cyber security Crossword Puzzles
CYBER LAW 2021-09-03
Across
- the making, altering, use, or possession of a false writing in order to commit a fraud
- registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- The communication via any electronic device of false data that damages a person's reputation
- process of converting information into a digital
- Business conducted electronically (buying/selling on web)
- Web page to summon different elements from diverse pages or servers to create a new Web page
Down
- the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
- Using a computer to steal personal data
- when someone forcefully takes control of a website by cracking the password and later changing it
- Make sure a buyer and seller can identify themselves
10 Clues: Using a computer to steal personal data • process of converting information into a digital • Make sure a buyer and seller can identify themselves • Business conducted electronically (buying/selling on web) • the making, altering, use, or possession of a false writing in order to commit a fraud • ...
CYBER LAW 2021-09-04
Across
- sending a fake email to steal other people's information
- offence where a hacker gains access and control over someone else's website
- buying and selling of goods and services over internet
- process of recognizing a user's identity
- process of displaying a graphic file on one website that originates at another
- use of defamatory statement over social networking sites
Down
- conversion of information into digital format
- selling, registering or using a domain name with an intention of earning profit from someone else's trademark
- material alteration of a legal instruments with an intention of doing fraud
- using social networking tools and platforms to share and broadcast mottos and messages and to interact with netizens
10 Clues: process of recognizing a user's identity • conversion of information into digital format • buying and selling of goods and services over internet • sending a fake email to steal other people's information • use of defamatory statement over social networking sites • offence where a hacker gains access and control over someone else's website • ...
Cyber Crime 2022-11-14
Across
- a virus on your computer that is intstalled when you open/download something that harvests your information
- when people are contacted and are tricked into giving the scammer money
- the first real cyber attack in 1971, it was a virus
- the first anti-virus software that hunted down the creeper
- stealing other people's identities
Down
- connecting a device to your phone so you can secretly listen to other people's calls
- making a perfect pitch to confuse a phone to give you a free call
- similar to phishing, but it runs a code on your computer, without you clicking a link.
- presenting a fake situation to the victim to either get money or information from them
- a virus that scammed over 80 million USD from people at a time
10 Clues: stealing other people's identities • the first real cyber attack in 1971, it was a virus • the first anti-virus software that hunted down the creeper • a virus that scammed over 80 million USD from people at a time • making a perfect pitch to confuse a phone to give you a free call • when people are contacted and are tricked into giving the scammer money • ...
Cyber Crime 2022-09-07
10 Clues: wannabe hacker • to steal something • produce 80% damage • deep technical skills • uses email to trick you • redirects you to bad website • information about who you are • someone who tests secure sites • promise of goods is never made • reliable website has this in url line
Cyber Mobbing 2019-05-03
Across
- Belästigung im …
- Was solltest du machen wenn dich eine Person belästigt?
- Mit welcher Person solltest du als erstes reden?
- Belästigung im Internet
- Meist wir aus "Spaß" und … gemobbt!
- nicht gewollt
Down
- hinter einem stehen
- Verrate niemals deine persönlichen …
- Person die andere Menschen Belästigt
- Bei wem kannst du die Belästigung einer Person melden?
10 Clues: nicht gewollt • Belästigung im … • hinter einem stehen • Belästigung im Internet • Meist wir aus "Spaß" und … gemobbt! • Verrate niemals deine persönlichen … • Person die andere Menschen Belästigt • Mit welcher Person solltest du als erstes reden? • Bei wem kannst du die Belästigung einer Person melden? • Was solltest du machen wenn dich eine Person belästigt?
CYBER SAFTY 2019-09-24
Across
- trying to break into computer system
- being harassed or threatened online
- flag feeling when you feel in danger or in pain by what someone did
- someone who intentionally and illegally hacks into another person's system to obtain information
- protection for your computer
Down
- something you shouldn't give online.
- software protecting computers from danger
- being pursed by someone online trough social media
- someone who has knowledge on programing and on computers
- sending a fake e-mail to get others personal information
10 Clues: protection for your computer • being harassed or threatened online • something you shouldn't give online. • trying to break into computer system • software protecting computers from danger • being pursed by someone online trough social media • someone who has knowledge on programing and on computers • sending a fake e-mail to get others personal information • ...
Cyber Safety 2023-05-22
Across
- Talking someone into revealing secrets or embarrassing information, then sharing it online
- intentionally or cruelly excluding someone from an online group
- a disease that spreads through the computer
- sharing someone secrets or embarassing info
- Repeated, intense harassment that includes threats or creates significant fear.
Down
- Using someones work without their permission
- Repeated mean, rude and insulting
- Online messages with angry language
- Bullying Online
- Theft When someone steals another Persons identity
10 Clues: Bullying Online • Repeated mean, rude and insulting • Online messages with angry language • a disease that spreads through the computer • sharing someone secrets or embarassing info • Using someones work without their permission • Theft When someone steals another Persons identity • intentionally or cruelly excluding someone from an online group • ...
