cyber security Crossword Puzzles

Information security test 2025-03-14

Information security test crossword puzzle
Across
  1. Napad koji preplavljuje sistem ogromnim brojem zahtjeva kako bi ga onemogućio.
  2. Virtualna privatna mreža koja šifrira saobraćaj kako bi osigurala privatnost na internetu.
  3. KOPIJA Najbolja zaštita od ransomware napada – redovno čuvanje podataka.
  4. SOFTVER Zajednički naziv za zlonamjerne softvere poput virusa, trojanaca i crva.
  5. Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima.
  6. Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.
  7. Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.
  8. ZID Sigurnosni sistem koji filtrira mrežni saobraćaj kako bi spriječio neovlašteni pristup.
  9. Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.
  10. TESTIRANJE Simulirani napad na sistem s ciljem identifikacije ranjivosti.
Down
  1. KONJ Vrsta zlonamjernog softvera koji se prikazuje kao legitimni softver, ali sadrži zlonamjerne funkcije.
  2. NIVO POVJERENJA Sigurnosni model koji podrazumijeva nepovjerenje prema svim korisnicima dok se ne autentifikuju.
  3. RANJIVOSTI Iskorištavanje slabosti softvera ili sistema radi neovlaštenog pristupa.
  4. AUTENTIFIKACIJA Sigurnosna metoda koja zahtijeva više faktora autentifikacije.
  5. IDENTITETA Krađa ličnih podataka radi prevare ili financijske dobiti.
  6. Napad koji koristi lažne e-mailove kako bi prevario korisnike da otkriju svoje podatke.
  7. BRUTALNOM SILOM Napad u kojem napadač isprobava veliki broj kombinacija lozinki dok ne pronađe ispravnu.

17 Clues: Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima....

Learning Unit 9: Security Risk Reviews 2023-05-05

Learning Unit 9: Security Risk Reviews crossword puzzle
Across
  1. refer to the specialized knowledge and expertise needed to accomplish complex actions, tasks, and processes relating to computational and physical technology as well as a diverse group of other enterprises.
  2. Through _____________, our goal is to understand how well the current security program operates within the technical architecture.
  3. As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis.
  4. These controls are used to manage the organization’s information security and compliance efforts and to address the people part of security. These types of controls include things like policies, standards, procedures, and training. These are not exciting, but are absolutely critical to good information security and compliance management.
  5. Typically the controls that you can touch. These controls are designed to manage physical access to information and include things like door locks, alarm systems, and camera surveillance. It really doesn’t matter how good your antivirus software is if someone can easily steal your server.
  6. is a collaborative process used to identify security-related issues, determine the level of risk associated with those issues, and make informed decisions about risk mitigation or acceptance.
Down
  1. This is the IT part of security. Notice how the IT part of security is only one part of security and not all parts of security? Technical controls are what most people think of when they think of information security. These controls include things like firewalls, antivirus software, passwords, and permissions.
  2. is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.
  3. should be a planned part of the risk management process and involve regular checking or surveillance. The results should be recorded and reported externally and internally, as appropriate. The results should also be an input to the review and continuous improvement of the firm's risk management framework.
  4. was founded in 1901 and is now part of the U.S. Department of Commerce. _____________ is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time — a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany and other economic rivals.
  5. is ensuring that information is accurate. Accurate information is critical to us in making sound decisions. The opposite of integrity is (unauthorized) alteration.

11 Clues: is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis....

Chapter 2 Vocabulary 2022-11-21

Chapter 2 Vocabulary crossword puzzle
Across
  1. A type of ETF transaction; money is deposited directly into the customer's checking account.
  2. someone who assists you with purchasing stocks and bonds
  3. Any organization that provides services related to money
  4. A security that pays interest over terms of ten or thirty years.
  5. owners are personally liable for their company’s losses
  6. A security that matures in a year or loss.
Down
  1. A financial institution that does not accept deposits
  2. Action taken to manage supply of money and interest rate.
  3. A financial institution that accepts money from customers and deposits it into the customer's account.
  4. A document guaranteeing payment of a specific amount.
  5. A security that pays interest over terms ranging from two to ten years.
  6. A financial investment issued by a corporation, government, or other organization.

12 Clues: A security that matures in a year or loss.A financial institution that does not accept depositsA document guaranteeing payment of a specific amount.owners are personally liable for their company’s lossessomeone who assists you with purchasing stocks and bondsAny organization that provides services related to money...

Once Upon a Time C 2021-09-30

Once Upon a Time C crossword puzzle
Across
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  3. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  4. The ? gardener was willing to travel to different places where there was work.
  5. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  6. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  7. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  8. Due to neglect, some of the ? of the homes required some painting and repairs.
  9. As ? for the broken security alarm, the company offered them six months of service for no charge.
  10. As usual, the father was ? by the beeping of his phone at 6:00 am.
  11. For their safety, they ? to the Neighbourhood Watch program.
  12. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
  1. After many false alarms, the family wondered about the ? of the security system.
  2. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  3. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  4. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  5. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  6. Nervously, the resident noticed the ? of a figure below the street light.
  7. When slicing bread or tomato, it is easier using a knife with ?.
  8. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  9. Residents ? their fears of criminals by installing sophisticated security devices.
  10. cherished red wagon with the supplies for phys. Ed.
  11. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  12. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
  13. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  14. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  15. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  16. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  17. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.

29 Clues: cherished red wagon with the supplies for phys. Ed.For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light....

Smart City Crossword Puzzle 2019-03-20

Smart City Crossword Puzzle crossword puzzle
Across
  1. effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
  2. the process of combining software components, hardware components, or both into an overall system
  3. act of periodically checking processes, equipment and environment in order to detect any changes
  4. big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
  5. ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
  6. an extended social group having a distinctive cultural and economic organization
Down
  1. collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
  2. process by which people become residents of cities
  3. ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
  4. a native or naturalized member of a state or other political community
  5. ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
  6. the organized action of making of goods and services for sale
  7. ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information

13 Clues: process by which people become residents of citiesthe organized action of making of goods and services for salea native or naturalized member of a state or other political communityan extended social group having a distinctive cultural and economic organization...

Private Security Chapter 1-3 Terminology 2019-09-27

Private Security Chapter 1-3 Terminology crossword puzzle
Across
  1. the aim of punishment is to prevent or deter persons from engaging in future crime
  2. when security organizations work to prevent crime
  3. official data on crime that are reported to law enforcement agencies across the United States
  4. a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
  5. when security officers respond for security purposes after a crime has been attempted or committed
  6. the eight major crimes included in Part 1 of the Uniform Crime Report
Down
  1. any action taken to reduce crime risks and build individual and community safety
  2. the first regular police force in London
  3. when security organizations police the community all work together to solve crime
  4. who formed Chicago's first private detective agency in 1850
  5. Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
  6. Scanning Analysis Response Assess
  7. a call to citizens to assist in an emergency situation

13 Clues: Scanning Analysis Response Assessthe first regular police force in Londonwhen security organizations work to prevent crimea call to citizens to assist in an emergency situationwho formed Chicago's first private detective agency in 1850the eight major crimes included in Part 1 of the Uniform Crime Report...

Orientation 2023-01-06

Orientation crossword puzzle
Across
  1. email
  2. compliance training
  3. customer data
  4. peer to peer ackowledgment
  5. bnh intranet page
Down
  1. information security training
  2. expenses
  3. volunteer and charitable giving
  4. employee assistance program
  5. bank security
  6. Clock in/Clock out

11 Clues: emailexpensescustomer databank securitybnh intranet pageClock in/Clock outcompliance trainingpeer to peer ackowledgmentemployee assistance programinformation security trainingvolunteer and charitable giving

Information Security crossword 2021-07-06

Information Security crossword crossword puzzle
Across
  1. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  2. ISO 27001 is the international standard for _____________
  3. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  4. Guarantee of reliable access to the information by authorized people
  5. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  6. An asset that is essential to an organization and must be suitably protected
  7. Prevents the unauthorized use or disclosure of information
  8. You should never share this with anyone
  9. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
  1. You should report Phishing emails in the ___________ console
  2. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  3. Protecting the accuracy and completeness of information and processing methods
  4. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  5. Encodes the data in such a way that it is unintelligible without a key
  6. A software program that is designed to prevent malware
  7. Where to report a security incident? - __________@tavant.com
  8. Effect of uncertainty on objectives
  9. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details

18 Clues: Effect of uncertainty on objectivesYou should never share this with anyoneA software program that is designed to prevent malwareISO 27001 is the international standard for _____________Prevents the unauthorized use or disclosure of informationYou should report Phishing emails in the ___________ console...

AI Security Awareness 2025-04-25

AI Security Awareness crossword puzzle
Across
  1. A type of machine learning where the model finds patterns and relationships in unstructured data without labeled responses.
  2. Data that requires protection due to its confidential nature.
  3. A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
  4. The simulation of human intelligence processes by machines, especially computer systems.
  5. Most AI chatbots are this type of LLM. Stands for generative pre-trained transformer.
  6. A type of neural network architecture used for natural language processing tasks.
  7. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. A type of machine learning where the model is trained on labeled or structured data.
  2. A type of AI that enables computers to learn from data and improve their performance over time without being explicitly programmed.
  3. The ability of AI to interact and converse with humans in a natural way through human language.
  4. Refers to AI models that can create new content, such as text, images, or music.
  5. AI-generated media that mimics real people, often used to create misleading or false content.
  6. A method of trying to gather personal information using deceptive e-mails and websites.
  7. The right of individuals to keep their personal information secure and free from unauthorized access.
  8. Systematic error introduced into data or algorithms that can lead to unfair outcomes.
  9. An AI program designed to simulate conversation with human users.
  10. Large Language Model; an AI model trained on vast amounts of text data to understand and generate human language.

17 Clues: Data that requires protection due to its confidential nature.An AI program designed to simulate conversation with human users.Refers to AI models that can create new content, such as text, images, or music.A type of neural network architecture used for natural language processing tasks....

Digital security fundamentals 2022-12-17

Digital security fundamentals crossword puzzle
Across
  1. The strongest password is: Crrrrrrrr@!!!, Gi0rg10, Mino012106, It@l1@, C@neSalutoFrutta
  2. Attack attempting to discover a password by systematically trying every possible combination
  3. 2 factors is a kind of strong …….
  4. Program used to detect unsolicited, unwanted and virus-infected emails is a …… filter
  5. When criminals use scam email they are trying to …. you
  6. A piece of code capable of copying itself
  7. Using this tool you can find out who an IP address belongs to
  8. Using a social handle or username of a person or business in your post or photo
Down
  1. Hostile online interaction that involves insulting messages between users
  2. Your computer will have many popups….
  3. Bronze medal again in 2022 as a password: an evergreen!
  4. Searching for and publishing private or identifying information about a particular individual on the internet
  5. Do not open if you don’t trust the sender
  6. A person who takes or use your computer information
  7. When criminals use scam sms they are trying to …. you
  8. A sequence of words or other text used to control access to a computer
  9. Fraudulent calls or voicemails

17 Clues: Fraudulent calls or voicemails2 factors is a kind of strong …….Your computer will have many popups….Do not open if you don’t trust the senderA piece of code capable of copying itselfA person who takes or use your computer informationWhen criminals use scam sms they are trying to …. youBronze medal again in 2022 as a password: an evergreen!...

Safety/Security Meeting 2025-09-24

Safety/Security Meeting crossword puzzle
Across
  1. Vernon & Fortino are the branch
  2. Put away all _____ information before helping a new client
  3. Always file a ______ incident within 72 hours
  4. We report media concerns to media
  5. Try to _______ disruptive behavior
  6. Fire, Gas & Bomb threats warrant immediate
  7. The yellow emergency Binder contains _______ procedures
  8. Who we call in the event of an emergency
  9. If you're approached in the lobby by the robber, get the money from the _____ line
Down
  1. Go to the ____ when the opening signal is not set or set incorrectly
  2. We use this checklist at the end of the day
  3. During a robbery, pay close attention to the person's
  4. Lock your ____ when leaving your computer
  5. Comply with the robber's
  6. Use the alarm keypad if the _____ button isn't available
  7. Know the procedure to allow _____ for unknown vendors
  8. A normal opening of the branch requires ____ employees

17 Clues: Comply with the robber'sVernon & Fortino are the branchWe report media concerns to mediaTry to _______ disruptive behaviorWho we call in the event of an emergencyLock your ____ when leaving your computerFire, Gas & Bomb threats warrant immediateWe use this checklist at the end of the dayAlways file a ______ incident within 72 hours...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Smart City Crossword Puzzle 2019-03-20

Smart City Crossword Puzzle crossword puzzle
Across
  1. big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
  2. a native or naturalized member of a state or other political community
  3. ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
  4. the process of combining software components, hardware components, or both into an overall system
  5. effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
  6. an extended social group having a distinctive cultural and economic organization
Down
  1. ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
  2. the organized action of making of goods and services for sale
  3. ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
  4. process by which people become residents of cities
  5. act of periodically checking processes, equipment and environment in order to detect any changes
  6. collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
  7. ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information

13 Clues: process by which people become residents of citiesthe organized action of making of goods and services for salea native or naturalized member of a state or other political communityan extended social group having a distinctive cultural and economic organization...

