

life skills 1 2023-03-22

life skills 1 crossword puzzle
Across
  1. bullying Sharing mean pictures
  2. to speak or talk
  3. a person you know and like
  4. relaxed state
  5. settings hiding your profile
  6. a planned meeting
  7. to talk with someone
  8. paper to be filled out
  9. things that you like
  10. copy, when you can't see the copy
Down
  1. copy, an exact copy of the original
  2. a person you don't know well
  3. coming off the street with no appointment
  4. mail that is not junk
  5. good at something
  6. when someone gets into your accounts
  7. not talking or using words
  8. to save a time and a place for something

18 Clues: relaxed stateto speak or talka planned meetinggood at somethingto talk with someonethings that you likemail that is not junkpaper to be filled outa person you know and likenot talking or using wordsa person you don't know wellsettings hiding your profilebullying Sharing mean picturescopy, when you can't see the copy...

The Security & Exchange Acts Legacy 2025-02-13

The Security & Exchange Acts Legacy crossword puzzle
Across
  1. regulates the exchanges on which securities are ____
  2. This act also helped regulate the ____ ______, enforce federal security laws, and required full disclosure of stock information.
  3. The Security & Exchange Acts Is still ____.
  4. this is about the _______ & exchange act
Down
  1. regulates secondary financial markets to ensure a transparent and fair _________ for investors. create transparency in the financial statements of corporations.
  2. The Security & Exchange Act was formed on ____ ___, 1934
  3. The Security & Exchange Act was considered a ______
  4. It is now one of many laws that control securities offerings in the ______.
  5. The Acts formation and purpose was to help prevent another Wall Street ____.
  6. register, regulate, and oversee brokerage firms, ______ agents, and clearing.

10 Clues: this is about the _______ & exchange actThe Security & Exchange Acts Is still ____.The Security & Exchange Act was considered a ______regulates the exchanges on which securities are ____The Security & Exchange Act was formed on ____ ___, 1934It is now one of many laws that control securities offerings in the ______....

Cyber Ethics,Class 8 2025-06-14

Cyber Ethics,Class 8 crossword puzzle
Across
  1. When someone lies or tricks others to get money, property, or an unfair advantage.
  2. A set of rules and proper behavior expected from individuals when interacting with other users online.
  3. Tye act of using someone else's words, ideas, or work without giving proper credit.
  4. Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or data.
  5. A cyber attack that tricks people into sharing personal information by pretending to be a trusted source.
  6. When someone takes a website name that belongs to someone else.
  7. Any illegal activity that involves a digital device to harm, steal, or disrupt.
Down
  1. The act of using digital platforms to harass, threaten, or intentionally harm someone emotionally or socially.
  2. Individual pieces of information.
  3. A cyber attack that takes users to fake websites to steal personal information.
  4. Keeping digital systems, data, and online activities safe from threats like hacking, viruses, or theft.
  5. When someone uses technical skills to get into a system or network without permission, often to control, steal, or disrupt data.
  6. The right to keep your personal information, actions, or space protected from others' access or interference.
  7. A type of malicious software that spreads itself through networks without needing to attach to other programs.
  8. A global network that connects computers and allows people to share information and communicate.

15 Clues: Individual pieces of information.When someone takes a website name that belongs to someone else.A cyber attack that takes users to fake websites to steal personal information.Any illegal activity that involves a digital device to harm, steal, or disrupt.When someone lies or tricks others to get money, property, or an unfair advantage....

KAREN'S RETIREMENT 2022-11-07

KAREN'S RETIREMENT crossword puzzle
Across
  1. at Roller King
  2. next vacation spot
  3. seagoing travel
  4. financial security
  5. Friday supper
  6. baby ___
  7. retirement as known in Cancun
  8. you are getting old if they have your number
  9. November 18
  10. ten letter word for busier than ever
  11. holiday travel
  12. knitting, pickleball, beekeeping etc
Down
  1. spending time with ___ not coworkers
  2. Friday night hydration
  3. good wishes for retirement
  4. what you are now
  5. opportunity afforded by free time
  6. goodbye anxiety
  7. afternoon activity
  8. no longer needed
  9. related group
  10. work for fun
  11. escape from schedules
  12. previous contribution to medical security
  13. at Lake Tahoe

25 Clues: baby ___November 18work for funFriday supperrelated groupat Lake Tahoeat Roller Kingholiday travelseagoing travelgoodbye anxietywhat you are nowno longer needednext vacation spotfinancial securityafternoon activityescape from schedulesFriday night hydrationgood wishes for retirementretirement as known in Cancunopportunity afforded by free time...

Teneequas crossword 2021-02-11

Teneequas crossword crossword puzzle
Across
  1. longest runway in the world
  2. I’m not as close to the airport
  3. before security
  4. aircraft parking
  5. also known as aircraft Marshall
  6. is illegal
  7. makes your flight feel bumpy because of bad weather
  8. provides meals for the aircraft
  9. I charge more when you use me
  10. you need me and travel docs
Down
  1. fills aircraft with water
  2. moving the aircraft away from the gate
  3. sniffs drugs
  4. TBU
  5. where is JFK
  6. fills the aircraft with gas
  7. empties waste
  8. after security
  9. helps unload and load carago and baggage
  10. evacuates passengers

20 Clues: TBUis illegalsniffs drugswhere is JFKempties wasteafter securitybefore securityaircraft parkingevacuates passengersfills aircraft with waterlongest runway in the worldfills the aircraft with gasyou need me and travel docsI charge more when you use meI’m not as close to the airportalso known as aircraft Marshallprovides meals for the aircraft...

Banking 2020-06-21

Banking crossword puzzle
Across
  1. savings
  2. bill
  3. exchange
  4. advances
  5. share
  6. debt
  7. clearing
  8. allowance
  9. loan
  10. overdraft
  11. discount
  12. bond
  13. capital
  14. coupon
  15. funds
  16. equity
  17. broker
  18. agent
  19. charge
  20. cash
  21. clerk
  22. cheque
  23. audit
  24. retail
  25. debit
  26. mortgage
  27. ingot
  28. inflation
  29. currency
Down
  1. dividend
  2. signature
  3. cashier
  4. guinea
  5. credit
  6. balance
  7. branch
  8. crown
  9. insurance
  10. statement
  11. corporate
  12. deposit
  13. ledger
  14. cent
  15. income
  16. bankrupt
  17. receipt
  18. account
  19. security
  20. lending
  21. interest
  22. transfer
  23. note

52 Clues: billdebtloanbondcentcashnotesharecrownfundsagentclerkauditdebitingotguineacreditbranchledgercouponequityincomebrokerchargechequeretailsavingscashierbalancedepositcapitalreceiptaccountlendingdividendexchangeadvancesclearingdiscountbankruptsecurityinteresttransfermortgagecurrencysignatureinsurancestatementallowanceoverdraftcorporateinflation

Cybersecurity Terms 2025-03-09

Cybersecurity Terms crossword puzzle
Across
  1. Encoding data for security reasons
  2. Harmful software that damages computers
  3. Unauthorized access to data
  4. Falsifying identity or source
  5. Software that monitors for malware
  6. Algorithm for encrypting data
  7. Network entry point for traffic
  8. Access granted to perform actions
  9. Ethical hacking to find vulnerabilities
  10. Malware locks files for money
  11. Network security barrier
Down
  1. Facial recognition to grant access
  2. Hidden entry for unauthorized access
  3. List of blocked entities
  4. Network of infected computers
  5. Converting ciphertext into plaintext
  6. Machine learning and thinking
  7. Verifying user identity
  8. Scam emails that trick users
  9. Software displaying unwanted ads

20 Clues: Verifying user identityList of blocked entitiesNetwork security barrierUnauthorized access to dataScam emails that trick usersNetwork of infected computersFalsifying identity or sourceAlgorithm for encrypting dataMachine learning and thinkingMalware locks files for moneyNetwork entry point for trafficSoftware displaying unwanted ads...

WCG&R Trivia Crossword Puzzle 2021-06-09

WCG&R Trivia Crossword Puzzle crossword puzzle
Across
  1. 3rd Line of Defense
  2. Type of risk that can potentially harm the Bank's Brand
  3. New __ Product Approval
  4. Third Party _ Risk Management
Down
  1. _Risk Event
  2. __ Identification program
  3. Process Risk __ Self Assessment
  4. _ Anti-Money Laundering
  5. Risk of having insufficient cash or collateral to meet financial obligations
  6. Type of Risk Assessment

10 Clues: _Risk Event3rd Line of Defense_ Anti-Money LaunderingType of Risk AssessmentNew __ Product Approval__ Identification programThird Party _ Risk ManagementProcess Risk __ Self AssessmentType of risk that can potentially harm the Bank's BrandRisk of having insufficient cash or collateral to meet financial obligations

Periodisasi Sastra 2022-10-10

Periodisasi Sastra crossword puzzle
Across
  1. Zaman sekarang itu zaman yang apa?
  2. Mengandung makna "zaman rusak"
  3. Buku ini bertema pendidikan
  4. Lahir pada tanggal 26 April 1982
  5. Namanya dimulai dengan huruf "K"
  6. Karya Ayu Utami
Down
  1. Ada 6 seri supernova
  2. Sastrawan yang hidup di abad ke-17
  3. Sastra di Internet
  4. Jatuhnya rezim Presiden Soeharto

10 Clues: Karya Ayu UtamiSastra di InternetAda 6 seri supernovaBuku ini bertema pendidikanMengandung makna "zaman rusak"Lahir pada tanggal 26 April 1982Jatuhnya rezim Presiden SoehartoNamanya dimulai dengan huruf "K"Zaman sekarang itu zaman yang apa?Sastrawan yang hidup di abad ke-17