Cyber Safety 2023-05-22
Across
- stalking repeated intense harrasment
- to share someone else secerets or information ofimages online
- pretending to be someone or posting vidoes online to get them introuble
- to trick someone to reveal secrets or embarrisingInfromation online
- means to diss someone or spread rumors.
Down
- intentionally and cruely exculuding someone froman online group
- theft means to stels someones identity
- means to send mean or insulting messages.
- means to use angry and vulgar launage online
- denigration that includes threats and significant fear
10 Clues: stalking repeated intense harrasment • theft means to stels someones identity • means to diss someone or spread rumors. • means to send mean or insulting messages. • means to use angry and vulgar launage online • denigration that includes threats and significant fear • to share someone else secerets or information ofimages online • ...
CYBER SAFTEY 2023-05-18
Across
- LIKE A HUMAN VIRUS BUT FPR COMPUTERS
- YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
- IT IS WHAT IS YOURS
- WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.
- KEEPS EVERYTHING OF YOURS SAFE
Down
- ONLINE BULLYING
- WHEN PEOPLE BOTHER YOU OVER AND OVER
- HAPPENS TO KIDS ALL AROUND THE WORLD
- STALKING PEOPLE ONLINE
- USE THEM TO KEEP ONLINE THINGS SAFE
10 Clues: ONLINE BULLYING • IT IS WHAT IS YOURS • STALKING PEOPLE ONLINE • KEEPS EVERYTHING OF YOURS SAFE • USE THEM TO KEEP ONLINE THINGS SAFE • WHEN PEOPLE BOTHER YOU OVER AND OVER • LIKE A HUMAN VIRUS BUT FPR COMPUTERS • HAPPENS TO KIDS ALL AROUND THE WORLD • WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT. • YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
CYBER ATTACK 2024-01-22
Across
- to put at the disposal of; furnish or supply
- to gain unauthorized access to another computer system
- to stop something from happening or someone from doing something
- deliberate publication of private information for personal or corporate interest
Down
- in addition
- fabricated or deliberately manipulated audio or visual content
- observe and check the progress or quality of
- to regard as probable or likely; anticipate
- unintentional mistakes suh as inaccurate dates, statistics
- serve as evidence or proof that something exists or is the case
10 Clues: in addition • to regard as probable or likely; anticipate • to put at the disposal of; furnish or supply • observe and check the progress or quality of • to gain unauthorized access to another computer system • unintentional mistakes suh as inaccurate dates, statistics • fabricated or deliberately manipulated audio or visual content • ...
CYBER ATTACK 2024-01-22
Across
- to put at the disposal of; furnish or supply
- to gain unauthorized access to another computer system
- to stop something from happening or someone from doing something
- deliberate publication of private information for personal or corporate interest
Down
- in addition
- fabricated or deliberately manipulated audio or visual content
- observe and check the progress or quality of
- to regard as probable or likely; anticipate
- unintentional mistakes suh as inaccurate dates, statistics
- serve as evidence or proof that something exists or is the case
10 Clues: in addition • to regard as probable or likely; anticipate • to put at the disposal of; furnish or supply • observe and check the progress or quality of • to gain unauthorized access to another computer system • unintentional mistakes suh as inaccurate dates, statistics • fabricated or deliberately manipulated audio or visual content • ...
Cyber bullying 2023-10-26
Across
- , sending messages from a mobile phone
- , form of cyber bullying
- , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
- , a social media app that lets you take and upload photos for people to like, comment on and share
- , social media website beginning with F
Down
- , intentional emotional harm through devices like computers and phones
- , a wireless handheld device used for calls and messaging
- , making a statement of intention to cause harm to someone
- , an image showing what is on a phone or computer screen
- , words or actions intended to annoy, or abuse others
10 Clues: , form of cyber bullying • , sending messages from a mobile phone • , social media website beginning with F • , words or actions intended to annoy, or abuse others • , an image showing what is on a phone or computer screen • , a wireless handheld device used for calls and messaging • ...
Cyber Month! 2023-09-19
Across
- Name of the person who knows a lot about Big Risk because he IS a Big Risk
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- Animal you played during last week's Knowbe4 training
- Password storing software available to CAMPUS employees
- it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
- Clearly the best type of ice cream, don't argue
Down
- The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
- The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
- A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
- secret combination of characters, numbers, or symbols that you use to access something
10 Clues: Clearly the best type of ice cream, don't argue • Animal you played during last week's Knowbe4 training • Password storing software available to CAMPUS employees • Name of the person who knows a lot about Big Risk because he IS a Big Risk • secret combination of characters, numbers, or symbols that you use to access something • ...