Synopsys 12 Days of AppSec 2023-12-08

Synopsys 12 Days of AppSec crossword puzzle
Across
  1. A method of AppSec testing in which testers examine an application while it’s running, but have no knowledge of the application’s internal interactions or designs at the system level, and no access or visibility into the source program.
  2. A trending practice in application security (AppSec) that involves introducing security earlier in the software development life cycle (SDLC).
  3. A descriptive model that provides a baseline of observed activities for software security initiatives.
  4. An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities.
  5. Software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
  6. A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users.
Down
  1. The processes, practices, and tools used to identify, repair, and protect against vulnerabilities in applications, throughout the software development life cycle (SDLC)
  2. The combination of practices and tools designed to increase an organization’s ability to deliver applications and services faster than traditional software development processes
  3. A structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
  4. An authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system.
  5. Flaw in a computer system that weaken the overall security of the device/system.
  6. An inventory of what makes up a software application

12 Clues: An inventory of what makes up a software applicationFlaw in a computer system that weaken the overall security of the device/system.A descriptive model that provides a baseline of observed activities for software security initiatives.A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users....

Matt 2016-06-07

Matt crossword puzzle
Across
  1. showing the violence
  2. friends is when you play on the phone
  3. is an a electronic
  4. a site for exploring
  5. strangers that you can meet
  6. a bigger screen than an iPad
  7. is a thing that you are youse for my Computer
  8. taking a screen of when you can get back on again
  9. a small square showing your face
  10. somebody that cheats
Down
  1. that you play online with
  2. a site were you can post stuff.
  3. is a device
  4. a site for videos
  5. people that teach you
  6. reports that come out
  7. are people that help you
  8. to protect your device
  9. bully somebody that is mean online
  10. small activities

20 Clues: is a devicesmall activitiesa site for videosis an a electronicshowing the violencea site for exploringsomebody that cheatspeople that teach youreports that come outto protect your deviceare people that help youthat you play online withstrangers that you can meeta bigger screen than an iPada site were you can post stuff....

Airport Crossword 2019-02-12

Airport Crossword crossword puzzle
Across
  1. Centre provides comprehensive ... and booking service
  2. Located on top floor of the terminal. Provides a view of airfield
  3. Go there to eat/drink
  4. Located throughout international airport terminal to communicate. Have to pay to use
  5. Responsibility for aviation security should be shared between the NZ Police and the Military of transport
  6. Available throughout terminals to assist passengers
  7. Rooms with cots and changing tables are available.
  8. You can access this for computer or mobile usage
  9. Available for emergancy use
Down
  1. Where you can buy items cheaper and non-taxed
  2. Where you can buy small goods for yourself or as a gift
  3. Provided as a quiet place for contemplation to all travellers
  4. Will check you to ensure no transporting of any dangerous goods
  5. Available to help transfer luggage
  6. Changing currency types
  7. Secure baggage storage and luggage wrapping is available at SmartCarte
  8. Passengers first contact with airport to book a space. Can be long term or short term
  9. Available for transit passengers. Can buy supplies from vending machine
  10. Can access smoking lounge after security
  11. Getting cash out

20 Clues: Getting cash outGo there to eat/drinkChanging currency typesAvailable for emergancy useAvailable to help transfer luggageCan access smoking lounge after securityWhere you can buy items cheaper and non-taxedYou can access this for computer or mobile usageRooms with cots and changing tables are available....

CROSSWORD 2023-03-18

CROSSWORD crossword puzzle
Across
  1. Facilitated by ensuring
  2. Consequences of individual actions
  3. PATTERN, Theory explain crimes committed
  4. Theory minimize other factors
  5. Formal, human, and security
  6. Theory visible of crime
  7. Have four major components
  8. Engage in crime
  9. Theories classified three types
  10. 36,8 Volumes published
  11. Father of Sociology
  12. Act law makes punishable
  13. Grandfather of Charles Darwin
  14. Father of Criminal Justice
  15. Defensible space theory
  16. Human cells 22 pairs
  17. Classical school began
Down
  1. Act becomes morally right
  2. Greek word "physis" meaning
  3. Punishing who do offend
  4. Human behavior impact behavior
  5. Theory called " consequentialist"
  6. Laws enacted in 1926
  7. TRAITS, Theories determine person's character
  8. Theories external influences
  9. Mind and Logos meaning
  10. Heavy or obese
  11. Were antisocial and apathetic
  12. Link criminal behavior twins
  13. Somatotype thin and flat
  14. Deterrence from criminal act
  15. Were manic-depressive
  16. Personal location called
  17. Person's awareness space
  18. TOPINARD, French Anthropologist
  19. Incorporation of security hardware
  20. Theory relation criminal offending
  21. Basic security and behavioral
  22. "Structurally significant phenomenon"
  23. LANGE, Studied DZ,MZ twins

40 Clues: Heavy or obeseEngage in crimeFather of SociologyLaws enacted in 1926Human cells 22 pairsWere manic-depressiveMind and Logos meaning36,8 Volumes publishedClassical school beganPunishing who do offendTheory visible of crimeDefensible space theoryFacilitated by ensuringSomatotype thin and flatPersonal location calledPerson's awareness space...

Chapter 15 2013-04-25

Chapter 15 crossword puzzle
Across
  1. agreement between an organization and a vendor
  2. this act governs the disclosure and protection of health information
  3. individual well-known for social engineering
  4. scavenging for private data in trash
  5. more than one person is required to complete a task
  6. the safeguarding of personnel's rights
  7. a targeted social engineering attack
  8. documentation about evidence location and usage
  9. helps protect cable from EMI and RFI
Down
  1. a violation of physical security
  2. a formal process for managing changes to the IT environment
  3. this act helps protect the privacy of your social security number
  4. this type of fire extinguisher can be class A, B, C, D, or K
  5. an event that affects the security of an organization
  6. this system helps remove heat from a server room
  7. wiping or purging data
  8. this type of fire suppression system can be wet pipe or dry pipe
  9. a dry pipe fire suppression system with special features
  10. this act governs the disclosure of financial and accounting information
  11. assuring that risks are known and managed

20 Clues: wiping or purging dataa violation of physical securityscavenging for private data in trasha targeted social engineering attackhelps protect cable from EMI and RFIthe safeguarding of personnel's rightsassuring that risks are known and managedindividual well-known for social engineeringagreement between an organization and a vendor...

Bonds and Mutual Funds 2014-11-20

Bonds and Mutual Funds crossword puzzle
Across
  1. A borrowed fund
  2. Fund that comes with sales charge
  3. A publicly traded investment
  4. Large urban area
  5. Income return on an investment
  6. Does not have restrictions on the amount of shares
  7. Debt obligation with coupon
  8. Security that tracks an index
  9. Doesn't pay interest but is traded
  10. Promissory note or corporate bond
  11. Value printed on a coin
  12. Bond whose owner is registered
  13. Completely used up
  14. Bond that can be converted
  15. Debit security issued by a business entity
  16. To make up for something
Down
  1. Distribution of dividends
  2. Mutual fund that comes with sales charge
  3. Municipal bond that has a low risk
  4. Debt security issued by a state
  5. Mutual fund's price per share
  6. Bond secured by mortgage
  7. Final payment date of a loan
  8. Bond that matures at regular intervals
  9. High risk of loss
  10. Stocks in somebody's possession
  11. Shares are sold without commissioner sales charge
  12. Difference between higher priced paid
  13. Ascertaining liabilities

29 Clues: A borrowed fundLarge urban areaHigh risk of lossCompletely used upValue printed on a coinBond secured by mortgageAscertaining liabilitiesTo make up for somethingDistribution of dividendsBond that can be convertedDebt obligation with couponA publicly traded investmentFinal payment date of a loanSecurity that tracks an index...

Maria's favourite words. 2015-12-11

Maria's favourite words. crossword puzzle
Across
  1. / Information.
  2. / Maria’s main concern in the thesis.
  3. / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
  4. / A set of connected things or parts forming a complex whole, in particular.
  5. / Security building blocks
  6. / Antonym: vague.
  7. / A person with a role to promote, display or advertise commercial products.
  8. / Judgement.
  9. / A person’s bodily shape.
  10. / Area or territory controlled by a ruler or government.
Down
  1. / A series of actions or steps taken in order to achieve a particular end.
  2. / A raised level surface on which people or things can stand.
  3. / A thing or things belonging to someone; possessions collectively.
  4. / Action against someone or something.
  5. / Existing or firmly attached within something or under a surface.
  6. / Formal request to an authority for something (e.g., job).
  7. / Put, lay, or stand (something) in a specified place or position.
  8. / Dealing with the nature of being.
  9. / A part of a whole.
  10. / Associated with, able to, or designed for performing one or more practical activities.
  11. / Security-Enhanced Embedded system Design.
  12. / Useful or valuable thing.
  13. / Synonym: sketch, blueprint, outline.

23 Clues: / Judgement./ Information./ Antonym: vague./ A part of a whole./ Security building blocks/ A person’s bodily shape./ Useful or valuable thing./ Dealing with the nature of being./ Maria’s main concern in the thesis./ Action against someone or something./ Synonym: sketch, blueprint, outline./ Security-Enhanced Embedded system Design....

invest retire unit 2024-03-20

invest retire unit crossword puzzle
Across
  1. government retire account
  2. federal insurance contrabutions act
  3. how much you are willing to risk
  4. makes it difficult to change,hack or cheat the system
  5. Mike Washington jr's workplace
  6. union collected retirement
  7. age in which you can start investing
  8. government healthcare
  9. age in which you can collect social security
  10. place of investing and trading
  11. year that social security funds will run out
  12. s&p five hundred
  13. tax free individual retirement account
  14. guilty of 7 counts of fraud and conspiracy (last name)
  15. what makes Bitcoin have worth
  16. exaggerating worth and selling high
Down
  1. president that conseived social security
  2. bad day in stocks pessimisstic
  3. interest on interest
  4. good day in stocks optimist
  5. when a large number of bank customers withdrawl all of their money
  6. not like the movies
  7. how much does the FDIC insured up to
  8. year that medicare funds will run out
  9. when you stop working
  10. he lost 30 million with ftx
  11. a word for gambling with crypto
  12. not fiat money

28 Clues: not fiat moneys&p five hundrednot like the moviesinterest on interestwhen you stop workinggovernment healthcaregovernment retire accountunion collected retirementgood day in stocks optimisthe lost 30 million with ftxwhat makes Bitcoin have worthbad day in stocks pessimissticMike Washington jr's workplaceplace of investing and trading...

Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02

Hekking_JAS IT 2025_Net_Module 11 Crosswords crossword puzzle
Across
  1. control of what users may do after accessing network
  2. technology that makes data unusuable and unreadable to all but authorized users
  3. A public certification authority organization
  4. The most widely used method for encrypting data
  5. A white hat's role
  6. unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
  7. EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
  8. Inherence refers to ... traits
  9. A black hat's role
  10. Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
  1. ethical hacker who probes networks or OSs and reports on vulnerabilities
  2. control of access to network
  3. A common security tool used by Linux administrators
  4. Three credential categories for multifactor authentication: knowledge, possession, and ...
  5. Windows domain associated mutual authentication protocol
  6. A built-in firewall included in many Linux distributions
  7. common client-server authentication protocol
  8. A good security option for servers that are not physically secure
  9. A Linux Files tool that offers a trash can for deleting files permanently
  10. Windows Server Update Services

20 Clues: A white hat's roleA black hat's rolecontrol of access to networkInherence refers to ... traitsWindows Server Update Servicescommon client-server authentication protocolA public certification authority organizationThe most widely used method for encrypting dataA common security tool used by Linux administrators...