Crossword-2 2019-06-30

Crossword-2 crossword puzzle
Across
  1. initiative for Multi-lingual Internet
  2. smarter banking alternatives
  3. Regional Internet Registry
  4. reason for being
  5. ISOC Palestine initiative on online sexual harassment
Down
  1. UNICEF Report on IG and Child rights
  2. Cyber Hygiene initiative by ISOC...Chapter?
  3. Key ICANN focus area
  4. category of top level domains
  5. Internet Governance Academy

10 Clues: reason for beingKey ICANN focus areaRegional Internet RegistryInternet Governance Academysmarter banking alternativescategory of top level domainsUNICEF Report on IG and Child rightsinitiative for Multi-lingual InternetCyber Hygiene initiative by ISOC...Chapter?ISOC Palestine initiative on online sexual harassment

Law, Public Safety, Corrections & Safety 2023-01-25

Law, Public Safety, Corrections & Safety crossword puzzle
Across
  1. Having higher education may give you a higher --.
  2. Pathways of this career cluster are Correction Services, Emergency and Fire -- Services, Security and Protective Services, Law Enforcement Services, and Legal Services.
  3. About -- million people are employed in this career cluster.
  4. Depending on how serious the career is, a -- degree may be needed in order to practice.
  5. Police officers, firefighters, and EMTs respond to -- situations, risking their lives.
  6. Being a good -- speaker is an important skill to have in this cluster.
  7. -- degree or certificate programs qualify workers for work as firefighters, police patrol officers, and many more.
  8. An attorney needs this many years of law school.
  9. There are -- thousand police agencies in the U.S.
Down
  1. A -- degree is needed to qualify as a game warden and private detective.
  2. This career cluster focuses on --, managing, and providing public safety, legal, protective services, and homeland security.
  3. -- Bar Association is a degree needed to be a lawyer or judge.
  4. Only -- percent of police officers are women.
  5. Careers associated with this cluster often require specialized skills and ---.
  6. Careers in this cluster may have -- hours.
  7. Knowing multiple -- is a good skill to have in this career cluster.
  8. Security -- require a high school diploma or equivalent.
  9. This career cluster has a lot of --, and being able to overcome them is very important.
  10. The fastest growing occupation in this career cluster is this type of guard.

19 Clues: Careers in this cluster may have -- hours.Only -- percent of police officers are women.An attorney needs this many years of law school.Having higher education may give you a higher --.There are -- thousand police agencies in the U.S.Security -- require a high school diploma or equivalent.About -- million people are employed in this career cluster....

cyberscurity puzzule 2024-01-29

cyberscurity puzzule crossword puzzle
Across
  1. - Copy of data stored separately for recovery in case of loss.
  2. - Process of converting data into a format that cannot be easily accessed by unauthorized users.
  3. - Device or node connected to a network.
  4. - Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  5. - Malware that encrypts files and demands payment for their release.
  6. - Vulnerability that is exploited before the vendor releases a patch.
  7. - Unforeseen event that disrupts normal operations and compromises security.
  8. - Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  9. - Network security system that monitors and controls incoming and outgoing network traffic.
  10. - Set of rules and procedures governing how an organization manages and protects its data.
Down
  1. - Testing method used to identify security weaknesses in a system
  2. - Weakness in a system that can be exploited by threats to compromise security.
  3. - Authentication method requiring two forms of identification for access.
  4. - Software designed to detect and remove malicious software.
  5. - Segmentation - Dividing a network into smaller segments to reduce attack surface.
  6. - of Service (DoS) - Attack that disrupts services by overwhelming a system with traffic.
  7. - Update to a computer program or its supporting data designed to fix or improve it.
  8. - Process of verifying the identity of a user or system.
  9. - Engineering tactic that manipulates individuals into divulging confidential information.
  10. - Breach - Unauthorized access to sensitive or confidential information.
  11. - Unauthorized access to a computer system or network.

21 Clues: - Device or node connected to a network.- Unauthorized access to a computer system or network.- Process of verifying the identity of a user or system.- Software designed to detect and remove malicious software.- Copy of data stored separately for recovery in case of loss.- Testing method used to identify security weaknesses in a system...

CASP Exercise 1.1 2024-05-21

CASP Exercise 1.1 crossword puzzle
Across
  1. Rogue access points can intercept data flowing through the network, including
  2. is a process that identifies a cellular phone or any other radio transmitter by the?
  3. uses rules and heuristics to identify suspicious patterns of network behavior.
  4. firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
  5. has two security modes
  6. uses open protocols to control the virtual and physical devices responsible for routing the data packets.
  7. locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
  8. Rogue devices can spoof?
  9. allows good traffic and blocks all other.
  10. Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
  1. Wireless attack tool
  2. vulnerability where an attacker inserts malicious SQL code into an application’s input fields
  3. This security tool runs on Windows Server and can process packet capture files generated by Snort.
  4. analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
  5. monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
  6. It messes with Wi-Fi signals.
  7. allows all traffic and only blocks known bad traffic.
  8. It spies on nearby networks.
  9. Not only does it detect suspicious activity, but it also actively prevents attacks.
  10. ensures only authorized users and trusted devices can enter a network.
  11. Benefits are Privacy, Security, Access

21 Clues: Wireless attack toolhas two security modesRogue devices can spoof?It spies on nearby networks.It messes with Wi-Fi signals.Benefits are Privacy, Security, Accessallows good traffic and blocks all other.allows all traffic and only blocks known bad traffic.ensures only authorized users and trusted devices can enter a network....

Prem Thapa, 12/09/2024 2024-12-07

Prem Thapa, 12/09/2024 crossword puzzle
Across
  1. A method that uses hard drive space when your computer runs out of RAM
  2. A shared secret key used to securely connect devices on a network
  3. Rules set to track and record activities on a system to ensure security and compliance
  4. Converting data into a secure format to prevent unauthorized access
  5. A Linux tool that manages network traffic rules and firewall settings
  6. Rules that explain how a company collects, uses, and protects your personal information
  7. A framework of protocols used to secure data exchanged over an IP network by providing encryption, authentication, and data integrity
  8. Verifying identity using credentials
  9. An ethical hacker improving security
  10. The process of granting permission to access resources or perform actions
Down
  1. Unique mark left behind, often used to identify a person
  2. A security system that monitors and controls network traffic to block unauthorized access.
  3. Steps taken to keep your personal information safe from being stolen or lost
  4. A tool in Windows that secures data on a server by encrypting it
  5. A barrier on the OS that blocks harmful data from entering or leaving the computer
  6. A small unit of data that is monitored and filtered by the firewall to control network access
  7. Rules that define how passwords should be created, used, and updated for security
  8. Crating a copy of data for recovery
  9. A hacker with malicious intent
  10. Firewall rules that control data allowed into the server or device
  11. Malicious software designed to harm or exploit systems

21 Clues: A hacker with malicious intentCrating a copy of data for recoveryVerifying identity using credentialsAn ethical hacker improving securityMalicious software designed to harm or exploit systemsUnique mark left behind, often used to identify a personA tool in Windows that secures data on a server by encrypting it...

Investing - Angelina Guzman Cardenas 2025-03-24

Investing - Angelina Guzman Cardenas crossword puzzle
Across
  1. measures the price performance of a basket of securities
  2. Social security and medicare together are called…
  3. A sum of money saved or made available for a particular purpose.
  4. A digital ledger of transactions that is duplicated and distributed across a network.
  5. How old do you have to be to invest in crypto?
  6. Traditional IRA contributions are made…
  7. An example of fiat money is the…Bill
  8. Before investing in crypto only invest what you're willing to…
  9. Roth IRA contributions are made…
  10. Don't rely on … for retirement!
  11. Currencies that are created and backed by the government, but not tied to or backed by the value of any physical commodity.
  12. Investing all the money you have available at that given time, and putting it into the market
  13. If you leave your company you can… your funds to your new companies.
  14. Required Minimum Distributions must start at age…
  15. What category does crypto fall under?
  16. Before investing in crypto build a … fund.
Down
  1. Often times if you have one of these you don't pay social security tax.
  2. The biggest financial fraud in U.S history was the … scandal
  3. a strategy in which you invest your money in equal amounts, at regular intervals.
  4. Warren Buffets first rule…
  5. Social security is funded by…
  6. A pension is managed by…
  7. What president created social security…
  8. the availability of cash or the ease with which an asset can be converted to cash
  9. Crypto is a … risk Investment

25 Clues: A pension is managed by…Warren Buffets first rule…Social security is funded by…Crypto is a … risk InvestmentDon't rely on … for retirement!Roth IRA contributions are made…An example of fiat money is the…BillWhat category does crypto fall under?Traditional IRA contributions are made…What president created social security…...