Cyber Safety 2024-06-24
Across
- Being tracked or followed online which makes you feel uncomfortable
- Online apps focused on communication eg.snapchat,tiktok
- someone who is repeatedly mean to someone online
- Faking an online identity to manipulate others
- Spending too much time on online gaming
Down
- online devices eg phone,ipad
- somewhere you can go if you need help
- Being safe online
- When someone tries to steal your identity
- A romantic relationship with someone online
10 Clues: Being safe online • online devices eg phone,ipad • somewhere you can go if you need help • Spending too much time on online gaming • When someone tries to steal your identity • A romantic relationship with someone online • Faking an online identity to manipulate others • someone who is repeatedly mean to someone online • ...
Cyber crossword 2024-06-01
Across
- |Email indesiderata che spesso contiene pubblicità o truffe.
- |Una copia di sicurezza dei file importanti.
- |Un programma dannoso che può infettare un computer.
- |Un programma che protegge il computer bloccando i cattivi accessi.
- |Una persona che cerca di entrare nei computer senza permesso.
Down
- |Software dannoso progettato per danneggiare il computer.
- |Un messaggio inviato da un computer a un altro attraverso internet.
- |Una parola segreta usata per accedere a un computer o a un sito web.
- |Un miglioramento o correzione per un programma del computer.
- |Un trucco per ottenere informazioni personali come password e numeri di carta di credito.
10 Clues: |Una copia di sicurezza dei file importanti. • |Un programma dannoso che può infettare un computer. • |Software dannoso progettato per danneggiare il computer. • |Email indesiderata che spesso contiene pubblicità o truffe. • |Un miglioramento o correzione per un programma del computer. • |Una persona che cerca di entrare nei computer senza permesso. • ...
Cyber Crossword 2024-10-24
Across
- A tool that helps block unauthorized access to networks.
- Software that collects data from your device without consent.
- Verifying your identity, often with passwords or biometrics.
- False information spread to deceive or manipulate people.
Down
- Malicious software that harms devices or steals data.
- Encoding data to keep it secure from unauthorized access.
- Your login details needed to access accounts.
- Information that must be protected from unauthorized access.
- An incident where data is accessed without permission.
- A deceptive attempt to steal personal data through fake emails or SMS.
10 Clues: Your login details needed to access accounts. • Malicious software that harms devices or steals data. • An incident where data is accessed without permission. • A tool that helps block unauthorized access to networks. • Encoding data to keep it secure from unauthorized access. • False information spread to deceive or manipulate people. • ...
Cyber monday 2024-11-28
10 Clues: NO CHARGE • CURRENCY USED • MAKER OF ITEMS • TOTAL YOU SPEND • SHIPPING SERVICE • SPEED OF DELIVERY • WHAT YOU DO ONLINE • USED TO CARRY ITEMS • DISCOUNT IDENTIFIER • RECEIPT OR PAYMENT NOTE
Cyber monday 2024-11-28
10 Clues: PHYSICAL MONEY • PART OF A WEBSITE • A SHORT-TERM SALE • A METHOD OF PAYMENT • THE NAME OF A COMPANY • A PLACE ONLINE TO SHOP • SOMETHING WITH NO COST • WHERE YOUR MONEY IS KEPT • A LINE OR LIST OF WAITING ITEMS • WHAT YOU NEED TO ACCESS A WEBSITE
Cyber monday 2024-11-28
10 Clues: HOLDS YOUR CASH • A WAITING GROUP • A DEAL OR DISCOUNT • THE COST OF AN ITEM • NEEDED TO SHOP ONLINE • A PROMOTIONAL MESSAGE • AVAILABILITY OF ITEMS • PLAN FOR SPENDING MONEY • TO GIVE MONEY FOR SOMETHING • TO VERIFY ITEMS IN YOUR CART
Cyber monday 2024-11-28
10 Clues: NO CHARGE • CURRENCY USED • MAKER OF ITEMS • TOTAL YOU SPEND • SHIPPING SERVICE • SPEED OF DELIVERY • WHAT YOU DO ONLINE • USED TO CARRY ITEMS • DISCOUNT IDENTIFIER • RECEIPT OR PAYMENT NOTE
cyber bullying 2025-03-11
10 Clues: Hacking • hurtful person • to help someone • something you go on • hurting someone online • looking out for someone • knowing your on a device • mentally attacking someone • someone hurting someone else • something you use in everyday life
Cyber Ehics 2025-06-16
Across
- simplest way to prevent plagiarism
- criminal activities
- malicious software
- unwanted bulk emails
- set of programs that disrupts the functioning
- sending bulk emails till the server gets full
- combination of voice and phishing
Down
- a security system that prevents unauthorisation
- legal rules for online users
- hacking done for a good cause
10 Clues: malicious software • criminal activities • unwanted bulk emails • legal rules for online users • hacking done for a good cause • combination of voice and phishing • simplest way to prevent plagiarism • set of programs that disrupts the functioning • sending bulk emails till the server gets full • a security system that prevents unauthorisation
Cyber Ethics 2025-06-16
Across
- a simple way of preventing plagiarism
- criminal activities
- malicious software
- unwanted bulk emails
- a set of programs that disrupts the functioning
- sending bulk emails until the server gets full
- combination of voice and phishing
Down
- a security system that prevents un authorisation
- rules for online users
- hacking done for a good cause
10 Clues: malicious software • criminal activities • unwanted bulk emails • rules for online users • hacking done for a good cause • combination of voice and phishing • a simple way of preventing plagiarism • sending bulk emails until the server gets full • a set of programs that disrupts the functioning • a security system that prevents un authorisation
Cyber Ethics 2025-06-06
Across
- Unwanted bulk emails from unknown sources
- Behaving responsibly and ethically on the internet
- Legal term for ownership of creative work
- Illegally accessing a computer system
- Legal rights over creations of the mind
Down
- Copying someone’s work and calling it your own
- The trace a person leaves online.