Government 2024-07-08

Government crossword puzzle
Across
  1. The President's personal advisors
  2. to approve or confirm officially
  3. High ranking official in executive branch
  4. group of advisers to the president
  5. head of the Department of Justice
  6. department that oversees the federal budget
  7. Head of the U.S. armed forces
  8. department managing the nation's finances
  9. principal Advisor to the President on national security
  10. second in command in the executive branch
  11. formal agreement between countries
  12. authority or influence over an organization
  13. Federal law enforcement agency
  14. federal organization managing emergency response
  15. informal advisory group
  16. to make or enforce rules or policies
  17. A document issued by the President
Down
  1. Secretary heading the Treasury of Department
  2. Position in the Executive branch
  3. title for the leader of the Department of Defence
  4. government department of Foreign Affairs
  5. official statement or directive by the president
  6. meeting between heads and state
  7. Secretray heading the Treasury Department
  8. collection of all executive agencies and departments
  9. federal agency for national security
  10. president's official residence Bureaucracyace
  11. Set principles guiding the government's actions
  12. Government entity responsible for creating laws
  13. leader of the executive branch

30 Clues: informal advisory groupHead of the U.S. armed forcesFederal law enforcement agencyleader of the executive branchmeeting between heads and statePosition in the Executive branchto approve or confirm officiallyThe President's personal advisorshead of the Department of Justicegroup of advisers to the presidentformal agreement between countries...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

CIS178 Cybersecurity Crossword Puzzle 2023-04-19

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. authentication using physical characteristics
  2. people carrying out specific actions
  3. software that installs itself secretly
  4. highly targeted phishing attacks
  5. virus disguised as legitimate software
  6. protect personal data
  7. users directed towards fake websites
  8. updates to improve security
Down
  1. permission to be on hard-drive
  2. security feature to detect hacking
  3. users denied access to services
  4. mathematical fuction that protects information
  5. attempting to obtain sensitive information
  6. prevents unauthorized access
  7. program added for entertainment
  8. emails asking for sensitive information
  9. detect and remove viruses
  10. software that makes data unstable
  11. secret software installed on hard-drive
  12. shared storage accessed online

20 Clues: protect personal datadetect and remove virusesupdates to improve securityprevents unauthorized accesspermission to be on hard-driveshared storage accessed onlineusers denied access to servicesprogram added for entertainmenthighly targeted phishing attackssoftware that makes data unstablesecurity feature to detect hacking...

spanish travel words 2020-04-10

spanish travel words crossword puzzle
Across
  1. What you go through before you enter a country with costumes
  2. train checker
  3. sleeping car
  4. security screenings
  5. train car
  6. first class
  7. boarding pass
  8. flight
  9. suitcase
  10. bunk bed
  11. safety belt
  12. delayed
  13. airport
  14. platform
  15. ticket
  16. window
  17. passenger
  18. waiting room
  19. passport
  20. arrival
  21. train station
  22. visa
  23. seat
  24. on time
Down
  1. economy class
  2. a stop
  3. security agent
  4. flight assistant
  5. departure
  6. second class
  7. aisle
  8. carry on luggage
  9. luggage
  10. boarding gate
  11. international airport
  12. baggage claim
  13. window
  14. flight connection
  15. event ticket
  16. layover
  17. check in counter
  18. ticket
  19. trip/travel

43 Clues: visaseataislea stopflightwindowticketwindowticketluggagedelayedairportlayoverarrivalon timesuitcasebunk bedplatformpassportdeparturetrain carpassengerfirst classsafety belttrip/travelsecond classsleeping carevent ticketwaiting roomeconomy classtrain checkerboarding gatebaggage claimboarding passtrain stationsecurity agentflight assistant...

fnaf crossword 2023-05-19

fnaf crossword crossword puzzle
Across
  1. possess the puppet
  2. this is where your story ends
  3. was the first, saw everything
  4. main character
  5. most confusing character
  6. the most brutal thing in all of fnaf
  7. died in the bite of 83
  8. hello, hello?
  9. gave his creator nightmares
  10. leave the demon to his demons
  11. main villain
  12. everybody hates
Down
  1. but that's just a theory
  2. remember
  3. who we play as in security breach
  4. the dj in security breach
  5. most confusing minigame
  6. main mascot
  7. caused the bite of 87
  8. the king of fnaf
  9. the most popular character
  10. possess baby
  11. the vengeful spirit

23 Clues: remembermain mascotpossess babymain villainhello, hello?main charactereverybody hatesthe king of fnafpossess the puppetthe vengeful spiritcaused the bite of 87died in the bite of 83most confusing minigamebut that's just a theorymost confusing characterthe dj in security breachthe most popular charactergave his creator nightmares...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Fmm project 2024-07-21

Fmm project crossword puzzle
Across
  1. which window displays security capital market segments
  2. expand sureon
  3. nse has a main computer which is connected through
  4. expand SQ
  5. cancelation expand OCXL
  6. Full form of SBRS
  7. which order is to enable the user to view the outstanding orders fir a security
  8. Which manager is a term assigned to a user placed at the highest level in a trading firm
  9. who are the users at the lowest level of the hierarchy
Down
  1. expand NEAT
  2. which displays trading system bar
  3. which market are initiated by the exchange on behalf of tm for settlement related seasons
  4. which wait indicates that price have increased
  5. order which order are orders to buy or sell shares at a stated quantity and price.
  6. expand MBP
  7. which feature allows a TM to get instanteous market information on any desired security

16 Clues: expand SQexpand MBPexpand NEATexpand sureonFull form of SBRScancelation expand OCXLwhich displays trading system barwhich wait indicates that price have increasednse has a main computer which is connected throughwhich window displays security capital market segmentswho are the users at the lowest level of the hierarchy...

FNAF 2022-03-09

FNAF crossword puzzle
Across
  1. Animatronic that runs down the hall in FNAF1
  2. Animatronic who was taken apart in FNAF2
  3. Animatronic which is missing a face in FNAF2
  4. Animatronic controlled by the puppet
  5. Halloween Chica in FNAF4
  6. A very powerful freddy
  7. What the animatronics in FNAF4 are believed as
  8. The main 'animatronic' in FNAF3
  9. Gives you his life story when he jumpscares you in UCN
  10. Nerdylooking Freddy in FNAF6
  11. Upgraded Bonnie in FNAF2
  12. Animatronic in FNAF1 that LOVES pizza.
  13. Crocodile animatronic in Security Breach
  14. Chubby bear in FNAF2
Down
  1. Helps you in FNAF Security Breach
  2. Animatronic which requires music in FNAF2
  3. Elephant in FNAF6
  4. The animatronic in Help Wanted called a glitch
  5. The small bear in FNAF6
  6. Disables your cameras if you don't catch his fish in UCN
  7. Who we play as in FNAF1
  8. In your closet in FNAF4
  9. The main animatronic in FNAF1
  10. Probably the most scariest fanmade game
  11. He can see through your mask in FNAF2
  12. Merge of all the Funtime animatronics in Sister Location
  13. The wolf in Security Breach
  14. Big baby in Sister Location

28 Clues: Elephant in FNAF6Chubby bear in FNAF2A very powerful freddyThe small bear in FNAF6Who we play as in FNAF1In your closet in FNAF4Halloween Chica in FNAF4Upgraded Bonnie in FNAF2The wolf in Security BreachBig baby in Sister LocationNerdylooking Freddy in FNAF6The main animatronic in FNAF1The main 'animatronic' in FNAF3...

Domestic & International Airports 2018-08-15

Domestic & International Airports crossword puzzle
Across
  1. What is the abbreviation for Aviation Security Officer?
  2. The wall of an a/c.
  3. What can you use for free at most airports (excluding bathroom facilities)?
  4. What is the 'code'(hint)of an a/c called?
  5. What is the area where you go through security at the airport?
  6. What city airport is PPQ?
  7. What is'N' in phonetic alphabet?
  8. If I get on a plane what am I doing?
  9. A passenger who does not turn up to their flight.
  10. This is an area, usually adjacent to a terminal, where a/c park.
Down
  1. Where can passengers go if they are wanting to pray before a flight?
  2. What is the area before departing passengers through security at the airport?
  3. Where can you go to ask for help at an airport?
  4. Who play a vital role in customs work and are most referred to as "sniffer dogs"?
  5. Who flies the plane?
  6. What is 'S' in the phonetic alphabet?
  7. What is the airline code of MH?
  8. What is the airport code for Queenstown?
  9. What is 'B' in phonetic alphabet?
  10. Another word for passenger.

20 Clues: The wall of an a/c.Who flies the plane?What city airport is PPQ?Another word for passenger.What is the airline code of MH?What is'N' in phonetic alphabet?What is 'B' in phonetic alphabet?If I get on a plane what am I doing?What is 'S' in the phonetic alphabet?What is the airport code for Queenstown?What is the 'code'(hint)of an a/c called?...

Chapter 15 2013-11-26

Chapter 15 crossword puzzle
Across
  1. helps protect cable from EMI and RFI
  2. this act governs the disclosure and protection of health information
  3. Due ________ is the sageguarding of personnel's rights
  4. this act helps protect the privacy of your social security number
  5. Chain of ___________ documentation about evidence location and usage
  6. a violation of physical security
  7. individual well-known for social engineering
  8. ______ phishing is a targeted social engineering attack
  9. ________ management is a formal process for managing changes to the IT environment
  10. ________ diving is scavenging for private data in trash
  11. this type of fire supression system can be wet pipe or dry pipe
Down
  1. an event that affects the security of an organization
  2. wiping or purging data
  3. this system helps remove heat from a server room
  4. a dry pipe fire supression system with special features
  5. Separation Of ______ means more than one person is required to complete a task
  6. Due __________ is assuring that risks are known and managed
  7. this type of fire extinguisher can be class A, B, C, D, or K
  8. this act governs the disclosure of financial and accounting information
  9. agreement between an organization and a vendor

20 Clues: wiping or purging dataa violation of physical securityhelps protect cable from EMI and RFIindividual well-known for social engineeringagreement between an organization and a vendorthis system helps remove heat from a server rooman event that affects the security of an organizationDue ________ is the sageguarding of personnel's rights...

Cyber security cross word 2023-04-28

Cyber security cross word crossword puzzle
Across
  1. A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
  2. A file or code that infects, explores, steals or conducts any behavior an attacker wants.
Down
  1. A wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  2. A security network that protects your network/devices from unwanted traffic.

4 Clues: A security network that protects your network/devices from unwanted traffic.A file or code that infects, explores, steals or conducts any behavior an attacker wants.A wireless networking technology that uses radio waves to provide wireless high-speed Internet access....

Block 3, Unit 1 2017-09-06

Block 3, Unit 1 crossword puzzle
Across
  1. Windows Event ____ lets you monitor system events.
  2. The ____ toner fault isolation tool has two parts: the toner & the probe
  3. Security management subsystems work by partitioning resources into ____ & unauthorized areas
  4. This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
  5. Per the NSA IATF there are ____ classes of attacks
  6. In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
  7. Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
  8. Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
  9. There are 2 types of fault management: passive & ____
Down
  1. Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
  2. There are ____ steps in the troubleshooting model
  3. This network management area ensures internetwork performance can be maintained at an acceptable level
  4. ____ Manager provides information about programs running on your computer
  5. The ____ event logs can only be accessed by administrators
  6. The goal of this network management is to measure network utilization parameters so it can be regulated
  7. Air Force security management is provided by the ____ systems suite of tools (acronym)
  8. The first step in accounting management is to ____ usage of all important network resources
  9. The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
  10. There are 3 types of event log: Application, Security & ____

19 Clues: There are ____ steps in the troubleshooting modelWindows Event ____ lets you monitor system events.Per the NSA IATF there are ____ classes of attacksThere are 2 types of fault management: passive & ____The ____ event logs can only be accessed by administratorsThere are 3 types of event log: Application, Security & ____...

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
  2. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  3. The ? gardener was willing to travel to different places where there was work.
  4. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  5. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  6. As ? for the broken security alarm, the company offered them six months of service for no charge.
  7. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  8. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  9. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  10. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  12. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
Down
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  3. Due to neglect, some of the ? of the homes required some painting and repairs.
  4. Nervously, the resident noticed the ? of a figure below the street light.
  5. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  6. As usual, the father was ? by the beeping of his phone at 6:00 am.
  7. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  8. For their safety, they ? to the Neighbourhood Watch program.
  9. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  10. Residents ? their fears of criminals by putting in security devices for their homes.
  11. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  12. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

EMD Polices & Procedures 2024-04-12

EMD Polices & Procedures crossword puzzle
Across
  1. All visitors must have a _____ completed in order to be allowed into the facility or do work on the grounds.
  2. Document needed when taking company property off site.
  3. Members of_____ assume control over all emergency situations.
  4. How many steps to disable or enable fire panel.
  5. Temporary badges can only be issued and returned to _____.
  6. Issued to employees and long term contractor to identify a vehicle in the parking lot.
  7. what document is to be completed every time a foreign national enter the shop for a tour.
  8. This report is a firsthand account of the activities the security officer performed while on duty.
  9. FN are permitted to have electronics in this area ONLY.
  10. _____ book is used by CW-EMD security to alert security officers of individuals who previously had access but have been temporarily or permanently rescinded.
  11. These passes are issued for a maximum of 5 days at at time.
  12. This form is used for all reports including an injury report or bomb threat.
  13. Badge worn by contractors who are sole US citizens who have a business relationship that requires daily or frequent visits but will not require access to classified information.
  14. Badge color reserved specifically for foreign nationals.
  15. Application used for alarms and event view.
  16. 2 Pop-up windows in security expert.
  17. _____ visitors wearing this badge must always have an EMD escort with them.
Down
  1. Only post that is manned from 0630-2230 Monday thru Friday.
  2. CW-EMD cleared employees have a _____ on their badge.
  3. Form generated and issued by the purchasing department authorizing equipment to be removed.
  4. Inspection performed by security officers to ensure that employees are using their assigned badge.
  5. Form used by employees to declare and drop off incoming business necessary computer storage/media at central guard.
  6. what type of alarm is High Water Bldg 12.
  7. Special arrangements have been made to allow _____ employees to bring company provided cell phones thru property.
  8. _____ are issued if a person's vehicle information is not in the system.
  9. Required any time work is being done inside the building that could potentially spark a fire.
  10. Sticker on a personally owned cell phone that has been approved by EMD security.
  11. This badge has a yellow background with red lettering.
  12. Post where you control and perform 100% vehicle inspections.
  13. Secured area located in Bldg 3A 2nd floor.
  14. Looking for on visitor ID.
  15. Document with information that must be reported to the next officer.

32 Clues: Looking for on visitor ID.2 Pop-up windows in security expert.what type of alarm is High Water Bldg 12.Secured area located in Bldg 3A 2nd floor.Application used for alarms and event view.How many steps to disable or enable fire panel.CW-EMD cleared employees have a _____ on their badge.Document needed when taking company property off site....