Security Awareness Week- 2025 2025-09-10

Security Awareness Week- 2025 crossword puzzle
Across
  1. Tool used for receiving C-Return shipments
  2. Annual Evaluation of site compliance
  3. Replaced HID
  4. Navigate sites via interactive maps and device placement.
  5. No details of the unit
  6. Name of Video Management System
  7. An official repository of critical information and resources with regard to a site
  8. Used for Flagging/Unflagging of ASINs as HRV/Non-HRV
  9. Provides External access to roof
  10. Application used to identify employees on site during an emergency.
  11. Shows Process Path Rollup and Employee details including permissions and activity
  12. Zone 5 area
  13. Tool used for salvaging Orphan shipments
  14. Access Management Tool used for addition and removal of access levels.
  15. Used to link security devices with the Milestone video system.
Down
  1. Entity Dealing with Customer Returns
  2. Web based replacement for Lenel OnGuard's Alarm Monitoring.
  3. Replacement of Lenel Security Access System
  4. Tool used to handle orphan shipments
  5. Allows addition and removal of badges, access levels and badge photos.
  6. Present at Reception and used to alert control room about emergency.
  7. Required for maintenance of Security equipments and done on quarterly cadence
  8. Device Arming/Disarming Tool
  9. Facilitating entry/exit to/from the site
  10. Portal for driver verification and yard pass generation
  11. Tool to fetch access control reports
  12. Replacement of Right Crowd
  13. This is in three colors
  14. Biometric Authentication for Associates
  15. Virtual Monitoring team
  16. Tool/interface used for processing C-Return shipments
  17. Audit/certification for verifying Facility Security Requirements

32 Clues: Zone 5 areaReplaced HIDNo details of the unitThis is in three colorsVirtual Monitoring teamReplacement of Right CrowdDevice Arming/Disarming ToolName of Video Management SystemProvides External access to roofEntity Dealing with Customer ReturnsTool used to handle orphan shipmentsAnnual Evaluation of site compliance...

Chapter 11 CIS 25 2024-10-26

Chapter 11 CIS 25 crossword puzzle
Across
  1. Controls user and computer settings in domains
  2. Secure network authentication protocol for encrypted connections
  3. Encryption tool for protecting drive data security
  4. Application set to open specific file types
  5. Navigates and manages files and folders
  6. Command-line tool for task automation and scripting
  7. Enables file access without network connectivity
  8. Displays open applications, shortcuts, and notifications
  9. Security prompt for administrative privilege actions
  10. Monitors applications, processes, and system performance
  11. Web-based platform for collaboration and document management
  12. Database of system and application configuration settings
  13. Properties defining file characteristics and access permissions
  14. Hierarchical arrangement of files and folders
  15. Diagnoses DirectX issues and system hardware specifications
  16. Logs failed security events, unauthorized access attempts
  17. Remote access protocols
Down
  1. Hosts management tools for system administration tasks
  2. Analyzes real-time system performance and resource usage
  3. Logs, reviews system and application event information
  4. Caches files locally, reducing WAN bandwidth usage
  5. Manages installed hardware devices and driver software
  6. Identifiers for file types and associated programs
  7. Directory service managing users, computers, network resources
  8. Graphical interface for interacting with Windows system
  9. Peer-to-peer network without centralized authentication control
  10. Network structure grouping computers, users, security policies
  11. Text-based interface for executing system commands
  12. Encrypts files, ensuring only authorized access
  13. Tool for viewing, editing Windows registry settings database
  14. Hidden network share for system management purposes
  15. Configuration hub for Windows system settings customization
  16. Combines multiple drives for redundancy, speed improvements

33 Clues: Remote access protocolsNavigates and manages files and foldersApplication set to open specific file typesHierarchical arrangement of files and foldersControls user and computer settings in domainsEncrypts files, ensuring only authorized accessEnables file access without network connectivityEncryption tool for protecting drive data security...

security awareness CW3 2023-03-29

security awareness CW3 crossword puzzle
Across
  1. X is a large network of servers that can improve the security, performance, and reliability of anything connected to the Internet. X does this by serving as a reverse proxy Open external link for your web traffic. At Meesho, X WAF provides both automatic protection from vulnerabilities and the flexibility to create custom rules.
  2. A X test is an authorized simulated attack performed on a Meesho applications to evaluate its security. X testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system. The Product Security team performs quarterly X testing across the family of apps to identify and mitigate security issues in production.
  3. Meesho's ________ team ensures that our platform offers a safe environment for people to shop online and build businesses. Hence, Meesho _____ team collaborates with various teams such as Information Security, Product Security, and Red Team to design secure products and services, perform security assessments, evaluate threats, and develop engineered mitigations.
  4. Secure ________, also referred to as secure programming, involves writing code in a high-level language that follows strict principles with the goal of preventing potential vulnerabilities. Secure _______ practices entail writing code in a way that will prevent potential security vulnerabilities. This includes maintaining both your source code and any third-party libraries in a secure state.
  5. The team publishes a lot of information on Confluence or JIRA pages, so we need to ensure that there is no X information being published intentionally or unintentionally. This X information can be transferred away with employees when they leave the organization, which can be a risk in itself. The name starts with the letter 'S' and ends 'E'.
Down
  1. The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams.
  2. At Meesho, X helps users of your GitHub Enterprise Server instance find and fix vulnerabilities in their dependencies. You can enable X alerts to notify users about vulnerable dependencies and X updates to fix the vulnerabilities and keep dependencies updated to the latest version.
  3. X attacks, in that it uses a single Internet-connected device (one network connection) to flood a target with malicious traffic. You can tag @security-oncall on slack in such situations.
  4. The X tool is required to ensure that the company's cloud computing environments, AWS and GCP, are protected with utmost assurance. This tool scans for data breaches and misconfigurations to secure a company's data
  5. To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack.

10 Clues: The Security Engineering team regularly conducts _________ Security Training to spread awareness about security best practices across the engineering teams.To maintain a single point of contact for monitoring all security incidents or any security-related engagements, you can tag a single roster using the @security-_____ handle on Slack....

Digital Literacy: Safety and Ethics 2017-01-04

Digital Literacy: Safety and Ethics crossword puzzle
Across
  1. This happens when a person is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another using the Internet, interactive and digital technologies or mobile phones.
  2. These "account protectors" should be kept secure to ensure others with malicious intent cannot access account information.
  3. Heavy objects should be lifted with these muscles.
  4. This is an online type of computer virus that monitors and records the victim's keystrokes in order to steal personal information.
  5. This is one of the most common causes of accidents in an office environment.
Down
  1. Heavy objects should never be lifted with these muscles.
  2. Cyber bullies can face criminal prosecution for this.
  3. Bad computer code that does nasty or undesirable things to the host computer or code is called a computer...
  4. Be sure electrical wiring is properly _______ to avoid electric shock.
  5. Your name, address, phone number, birth date, and other identification and location information should be kept _______ online as a protection from cyber criminals.

10 Clues: Heavy objects should be lifted with these muscles.Cyber bullies can face criminal prosecution for this.Heavy objects should never be lifted with these muscles.Be sure electrical wiring is properly _______ to avoid electric shock.This is one of the most common causes of accidents in an office environment....

OPS Zone Newsletter Review 7/7/21 2021-07-09

OPS Zone Newsletter Review 7/7/21 crossword puzzle
Across
  1. Individuals Receiving Payments
  2. Stop Getting Advance Payments
  3. Bleeding Ink Color
  4. Paper from the US Treasury
  5. Type of Check Feature
  6. Procedure Related to These Checks
  7. Watermark Reads
  8. Small Printing
Down
  1. Security Ink
  2. Signed Check
  3. Tool to Assist in Fraud Detection
  4. No Watermark
  5. Website

13 Clues: WebsiteSecurity InkSigned CheckNo WatermarkSmall PrintingWatermark ReadsBleeding Ink ColorType of Check FeaturePaper from the US TreasuryStop Getting Advance PaymentsIndividuals Receiving PaymentsTool to Assist in Fraud DetectionProcedure Related to These Checks

Don't Travel Without 2022-01-21

Don't Travel Without crossword puzzle
Across
  1. the piece of paper that lets you on the plane
  2. the people who work in the plane with passengers
  3. when security checks your person
  4. what you pass through at security
  5. the official document that lets you travel
  6. the area you go to pick up your luggage
Down
  1. the person flying the airplane
  2. what your luggage goes through at security
  3. the luggage you take on a plane
  4. telling the airline you're here for your flight
  5. the area you pass through when traveling in a new country
  6. moving from one flight to another
  7. a square piece of luggage
  8. the cart used to carry luggage

14 Clues: a square piece of luggagethe person flying the airplanethe cart used to carry luggagethe luggage you take on a planewhen security checks your personmoving from one flight to anotherwhat you pass through at securitythe area you go to pick up your luggagewhat your luggage goes through at securitythe official document that lets you travel...

INFANT SAFETY/ABDUTION 2023-03-02

INFANT SAFETY/ABDUTION crossword puzzle
Across
  1. Check the contents
  2. Call Security STAT
  3. #still not found
  4. Watch out
  5. Opposite of pro-active
  6. Mom & Dad
  7. Infant Security Measure
Down
  1. Mom's loving hug
  2. Emergency formerly known as
  3. Baby ID band spot
  4. Gender
  5. Tiniest Patient

12 Clues: GenderWatch outMom & DadTiniest PatientMom's loving hug#still not foundBaby ID band spotCheck the contentsCall Security STATOpposite of pro-activeInfant Security MeasureEmergency formerly known as