- Right to control information about yourself
- 💻 Moral principles for using computers and the internet
- Copying and using software illegally
10 Clues: The trace a person leaves online. • Copying and using software illegally • Illegally accessing a computer system • Legal rights over creations of the mind • Unwanted bulk emails from unknown sources • Legal term for ownership of creative work • Right to control information about yourself • Copying someone’s work and calling it your own • ...
Cyber Search 2025-06-24
Across
- Impersonation attack on the web
- System‑weakness hunt
- Network barrier that screens traffic
- Scrambling data for secrecy
Down
- Process of identity verification
- Malicious code demanding money
- Fake‑site fraud to steal data
- Virus‑killing program
- Unintentional human error causing breach
- Secret string for access
10 Clues: System‑weakness hunt • Virus‑killing program • Secret string for access • Scrambling data for secrecy • Fake‑site fraud to steal data • Malicious code demanding money • Impersonation attack on the web • Process of identity verification • Network barrier that screens traffic • Unintentional human error causing breach
Cyber Ethics 2025-05-21
Across
- ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic.
- ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software that blocks access to a computer system or data until a sum of money is paid.
- ㅤㅤㅤㅤ ㅤㅤㅤ A scam attempting to acquire sensitive information by masquerading as a trustworthy entity.
- ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.
- ㅤㅤㅤㅤ ㅤㅤㅤ The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- password ㅤㅤㅤㅤ A combination of uppercase and lowercase letters, numbers, and symbols, difficult to guess.
Down
- ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.
- ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.
- ㅤㅤㅤㅤ ㅤㅤㅤ The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something.
10 Clues: ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet. • ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software. • ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose. • ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic. • ...
Cyber Crossword 2025-10-21
10 Clues: Attack • Password • Phishing • Data leak • Protection • To encrypt data • To report a scam • Person who breaks into systems • The practice of protecting systems • Protects computers from unauthorized access
Cyber bullying 2026-02-10
Across
- dampak psikologis pada korban,seperti perasaan sedih mendalam.
- perilaku menyakitkan yang dilakukan melaluli media digital.
- sebutan untuk orang yang menjadi korban bullying.
- tindakan pencegahan awal cyberbullying.
- tindakan mengirim pesan kasar secara berulang.
Down
- langkah untuk melindungi dari cyberbullying.
- media yang sering digunakkan untuk cyberbullying.
- jenis cyberbullying dengan menyebarkan kabar bohong.
- tempat untuk melaporkan tindakan Cyber bullying.
- asasi hak yang dilanggar ketika seseorang mengalami cyberbullying.
10 Clues: tindakan pencegahan awal cyberbullying. • langkah untuk melindungi dari cyberbullying. • tindakan mengirim pesan kasar secara berulang. • tempat untuk melaporkan tindakan Cyber bullying. • media yang sering digunakkan untuk cyberbullying. • sebutan untuk orang yang menjadi korban bullying. • jenis cyberbullying dengan menyebarkan kabar bohong. • ...