Investing Unit 2024-03-20

Investing Unit crossword puzzle
Across
  1. At what age can you collect even more benefits from Social Security if you wait
  2. Ease with which an asset or security can be converted into cash without affecting the market price
  3. A sustained period of rising prices and optimistic sentiment in a financial market
  4. These funds are sold actively throughout the day and are Passively managed
  5. How can I buy a Mutual Fund
  6. An individual who buys and sells with the intention of profiting short term
  7. Bonds issued by company that have a fixed interest rate and face value
  8. At what age can you invest in Crypto
  9. Portion of the company's earnings distributed to shareholders as a return on investment
  10. Profit realized from sale of a capital asset like stock or real estate
  11. What indices comprises 30 blue chip companies?
  12. Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
  1. An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
  2. Buying different stocks from different companies
  3. Investing equal amounts of money at regular intervals
  4. At what age must you take a minimum from your retirement accounts each year (RMD)
  5. These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
  6. The age you can start collecting Social Security
  7. The process of offering shares f a private corporation to the public in a new stock issuance
  8. This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
  9. A unique combination of letters to represent a particular public ally traded company's stock or security
  10. A security that represents ownership of a fraction of a corporation
  11. Retirement account where money goes in after tax and is taken out penalty and tax free
  12. Bonds issued by the Government where you pay under face value and don't pay interest
  13. Retirement account where money is put in before taxes but is taken out taxed
  14. A market where prices are falling and a pessimistic outlook overall
  15. Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
  16. This is a federal payroll tax that is deducted from every paycheck
  17. Types of jobs that usually offer a pension
  18. Investing a big sum of money in one go

30 Clues: How can I buy a Mutual FundAt what age can you invest in CryptoInvesting a big sum of money in one goTypes of jobs that usually offer a pensionWhat indices comprises 30 blue chip companies?Buying different stocks from different companiesThe age you can start collecting Social SecurityInvesting equal amounts of money at regular intervals...

cybersecurity 2022-05-24

cybersecurity crossword puzzle
Across
  1. A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
  2. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  3. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  5. Designed to detect and destroy computer virus
  6. An individual who gains unauthorized access to a computer system/network for social or political purposes.
  7. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  8. internet Is the global system of interconnected computer networks that use the Internet protocol suite
  9. A network point that acts as an entrance to another network
  10. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  11. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  12. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  13. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
  1. Gaining access into a computer system/network illegally.
  2. an automated program that runs over the Internet
  3. Self-replicating virus that does not alter files but resides in active memory and duplicates itself
  4. Data confidentiality is a measure of the ability of a system to protect its data
  5. A person who uses computers to gain unauthorized access to data
  6. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  7. Software that is intended to damage or disable computers and computer systems
  8. Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
  9. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  10. A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
  11. management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
  12. Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
  13. Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.

26 Clues: Designed to detect and destroy computer virusan automated program that runs over the InternetGaining access into a computer system/network illegally.A network point that acts as an entrance to another networkA person who uses computers to gain unauthorized access to dataSoftware that is intended to damage or disable computers and computer systems...

Cybersecurity Terms 2023-03-17

Cybersecurity Terms crossword puzzle
Across
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. is a method of connecting a series of computers and devices in a private encrypted network
  9. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. is used to protect your information from hackers.
  5. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. A form of malware used by hackers to spy on you and your computer activities
  7. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. Any technology, be it software or hardware, used to keep intruders out.
  9. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

20 Clues: is used to protect your information from hackers.Any technology, be it software or hardware, used to keep intruders out.A form of malware used by hackers to spy on you and your computer activitiesis a method of connecting a series of computers and devices in a private encrypted network...

Chapter 2 Vocabulary 2022-11-21

Chapter 2 Vocabulary crossword puzzle
Across
  1. A type of ETF transaction; money is deposited directly into the customer's checking account.
  2. someone who assists you with purchasing stocks and bonds
  3. Any organization that provides services related to money
  4. A security that pays interest over terms of ten or thirty years.
  5. owners are personally liable for their company’s losses
  6. A security that matures in a year or loss.
Down
  1. A financial institution that does not accept deposits
  2. Action taken to manage supply of money and interest rate.
  3. A financial institution that accepts money from customers and deposits it into the customer's account.
  4. A document guaranteeing payment of a specific amount.
  5. A security that pays interest over terms ranging from two to ten years.
  6. A financial investment issued by a corporation, government, or other organization.

12 Clues: A security that matures in a year or loss.A financial institution that does not accept depositsA document guaranteeing payment of a specific amount.owners are personally liable for their company’s lossessomeone who assists you with purchasing stocks and bondsAny organization that provides services related to money...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Health class 2022-10-24

Health class crossword puzzle
Across
  1. hands and feet/touch
  2. helps 3
  3. a person who supports 1
  4. bystander a person who see someone bullying but does nothing
  5. a person who is the target of 1
Down
  1. internet/tech
  2. to choose to something
  3. words
  4. a person who targets someone for a long time
  5. feeling down for a long time

10 Clues: wordshelps 3internet/techhands and feet/touchto choose to somethinga person who supports 1feeling down for a long timea person who is the target of 1a person who targets someone for a long timebystander a person who see someone bullying but does nothing

Health crossword 2022-10-24

Health crossword crossword puzzle
Across
  1. someone who constantly hurts someone
  2. someone who stands and watches
  3. someone who stands up for victim
  4. hitting punching
  5. a process of hurting yourself
Down
  1. being sad for a small portion of time
  2. name calling and mean words
  3. being mean online
  4. being sad for 1 or more weeks
  5. of process of decisions

10 Clues: hitting punchingbeing mean onlineof process of decisionsname calling and mean wordsbeing sad for 1 or more weeksa process of hurting yourselfsomeone who stands and watchessomeone who stands up for victimsomeone who constantly hurts someonebeing sad for a small portion of time

Bullying dan emosional 2024-01-16

Bullying dan emosional crossword puzzle
Across
  1. cara mengendalikan emosi pada diri sendiri...
  2. apa itu emosional...
  3. bullying dengan cacian dan umpatan kebencian merupakan bullying berupa
  4. bagaimana cara mengendalikan emosi...
  5. apa penyebab terjadinya emosional...
Down
  1. apa dampak emosional..
  2. pembullyan melalui teknologi, merupakan ..... Bullying
  3. tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
  4. pihak yang terlibat dalam bullying?
  5. bullying adalah suatu tindakan...

10 Clues: apa itu emosional...apa dampak emosional..bullying adalah suatu tindakan...pihak yang terlibat dalam bullying?apa penyebab terjadinya emosional...bagaimana cara mengendalikan emosi...cara mengendalikan emosi pada diri sendiri...pembullyan melalui teknologi, merupakan ..... Bullying...

Bullying, Conflict and Being Mean 2024-03-10

Bullying, Conflict and Being Mean crossword puzzle
Across
  1. A Maori representation of a person's life through their wellbeing
  2. Bullying through the digital world
  3. Every now and then
  4. Yin and Yang
  5. In the open
Down
  1. Bullying through the use of physical actions
  2. Two sides
  3. In secret
  4. Bullying through the use of words
  5. Synonym for repeated

10 Clues: Two sidesIn secretIn the openYin and YangEvery now and thenSynonym for repeatedBullying through the use of wordsBullying through the digital worldBullying through the use of physical actionsA Maori representation of a person's life through their wellbeing

QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen 2025-07-24

QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen crossword puzzle
Across
  1. - Zweiter Faktor, der kompromittiert wurde
  2. - Die Art des Cyberangriffs
  3. - Wohin der QR-Code tatsächlich führt
  4. - Der visuelle Köder im Angriff
Down
  1. - Der Übertragungsweg des Angriffs
  2. - Die App zur Login-Verifizierung
  3. - Psychologischer Trick in der Nachricht
  4. - Das gestohlene Element zur Umgehung des Logins
  5. - Der gefälschte Login-Dienst
  6. - Rogers Rolle in diesem Cyber-Drama

10 Clues: - Die Art des Cyberangriffs- Der gefälschte Login-Dienst- Der visuelle Köder im Angriff- Die App zur Login-Verifizierung- Der Übertragungsweg des Angriffs- Rogers Rolle in diesem Cyber-Drama- Wohin der QR-Code tatsächlich führt- Psychologischer Trick in der Nachricht- Zweiter Faktor, der kompromittiert wurde...

teka teki keamanan jaringan 2025-11-29

teka teki keamanan jaringan crossword puzzle
Across
  1. SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
  2. Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
  3. (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
  4. Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
  5. SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
  6. IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.
  7. DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
  8. MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
  9. Metodekeamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
  10. Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
  11. SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
  12. Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
  13. Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
Down
  1. Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
  2. Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
  3. Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
  4. Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
  5. Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
  6. SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
  7. Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
  8. Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.

21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah.Memastikan hanya pengguna yang berwenang yang dapat mengakses data.SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak....

Puzzle on Security 2020-06-02

Puzzle on Security crossword puzzle
Across
  1. When an information is protected from disclosure or exposure to unauthorized individuals or systems
  2. When an information is whole, complete, and uncorrupted
  3. Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
  4. Software programs that hide their true nature and reveal their designed behavior only when activated
  5. These software components or programs are designed to damage, destroy, or deny service to the target
  6. the act of sending an e-mail message with a modified field
  7. The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
  8. When an information is free from mistakes or errors and it has the value that the end user expect
Down
  1. A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
  2. Computer Security centered on a system
  3. A computer consists of segments of code that perform malicious actions
  4. A well-known and broad category of electronic and human activities that can breach the confidentiality of information
  5. A malicious program that replicates itself constantly, without requiring another program environment
  6. This German code machine _______ were first broken by the Poles in the year 1930
  7. A category of objects, persons, or other entities that presents a danger to an asset
  8. The probability that something unwanted will happen
  9. An intentional or unintentional act that can cause damage to information and/or the systems that support it

17 Clues: Computer Security centered on a systemThe probability that something unwanted will happenWhen an information is whole, complete, and uncorruptedthe act of sending an e-mail message with a modified fieldA computer consists of segments of code that perform malicious actions...

Information Security crossword 2021-07-06

Information Security crossword crossword puzzle
Across
  1. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  2. An asset that is essential to an organization and must be suitably protected
  3. You should report Phishing emails in the ___________ console
  4. Guarantee of reliable access to the information by authorized people
  5. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
  6. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  7. Prevents the unauthorized use or disclosure of information
  8. Effect of uncertainty on objectives
  9. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  10. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
Down
  1. You should never share this with anyone
  2. A software program that is designed to prevent malware
  3. Where to report a security incident? - __________@tavant.com
  4. Protecting the accuracy and completeness of information and processing methods
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. ISO 27001 is the international standard for _____________
  7. Encodes the data in such a way that it is unintelligible without a key
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______

18 Clues: Effect of uncertainty on objectivesYou should never share this with anyoneA software program that is designed to prevent malwareISO 27001 is the international standard for _____________Prevents the unauthorized use or disclosure of informationWhere to report a security incident? - __________@tavant.com...

CYBER SAFETY 2023-01-02

CYBER SAFETY crossword puzzle
Across
  1. LIKE CATFISHING BUT ONLINE
  2. BAD OR DANGEROUS
  3. CODE TO HARM COMPUTERS
  4. CODE TO STEAL COMPUTER DATA
  5. RELATING TO THE COMPUTER CULTURE
Down
  1. PROGRAMS USED BY COMPUTERS
  2. SHORT FOR MALICIOUS SOFWARE
  3. SHOULD BE STRONG AND LONG

8 Clues: BAD OR DANGEROUSCODE TO HARM COMPUTERSSHOULD BE STRONG AND LONGLIKE CATFISHING BUT ONLINEPROGRAMS USED BY COMPUTERSSHORT FOR MALICIOUS SOFWARECODE TO STEAL COMPUTER DATARELATING TO THE COMPUTER CULTURE

profesions 2021-04-23

profesions crossword puzzle
Across
  1. someone who has a business
  2. driver a person that drive buss
  3. person who teach student
  4. a person who flies a plane
  5. the person who works on a farm
  6. a person that take photos
  7. a person that gives lectures usually in a university
  8. bank employee the person who serving the people in bank
  9. they make bread and cakes and work in bakery
  10. the person in charge of maintaining security
  11. the person checking the others
Down
  1. the person in charge of maintaining security of the country
  2. a person that can fix the problem you have with your teeth
  3. the person who serving the people in restorant
  4. a person who catch fish
  5. the man who lead the mass
  6. person who act in film
  7. a person trained to help a doctor look after the sick or injured
  8. a person who has the jobs of designing things
  9. a person that works in the science industry
  10. the person who work in kitchen
  11. a person that defends people in court and gives legal advice

22 Clues: person who act in filma person who catch fishperson who teach studentthe man who lead the massa person that take photossomeone who has a businessa person who flies a planethe person who works on a farmthe person who work in kitchenthe person checking the othersdriver a person that drive bussa person that works in the science industry...

11.5 Testout Crossword 2023-03-28

11.5 Testout Crossword crossword puzzle
Across
  1. uses radio waves to transmit data from small circuit boards
  2. the standard mechanism to dynamically assign IP addresses within a network
  3. a triple-A protocol
  4. an encrypted security protocol that protects internet traffic on wireless networks.
  5. electromagnetic radiation with wavelengths longer than those of visible light and shorter than radio waves
  6. developed at MIT and is a key component of Windows Active Directory
  7. a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
  8. a file-level storage architecture that makes stored data more accessible to networked devices
  9. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
  1. Internet Protocol Address
  2. is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs
  3. a symmetric block cipher chosen by the U.S. government to protect classified information.
  4. combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
  5. a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
  6. a new WFA security standard for personal and enterprise networks
  7. network that uses wireless data connections between network nodes.
  8. Characters that give wifi a unique name
  9. allows the antennae to divide streams between multiple devices.