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. pencurian hak cipta (11 h)
  2. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  3. perbuatan menyebar informasi yang merugikan orang lain (18h)
  4. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  5. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  6. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  7. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. menjaga keamanan data pribadi di internet (13h)
  9. penyebaran informasi palsu yang meluas (4 huruf)
  10. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  11. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  12. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  13. program kecil yang dapat merusak sistem komputer (5 huruf)
  14. informasi yang mengidentifikasi seseorang secara unik (12h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
Down
  1. aturan dan norma berperilaku baik di media sosial (11 h)
  2. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. perbuatan melanggar hukum didunia maya (10 huruf)
  5. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  6. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  7. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  8. perilaku tidak sopan/kasar didunia maya (10 h)
  9. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  10. peraturan yang melindungi data pribadi (16h)
  11. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  12. internet tindakan kriminal yang dilakukan melalui internet (14h)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  14. tindakan menyebar informasi yang salah secara sengaja (14h)
  15. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  2. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  3. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  4. informasi yang mengidentifikasi seseorang secara unik (12h)
  5. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  6. perbuatan melanggar hukum didunia maya (10 huruf)
  7. peraturan yang melindungi data pribadi (16h)
  8. program kecil yang dapat merusak sistem komputer (5 huruf)
  9. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  10. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  11. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  12. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  13. aturan dan norma berperilaku baik di media sosial (11 h)
  14. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
Down
  1. menjaga keamanan data pribadi di internet (13h)
  2. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  3. internet tindakan kriminal yang dilakukan melalui internet (14h)
  4. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  5. perbuatan menyebar informasi yang merugikan orang lain (18h)
  6. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  7. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  8. tindakan menyebar informasi yang salah secara sengaja (14h)
  9. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  10. perilaku tidak sopan/kasar didunia maya (10 h)
  11. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  12. penyebaran informasi palsu yang meluas (4 huruf)
  13. pencurian hak cipta (11 h)
  14. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  15. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  16. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

technology 2021-12-06

technology crossword puzzle
Across
  1. a device made by Apple
  2. a foldable computer
  3. a computer part that clicks
  4. the picture for your background
  5. for example, Google Chrome, Opera, Safari
  6. a cyber criminal
  7. helps you keep your device running
Down
  1. another word for device
  2. the long button on your keyboard
  3. screen with sensors

10 Clues: a cyber criminala foldable computerscreen with sensorsanother word for devicea device made by Applea computer part that clicksthe picture for your backgroundthe long button on your keyboardhelps you keep your device runningfor example, Google Chrome, Opera, Safari

Aiden Dominko 2021-06-24

Aiden Dominko crossword puzzle
Across
  1. to be feeling a way
  2. to be smiling and feeling _____
  3. to be unhappy and feeling _____
  4. to use the internet to bully someone
  5. a girl grown up
  6. to be a bad way to someone
Down
  1. to harm someone with strength
  2. watching someone getting bullied
  3. repeatedly being mean
  4. a boy grown up

10 Clues: a boy grown upa girl grown upto be feeling a wayrepeatedly being meanto be a bad way to someoneto harm someone with strengthto be smiling and feeling _____to be unhappy and feeling _____watching someone getting bulliedto use the internet to bully someone

2022 Employee Appreciation Week Crossword Puzzle 2022-06-07

2022 Employee Appreciation Week Crossword Puzzle crossword puzzle
Across
  1. Customer ____ Program
  2. Leaf of TD Framework
  3. Example of Second Line of Defense
  4. Legal ___ Compliance & Conduct Risk (LRCC)
  5. Privacy ____ Assessment
  6. Third Party ___ Risk Management
  7. Mission is to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation.
Down
  1. Enterprise Data ___ Office
  2. Third Line of Defense
  3. New ___ Product Approval (NBPA)

10 Clues: Leaf of TD FrameworkCustomer ____ ProgramThird Line of DefensePrivacy ____ AssessmentEnterprise Data ___ OfficeNew ___ Product Approval (NBPA)Third Party ___ Risk ManagementExample of Second Line of DefenseLegal ___ Compliance & Conduct Risk (LRCC)...

Crossword-2 2019-06-30

Crossword-2 crossword puzzle
Across
  1. Regional Internet Registry
  2. reason for being
  3. initiative for Multi-lingual Internet
  4. smarter banking alternatives
Down
  1. UNICEF Report on IG and Child rights
  2. Internet Governance Academy
  3. Cyber Hygiene initiative by ISOC...Chapter?
  4. ISOC Palestine initiative on online sexual harassment
  5. Key ICANN focus area
  6. category of top level domains

10 Clues: reason for beingKey ICANN focus areaRegional Internet RegistryInternet Governance Academysmarter banking alternativescategory of top level domainsUNICEF Report on IG and Child rightsinitiative for Multi-lingual InternetCyber Hygiene initiative by ISOC...Chapter?ISOC Palestine initiative on online sexual harassment

Security Cat's Easy Crossword 2016-08-29

Security Cat's Easy Crossword crossword puzzle
Across
  1. You can always ask them questions or talk to them when you don’t understand something. They are here to help you.
  2. Emails or messages that try to trick you into giving away personal information or clicking on something you shouldn’t. Often they use bad grammar and spelling, or look like they come from a real person.
  3. Treat your passwords like your __________: never share them with anyone and change them often!
  4. Be careful what you ________ online. When in doubt, it’s best to say less.
  5. You should always know where your _________ devices are, and make sure you have a lockscreen with a password on it. Some examples of these devices include iPhones, tablets, and laptops.
  6. Think before you _______! You don’t want to download malware by accident!
Down
  1. Ask your parents for _______ whenever you need it.
  2. This protects your online accounts from the bad guys. It should be long and hard to guess.
  3. Never talk to these people in real life or online!
  4. What happens here, stays here, so be careful about what you share! Once you post something here it stays here forever!
  5. Security ____ is your online buddy who helps keep humas safe and secure on the internet!
  6. Don’t be a cyber _______! This means you shouldn’t say mean things about or to anyone online. If you see someone being one of these, be sure to tell a parent or teacher right away.

12 Clues: Ask your parents for _______ whenever you need it.Never talk to these people in real life or online!Think before you _______! You don’t want to download malware by accident!Be careful what you ________ online. When in doubt, it’s best to say less.Security ____ is your online buddy who helps keep humas safe and secure on the internet!...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Arciniegas 2022-02-10

Arciniegas crossword puzzle
Across
  1. officer: he commands the duty officer
  2. officer: He is in charge of intelligence at the school
  3. the camp: school garden manager
Down
  1. Security of people
  2. technical officer: school weapon manager
  3. police: martiality
  4. commander: Security school
  5. no duty: service of company
  6. soldiers Security
  7. officer: send to school services

10 Clues: soldiers SecuritySecurity of peoplepolice: martialitycommander: Security schoolno duty: service of companythe camp: school garden managerofficer: send to school servicesofficer: he commands the duty officertechnical officer: school weapon managerofficer: He is in charge of intelligence at the school

Meraki IDE Bundle Crossword Puzzle 2020-03-26

Meraki IDE Bundle Crossword Puzzle crossword puzzle
Across
  1. Reliable _______________ connection up to 400 mbps
  2. ___________ path control networking
  3. Type of firewall protection included with Meraki IDE bundle
  4. ______________ based security
Down
  1. Connectivity backup for critical applications
  2. High Availability ________________
  3. Technical Support & Concierge “White Glove” Service
  4. Type of software and security updates delivered from the cloud
  5. __________ prevention security
  6. Cisco __________ IDE Bundle

10 Clues: Cisco __________ IDE Bundle______________ based security__________ prevention securityHigh Availability ___________________________ path control networkingConnectivity backup for critical applicationsReliable _______________ connection up to 400 mbpsTechnical Support & Concierge “White Glove” Service...

Safety Week 2024 2024-10-01

Safety Week 2024 crossword puzzle
Across
  1. Animal to emulate when walking on icy ground
  2. A symbol indicating dangerous biological substances
  3. A practice exercise to prepare for a potential emergency situation
  4. A collection of supplies and equipment for use in giving medical treatment
  5. See something ___ something
  6. A service providing emergency medical care and transportation
  7. Being ready and able to deal with emergencies
  8. Practice of following others through security checkpoint without access badge
  9. DMU's Chief Compliance Officer is highly ____ averse
  10. Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
  11. Action to take for a rapid, orderly process to exit building
  12. A portable device used to treat sudden cardiac arrest
Down
  1. Homeland Security model used by DMU for active threat response
  2. DMU encourages annual vaccines to prevent this common infection
  3. Document required by Clery Act to inform community on safety statistics
  4. DMUs emergency notification system
  5. Something one should always be aware of
  6. Campus department to contact if you witness suspicious activity
  7. DMU's avatar for emergency messaging

19 Clues: See something ___ somethingDMUs emergency notification systemDMU's avatar for emergency messagingSomething one should always be aware ofAnimal to emulate when walking on icy groundBeing ready and able to deal with emergenciesA symbol indicating dangerous biological substancesDMU's Chief Compliance Officer is highly ____ averse...

Marketplace Smackdown 2026-02-21

Marketplace Smackdown crossword puzzle
Across
  1. What is andys favorite dino
  2. Who did casey choke most recently
  3. what fruit can we not get enough of
  4. Fun River name
  5. what is the worst to replace
  6. Who is the drink
Down
  1. what are we watching
  2. what minecraft block is the floor
  3. who is cyber guy
  4. who is big blues mom
  5. who is planning a wedding
  6. who is a silly guy

12 Clues: Fun River namewho is cyber guyWho is the drinkwho is a silly guywhat are we watchingwho is big blues momwho is planning a weddingWhat is andys favorite dinowhat is the worst to replacewhat minecraft block is the floorWho did casey choke most recentlywhat fruit can we not get enough of

Sosiologi Tentang Globalisasi 2025-08-25

Sosiologi Tentang Globalisasi crossword puzzle
Across
  1. jenis serangan cyber yang berbahaya
  2. nilai-nilai yang di anut oleh suatu masyarakat
  3. indikator keberhasilan ekonomi suatu negara
  4. metode pembelajaran yang menggunakan ekonomi
  5. proses pembelajaran yang berpusat pada siswa
Down
  1. jenis hukum yang berlaku di Indonesia
  2. sistem ekonomi yang berdasarkan
  3. bentuk komunikasi yang tidak langsung
  4. jenis teknologi yang digunakan untuk mengakses internet
  5. perusahaan teknologi yang terkenal
  6. kepemilikan swasta
  7. bahasa pemrograman yang populer

12 Clues: kepemilikan swastasistem ekonomi yang berdasarkanbahasa pemrograman yang populerperusahaan teknologi yang terkenaljenis serangan cyber yang berbahayajenis hukum yang berlaku di Indonesiabentuk komunikasi yang tidak langsungindikator keberhasilan ekonomi suatu negarametode pembelajaran yang menggunakan ekonomi...