TEKA-TEKI silang 2025-06-03
Across
- internet tindakan kriminal yang dilakukan melalui internet (14h)
- perbuatan menyebar informasi yang merugikan orang lain (18h)
- tindakan menyebar informasi yang salah secara sengaja (14h)
- infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
- praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
- yang melibatkan pengungkapan konfirmasi pribadi (18h)
- penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
- kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
- jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
- penyebaran informasi palsu yang meluas (4 huruf)
- aturan dan norma berperilaku baik di media sosial (11 h)
- pencurian hak cipta (11 h)
- pelindungan hukum terhadap pencemaran nama baik (15 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
- perbuatan melanggar hukum didunia maya (10 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
- informasi yang mengidentifikasi seseorang secara unik (12h)
- perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
- peraturan yang melindungi data pribadi (16h)
- menjaga keamanan data pribadi di internet (13h)
- informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
- sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
- pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
- ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
- jejak digital yang tercipta tanpa disadari penggunaan (10 h)
- jenis pinjaman yang dilakuakan melalui platfrom online (14h)
- serang Cyber yang bertujuan untuk mencari data pribadi (14h)
- perilaku tidak sopan/kasar didunia maya (10 h)
30 Clues: pencurian hak cipta (11 h) • peraturan yang melindungi data pribadi (16h) • perilaku tidak sopan/kasar didunia maya (10 h) • menjaga keamanan data pribadi di internet (13h) • penyebaran informasi palsu yang meluas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • yang melibatkan pengungkapan konfirmasi pribadi (18h) • ...
Security meeting 2021-08-31
Across
- the best of the H&M departments
- It's used to fight against fire.
- It's used for employee to create and improve awareness and knowledge.
- It's used to align the company commitment and company principles.
- Those are used to identify or highlight a security/emergency equipment.
Down
- It will be a problem if a lack of_ exist.
- It's a situation where it's necessary to react quickly.
- It's used to measure the security compliance level.
- it's a situation where you have to put yourself secure.
- It affects all around the world.
- We have to be prepared to manage it, creating clear routines and guidelines also training for employees.
11 Clues: the best of the H&M departments • It's used to fight against fire. • It affects all around the world. • It will be a problem if a lack of_ exist. • It's used to measure the security compliance level. • It's a situation where it's necessary to react quickly. • it's a situation where you have to put yourself secure. • ...
Security Guide 2021-09-10
Across
- checklist used during bomb threat call
- Where do we find the security guide?
- How should we remain during a robbery?
- Member's information is always kept "________"
- # of Months pass to replace all-clear (non-numerical)
Down
- "Hi can I speak to __________?"
- Sym duress code
- where do we meet in emergencies?
- Item inside vault box
- Fabric Item inside vault box
- money kept inside drawer at all times
11 Clues: Sym duress code • Item inside vault box • Fabric Item inside vault box • "Hi can I speak to __________?" • where do we meet in emergencies? • Where do we find the security guide? • money kept inside drawer at all times • checklist used during bomb threat call • How should we remain during a robbery? • Member's information is always kept "________" • ...
Network Security 2024-01-30
Across
- these are attached to a document or spreadsheet and use the macro/ scripting function
- this is a self-replicating computer program
- regular backups should be made so data can be ___________
- these will lie dormant until a specific piece of program code is activated
Down
- these are assigned to each user to ensure they may only access certain files
- word to describe programs that can steal/ alter data
- passwords can be guessed as users _____ passwords
- these will prevent unauthorised access to data
- where a user can take a copy of a file it is ____ & ____ access
- a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
- these replicate without the use of a host file
11 Clues: this is a self-replicating computer program • these will prevent unauthorised access to data • these replicate without the use of a host file • passwords can be guessed as users _____ passwords • word to describe programs that can steal/ alter data • regular backups should be made so data can be ___________ • ...
Food Security 2024-02-05
Across
- State with most food insecure people
- The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is
- Most devastating famine faced by India
- The price at which foodgrains are distributed in the deficit areas and among the poor strata of the society.
- Antyodaya card is meant for people below
Down
- Who emphasized access to food security?
- co-operative societies working in Dehli
- Which government organisation buys foodgrains from the farmers and supplies to the fair price shops?
- A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as
- co-operative societies working in Gujrat
- The acronym for government program ensuring food security
11 Clues: State with most food insecure people • Most devastating famine faced by India • Who emphasized access to food security? • co-operative societies working in Dehli • co-operative societies working in Gujrat • Antyodaya card is meant for people below • The acronym for government program ensuring food security • ...
Security crossword 2022-07-21
Across
- is a nonprofit foundation dedicated to improving software security
- is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
- Place to store high privilege passwords
- IT Governance framework from ISACA
- Unplanned downtime of IT resources
- Information security triad
Down
- Need to impart to everyone to protect the organization
- process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
- is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default
- seamless integration of security testing and protection throughout the software development and deployment lifecycle
- is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
11 Clues: Information security triad • IT Governance framework from ISACA • Unplanned downtime of IT resources • Place to store high privilege passwords • Need to impart to everyone to protect the organization • is a nonprofit foundation dedicated to improving software security • ...