18 Clues: a triple-A protocolInternet Protocol AddressCharacters that give wifi a unique nameuses radio waves to transmit data from small circuit boardsallows the antennae to divide streams between multiple devices.a new WFA security standard for personal and enterprise networksnetwork that uses wireless data connections between network nodes....

Online bullying 2024-06-11

Online bullying crossword puzzle
Across
  1. online platform
  2. when someone is picking on you constantly
  3. going to the police to fill in a
  4. someone to talk to at school
Down
  1. connected to a group of things
  2. someone you can seek out
  3. protecting yourself online
  4. Another name for the internet
  5. a platform used with internet
  6. to stop people contacting you
  7. someone to talk to at home

11 Clues: online platformsomeone you can seek outprotecting yourself onlinesomeone to talk to at homesomeone to talk to at schoolAnother name for the interneta platform used with internetto stop people contacting youconnected to a group of thingsgoing to the police to fill in awhen someone is picking on you constantly

BackLash 2020-03-04

BackLash crossword puzzle
Across
  1. Brother of Bree
  2. What is the boy name on the fake account
  3. Lara’s former best friend
  4. Came to Lara to ask question
  5. Lara makes this team
  6. who is Lara’s best friend
  7. The sister of Lara
Down
  1. Took pills because of bullying
  2. Where does Liam ad Sydney hang out
  3. What does Bree to Lara

10 Clues: Brother of BreeThe sister of LaraLara makes this teamWhat does Bree to LaraLara’s former best friendwho is Lara’s best friendCame to Lara to ask questionTook pills because of bullyingWhere does Liam ad Sydney hang outWhat is the boy name on the fake account

Forensic Midterm 2022-03-14

Forensic Midterm crossword puzzle
Across
  1. Online criminal activity
  2. plaster replica of an impression
  3. Dents left behind as evidence
  4. The study of a crime
Down
  1. The way humans write
  2. A device used to access the internet
  3. The investigation of fire
  4. Medicine for the teeth
  5. Rapid oxidization releasing light and heat
  6. A handheld device used to perform a function

10 Clues: The way humans writeThe study of a crimeMedicine for the teethOnline criminal activityThe investigation of fireDents left behind as evidenceplaster replica of an impressionA device used to access the internetRapid oxidization releasing light and heatA handheld device used to perform a function

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. illegale Personen die sich in Computersysteme einloggen?
  2. Information eines dritten?
  3. Engineering Manipulation ohne Technische Geräte?
  4. unerwünschte Werbenachrichten?
  5. Viren , die in einem Programm drinnen sind?
Down
  1. Ansprechen von Minderjährigen?
  2. Versteck in einem nützlichen Programm?
  3. Überbegriff für unerwünschte, Schädliche Software?
  4. Surfing Beobachtung bei der Eingabe von Daten?
  5. Hintertür zu einem anderen Computer?

10 Clues: Information eines dritten?Ansprechen von Minderjährigen?unerwünschte Werbenachrichten?Hintertür zu einem anderen Computer?Versteck in einem nützlichen Programm?Viren , die in einem Programm drinnen sind?Surfing Beobachtung bei der Eingabe von Daten?Engineering Manipulation ohne Technische Geräte?Überbegriff für unerwünschte, Schädliche Software?...

internet saftey 2024-02-27

internet saftey crossword puzzle
Across
  1. steal your personal info
  2. can show you bad stuff
  3. to use there matrial
  4. has a lot of dangerous stuff
Down
  1. bullies are trying to hurt your feelings
  2. email is trying to get you to spread your info
  3. needs to be strong
  4. try to take your money
  5. info needs to be private
  6. are mean people

10 Clues: are mean peopleneeds to be strongto use there matrialtry to take your moneycan show you bad stuffsteal your personal infoinfo needs to be privatehas a lot of dangerous stuffbullies are trying to hurt your feelingsemail is trying to get you to spread your info

TETATEKI 2025-05-07

TETATEKI crossword puzzle
Across
  1. Kumpulan data atau dokumen yang disimpan di komputer
  2. Satuan terkecil dalam data digital
  3. Alat elektronik untuk mengolah data
  4. Alat input yang digunakan untuk menggerakkan pointer di layar
  5. Aplikasi untuk membuka halaman web
  6. Amanat atau wilayah dunia maya
  7. Fakta mentah yang bisa diolah menjadi informasi
  8. Surat elektronik
Down
  1. Perangkat lunak yang membantu komputer menjalankan tugas
  2. Hasil dari pengolahan data
  3. Perangkat output yang menampilkan gambar atau teks
  4. Jaringan komunikasi global yang menghubungkan komputer di seluruh dunia
  5. Tempat penyimpanan data secara online
  6. Perangkat keras dalam sistem komputer
  7. Alat input berupa papan ketik

15 Clues: Surat elektronikHasil dari pengolahan dataAlat input berupa papan ketikAmanat atau wilayah dunia mayaSatuan terkecil dalam data digitalAplikasi untuk membuka halaman webAlat elektronik untuk mengolah dataTempat penyimpanan data secara onlinePerangkat keras dalam sistem komputerFakta mentah yang bisa diolah menjadi informasi...

CYBER 2017-04-20

CYBER crossword puzzle
Across
  1. WIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?
  2. WAS FINDET MAN OFT AUF STREAMING SEITEN
  3. SOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMT
  4. Man's best friend
Down
  1. MOBBING IM INTERNET NENNT SICH
  2. OPFER BRAUCHEN UNTERSTÜTZUNG VON..

6 Clues: Man's best friendMOBBING IM INTERNET NENNT SICHOPFER BRAUCHEN UNTERSTÜTZUNG VON..WAS FINDET MAN OFT AUF STREAMING SEITENSOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMTWIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?

FITD Vocab.af 2013-05-15

FITD Vocab.af crossword puzzle
Across
  1. the internet and online world
  2. Where you connect to a network using a wired connection (internet)
  3. searches all search engines and gets the top results
  4. SSID
  5. Alternatively to as high-speed Internet or wide band transmission
  6. a program that allows you to search the internet for information
  7. long term memory
  8. the way you behave online
  9. a readable file
  10. Homeland Security (NCSA)
  11. CPU
  12. examples: headphones, speakers
  13. the heart of the computer
  14. the software of a laptop
  15. hand free speaking device
  16. set of structured activies (safari, firefox)
  17. 8 bits make a ____
  18. is a sequence of instructions
  19. created with a copyright symbol on it
  20. location for CD in your laptop
  21. a device that displays signals on a computer screen
  22. a brief background of your history
Down
  1. is equal to 1,099,511,627,776 bytes
  2. ISP
  3. portable device
  4. where all information is stored
  5. when the computer isn't working you ____ it back up
  6. this is a program
  7. What do they want? who is asking? Why do they want it?
  8. a port used to connect a computer a mouse or a keyboard to an IBM compatible computer
  9. is an object on a computer that stores data
  10. rules and behavior to keep you and your computer safe
  11. short term memory
  12. USB (flash drive)
  13. examples: flashdrive, keyboard, mouse, etc
  14. LCD
  15. the purpose of this is to upgrade your computer
  16. LED
  17. a device that receives data and projected data
  18. a storage device or backup device that you can access
  19. A electronical and physical port
  20. to protect information and networks
  21. a program on your device that allows you to download and upload
  22. is a physical components of computer wiring (the inside of the computer)
  23. cloud based presentation on the internet. There is only one slide that can be edited. .

45 Clues: ISPLCDCPULEDSSIDportable devicea readable filelong term memorythis is a programshort term memoryUSB (flash drive)8 bits make a ____Homeland Security (NCSA)the software of a laptopthe way you behave onlinethe heart of the computerhand free speaking devicethe internet and online worldis a sequence of instructionsexamples: headphones, speakers...

6 grade vocabulary crossword puzzle 2025-01-30

6 grade vocabulary crossword puzzle crossword puzzle
Across
  1. bullying online bullying
  2. Place where the photo was taken
  3. To not be nown
  4. punching or fighting someone
  5. To hit someone
  6. To increase or widen participation or impact
  7. The person doing the harassing or bullying
  8. A winess to harassment
  9. an argument or disagreement that isn't nescessarily repepeated
Down
  1. Information about what's in the photo
  2. A form of harassment or bullying used
  3. Can't talk
  4. abuse To tell a police offshore of a abuse
  5. mesing around with someone
  6. A Target privately or publicly
  7. To go for one person
  8. a wepsite that no one can use

17 Clues: Can't talkTo not be nownTo hit someoneTo go for one personA winess to harassmentbullying online bullyingmesing around with someonepunching or fighting someonea wepsite that no one can useA Target privately or publiclyPlace where the photo was takenInformation about what's in the photoA form of harassment or bullying used...

November Cross word 2023-11-24

November Cross word crossword puzzle
Across
  1. We need more!
  2. Highest ranked pre-season team.
  3. I'm not a veggie; I'm a fall fruit.
  4. Student-written and delicious.
Down
  1. Community heroes.
  2. The new Monday champion.
  3. It's giving.
  4. Re-issued the Thanksgiving proclamation in 1863.

8 Clues: It's giving.We need more!Community heroes.The new Monday champion.Student-written and delicious.Highest ranked pre-season team.I'm not a veggie; I'm a fall fruit.Re-issued the Thanksgiving proclamation in 1863.

Security Crossword Puzzle 2022-10-17

Security Crossword Puzzle crossword puzzle
Across
  1. All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected
  2. Improper Security Practices, Classified data spills, Improper marking of classified information, Introduction, or use of unauthorized electronics
  3. An ongoing screening process to review the background of an individual who is already assigned to a sensitive position or has access to classified information.
  4. You must notify your FSO/CPSO of this at least 30 days before
  5. Giovanni Fiorella
  6. Controlled Unclassified Information
  7. Information or material the unauthorized disclosure of which reasonably could be expected to cause SERIOUS damage to national security
Down
  1. 800-424-9098
  2. Jay Triplett, Jason Hughes, and Bradley Beatty
  3. Non-Disclosure agreement
  4. Joey Barone
  5. Information or material the unauthorized disclosure of which reasonably could be expected to cause EXCEPTIONALLY GRAVE damage to national security

12 Clues: Joey Barone800-424-9098Giovanni FiorellaNon-Disclosure agreementControlled Unclassified InformationJay Triplett, Jason Hughes, and Bradley BeattyYou must notify your FSO/CPSO of this at least 30 days beforeAll members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected...

Standards Law & Ethics of Cybersecurity 2023-06-08

Standards Law & Ethics of Cybersecurity crossword puzzle
Across
  1. Link that is ______ often found on social media and SMS is one of the Phishing Scams.
  2. By sharing ______ date it potentially threatens personal safety.
  3. What should you do if you receive suspicious links on your mobile phone?
  4. Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
  1. Resending fake emails to everyone who knows you can be identified as _______.
  2. Do not ______ your password.
  3. _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
  4. Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.

8 Clues: Do not ______ your password.By sharing ______ date it potentially threatens personal safety.What should you do if you receive suspicious links on your mobile phone?Resending fake emails to everyone who knows you can be identified as _______.Link that is ______ often found on social media and SMS is one of the Phishing Scams....

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. Free software that can be downloaded from the internet.
  2. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  3. The internet version of Junk mail
  4. Buying products on the Internet using credit cards or other electronic payments
  5. Short for Random Access Memory
  6. From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
  7. Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
  1. Small text files that websites save in your web browser to store information like your username and password.
  2. A name you use to identify yourself on a computer or website.
  3. A type of malware that spies on what you do on the internet and can steal information about you
  4. A computer that has been hacked into and is used to launch malicious attacks
  5. The last part of a URL eg;.gov .com
  6. Marking something or someone as suspicious or inappropriate.
  7. When a computer calls out to another computer to see if it is active.
  8. Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.

15 Clues: Short for Random Access MemoryThe internet version of Junk mailThe last part of a URL eg;.gov .comFree software that can be downloaded from the internet.Marking something or someone as suspicious or inappropriate.A name you use to identify yourself on a computer or website.When a computer calls out to another computer to see if it is active....

Cyber Cross-Word 2022-05-19

Cyber Cross-Word crossword puzzle
Across
  1. shortest-path-first routing protocol
  2. type of AV-based thats unusual for the user
  3. software that displays unwanted ad
  4. transmission media with cables
  5. secure communications techniques
  6. SIEM tool that enable to search, analyze...
  7. tool that uses multiple antivirus engines
Down
  1. firewall keeps track of com sessions
  2. 8e8c92b1c360cbe3cd2b40d6b29278d5
  3. packet analyzer
  4. software/hardware that creates/runs VM
  5. attract attackers
  6. secret - cb5ceb103977f1271d0763ac75fcd8e9
  7. an open-source EDR
  8. interaction between snmp agent manager

15 Clues: packet analyzerattract attackersan open-source EDRtransmission media with cables8e8c92b1c360cbe3cd2b40d6b29278d5secure communications techniquessoftware that displays unwanted adfirewall keeps track of com sessionsshortest-path-first routing protocolsoftware/hardware that creates/runs VMinteraction between snmp agent manager...