Siloviki 2025-06-03

Siloviki crossword puzzle
Across
  1. Secretary of the Security Council, a key Siloviki ideologue
  2. A primary goal of the Siloviki, maintaining stability
  3. Russia's military intelligence directorate
  4. Abbreviation for the Security Council of Russia
  5. Current President, whose background is in the KGB
  6. The main domestic security and counter-intelligence agency
  7. A core value and source of cohesion for this elite group
  8. CEO of Rosneft, a prominent "Silogarch"
Down
  1. Russia's foreign intelligence service
  2. Governor of Tula, ex-FSO/GRU, often tipped as successor
  3. State-owned oil giant often linked to Siloviki interests
  4. Soviet predecessor to the FSB and SVR
  5. Ideology prioritizing a strong, centralized state
  6. The "men of force" faction in Russian politics

14 Clues: Russia's foreign intelligence serviceSoviet predecessor to the FSB and SVRCEO of Rosneft, a prominent "Silogarch"Russia's military intelligence directorateThe "men of force" faction in Russian politicsAbbreviation for the Security Council of RussiaIdeology prioritizing a strong, centralized stateCurrent President, whose background is in the KGB...

Saferinternet 2024-03-01

Saferinternet crossword puzzle
Across
  1. Die schädliche Software
  2. Gefälschte Fan-Seiten, Klickbetrug
  3. Ein soziales Netzwerk
  4. Identitätsdiebstahl
Down
  1. Das schädliche Programm
  2. Der Sammelbegriff des Browsers
  3. Cyberbullying,Beschimpfungen

7 Clues: IdentitätsdiebstahlEin soziales NetzwerkDas schädliche ProgrammDie schädliche SoftwareCyberbullying,BeschimpfungenDer Sammelbegriff des BrowsersGefälschte Fan-Seiten, Klickbetrug

Bullying 2026-02-24

Bullying crossword puzzle
Across
  1. Spreading rumors, excluding others
  2. The Bully
  3. Someone who does nothing
  4. Hitting, Punching, Throwing
Down
  1. Someone who tries to stop the bully
  2. Using Social Media, Computers, Phones, etc.
  3. The best team in the NFL
  4. Calling them names
  5. The target of the bullying

9 Clues: The BullyCalling them namesThe best team in the NFLSomeone who does nothingThe target of the bullyingHitting, Punching, ThrowingSpreading rumors, excluding othersSomeone who tries to stop the bullyUsing Social Media, Computers, Phones, etc.

noun 2021-03-23

noun crossword puzzle
Across
  1. He takes great _____.
  2. The plural of bacterium
  3. Sit on the ______ ______(Chair/office).
  4. In the cyber are a lot of _______.
  5. The plural of fungus
Down
  1. Today he has his first ______ ______(interview/job).
  2. Plural of woman.
  3. The ______ met after the court.
  4. In the desert are a lot of ______.
  5. They built a _____ _____(house/bricks).
  6. Pass me the ____ ______(spoon/soup).
  7. Mister beast ______ has a lot of views.
  8. The plural of fry
  9. I used to watch super hero _____.

14 Clues: Plural of woman.The plural of fryThe plural of fungusHe takes great _____.The plural of bacteriumThe ______ met after the court.I used to watch super hero _____.In the desert are a lot of ______.In the cyber are a lot of _______.Pass me the ____ ______(spoon/soup).They built a _____ _____(house/bricks).Mister beast ______ has a lot of views....

The Enterprise Report 2021-11-15

The Enterprise Report crossword puzzle
Across
  1. The ____ Guy sets up at the Village on Wednesdays
  2. Monday after Black Friday
  3. open ____ has ended for the year 2021-2022
  4. Wednesday before Thanksgiving, at Salish Coast
  5. featured Employee of the Month
  6. people honored on Nov. 11
Down
  1. keeps your hands warm
  2. "busy" animal
  3. may participate in Salish Coast's Coloring Contest
  4. energy drink sold by the Coffee Point
  5. Swinomish Market at the _____
  6. 11th month of the year
  7. fuels your car
  8. manager at the Village

14 Clues: "busy" animalfuels your carkeeps your hands warm11th month of the yearmanager at the VillageMonday after Black Fridaypeople honored on Nov. 11Swinomish Market at the _____featured Employee of the Monthenergy drink sold by the Coffee Pointopen ____ has ended for the year 2021-2022Wednesday before Thanksgiving, at Salish Coast...

Secure Your Universe 2025-09-09

Secure Your Universe crossword puzzle
Across
  1. A software update that fixes security flaws
  2. Worn to identify employees and grant access
  3. Cameras or monitoring systems for physical security
  4. A secure tunnel for your internet traffic
  5. A login method that uses a password and a code
  6. Verifying your identity before granting access
  7. A security measure to restrict movement during a threat
  8. Software that detects and removes harmful programs
Down
  1. A secret word or phrase used to access something
  2. When unauthorized access to data occurs
  3. Software designed to harm or exploit a system
  4. Scrambles data so only authorized users can read it
  5. Uses fingerprints or facial recognition for access
  6. A fake email that tricks you into giving up personal info
  7. A digital barrier that blocks unauthorized access
  8. Engineering Tricking people into revealing confidential information

16 Clues: When unauthorized access to data occursA secure tunnel for your internet trafficA software update that fixes security flawsWorn to identify employees and grant accessSoftware designed to harm or exploit a systemA login method that uses a password and a codeVerifying your identity before granting access...

ZAJEDNO ZA BOLJI INTERNET 2023-02-15

ZAJEDNO ZA BOLJI INTERNET crossword puzzle
Across
  1. ne objavljivanje sadržaja koji nije
  2. prijatelji osobe s kojima se sprijateljiš a ne
  3. seksualno uznemiravanje na internetu
  4. slike slanje slika koje ne smiješ nikome slat
  5. vijesti širenje nečega za što nisi siguran
  6. ljudima
  7. profila praviti se da si netko tko nisi
Down
  1. bulling nasilje na internetu
  2. ignoriranje neželjnog sadržaja
  3. paukova mreža
  4. pričanje u žio s ljudima koje ne poznaješ
  5. stavljanje računa na privatni
  6. kometari rečenice koje izriču mržnju i ljubomoru
  7. za tvoju dob
  8. ih u živo
  9. tok aplikacija na kojoj se najviše susrećemo s

16 Clues: ljudimaih u živoza tvoju dobpaukova mrežabulling nasilje na internetustavljanje računa na privatniignoriranje neželjnog sadržajane objavljivanje sadržaja koji nijeseksualno uznemiravanje na internetuprofila praviti se da si netko tko nisipričanje u žio s ljudima koje ne poznaješvijesti širenje nečega za što nisi siguran...

crossword 2012-11-15

crossword crossword puzzle
Across
  1. logo 2
  2. logo 3
  3. brand ambassador of sony cyber shot
  4. ceo of virgin atlantic
  5. parent company of minute maid
  6. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse
  7. logo 4
  8. highest grossing hollywood movie
Down
  1. the ultimate driving machine
  2. full form of P&G
  3. artist with the highest number of views for his\her video on youtube
  4. one world many states
  5. subsidiary company of adidas which makes sportswear, apparel and accessories
  6. towards excellence
  7. logo 1
  8. world's local bank

16 Clues: logo 2logo 3logo 1logo 4full form of P&Gtowards excellenceworld's local bankone world many statesceo of virgin atlanticthe ultimate driving machineparent company of minute maidhighest grossing hollywood moviebrand ambassador of sony cyber shotartist with the highest number of views for his\her video on youtube...

Tatler Crossword Week 6 2023-11-27

Tatler Crossword Week 6 crossword puzzle
Across
  1. Popular girl scout cookie
  2. Journalist ___ B. Wells
  3. Shortest Grizzlies player(last name)
  4. Best time to buy online is ______ Monday,
  5. Woman's name that sounds like its first and third letters
Down
  1. The largest city in the world.
  2. Boy band with the 2000 hit "Bye Bye Bye"
  3. first animal in space
  4. Home to the Alhambra
  5. Knight's title
  6. Santa's workers

11 Clues: Knight's titleSanta's workersHome to the Alhambrafirst animal in spaceJournalist ___ B. WellsPopular girl scout cookieThe largest city in the world.Shortest Grizzlies player(last name)Boy band with the 2000 hit "Bye Bye Bye"Best time to buy online is ______ Monday,Woman's name that sounds like its first and third letters

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. perbuatan menyebar informasi yang merugikan orang lain (18h)
  2. program kecil yang dapat merusak sistem komputer (5 huruf)
  3. peraturan yang melindungi data pribadi (16h)
  4. pencurian hak cipta (11 h)
  5. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  6. tindakan menyebar informasi yang salah secara sengaja (14h)
  7. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  8. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  9. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
  10. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  11. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  12. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  13. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  14. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  15. aturan dan norma berperilaku baik di media sosial (11 h)
  16. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
Down
  1. perbuatan melanggar hukum didunia maya (10 huruf)
  2. informasi yang mengidentifikasi seseorang secara unik (12h)
  3. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  4. penyebaran informasi palsu yang meluas (4 huruf)
  5. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  6. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  7. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  8. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  9. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  10. perilaku tidak sopan/kasar didunia maya (10 h)
  11. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  12. menjaga keamanan data pribadi di internet (13h)
  13. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  14. internet tindakan kriminal yang dilakukan melalui internet (14h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

Fraud Crossword 2018-11-08

Fraud Crossword crossword puzzle
Across
  1. A man who cheats or tricks someone by gaining their trust and persuading them to believe something that is not true.
  2. A not-for-profit organisation working to reduce and prevent fraud and financial crime
  3. The action or offence of giving a false or misleading account of the nature of something.
  4. Something that is offered to a customer to protect them.
  5. Wrongful or criminal deception intended to result in financial or personal gain.
Down
  1. An act of pretending to be another person for the purpose of entertainment or fraud.
  2. Someone who has been defrauded or become a.....
  3. A system we use within Experian
  4. The UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime in England, Wales and Northern Ireland.