Network Security 2022-08-03
Across
- This decides what areas of the network you can access. For example, you have full access to your home drive (documents area), but you can only read some documents on the classwork area. There are some drives you can't even see (3 words)
- The method for encrypting the plaintext (2 words)
- Provides extra security for the word or term used to log on. Some companies insist this word must include letters, number, symbols and be at least 8 characters long (2 words)
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow it or block it (1 word)
- A sequence of numbers used to encrypt or decrypt, often using a mathematical formula (1 word)
- The encrypted message (1 word)
- The original message to be encrypted (1 word)
Down
- A way of identifying if the user trying to access the system is genuine and authorised
- A method to determine which devices are allowed to access the network (1 word)
- The process of converting cyphertext into plaintext (1 word)
- The process of converting plaintext into ciphertext (1 word)
11 Clues: The encrypted message (1 word) • The original message to be encrypted (1 word) • The method for encrypting the plaintext (2 words) • The process of converting cyphertext into plaintext (1 word) • The process of converting plaintext into ciphertext (1 word) • A method to determine which devices are allowed to access the network (1 word) • ...
Security Crosswords 2022-10-27
Across
- Test which verifies that unexpected input cannot affect the system in an unpredictable way.
- A set of measures to be taken to protect our product.
- A process used by the software industry to design, develop and test high quality software.
- Person who uses their technical computer skill to breach computer system.
- Reactive approach used in Nokia to build secure product.
- Designing a new product or defining a new software, the three security elements shall always be considered: Confidentiality, Integrity, and Availability
Down
- Process which has it's own phases that run in parallel with SDLC phases
- design for security.
- Nokia has a process for developing secure products and systems.
- Attacker sends a bogus requests to exhaust system resources.
- Proactive process used in Nokia to build secure product.
- User require to enter multiple credentials for login.
12 Clues: design for security. • A set of measures to be taken to protect our product. • User require to enter multiple credentials for login. • Proactive process used in Nokia to build secure product. • Reactive approach used in Nokia to build secure product. • Attacker sends a bogus requests to exhaust system resources. • ...
IT SECURITY 2022-10-27
Across
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- the process of converting information or data into a code, especially to prevent unauthorized access.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- network security device that monitors and filters incoming and outgoing network traffic
- good privacy an open source and freely available software package for email security
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- The conversion of encrypted data into its original form
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
11 Clues: The conversion of encrypted data into its original form • good privacy an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
Business Security 2024-06-10
Across
- Process to void a lost or stolen check
- Initials of state agency to recover expired money owed to someone
- What this unit is responsible for detecting daily
- Type of check that goes out when a lost check affidavit is received
- Something that occurs when a lost check is cashed for example
Down
- State of Oregon bank
- ___ checks must be entered into the SinglePoint system in order for the recipient to cash them.
- annual process to expire checks greater than 2 years old
- The name synonomous with the crossword title
- Type of checks field offices use for emergencies
- Payment ___ are set to flag cancelled checks to avoid overpayments
11 Clues: State of Oregon bank • Process to void a lost or stolen check • The name synonomous with the crossword title • Type of checks field offices use for emergencies • What this unit is responsible for detecting daily • annual process to expire checks greater than 2 years old • Something that occurs when a lost check is cashed for example • ...
FOOD SECURITY 2024-12-17
Across
- what is a green vegetable that is good for eyes ?
- What is the name of the fruit that is yellow, round, and grows on a tree?
- Which vegetable is white, long, and we use it to make mashed potatoes?
- Which vegetable is green, leafy, and we use it to make pesto?
- Which vegetable is red, round, and we use it to make tomato sauce?
Down
- What is the name of the fruit that is green, bumpy, and has small black seeds?
- what do you eat drink that comes from cow and colour is white ?
- what is green and crunchy that can eat in a salad ?
- What is the name of the fruit that is yellow, oval-shaped, and grows on a tree?
- which is orange colour and use in salad ?
- What is the name of the fruit that is purple, oval-shaped, and has a stone inside?
11 Clues: which is orange colour and use in salad ? • what is a green vegetable that is good for eyes ? • what is green and crunchy that can eat in a salad ? • Which vegetable is green, leafy, and we use it to make pesto? • what do you eat drink that comes from cow and colour is white ? • Which vegetable is red, round, and we use it to make tomato sauce? • ...
Food Security 2024-12-17
Across
- A type of climate event that causes a long period without rain, making hard to grow food
- a yellow fruit that monkeys love to eat
- A problem that happens when people dont get enough food to eat
- This is used to grow plants and crops. It is found in gardens and fields
- A small insect that damages crops and reduces food supply
- the process of growing food without using harmful chemicals
Down
- a place where fruits, vegetables, or grains are planted and harvested
- A major food crop grown in field, often used to make bread
- A nut that is good for heart and brain
- This system is used to bring water to crops in dry areas
- The word that means enough food for everyone to stay healthy and strong
11 Clues: A nut that is good for heart and brain • a yellow fruit that monkeys love to eat • This system is used to bring water to crops in dry areas • A small insect that damages crops and reduces food supply • A major food crop grown in field, often used to make bread • the process of growing food without using harmful chemicals • ...