Cyber Crossword Puzzle 2025-09-15

Cyber Crossword Puzzle crossword puzzle
Across
  1. Something like a phone, laptop, or tablet
  2. A fix for a security problem in software
  3. Software that protects against malware
  4. Protects your network from threats
  5. Someone who breaks into systems
  6. Scrambles information to keep it safe
  7. A copy of your files kept safe
Down
  1. A secret code you use to log in
  2. A fake email that tries to trick you
  3. Keeps your software current and safe
  4. A secure way to connect on the internet
  5. Bad software that harms your computer
  6. A common way hackers send scams
  7. What you should do to your device when away
  8. Unwanted or junk emails

15 Clues: Unwanted or junk emailsA copy of your files kept safeA secret code you use to log inA common way hackers send scamsSomeone who breaks into systemsProtects your network from threatsA fake email that tries to trick youKeeps your software current and safeBad software that harms your computerScrambles information to keep it safe...

Bullying 2023-10-23

Bullying crossword puzzle
Across
  1. The use of technology to harass, threaten, embarrass, or target another person
  2. A tool to verbally bully
  3. Spread behind peoples back
  4. A Bird that cyberbullies
  5. Saying or writing mean things
  6. Involves hurting someone’s reputation or relationships
Down
  1. Person who is nearby or a witness to a bullying situation
  2. A tool to cyberbully
  3. Hurting a person’s body or possessions
  4. Person who steps in to stop a bullying situation
  5. A tool to physically bully
  6. Target
  7. Aggressor

13 Clues: TargetAggressorA tool to cyberbullyA tool to verbally bullyA Bird that cyberbulliesA tool to physically bullySpread behind peoples backSaying or writing mean thingsHurting a person’s body or possessionsPerson who steps in to stop a bullying situationInvolves hurting someone’s reputation or relationships...

Information Security Crossword 2017-02-15

Information Security Crossword crossword puzzle
Across
  1. Completion of Information Security and DPA annual training is ____________
  2. When you receive an email with a link to a bogus website it is called _________
  3. A type of use that should be limited when using Society systems ________
  4. This should only be installed on Society systems by approved administrators ______
  5. Something that can infect a PC/Laptop is known as a ________
  6. Personal information is protected by this act _______
  7. All colleagues must comply with these information security documents _______
  8. This should be worn at all times when on Society premises __________
  9. You should not allow others to do this when accessing Society premises ______
Down
  1. Always ensure your _________ is locked when you are away from your computer.
  2. A tidy desk is also known as a _________ desk
  3. When you received unsolicited email from unknown sources this is called ______
  4. These should never be shared __________
  5. It should be changed immediately if suspected of being compromised
  6. Information Security policies are published on it ___________
  7. Skipton may ______________ your internet usage
  8. Personal journal published on the World Wide Web ________

17 Clues: These should never be shared __________A tidy desk is also known as a _________ deskSkipton may ______________ your internet usagePersonal information is protected by this act _______Personal journal published on the World Wide Web ________Something that can infect a PC/Laptop is known as a ________...

High Security Estate 2017-01-31

High Security Estate crossword puzzle
Across
  1. Untidy place to eat
  2. To pay for company
  3. Spikey steel
  4. After a shampoo
  5. Location to catch a plane from
  6. Provide relevant information
  7. fixteen in a room
Down
  1. To come and go
  2. Part of me
  3. Stop drop roll
  4. More then a scan
  5. Hands on
  6. Above standard
  7. Silver stripe
  8. Party after a wedding
  9. Wireless
  10. American word for phone

17 Clues: Hands onWirelessPart of meSpikey steelSilver stripeTo come and goStop drop rollAbove standardAfter a shampooMore then a scanfixteen in a roomTo pay for companyUntidy place to eatParty after a weddingAmerican word for phoneProvide relevant informationLocation to catch a plane from

IFG Security Knowledge 2025-11-24

IFG Security Knowledge crossword puzzle
Across
  1. Primary source for finding SAP CPI
  2. Accredited area to work SAP
  3. F-22 ISSM
  4. F-22 CSSO
  5. Report travel to CSSO __ days prior to travel
  6. Willful or negligent action
  7. Days to complete PSQ Template 3 after travel
  8. Used to Nominate an individual for SAP Access
Down
  1. Provides guidance on security baseline policies
  2. Utilized to indicate the SAP accesses of LM Aero Employees
  3. Secure Voice/fax capable
  4. Dedicated unclassified F-22 program area
  5. F-16 CSSO
  6. Required form to request network access
  7. F-16 ISSM
  8. Individual whose program access is not maintained by LM Aero
  9. Risk Management Methodology

17 Clues: F-22 ISSMF-16 CSSOF-22 CSSOF-16 ISSMSecure Voice/fax capableAccredited area to work SAPWillful or negligent actionRisk Management MethodologyPrimary source for finding SAP CPIRequired form to request network accessDedicated unclassified F-22 program areaDays to complete PSQ Template 3 after travelReport travel to CSSO __ days prior to travel...

Word List 2020-04-28

Word List crossword puzzle
Across
  1. a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
  2. evil which is commited by hackers every day
  3. is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  4. person who can intrude the system
  5. the process of encoding information
  6. characteristics or information
  7. a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
  8. two-dimensional barcode
  9. the utility that lets the hacker to trace the data of user's device
  10. to destroy the secret of the data
  11. the domain that lets the hacker trace the personal geolocation.
Down
  1. a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
  2. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  3. computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
  4. situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
  5. to kidnap the data
  6. any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
  7. a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
  8. the most popular remote access trojan
  9. the global system of interconnected computer networks
  10. case of programms for interacting with wireless networks
  11. to get the data in a dishonest way
  12. critical system error on Windows

23 Clues: to kidnap the datatwo-dimensional barcodecharacteristics or informationcritical system error on Windowsperson who can intrude the systemto destroy the secret of the datato get the data in a dishonest waythe process of encoding informationthe most popular remote access trojanevil which is commited by hackers every day...

Chapter 36 2014-04-30

Chapter 36 crossword puzzle
Across
  1. were the industries that include financial services?
  2. where did manufacturing jobs move out of?
  3. what were the names of the general people who left their country to move to safety in 2005?
  4. what is the creation of plants or animals that are genetically identical to an existing plant or animal?
  5. what was created in 2002 to coordinate national efforts against terrorism
  6. what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
  7. what is the abbreviation for European Economic community?
  8. what includes all financial interactions that cross international borders?
  9. what is the abbreviation for the North Atlantic Treaty Organization?
  10. since that late 1960s, more than 14,000 terrorist attacks have occurred where?
  11. in the late 1950s a new style of music emerged called what?
Down
  1. president Bush an anti-terrorism bill called what?
  2. access to TV, radio, and phones are known as
  3. what is a spread of nuclear weapons to other nations called?
  4. what is the working laboratory for experiments in space?
  5. who was one of the greatest champions of human rights that established the order of the missionaries of charity?
  6. what is the voluntary linkage of computer networks around the world?
  7. what is the 20th century attempt to increase food resources worldwide using economic processes?
  8. cultural elements that reflect groups of people with common backgrounds and interests?
  9. what is a major goal for globalization?
  10. the transferring of genes from one living thing to another in order to produce an organism with new traits?
  11. what is the use of violence, on people, or property
  12. the western mind set of placing a high value on acquiring material possessions is what?
  13. what is the greatest global health issue(disease) that was first discovered in the 1980s?

24 Clues: what is a major goal for globalization?where did manufacturing jobs move out of?access to TV, radio, and phones are known aspresident Bush an anti-terrorism bill called what?what is the use of violence, on people, or propertywere the industries that include financial services?what is the working laboratory for experiments in space?...

Brices Puzzle 2024-01-05

Brices Puzzle crossword puzzle
Across
  1. Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
  2. Vision Syndrome A technology-related health condition that affects eyesight.
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. Compression Tool Tool that shrinks the size of a file(s).
  5. Web Design A website development approach that adapts the layout of a website to fit the screen
  6. System Number system that has just two unique digits, 0 and 1, called bits.
  7. An applied science devoted to incorporating comfort
  8. Device Any hardware component that conveys information from a computer or mobile device
  9. A computer that delivers requested webpages
  10. A small text file that a web server stores on your computer.
  11. The electronic component of a computer that interprets and carries
  12. The number of horizontal and vertical pixels in a display device.
  13. Aggregation A website or web app sometimes called a curation website
Down
  1. Device Any hardware component that allows you to enter data and instructions
  2. A business transaction that occurs over an electronic network
  3. The code of acceptable behaviors users should follow while on the Internet
  4. A program designed to make users more productive
  5. Firewall A security tool that detects and protects a personal computer and its data
  6. Device Convergence The trend of computers and devices with technologies
  7. A compromised computer or device whose owner is unaware
  8. Extortionist Someone who demands payment to stop an attack
  9. Someone who accesses a computer or network illegally.
  10. Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
  11. Protector A device that uses electrical components to provide a stable current flow and minimize
  12. Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
  13. A collection of computers and mobile devices connected

26 Clues: A computer that delivers requested webpagesA program designed to make users more productiveAn applied science devoted to incorporating comfortSomeone who accesses a computer or network illegally.A collection of computers and mobile devices connectedA compromised computer or device whose owner is unaware...

September Bootcamp 2022-08-03

September Bootcamp crossword puzzle
Across
  1. How many hours does an admin have to respond to a ransomware event with Ransomware Rollback?
  2. A collection of bots. The term also refers to the malware executed on a connected device which transforms the device into a bot
  3. cloud platform used for partners and MSPs
  4. EDR provides three layers of protection: Network, Process and Desktop _?
  5. A content heavy resource where you can find internal and external facing information
  6. sales methodology that focuses on customer relationships
  7. recently released managed detection and response service
  8. Malwarebytes cofounder and CEO
  9. What is Malwarebytes best known for?
  10. the tool used to automate communication with your customers
  11. cloud console for customers
  12. Regional identifier for sales/support activity in Europe-Middle East- Africa
  13. the platform that hosts e-learning and video tutorials
  14. easy of use term to describe the nebula console
Down
  1. the V in VPM
  2. Technical Account Management
  3. How many layers of live protection does EP provide?
  4. sales enablement content guru who controls highspot and academy
  5. A type of malware which locks users out of their computer and/or encrypts their files, offering to unlock on the condition that the victim pays a ransom
  6. CSM stands for Customer _ Manager
  7. A module for the Nebula platform helps block access to malicious websites and limit threats introduced by suspicious content
  8. abbreviation for Malwarebytes
  9. our internal storage system for documents and files
  10. an open-source equivalent to the Unix operating system
  11. branch of the revops org that runs MWB tech stack
  12. is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
  13. sales enablement services guru who supports MDR
  14. tool for recording and reflecting on calls by reps
  15. form on contract used in Sandler methodology to establish clear intentions and agenda
  16. regional identifier for sales/support activity in Asia-Pacific

30 Clues: the V in VPMcloud console for customersTechnical Account Managementabbreviation for MalwarebytesMalwarebytes cofounder and CEOCSM stands for Customer _ ManagerWhat is Malwarebytes best known for?cloud platform used for partners and MSPssales enablement services guru who supports MDReasy of use term to describe the nebula console...

AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE 2025-06-24

AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE crossword puzzle
Across
  1. Auditors must _________ the results of the sample and their implications.
  2. Auditors need to address _______responsibilities related to data privacy, confidentiality, and the use of IT in the audit process.
  3. Auditors need to acquire and maintain ______ in using new IT tools and techniques.
  4. Performing Audit _________ on Selected Items
  5. Risk that conclusions based on a sample differ from those of the entire population.
  6. Auditors must ________ the nature and cause of deviations or misstatements.
  7. control IT can be used to implement and monitor ________ more effectively, improving the overall control environment.
  8. IT systems are vulnerable to _______ threats, data breaches, and other security risks that could compromise the integrity of audit evidence.
  9. Application of procedures to less than 100% of items in a population.
  10. Ensures each unit has an equal chance of selection.
Down
  1. IT auditors require specialized knowledge and skills to assess the effectiveness of IT controls and systems.
  2. Auditors must adapt to new technologies, manage increased _________ ___________, and address the associated risks to ensure the integrity and reliability of the audit process.
  3. Ongoing ___________ of IT systems and controls is necessary to ensure their effectiveness and identify potential issues.
  4. Electronic data processing and auditing can reduce the likelihood of _____ in audit work and increase the probability of identifying misstatements.
  5. IT enables auditors to analyze ________ datasets, identify anomalies, and detect potential errors or fraud more effectively.
  6. IT facilitates the shift towards ______ audits, reducing reliance on physical documents and streamlining the audit workflow.
  7. Entire set of data from which a sample is selected.
  8. Generally not recommended due to potential bias in contiguous items.
  9. Sample _____ should be sufficient to reduce sampling risk to an acceptably low level.
  10. ________ are projected for each stratum separately, combining results for overall assessment.Information technology (IT) has significantly transformed the audit process, enhancing efficiency and effectiveness while introducing new challenges.

20 Clues: Performing Audit _________ on Selected ItemsEntire set of data from which a sample is selected.Ensures each unit has an equal chance of selection.Generally not recommended due to potential bias in contiguous items.Application of procedures to less than 100% of items in a population....