9 Clues: A system we use within ExperianSomeone who has been defrauded or become a.....Something that is offered to a customer to protect them.Wrongful or criminal deception intended to result in financial or personal gain.An act of pretending to be another person for the purpose of entertainment or fraud....

ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2024-02-12

ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ crossword puzzle
Across
  1. Positive εικόνα σώματος και κοινωνικά δίκτυα
  2. Passwords κωδικοί πρόσβασης
  3. News ψευδείς ειδήσεις
  4. Reputation διαδικτυακή φήμη
  5. Scams ηλεκτρονικές απάτες
Down
  1. διαδικτυακός εκφοβισμός
  2. Gaming παιχνίδια στο διαδίκτυο
  3. κακόβουλο λογισμικό
  4. Addiction εθισμός στο διαδίκτυο
  5. Piracy πειρατεία λογισμικού

10 Clues: κακόβουλο λογισμικόNews ψευδείς ειδήσειςδιαδικτυακός εκφοβισμόςScams ηλεκτρονικές απάτεςPasswords κωδικοί πρόσβασηςPiracy πειρατεία λογισμικούReputation διαδικτυακή φήμηGaming παιχνίδια στο διαδίκτυοAddiction εθισμός στο διαδίκτυοPositive εικόνα σώματος και κοινωνικά δίκτυα

TTS 2022-02-10

TTS crossword puzzle
Across
  1. mengucilkan, mengabaikan dan
  2. menyoraki, dan menjuluki.
  3. Fisik : memukul, menampar, memalak,
  4. Verbal : memaki, memfitnah, mengejek,
Down
  1. , menjambak dan menginjak.
  2. Psikologis (Mental) : Memandang sinis,
  3. Bullying : Menyebarkan video,
  4. mencubit, mencakar, melempar,

8 Clues: menyoraki, dan menjuluki., menjambak dan menginjak.mengucilkan, mengabaikan danBullying : Menyebarkan video,mencubit, mencakar, melempar,Fisik : memukul, menampar, memalak,Verbal : memaki, memfitnah, mengejek,Psikologis (Mental) : Memandang sinis,

Cyber safety- Claire Williams 2016-06-08

Cyber safety- Claire Williams crossword puzzle
Across
  1. . Something you do
  2. Being mean online
  3. . When you right on your iPad
  4. .don't tell people it
  5. . A family member that is a female
Down
  1. important member in your family
  2. . Helps you learn
  3. . something you need too be
  4. When someone is trick you

9 Clues: . Helps you learnBeing mean online. Something you do.don't tell people itWhen someone is trick you. something you need too be. When you right on your iPadimportant member in your family. A family member that is a female

Information Security Crossword 2012-02-29

Information Security Crossword crossword puzzle
Across
  1. We calculate this to calculate Business Impact
  2. How you keep your card details safe
  3. IFS Policies can be found here
  4. Where you go to fill out an IS request
  5. Gary Woodcock is the....at IFS
  6. LRQA will be carrying out one of these in March
  7. A secure method of preventing unauthorised access to Haven House
  8. It's what makes a car unique
Down
  1. Sending data to the wrong recipient in error is a security
  2. A social media site
  3. This is unique to each user
  4. Your computer is one of these
  5. How IFS Classify it's information can be found here
  6. The minimum classification for client information
  7. CTRL+ALT+DEL will do what to your screen
  8. The ISMS Cross Functional Security Team is known as the security .....

16 Clues: A social media siteThis is unique to each userIt's what makes a car uniqueYour computer is one of theseIFS Policies can be found hereGary Woodcock is the....at IFSHow you keep your card details safeWhere you go to fill out an IS requestCTRL+ALT+DEL will do what to your screenWe calculate this to calculate Business Impact...

security 2022-05-05

security crossword puzzle
Across
  1. is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply sending the same message over and over to the same user.
  2. is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer.
  3. is a computer program used to prevent, detect, and remove malware.
Down
  1. is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
  2. is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
  3. is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy.
  4. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.

7 Clues: is a computer program used to prevent, detect, and remove malware.is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer....

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Casino 2024-02-29

Casino crossword puzzle
Across
  1. Coin counter
  2. provides an escort
  3. one of four service drivers
  4. what color is a 10's strap
  5. Card for veterans
  6. eyes in the sky
  7. 21
  8. who's portrait is on a 20 dollar bill
Down
  1. Finance Director
  2. Fake currency
  3. Highest Card Status
  4. one arm bandit
  5. Another name for ATM
  6. What color is the security thread in a 100
  7. currency is made of linen and
  8. who fills Kiosk

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skywho fills KioskFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

Cybersecurity 2022-07-08

Cybersecurity crossword puzzle
Across
  1. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. Type of assessments that are the cornerstone of every program for cybersecurity
  3. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. Protecting information is vital for the normal functioning of organizations
  5. Is an advanced security control that reduces the chance of it being stolen
Down
  1. Systems that are no longer supported by the manufacturer
  2. is a significant threat to the confidentiality, integrity and availability of information
  3. A key stakeholder that may not recognize how to securely communicate with their provider
  4. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. Type of phishing email specific employee within an organization
  6. Most significant security incident
  7. This stakeholder may have lax security policies compromising your system

12 Clues: Most significant security incidentSystems that are no longer supported by the manufacturerType of phishing email specific employee within an organizationThis stakeholder may have lax security policies compromising your systemIs an advanced security control that reduces the chance of it being stolen...

Investment Course Lesson 11 Investment Trusts 2023-03-03

Investment Course Lesson 11 Investment Trusts crossword puzzle
Across
  1. The amount that a derivative moves, per $1 movement in the underlying asset
  2. A type of security based on the ownership of real estate rental properties
  3. when a security price and moving average crossover each other on the chart, indicating strong or weak investor confidence
  4. having a number of assets that are different enough from each other that sudden changes in one asset will have little effect on the others
  5. The rise and fall of markets on a repeated basis
  6. a narrow or defined classification of a company’s profile
  7. shows how two moving averages in a particular security are related
Down
  1. strategies designed to reduce short term impact on the price of securities
  2. A type of investment trust with more than one type of share.
  3. when the price of a security moves contrary to other data
  4. a large section of the overall economy used to identify a company’s profile
  5. The average selling price of a security over a time period

12 Clues: The rise and fall of markets on a repeated basiswhen the price of a security moves contrary to other dataa narrow or defined classification of a company’s profileThe average selling price of a security over a time periodA type of investment trust with more than one type of share.shows how two moving averages in a particular security are related...

Online Identity Crossword 2024-09-12

Online Identity Crossword crossword puzzle
Across
  1. Addiction When people can't go without the internet
  2. Purchase Buying things online
  3. Thinking What you need to do when using technology
  4. A Delicious Treat
  5. Spiders make this site
  6. Shows who you are online
  7. Use How you spend time on a computer
Down
  1. Information What hackers have done
  2. Media Platforms with social environments
  3. What's saved on your devices
  4. Shopping Browsing on the internet for personal items
  5. Online Villain
  6. Personalized for your technological devices
  7. Psychology How users behave online
  8. Phones, TV, Computers
  9. Who you are
  10. Use When users associate with internet

17 Clues: Who you areOnline VillainA Delicious TreatPhones, TV, ComputersSpiders make this siteShows who you are onlineWhat's saved on your devicesPurchase Buying things onlineInformation What hackers have donePsychology How users behave onlineUse How you spend time on a computerUse When users associate with internetMedia Platforms with social environments...

Online Identity Crossword 2024-09-12

Online Identity Crossword crossword puzzle
Across
  1. Addiction When people can't go without the internet
  2. Purchase Buying things online
  3. Thinking What you need to do when using technology
  4. A Delicious Treat
  5. Spiders make this site
  6. Shows who you are online
  7. Use How you spend time on a computer
Down
  1. Information What hackers have done
  2. Media Platforms with social environments
  3. What's saved on your devices
  4. Shopping Browsing on the internet for personal items
  5. Online Villain
  6. Personalized for your technological devices
  7. Psychology How users behave online
  8. Phones, TV, Computers
  9. Who you are
  10. Use When users associate with internet

17 Clues: Who you areOnline VillainA Delicious TreatPhones, TV, ComputersSpiders make this siteShows who you are onlineWhat's saved on your devicesPurchase Buying things onlineInformation What hackers have donePsychology How users behave onlineUse How you spend time on a computerUse When users associate with internetMedia Platforms with social environments...