Study 2025-09-23
Across
- Weakness in a system
- Protects sensitive information
- Security-related event
- Permission to use resources
- Ensures systems are accessible
- Testing for security weaknesses
- Ensures data is accurate and unaltered
- Restriction of access
- Potential cause of harm
Down
- Notification of suspicious activity
- Action taken after an incident
- Adherence to regulations
- Observing system activity
- Restoring after a breach
- Takes advantage of a vulnerability
15 Clues: Weakness in a system • Restriction of access • Security-related event • Potential cause of harm • Adherence to regulations • Restoring after a breach • Observing system activity • Permission to use resources • Action taken after an incident • Protects sensitive information • Ensures systems are accessible • Testing for security weaknesses • Takes advantage of a vulnerability • ...
15.1 Understanding Money Created by Yash Gupta 2024-05-09
Across
- is a transfer of money from one bank account to another
- the mechanism a nation uses to provide and manage money for itself
- money received today can be invested or deposited in the bank to earn interest
- allows customers to pay for purchases directly from their checking account
- action taken to manage the supply of money and interest rates in an economy
- a security that pays interest over terms of ten to thirty years
- money can be saved and used at a later date
- coins or banknotes that must be accepted if offered in payment of a debt.
- Anything of value that is accepted in return for goods and services
- is a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
- the process of transferring money from one individual or organization to another
- is a security that matures in a year or less
- is a security that pays interest over terms ranging from two to ten years
- money is used in exchange for goods and services needed by individuals, businesses, and governments
- money is a common measure of the worth or price of a good or service
- a type of financial investment issued by a corporation, government, or organization
- a type of a document guaranteeing the payment of a specific amount of money
- banks that are part of the Federal Reserve Systems
- exchange one good or service for another good or service
- another name for money
20 Clues: another name for money • money can be saved and used at a later date • is a security that matures in a year or less • banks that are part of the Federal Reserve Systems • is a transfer of money from one bank account to another • exchange one good or service for another good or service • a security that pays interest over terms of ten to thirty years • ...
Network requirements. 2024-08-07
Across
- Network is able to perform required functions without failing
- Distributing network traffic across many servers to optimize resource use and avoid overload
- Network is able to handle an increase in the number of users
- The physical or logical arrangement of network devices and connections.
- Policies that restrict network access to authorized users often involving authentication
- Rules set in place to protect network from attacks
- Additional pathways that ensure network availability in case of a failure
- Security devices that monitor and control incoming or outgoing network traffic based on security rules
- The process of converting data into a coded format to prevent unauthorized access
Down
- Techniques used to control network bandwidth to ensure optimal performance
- Measurement of a network(in Mbps or Gbps)
- Tools used to control network traffic for suspicious activity and take action to prevent or mitigate attacks
- The aberration in packet arrival times
- Making sure the network meets industry standards related to data handling and privacy
- Dividing a network into smaller segments to improve performance and security
- A delay in signals being received or sent. Crucial for gaming and video conferences
- Manners used to categorizing certain types of traffic to ensure performance of applications
- Creating virtual versions of network resources such as servers or switches to optimize flexibility
- Different systems and devices working together within a network ensuring a seamless communication
- The rate of successful data transfer across a network
20 Clues: The aberration in packet arrival times • Measurement of a network(in Mbps or Gbps) • Rules set in place to protect network from attacks • The rate of successful data transfer across a network • Network is able to handle an increase in the number of users • Network is able to perform required functions without failing • ...
Slande Cheridor 2024-12-07
Across
- testers who are paid to probe networks and report vulnerabilities
- what the user has (smart card or key)
- a server role that makes it possible for administrators to take control of Microsoft product updates
- The most widely used method for encrypting data
- security features that enable administrators to control who has access to the network
- an industry-standard client/server protocol that offers centralized control
- security features that enable administrators to control what users can do after they are logged on to the network
- used in a Windows domain environment and provides mutual authentication
- backs up the disk sector by sector to create an exact image of the disk’s contents
- framework for other protocols that provide encryption and authentication
- A common tool used by many Linux administrators
- a good security enhancement for servers that aren’t physically secure
Down
- can be set in the Local Security Policy console found in Administrative Tools
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- tool used to delete unneeded files in Windows
- disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- a unique biometric identifying trait. What the user is
- document that describes the rules governing access to an organization’s information resources
- creates a barrier between two entities
- prevents people from using eavesdropping technology
20 Clues: what the user has (smart card or key) • creates a barrier between two entities • tool used to delete unneeded files in Windows • The most widely used method for encrypting data • A common tool used by many Linux administrators • prevents people from using eavesdropping technology • a unique biometric identifying trait. What the user is • ...