Online Safety 2023-01-29

Online Safety crossword puzzle
Across
  1. security updates for software
  2. An unsecure Wi-Fi network
  3. Norton, McAfee, AVAST, or AVG
  4. weak-point in a network or system
  5. broad term for viruses
  6. like adware but sent to hackers
  7. confirming a user's identity
  8. using your click against you
  9. records info for advertising purposes
Down
  1. records keystrokes
  2. scan an IP address for open ports
  3. username and password
  4. common in forums and social media
  5. Login now www.amazon1.com
  6. Encrypts data, demands payment
  7. rule-based network security
  8. unsolicited or malicious emails
  9. Browse securely, or work remotely
  10. scrambled text meant to confuse bots
  11. overwhelms a servers resources

20 Clues: records keystrokesusername and passwordbroad term for virusesAn unsecure Wi-Fi networkLogin now www.amazon1.comrule-based network securityconfirming a user's identityusing your click against yousecurity updates for softwareNorton, McAfee, AVAST, or AVGEncrypts data, demands paymentoverwhelms a servers resourcesunsolicited or malicious emails...

Volunteer 2013-03-04

Volunteer crossword puzzle
Across
  1. Alcohol-based hand rub
  2. Body system supporting the spine
  3. Who is responsible for security?
  4. The most single effective way of removing bacteria from hands
  5. Security office location
  6. Bacteria in or on the body not causing illness
  7. Fibrous tissue that links together two bones
  8. Remove Alert Contain Evacuate
  9. Potential to harm health & safety of a person
Down
  1. Posture position with least stress
  2. Work Health & Safety
  3. Used to wash hands
  4. 33 (2 words)
  5. Micro-organisms
  6. A spinal structure
  7. Relates to work evironment
  8. Bacteria in or on the body causing illness
  9. Attach muscles to bone
  10. Code Red
  11. Report incidents to

20 Clues: Code Red33 (2 words)Micro-organismsUsed to wash handsA spinal structureReport incidents toWork Health & SafetyAlcohol-based hand rubAttach muscles to boneSecurity office locationRelates to work evironmentRemove Alert Contain EvacuateBody system supporting the spineWho is responsible for security?Posture position with least stress...

La Snoer crosswords 2014-09-10

La Snoer crosswords crossword puzzle
Across
  1. Spreker
  2. Toegangscontrole tot beschermd gebied
  3. Renaissancestad in Italie
  4. Afkorting van Nuclear Security Summit
  5. Vliegbelasting
  6. Moment waarop aandelen van een NV voor de eerste keer naar de effectenbeurs worden gebracht
  7. zoutjes gemaakt van flinterdunne aardappelschijfjes
  8. Getallen in kalenderjaar
  9. Ruggenraat (Engelse vertaling)
  10. Hoofdstad van Flevoland
  11. Film met Tom Hanks
  12. Engelse lowcost carrier
  13. Zuid Afrikaanse antilope
Down
  1. Onderricht
  2. voormalig bezoekerscentrum van Schiphol
  3. Vulkaan in IJsland
  4. Spaanse lowcost carrier
  5. Iranier
  6. Start- en landingsbaan ten westen van de Zwanenburgbaan
  7. Neerleggen van werk
  8. Watervogel
  9. Veiligheid
  10. Rechterhand van Sinterklaas
  11. Vloeistoffen (Engelse vertaling)
  12. Haarspul
  13. Miscalculatie

26 Clues: SprekerIranierHaarspulOnderrichtWatervogelVeiligheidMiscalculatieVliegbelastingVulkaan in IJslandFilm met Tom HanksNeerleggen van werkSpaanse lowcost carrierHoofdstad van FlevolandEngelse lowcost carrierGetallen in kalenderjaarZuid Afrikaanse antilopeRenaissancestad in ItalieRechterhand van SinterklaasRuggenraat (Engelse vertaling)...

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. opposite of DK'ed
  2. cash or stock _
  3. attorney letter
  4. not today but tomorrow
  5. buyout
  6. identifying number
  7. broker
  8. money due you
  9. reregistration company
  10. paper form
  11. into two or more
  12. holdings
  13. to vote
  14. bid price
  15. trading happens
  16. another word for money
  17. __exchange
Down
  1. Intelligent _
  2. Acquire shares
  3. cash or _
  4. transferrable
  5. trade shares
  6. It is a debt security
  7. 1 ½ by 1 ¾
  8. shares in a basket
  9. payout
  10. Another word for shares
  11. assets held here
  12. money earned
  13. stocks traded
  14. taxes
  15. buy 100_
  16. A preliminary prospectus
  17. expiring contract

34 Clues: taxespayoutbuyoutbrokerto voteholdingsbuy 100_cash or _bid price1 ½ by 1 ¾paper form__exchangetrade sharesmoney earnedIntelligent _transferrablestocks tradedmoney due youAcquire sharescash or stock _attorney lettertrading happensassets held hereinto two or moreopposite of DK'edexpiring contractshares in a basketidentifying number...

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  2. As usual, the father was ? by the beeping of his phone at 6:00 am.
  3. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  4. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  5. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
  6. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  7. For their safety, they ? to the Neighbourhood Watch program.
  8. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  9. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  10. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  11. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  12. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  13. The ? gardener was willing to travel to different places where there was work.
  14. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
Down
  1. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  2. Nervously, the resident noticed the ? of a figure below the street light.
  3. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  4. As ? for the broken security alarm, the company offered them six months of service for no charge.
  5. Residents ? their fears of criminals by putting in security devices for their homes.
  6. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  7. Due to neglect, some of the ? of the homes required some painting and repairs.
  8. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  9. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  10. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

Investing Unit 2024-03-20

Investing Unit crossword puzzle
Across
  1. At what age can you collect even more benefits from Social Security if you wait
  2. Ease with which an asset or security can be converted into cash without affecting the market price
  3. A sustained period of rising prices and optimistic sentiment in a financial market
  4. These funds are sold actively throughout the day and are Passively managed
  5. How can I buy a Mutual Fund
  6. An individual who buys and sells with the intention of profiting short term
  7. Bonds issued by company that have a fixed interest rate and face value
  8. At what age can you invest in Crypto
  9. Portion of the company's earnings distributed to shareholders as a return on investment
  10. Profit realized from sale of a capital asset like stock or real estate
  11. What indices comprises 30 blue chip companies?
  12. Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
  1. An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
  2. Buying different stocks from different companies
  3. Investing equal amounts of money at regular intervals
  4. At what age must you take a minimum from your retirement accounts each year (RMD)
  5. These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
  6. The age you can start collecting Social Security
  7. The process of offering shares of a private corporation to the public in a new stock issuance
  8. This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
  9. A unique combination of letters to represent a particular publically traded company's stock or security
  10. A security that represents ownership of a fraction of a corporation
  11. Retirement account where money goes in after tax and is taken out penalty and tax free
  12. Bonds issued by the Government where you pay under face value and don't pay interest
  13. Retirement account where money is put in before taxes but is taken out taxed
  14. A market where prices are falling and a pessimistic outlook overall
  15. Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
  16. This is a federal payroll tax that is deducted from every paycheck
  17. Types of jobs that usually offer a pension
  18. Investing a big sum of money in one go

30 Clues: How can I buy a Mutual FundAt what age can you invest in CryptoInvesting a big sum of money in one goTypes of jobs that usually offer a pensionWhat indices comprises 30 blue chip companies?Buying different stocks from different companiesThe age you can start collecting Social SecurityInvesting equal amounts of money at regular intervals...

EMD Polices & Procedures 2024-04-09

EMD Polices & Procedures crossword puzzle
Across
  1. _______ is to be completed every time a foreign national enters the shop for a tour
  2. Badge worn by visitors who are sole US citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
  3. Looking for on visitor ID
  4. Application used for alarms and event view
  5. This badge has a yellow background with red lettering
  6. Required any time work is being done inside the building that could potentially spark a fire
  7. Post where you control and perform 100% vehicle inspections
  8. Sticker on a personal owned cell phone that have been approved by EMD security
  9. Members of _______ assume control over all emergency situations
  10. Temporary badges can only be issued and returned to _______
  11. Only post that is manned from 0630-2230 Monday thru Friday
  12. Issued to employees and long term contractors to identify a vehicle in the parking lot
  13. These passes are issued for a maximum of 5 days at a time
  14. This form is used for all reports beside that of an injury report bomb threat or the DAR
  15. Inspection performed by security officers to ensure that employees are using their assigned badge
  16. _______are issued if a person's vehicle information is not in the system
Down
  1. Form generated by and issued by the purchasing department authorizing equipment to be removed
  2. Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
  3. CW-EMD cleared employee has a _______on their badge
  4. 2 pop-up windows in security expert
  5. _______ book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
  6. All visitors must have a _______completed in order to allowed into the facility or do work on the grounds
  7. Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard
  8. _______visitors wearing this must always have a EMD escort with them
  9. Document needed when taking company property off site
  10. FN are permitted to have electronics in this area ONLY
  11. How many steps to disable or enable fire panel
  12. Document with information that must be reported to the next officer
  13. Badge color reserved specifically for Foreign Nationals
  14. Secured area located in Bldg 3A 2nd floor
  15. This report is a firsthad account of the activities the security officer performed while on duty
  16. What type of alarm is High Water bldg 12

32 Clues: Looking for on visitor ID2 pop-up windows in security expertWhat type of alarm is High Water bldg 12Secured area located in Bldg 3A 2nd floorApplication used for alarms and event viewHow many steps to disable or enable fire panelCW-EMD cleared employee has a _______on their badgeThis badge has a yellow background with red lettering...

EMD Polices & Procedures 2024-04-08

EMD Polices & Procedures crossword puzzle
Across
  1. All visitors must have a _______ completed in order to be allowed into the facility or do work on the grounds
  2. _______visitors wearing this must always have a EMD escort with them
  3. These passes are issued for a maximum of 5 days at a time
  4. Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
  5. Document with information that must be reported to the next officer
  6. Form generated by and issued by the purchasing department authorizing equipment to be removed from the site
  7. Badge worn by visitors who are sole US Citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
  8. Only post that is manned from 0630-2230 Monday thru Friday
  9. _______book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
  10. Issued to employees and long term contractors to identify a vehicle in the parking lot
  11. Application used for alarms and event view
  12. _________is to be completed every time a foreign national enters the shop for a tour
  13. What type of alarm is High Water bldg 12
  14. Looking for on visitor ID
  15. Stickers on a personal owned cell phone that have been approved by EMD Security
  16. Badge color reserved specifically for Foreign Nationals
  17. Inspection performed by security officers to ensure that employees are using their assigned badge
Down
  1. This badge has a yellow background with red lettering
  2. Post where you control and perform 100% vehicle inspections
  3. Form used by employee to declare and drop off incoming business necessary computer storage/media at Central guard
  4. 2 pop-up windows in security expert
  5. Document needed when taking company property off site
  6. CW-EMD cleared employee has a __________ on their badge
  7. Members of _______ assume control over all emergency situations
  8. Reuqired any time work is being done inside the building that could potentially spark a fire
  9. ________are issued if a person's vehicle information is not in the system
  10. Temporary badge can on be issued and returned to _______
  11. How many steps to disable or enable fire panel
  12. Secure area located in Bldg 3A 2nd floor
  13. This report is a firsthand account of the activities the security officer performed while on duty
  14. FN are permitted to have electronics in this area only
  15. This form is used for all reports besides that of an injury report bomb threat or the DAR

32 Clues: Looking for on visitor ID2 pop-up windows in security expertSecure area located in Bldg 3A 2nd floorWhat type of alarm is High Water bldg 12Application used for alarms and event viewHow many steps to disable or enable fire panelThis badge has a yellow background with red letteringDocument needed when taking company property off site...

Positive Peer Influence 2021-01-22

Positive Peer Influence crossword puzzle
Across
  1. Be a ___________ peer influence online.
  2. Use _____________ for good.
  3. Be _________ of what you post.
  4. __________ before you post.
Down
  1. Do not post ____________ messages online.
  2. Do not spread ____________ news.
  3. Be an _____________ and don't ignore cyber bullying.
  4. Respect for self and _____________.

8 Clues: Use _____________ for good.__________ before you post.Be _________ of what you post.Do not spread ____________ news.Respect for self and _____________.Be a ___________ peer influence online.Do not post ____________ messages online.Be an _____________ and don't ignore cyber bullying.

Jace Keenhold 2017-09-07

Jace Keenhold crossword puzzle
Across
  1. Copyright / Taking something that's not yours
  2. Danger / Someone you don't know
  3. Media / Snapchat , Instagram
  4. Passwords / Good passwords
Down
  1. / The right way to communicate over the internet
  2. research / Finding things over the internet
  3. Domain / Public Information
  4. Plagiarism / Taking someone else's work
  5. bullying / Bullying over the internet
  6. Safety / Be safe on the internet

10 Clues: Passwords / Good passwordsDomain / Public InformationMedia / Snapchat , InstagramDanger / Someone you don't knowSafety / Be safe on the internetbullying / Bullying over the internetPlagiarism / Taking someone else's workresearch / Finding things over the internetCopyright / Taking something that's not yours...

STOP BULLYING !! 2024-02-19

STOP BULLYING !! crossword puzzle
Across
  1. memberi komentar negatif, menyebar gosip orang lain di medsos
  2. memukul, menendang, mendorong
  3. tempat untuk menuntut ilmu
  4. nama lain dari bullying
  5. pihak yang melihat terjadinya bullying
Down
  1. pihak yang melakukan tindakan bullying
  2. perilaku yang tidak menyenangkan secara verbal dan fisik
  3. pihak yang menerima tindakan bullying
  4. dengan sengaja mengabaikan, menyebarkan gosip
  5. menghina, menyindir, memanggil dengan julukan

10 Clues: nama lain dari bullyingtempat untuk menuntut ilmumemukul, menendang, mendorongpihak yang menerima tindakan bullyingpihak yang melakukan tindakan bullyingpihak yang melihat terjadinya bullyingdengan sengaja mengabaikan, menyebarkan gosipmenghina, menyindir, memanggil dengan julukanperilaku yang tidak menyenangkan secara verbal dan fisik...