DC9111 2024-08-09

DC9111 crossword puzzle
Across
  1. A framework used to manage and mitigate cybersecurity risks.
  2. A cybersecurity tool used to monitor, detect, and respond to threats.
  3. - The process of converting data into a code to prevent unauthorized access.
  4. The practice of finding and fixing security flaws.
  5. A common online attack method involving fraudulent emails.
  6. A network security device that monitors and filters incoming and outgoing traffic.
  7. An open-source intelligence gathering technique.
  8. A term for ethically hacking a system.
  9. An organized event where hackers test their skills.
  10. The art of disguising communication within another medium.
  11. A type of malware that demands payment for the return of stolen data.
  12. The practice of attacking a system to test its security.
  13. A person who finds and reports security vulnerabilities for rewards.
  14. A malicious program that spreads across systems and networks.
  15. A type of attack where multiple systems flood a target with traffic.
Down
  1. The exploitation of software vulnerabilities by malicious hackers.
  2. The unauthorized access of data in transit.
  3. A cryptographic key used in public key cryptography.
  4. A protocol used for secure internet communication.
  5. The process of analyzing network traffic for malicious activity.
  6. An organization that sets standards for securing information systems.
  7. A type of attack that overwhelms a system with traffic.
  8. A hidden malicious software that provides backdoor access.
  9. A form of social engineering to manipulate users into giving up confidential information.
  10. A global, decentralized group known for hacktivism.
  11. A popular TV series about a hacker with dissociative identity disorder.

26 Clues: A term for ethically hacking a system.The unauthorized access of data in transit.An open-source intelligence gathering technique.The practice of finding and fixing security flaws.A protocol used for secure internet communication.An organized event where hackers test their skills.A global, decentralized group known for hacktivism....

Ethnic Studies 5.5 (Redlining) 2024-08-15

Ethnic Studies 5.5 (Redlining) crossword puzzle
Across
  1. maps developed by the Home Owners’ Loan Corporation showing mortgage lending risks in different neighborhoods
  2. 1968 act banning refusal to sell or rent a dwelling to any person because of marginalized status
  3. racial segregation that is required by law or policy
  4. residential security maps category for the "riskiest" neighborhoods
  5. in 2016, White families had 8 and 10 times more wealth than Black and Hispanic families, respectively
  6. residential security maps category for "still desirable" neighborhoods
  7. upgrading low-income neighborhoods, causing higher costs of living and resident displacement
  8. reduced economic mobility for people of color
  9. nonviolent protests in which participants sit and refuse to leave, often resulting in their arrest
  10. residential security maps category for "declining" neighborhoods
Down
  1. racially restrictive covenants became increasingly common around the United States
  2. residential security maps category for affluent suburbs
  3. denying a person the right to buy or rent a home due because of marginalized status
  4. 1926 Supreme Court case that affirmed the constitutionality of racially restrictive covenants
  5. encouraging owners to sell their properties because people of color are moving into a neighborhood
  6. banks refusing to make loans to people living in certain geographic locations
  7. non-white people
  8. segregation of people into separate areas by fact rather than by law or policy
  9. provisions in real estate deeds prohibiting sales to people from marginalized groups
  10. between 1946-1959, 2% of homes insured by the Federal Housing Administration were available to people of color

20 Clues: non-white peoplereduced economic mobility for people of colorracial segregation that is required by law or policyresidential security maps category for affluent suburbsresidential security maps category for "declining" neighborhoodsresidential security maps category for the "riskiest" neighborhoods...

Security Verification 2013-07-19

Security Verification crossword puzzle
Across
  1. True or False? If a customer wants us to provide them with their account center User ID, I verify primary security information only.
  2. Can an account holder change their monther's maiden name to a secuirty word?
  3. If an account holder wants to close a CD or do an early withdrawal and they did a change of address in the last two months, how many Account Level questions must they answer?
  4. If an account holder wants to have ATM access removed from their Money Market account AND they want to Remove Backup withholding, do I have to ask just two Account Level questions?
  5. What Money Page article should you refer to if you have questions regarding account verification?
Down
  1. If you are verifying a customer whose mother's maiden name is shortened to four characters, you should update the system with the full name. True or False?
  2. If an account holder wants an official checked mailed out but they have changed their address with you today, what verification are you required to do?
  3. If an account holder can only verify one piece of their primary security, the call should be transferred where?
  4. If an account holder wants to remove a POA from their account, what type of verification is required?
  5. What program should I use if a customer can verify two primary security questions and one account level question?
  6. Beside the account holders name, how many pieces of information are you required to verify prior to releasing account-specific information?

11 Clues: Can an account holder change their monther's maiden name to a secuirty word?What Money Page article should you refer to if you have questions regarding account verification?If an account holder wants to remove a POA from their account, what type of verification is required?...

security technology 2014-07-07

security technology crossword puzzle
Across
  1. layer
  2. encryption scheme
  3. system
  4. control protocol
  5. reads your mail
Down
  1. layer
  2. private network
  3. key distribution
  4. layer
  5. protocol/internet layer
  6. intercepts your mail and modify
  7. mail and sign your name
  8. risk

13 Clues: risklayerlayerlayersystemprivate networkreads your mailkey distributioncontrol protocolencryption schemeprotocol/internet layermail and sign your nameintercepts your mail and modify

IT SECURITY 2022-10-27

IT SECURITY crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. network security device that monitors and filters incoming and outgoing network traffic
  7. good privacy an open source and freely available software package for email security
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. The conversion of encrypted data into its original form
  3. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

11 Clues: The conversion of encrypted data into its original formgood privacy an open source and freely available software package for email securitynetwork security device that monitors and filters incoming and outgoing network trafficthe process of converting information or data into a code, especially to prevent unauthorized access....

Network Security 2024-01-30

Network Security crossword puzzle
Across
  1. these are attached to a document or spreadsheet and use the macro/ scripting function
  2. this is a self-replicating computer program
  3. regular backups should be made so data can be ___________
  4. these will lie dormant until a specific piece of program code is activated
Down
  1. these are assigned to each user to ensure they may only access certain files
  2. word to describe programs that can steal/ alter data
  3. passwords can be guessed as users _____ passwords
  4. these will prevent unauthorised access to data
  5. where a user can take a copy of a file it is ____ & ____ access
  6. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
  7. these replicate without the use of a host file

11 Clues: this is a self-replicating computer programthese will prevent unauthorised access to datathese replicate without the use of a host filepasswords can be guessed as users _____ passwordsword to describe programs that can steal/ alter dataregular backups should be made so data can be ___________...

Security SOP 2024-10-07

Security SOP crossword puzzle
Across
  1. The "go to" Security notebook
  2. Everyone must wear Safety ________ (plural)
  3. Tell supervisor the ________ for a fire alarm
  4. Who to call on weekends for Dry Air alarms
  5. Acronym for Panasonic Energy Corporation of America
  6. Allowed only in designated area
Down
  1. Required Eye Personal Protective Equipment
  2. Federal Agency responsible for Workplace Safety
  3. Safety Representative for PECA
  4. First thing to pull out during any alarm
  5. Third element on Periodic table

11 Clues: The "go to" Security notebookSafety Representative for PECAThird element on Periodic tableAllowed only in designated areaFirst thing to pull out during any alarmRequired Eye Personal Protective EquipmentWho to call on weekends for Dry Air alarmsEveryone must wear Safety ________ (plural)Tell supervisor the ________ for a fire alarm...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The act of growing only one type of crop on a farm.
  2. What is needed to grow crops, often affected by drought.
  3. The lack of enough nutritious food to stay healthy
  4. A food preservation method using low temperatures.
Down
  1. Lack of consistent access to food.
  2. A person who grows crops or raises animals or food.
  3. A shortage of rain over a long time.
  4. Farming done in cities often in small spaces.
  5. A crop commonly used to make bread
  6. Food that is grown without using harmful chemicals
  7. A grain that is common food in many Asian countries.

11 Clues: Lack of consistent access to food.A crop commonly used to make breadA shortage of rain over a long time.Farming done in cities often in small spaces.Food that is grown without using harmful chemicalsThe lack of enough nutritious food to stay healthyA food preservation method using low temperatures.A person who grows crops or raises animals or food....

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Felling you get when you have no food.
  2. A grain that feeds millions of people worldwide.
  3. Essential for growing crops.
  4. What we eat to stay alive.
  5. A place where food is grown.
  6. What you call breakfast,lunch or dinner
Down
  1. When people have little or no money to buy food.
  2. A common grain used to make bread.
  3. Plants grown in large amounts for food.
  4. Help given to countries during food crises.
  5. A time when there is no food in an entire region.

11 Clues: What we eat to stay alive.Essential for growing crops.A place where food is grown.A common grain used to make bread.Felling you get when you have no food.Plants grown in large amounts for food.What you call breakfast,lunch or dinnerHelp given to countries during food crises.When people have little or no money to buy food....