Crossword 2025-11-18

Crossword crossword puzzle
Across
  1. Watching somebody get picked on
  2. Who you should tell when somethings wrong
  3. media A way to communicate to others
  4. something that is yours
  5. bullying Picking on somebody online
Down
  1. a mean thing to say
  2. How to get into a account
  3. standing up for somebody
  4. Picking on somebody repeatedly
  5. How bullying can make someone feel

10 Clues: a mean thing to saysomething that is yoursstanding up for somebodyHow to get into a accountPicking on somebody repeatedlyWatching somebody get picked onHow bullying can make someone feelbullying Picking on somebody onlinemedia A way to communicate to othersWho you should tell when somethings wrong

Shoulder surfing 2020-06-03

Shoulder surfing crossword puzzle
Across
  1. bahasa inggris siber
  2. yang dilakukan wanita di komik
  3. akun punya id dan ....
  4. ponsel pintar
Down
  1. facebook, whatsapp, instagram disebut
  2. orang yang melakukan hacking
  3. surat elektronik

7 Clues: ponsel pintarsurat elektronikbahasa inggris siberakun punya id dan ....orang yang melakukan hackingyang dilakukan wanita di komikfacebook, whatsapp, instagram disebut

safe internet 2022-02-11

safe internet crossword puzzle
Across
  1. παιχνίδια (online gaming)
  2. Hygiene υγιεινή των συσκευών
  3. Διαδίκτυο
  4. διαδικτυακός εκφοβισμός (cyberbullying)
Down
  1. Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα
  2. ερωτική επικοινωνία μέσω διαδικτύο
  3. Κανόνες ορθής διαδικτυακής συμπεριφοράς

7 Clues: Διαδίκτυοπαιχνίδια (online gaming)Hygiene υγιεινή των συσκευώνερωτική επικοινωνία μέσω διαδικτύοΚανόνες ορθής διαδικτυακής συμπεριφοράςδιαδικτυακός εκφοβισμός (cyberbullying)Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα

Digital-Literacy-Kavon Stewart 2024-06-14

Digital-Literacy-Kavon Stewart crossword puzzle
Across
  1. Something used to protect Against Viruses
  2. Displays ads on your computer. May slow down your computer
  3. make sure to ____ your software when Needed.
  4. When someone gets your personal info and then does things pretending to be you.
  5. When you copy someone's work and claim it as your own.
  6. Emails that spread Malware often use _________.
  7. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  8. Everyone has a Digital _______ so be careful
  9. you should regularly make _______ to make sure that your things will be safe.
  10. Reads everyone’s data that is passing through a network. Usually on public WiFi.
  11. Keeps track of every key you type and sends it to the hacker.
  12. To ensure your data is safe you could us ______ storage.
Down
  1. Spies on you, stealing information like passwords and credit card numbers
  2. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  3. avoid using ______ Wi-fi.
  4. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. make sure to have strong an secure ________.
  7. Blocks you from accessing your files until you pay a ransom.
  8. __________ is when people steal intellectual property such as movies, music and software.
  9. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  10. A group of computers all being controlled by a remote hacker to perform illegal activity.
  11. if you are being cyber bullied Don't _____ the messages because they can be used as proof
  12. IF someone is completely _______ they cant be traced.

24 Clues: avoid using ______ Wi-fi.Something used to protect Against Virusesmake sure to ____ your software when Needed.make sure to have strong an secure ________.Everyone has a Digital _______ so be carefulEmails that spread Malware often use _________.IF someone is completely _______ they cant be traced....

Year 7 Coding and Networking 2025-09-08

Year 7 Coding and Networking crossword puzzle
Across
  1. A device that requests services from a server
  2. A temporary IP address that can change, assigned by a DHCP server
  3. An action that causes something to happen in a program
  4. Internet protocol address that is 128 bits long
  5. Internet protocol address that is 32 binary digits long
  6. A seven-layer architecture for communication systems
  7. Text-based language that provides deep understanding of programming techniques
  8. A computer in a network that provides services like websites or emails
  9. The high-capacity network that carries internet traffic across the world
  10. System that translates easy-to-remember domain names into IP addresses
  11. Uses radio waves for transporting data without physical cables
  12. Fast, easy-to-learn and beginner-friendly text-based programming language
  13. An error in a program that prevents it from running as expected
  14. A list of steps to finish a task
  15. Protocol for dynamically assigning IP addresses to network devices
Down
  1. The most common form of cable used for wired networking
  2. A set of rules that defines how two entities communicate across a network
  3. A unique identifier assigned to internet-connected devices
  4. Small units of data into which messages are split for transmission across a network
  5. Text-based programming language for basic coding skills just like a programmer
  6. Device that guides data to its correct destination, preventing traffic jams
  7. A permanent address for a device, usually set up manually
  8. Free programming language from MIT that uses block-based technology
  9. Free programming language developed by Google which uses visual blocks
  10. Finding and fixing errors in programs that prevent them from running correctly
  11. Requires a physical medium for transporting information between nodes
  12. Programming language often used for creating modifications in Minecraft
  13. Programming language developed by Microsoft for creating 3D games
  14. The action of doing something over and over again in programming
  15. A cyber security threat that tricks victims into sharing sensitive data

30 Clues: A list of steps to finish a taskA device that requests services from a serverInternet protocol address that is 128 bits longA seven-layer architecture for communication systemsAn action that causes something to happen in a programThe most common form of cable used for wired networkingInternet protocol address that is 32 binary digits long...

Chapter 11 Crossword Puzzle 2023-10-19

Chapter 11 Crossword Puzzle crossword puzzle
Across
  1. A highly secure correctional facility which houses the worst criminal
  2. jail designed to encourage interactions between inmates and jail officials
  3. inmates separated at all times with activities in their individual cells
  4. The prison official in charge
  5. prison prison designed giving inmates a great deal of freedom
  6. the time spent in jail prior to being sentenced
  7. disciplinary action ordering inmates to their cells
  8. The security designation given to new inmates
Down
  1. Correctional facilities not operated by the government
  2. early form of correctional facility
  3. holds inmates awaiting trial or sentences of year or less
  4. inmates incarcerated in jail awaiting trial
  5. screening of inmates determining their security level
  6. Inmates kept in separate cells but worked together in silence
  7. reimbursement for costs of housing inmates

15 Clues: The prison official in chargeearly form of correctional facilityreimbursement for costs of housing inmatesinmates incarcerated in jail awaiting trialThe security designation given to new inmatesthe time spent in jail prior to being sentenceddisciplinary action ordering inmates to their cellsscreening of inmates determining their security level...

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. trade shares
  2. opposite of DK'ed
  3. broker
  4. reregistration company
  5. to vote
  6. trading happens
  7. money due you
  8. paper form
  9. buyout
  10. attorney letter
  11. transferrable
  12. 1 ½ by 1 ¾
  13. buy 100_
  14. payout
  15. Another word for shares
  16. cash or stock _
  17. holdings
Down
  1. into two or more
  2. expiring contract
  3. assets held here
  4. stocks traded
  5. bid price
  6. not today but tomorrow
  7. taxes
  8. identifying number
  9. shares in a basket
  10. A preliminary prospectus
  11. Intelligent _
  12. It is a debt security
  13. money earned
  14. Acquire shares
  15. cash or _
  16. __exchange
  17. another word for money

34 Clues: taxesbrokerbuyoutpayoutto votebuy 100_holdingsbid pricecash or _paper form1 ½ by 1 ¾__exchangetrade sharesmoney earnedstocks tradedmoney due youIntelligent _transferrableAcquire sharestrading happensattorney lettercash or stock _into two or moreassets held hereexpiring contractopposite of DK'edidentifying numbershares in a basket...

AKS Crossword Puzzle 2024-07-22

AKS Crossword Puzzle crossword puzzle
Across
  1. Industry leader key machine
  2. Plug that hole
  3. Fill
  4. Keys or shavings
  5. .003 or .005, that is the question
  6. Picking & decoding in one
  7. High security key
  8. Favorite distributor of locksmith
  9. Metal tail
  10. Black mess lube
  11. Head
Down
  1. Slippery magic in a bottle
  2. High security angle cuts
  3. 10B
  4. Core quick-swap
  5. Recombinate
  6. Chicago ace
  7. Lock or nose
  8. Opposite of Kwikset
  9. The original ic core
  10. Push buttons and pull levers
  11. Pop a latch or pass a pin
  12. Favorite tool of the scammer
  13. Inner cylinder part
  14. Org loved and hated by auto locksmiths

25 Clues: 10BFillHeadMetal tailRecombinateChicago aceLock or nosePlug that holeCore quick-swapBlack mess lubeKeys or shavingsHigh security keyOpposite of KwiksetInner cylinder partThe original ic coreHigh security angle cutsPicking & decoding in onePop a latch or pass a pinSlippery magic in a bottleIndustry leader key machinePush buttons and pull levers...

Cybersecurity crossword 2023-04-22

Cybersecurity crossword crossword puzzle
Across
  1. unaware software vulnerability attacked
  2. computer damaging, harmful software
  3. website shutdown using multiple devices
  4. security during initial production stages
  5. seemingly harmless but malicious malware
  6. locks computer until random paid
  7. scrambling data method
  8. slows computer with unwanted ads
  9. required identification changing system settings
  10. Online repeated harassment
Down
  1. implements security for computer system
  2. access blocked for unauthorized users
  3. click hidden element, opening malware
  4. work policy for personal device
  5. misleading edited picture or video
  6. program designed to remove malware
  7. compromised system infecting other systems
  8. service for remotely connected wifi
  9. the guarding against unauthorized access
  10. personal information stealing tactic

20 Clues: scrambling data methodOnline repeated harassmentwork policy for personal devicelocks computer until random paidslows computer with unwanted adsmisleading edited picture or videoprogram designed to remove malwarecomputer damaging, harmful softwareservice for remotely connected wifipersonal information stealing tactic...

Security Terminology Puzzle (Participation 3) - Emily Pedrazzi 2023-01-25

Security Terminology Puzzle (Participation 3) - Emily Pedrazzi crossword puzzle
Across
  1. Many devices attack a target.
  2. Creates an encrypted tunnel.
  3. Many compromised computers sending cyberattacks.
  4. Detects and protects against malware.
  5. Pay to regain access to systems.
  6. Malicious software.
  7. Tricks users into providing information.
  8. Attack that exploits new vulnerabilities.
  9. Cisco's entry-level network certification.
  10. Someone who exploits vulnerabilities.
  11. Someone who penetration tests organizations.
Down
  1. Scrambles sensitive data; must decrypt.
  2. Saves hardware costs; increases risk.
  3. Legitimate app containing harmful malware.
  4. Free Internet access.
  5. Falsified media used for harm.
  6. Blocks unusual traffic and users.
  7. CompTIA's entry-level security certification.
  8. Sensitive information exposed to attackers.
  9. Requires users to confirm identity.

20 Clues: Malicious software.Free Internet access.Creates an encrypted tunnel.Many devices attack a target.Falsified media used for harm.Pay to regain access to systems.Blocks unusual traffic and users.Requires users to confirm identity.Saves hardware costs; increases risk.Detects and protects against malware.Someone who exploits vulnerabilities....

Aidan's personality 2021-11-01

Aidan's personality crossword puzzle
Across
  1. who I live with at the momment
  2. my fave yellowish colour
  3. being socially happy
  4. what I do when i'm sick and can't do anything else
  5. education
  6. what life is filled with! (words and all)
  7. what has me actively boogy
Down
  1. what I dance to!
  2. What the best cyber activity is
  3. what people love and deserve!
  4. my best friend (name starts with ge and ends with ge)
  5. my fave coding game
  6. fun with____
  7. what occupies me

14 Clues: educationfun with____what I dance to!what occupies memy fave coding gamebeing socially happymy fave yellowish colourwhat has me actively boogywhat people love and deserve!who I live with at the mommentWhat the best cyber activity iswhat life is filled with! (words and all)what I do when i'm sick and can't do anything else...

INFORMATIKA 2024-08-13

INFORMATIKA crossword puzzle
Across
  1. Penghitungan dengan menggunakan komputer
  2. ilmu yang mempelajari tentang penggunaan komputer
  3. Salah satu aplikasi media sosial
  4. Pembelajaran secara online
  5. Dunia Maya
  6. Situs web berbagi video
  7. Media sosial yang didirikan oleh Mark Zuckerberg
Down
  1. Salah satu aplikasi penyedia layanan transportasi
  2. Salah satu aplikasi jual beli online
  3. Salah satu game online popular
  4. Pembelajaran secara offline
  5. Salah satu karakter dalam profil pelajar pancasila
  6. Seseorang yang tidak begitu mahir dalam bermain
  7. Metode pembayaran yang dilakukan secara langsung di tempat Pembeli setelah pesanan dari kurir diterima

14 Clues: Dunia MayaSitus web berbagi videoPembelajaran secara onlinePembelajaran secara offlineSalah satu game online popularSalah satu aplikasi media sosialSalah satu aplikasi jual beli onlinePenghitungan dengan menggunakan komputerSeseorang yang tidak begitu mahir dalam bermainMedia sosial yang didirikan oleh Mark Zuckerberg...