Food security 2024-11-28

Food security crossword puzzle
Across
  1. CAN BE FOUND IN CURD
  2. OPPOSITE OF TIDY
  3. SIGNIFICANT MEASURES TO PREVENT FROM HARM
  4. GOOD FOR DIGESTIVE SYSTEM
  5. OPPOSITE OF CLEAN
Down
  1. MEDICINE TO REMOVE PESTS
  2. NAME TAG
  3. PROCESS OF REMOVING INFECTIOUS THINGS
  4. MANDATORY ACTIVITY BEFORE EATING
  5. END OF LIFE
  6. SOURCE OF MULTIVITAMIN

11 Clues: END OF LIFENAME TAGOPPOSITE OF TIDYOPPOSITE OF CLEANCAN BE FOUND IN CURDSOURCE OF MULTIVITAMINMEDICINE TO REMOVE PESTSGOOD FOR DIGESTIVE SYSTEMMANDATORY ACTIVITY BEFORE EATINGPROCESS OF REMOVING INFECTIOUS THINGSSIGNIFICANT MEASURES TO PREVENT FROM HARM

Security Adobe 2025-10-17

Security Adobe crossword puzzle
Across
  1. FTeB5SkrOZM=
  2. vp6d18mfGL+5n2auThm2+Q==
  3. dA8D8OYD55E=
  4. L3uQHNDF6Mw=
  5. 7Z6uMyq9bpxe1EB7HijrBQ==
Down
  1. WqflwJFYW3+PszVFZo1Ggg==
  2. 2aZl4Ouarwm52NYYI936YQ==
  3. zk8NJgAOqc4=
  4. L8qbAD3jl3jSPm/keox4fA==
  5. yxzNxPIsFno=
  6. WlMTLimQ5b4=

11 Clues: zk8NJgAOqc4=FTeB5SkrOZM=dA8D8OYD55E=L3uQHNDF6Mw=yxzNxPIsFno=WlMTLimQ5b4=WqflwJFYW3+PszVFZo1Ggg==2aZl4Ouarwm52NYYI936YQ==L8qbAD3jl3jSPm/keox4fA==vp6d18mfGL+5n2auThm2+Q==7Z6uMyq9bpxe1EB7HijrBQ==

network security 2026-03-17

network security crossword puzzle
Across
  1. The process of converting information or data into a code to prevent unauthorized access.
  2. The process of verifying the identity of a user, device, or system.
  3. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication.
  4. The process of taking encoded or sealed data and turning it back into a format that you or the computer can read.
  5. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. A weakness or flaw in a system’s security that could be exploited by a threat.
  2. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  5. Software used to prevent, scan, detect, and delete viruses from a computer.
  6. A service that creates a safe, encrypted connection over a less secure network, such as the internet.

11 Clues: The process of verifying the identity of a user, device, or system.Software used to prevent, scan, detect, and delete viruses from a computer.A weakness or flaw in a system’s security that could be exploited by a threat.The process of converting information or data into a code to prevent unauthorized access....

j808 4.1 types of threats 2019-01-09

j808 4.1 types of threats crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. any software that shows adverts
  3. Software that encrypts programs and data until a ransom is paid to remove it.
  4. When someone deceives by pretending to be someone else in order to get personal data.
  5. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  6. Criminals make a promise of goods in return for details, such as offering a free music download.
  7. Program that hides in a computer and allows someone from a remote location to take full control of the computer
Down
  1. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  2. A type of Malware that locates and saves data from users without them knowing about it
  3. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. Collection of captured bot computers
  5. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  6. malware that allows a cyber-security attacker to take control of an infected computer
  7. An error in a program that prevents the program from running as expected.
  8. horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer

15 Clues: any software that shows advertsCollection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

Cybersecurity Vocab 2022-03-10

Cybersecurity Vocab crossword puzzle
Across
  1. Credit and Copyright
  2. Cipher
  3. Your Own Device (BYOD)
  4. Stalking
Down
  1. Certificate
  2. Triad
  3. Hygiene

7 Clues: TriadCipherHygieneStalkingCertificateCredit and CopyrightYour Own Device (BYOD)

The Global Village 2024-11-12

The Global Village crossword puzzle
Across
  1. the whole world together
  2. quicker
  3. hitting, fighting or calling someone names
  4. less hard or harsh
  5. energy that will never run out
  6. to make fun of someone to hurt them
  7. to do with friendship and relationships
  8. words used to communicate
  9. made by humans, not nature
Down
  1. to make someone angry
  2. making used things into new things
  3. make someone feel sad or worried
  4. something done on the internet
  5. when you end a fight or argument
  6. an accent that is easier to understand than another
  7. fighting with words

16 Clues: quickerless hard or harshfighting with wordsto make someone angrythe whole world togetherwords used to communicatemade by humans, not naturesomething done on the internetenergy that will never run outmake someone feel sad or worriedwhen you end a fight or argumentmaking used things into new thingsto make fun of someone to hurt them...

Disability specialist week crossword 2021-06-13

Disability specialist week crossword crossword puzzle
Across
  1. Who is the current president of WADE
  2. What state children's disability program does WI administer?
  3. What year did the disability program start?
  4. Who is the current vice president of WADE
  5. How many NADE presidents have been from Wisconsin?
  6. What is the Social Security region that WI DDS reports to
  7. What program besides Social Security disability does WI DDS make decisions for?
  8. what is your state disability examiner association
  9. lakes Which region does WI NADE chapter belong to?
Down
  1. How many years has NADE been in existence?
  2. What is the NADEs newsletter called?
  3. Before Michelle, who was previous DDS administrator?
  4. How many years has NADE been in existence?
  5. How many regions does Social Security have?
  6. How many dollars does it cost to be a member of NADE?
  7. How many NADE presidents have been from Wisconsin?
  8. Who is the current treasurer of WADE
  9. Who is the current secretary of WADE
  10. What is your national association of disability examiners
  11. Who does NADE represent?
  12. What are the initials for the office that reviews the quality of disability decisions

21 Clues: Who does NADE represent?Who is the current president of WADEWhat is the NADEs newsletter called?Who is the current treasurer of WADEWho is the current secretary of WADEWho is the current vice president of WADEHow many years has NADE been in existence?How many years has NADE been in existence?How many regions does Social Security have?...

Cyber Crime 2020-07-05

Cyber Crime crossword puzzle
Across
  1. /phrase used for authenticating a system
  2. / first person to be found guilty of cyber crime
  3. / breaking into your computer without your knowledge or consent
  4. /fake links or fake software
  5. /a type of spyware that records keyboard activities
Down
  1. /large volume of emails sent to the victim for the webserver crash.
  2. /Vital Information Resource under seize
  3. / selling of pirated software through physical media or electronic downloads.
  4. / politically motivated hacking to conduct sabotage and espionage
  5. /a method to promote sextortion

10 Clues: /fake links or fake software/a method to promote sextortion/Vital Information Resource under seize/phrase used for authenticating a system/ first person to be found guilty of cyber crime/a type of spyware that records keyboard activities/ breaking into your computer without your knowledge or consent...

CYBER CROSSWORD 2023-02-13

CYBER CROSSWORD crossword puzzle
Across
  1. Activez l’ ______ multifactorielle sur tous vos appareils quand elle est disponible
  2. Type de cyberattaque qui verrouille vos données et vos appareils
  3. Changez toujours le _______ de passe par défaut de votre réseau domestique
  4. Logiciel malveillant conçu pour avoir accès à vos appareils
  5. Vous devriez utiliser un VPN si vous naviguez sur un réseau Wi-Fi _______
Down
  1. Des mots de passe sécurisés, c’est bien, mais des _______ de passe c’estmieux
  2. Vous devriez______ tous les appareils qui se connectent en ligne
  3. Faites des _____ à jour régulièrement pour sécuriser vos logiciels
  4. Installez un logiciel ______ pour protéger votre ordinateur
  5. ______ criminels

10 Clues: ______ criminelsInstallez un logiciel ______ pour protéger votre ordinateurLogiciel malveillant conçu pour avoir accès à vos appareilsVous devriez______ tous les appareils qui se connectent en ligneType de cyberattaque qui verrouille vos données et vos appareilsFaites des _____ à jour régulièrement pour sécuriser vos logiciels...

Cyber crossword 2022-12-06

Cyber crossword crossword puzzle
Across
  1. The arrangement of the various elements (computers, routers, switches, etc) of a network.
  2. Analyze something without interfering or affecting it.
  3. A computer, typically one on a network.
  4. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
Down
  1. The way an organization structures and organizes the information that is required by their employees and/or customers.
  2. An agreed-upon method for communication.
  3. Typically, the last two elements of a URL. With domain names, organizations can build URLs.
  4. ervice can have two meanings in computer terminology:
  5. A computer that delivers files forming web pages across a network to requesting clients.
  6. A starting point for data analysis. It is the initial data set used in later comparisons.

10 Clues: A computer, typically one on a network.An agreed-upon method for communication.ervice can have two meanings in computer terminology:Analyze something without interfering or affecting it.A computer that delivers files forming web pages across a network to requesting clients....

Cyber Safety 2020-12-17

Cyber Safety crossword puzzle
Across
  1. a duty you have to yourself or others
  2. a secret string of letters, symbols, and numbers that you can use to restrict who can access something digital
  3. the acceptable way of communicating on the internet
  4. a group of people who share the same interests or goals
  5. things having to do with computers or the internet
Down
  1. a worldwide network that connects people using computers, phones, or other devices
  2. a picture you take of of yourself, usually with a phone
  3. different parts of your culture, experiences, and interests that make you unique
  4. a character other than a number or letter, such as #, !, or @.
  5. a name you create to sign into a website, app, or game

10 Clues: a duty you have to yourself or othersthings having to do with computers or the internetthe acceptable way of communicating on the interneta name you create to sign into a website, app, or gamea picture you take of of yourself, usually with a phonea group of people who share the same interests or goals...

Cyber 101 2021-04-15

Cyber 101 crossword puzzle
Across
  1. designed to keep the bad guys out
  2. enables several devices to communicate on the same network
  3. tells a computer to perform a task
  4. I'll never tell
  5. collection of zombie computers
Down
  1. malicious software to wreak havoc
  2. allows cybercriminals to remotely control your computer
  3. remain anonymous by masking the location and encrypting traffic
  4. I see you
  5. denied

10 Clues: deniedI see youI'll never tellcollection of zombie computersmalicious software to wreak havocdesigned to keep the bad guys outtells a computer to perform a taskallows cybercriminals to remotely control your computerenables several devices to communicate on the same networkremain anonymous by masking the location and encrypting traffic