Investing - Harper Staveley 2026-03-20
Across
- system of recording information in way that makes it nearly impossible to hack into or change
- shared with other and managed by expert
- contributions are made pre tax, can withdraw funds with no penalty age 59
- index representing the top 500 market cap companies
- An Initial Public Offering
- retirement plan managed by employer
- data is stored across many digital systems
- based on community involvement
- where you buy and sell shares of stock
- contributions are made post tax, can withdraw funds with no penalty age 59
- an amount of money that is paid at one time
Down
- a debt security that makes no periodic interest payments and is purchased at a deep discount to its face value.
- 30 blue chip companies
- SECURITY US federal program designed to provide financial protection through retirement, disability, and survivor benefits
- age you can collect social security.
- the availability
- social security and medicare taxes combined
- have a face value,fixed interest rate, and maturity date
- Exchange-traded funds
- retirement plan, contributions are taken out of your paycheck with no taxes
- fixed-income investment representing a loan made by an investor to a borrower (typically corporate or governmental)
- cryptocurrency is a high risk investment because prices can change rapidly
- dedicated pool of money or resources set aside for a specific purpose, such as investments, savings, or projects
- EXPECTANCY how long your projected to live
- your employer will ____ what you put in
25 Clues: the availability • Exchange-traded funds • 30 blue chip companies • An Initial Public Offering • based on community involvement • retirement plan managed by employer • age you can collect social security. • where you buy and sell shares of stock • shared with other and managed by expert • your employer will ____ what you put in • data is stored across many digital systems • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27
Across
- the right to _____
- food and ______ for all
- Social security
- The right to seek a _____ place to live
- no one can take away your ______ rights
- The right to ____
- don't ___________
- we are all ____ free and equal
Down
- Your human rights are _________ by the law
- we're always ________ till proven guilty
- we're all ______ before the law
- the right to ________
- a _____ and free world
- ______ to move
- marriage and _______
- the right to ______
16 Clues: ______ to move • Social security • The right to ____ • don't ___________ • the right to _____ • the right to ______ • marriage and _______ • the right to ________ • a _____ and free world • food and ______ for all • we are all ____ free and equal • we're all ______ before the law • The right to seek a _____ place to live • no one can take away your ______ rights • ...
Computer Science 2022-11-08
Across
- central Processing Unit
- a part of something
- continues messages
- a device
- a barrier that separates your private network from the internet
- internet manners
- solid state drives
- random access memory
- A Universal Serial Bus
Down
- protected by a legal agreement
- use lets you use copyrighted material with permission from the owner
- wide area network
- Copying someone’s work without permission
- hard disk drives
- local area network
- Drive similar to USB
- Security protects your data and network from malware and security breaches
17 Clues: a device • hard disk drives • internet manners • wide area network • continues messages • local area network • solid state drives • a part of something • random access memory • A Universal Serial Bus • central Processing Unit • Drive similar to USB • protected by a legal agreement • Copying someone’s work without permission • ...
Week 16 puzzle 2022-03-24
Across
- shortened form of malicious software
- very cruel _ _ _ _ A L
- describes good gardener, a green _ _ _ _ _
- to divide, p _ _ _ _ I Z E
- word used in question about possession
- digital currency, _ _ _ _ _ _ CURRENCY
Down
- fraud to steal someone's money
- idiom:understanding of something unclear
- idiom: lots of 'paperwork', bureaucracy
- online 'attack' _ _ _ _ _ W A R
- idiom: surprise, out of the _ _ _ _
- phrase used in a culture,not literal
12 Clues: very cruel _ _ _ _ A L • to divide, p _ _ _ _ I Z E • fraud to steal someone's money • online 'attack' _ _ _ _ _ W A R • idiom: surprise, out of the _ _ _ _ • shortened form of malicious software • phrase used in a culture,not literal • word used in question about possession • digital currency, _ _ _ _ _ _ CURRENCY • idiom: lots of 'paperwork', bureaucracy • ...
puzzle 2023-07-15
Across
- Has a trunk
- which one is first web browser invented is 1990?
- what is short from of star cyber secure user?
- Flying mammal
- where is iant regional office?
- what is collection of facts and figures?
- Man's best friend
Down
- how many digit enter the password?
- what is used to secure our phone?
- an open source operating system?
- Likes to chase mice
- Large marsupial
12 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • where is iant regional office? • an open source operating system? • what is used to secure our phone? • how many digit enter the password? • what is collection of facts and figures? • what is short from of star cyber secure user? • which one is first web browser invented is 1990?
Arciniegas 2022-02-10
Across
- officer: he commands the duty officer
- officer: He is in charge of intelligence at the school
- the camp: school garden manager
Down
- Security of people
- technical officer: school weapon manager
- police: martiality
- commander: Security school
- no duty: service of company
- soldiers Security
- officer: send to school services
10 Clues: soldiers Security • Security of people • police: martiality • commander: Security school • no duty: service of company • the camp: school garden manager • officer: send to school services • officer: he commands the duty officer • technical officer: school weapon manager • officer: He is in charge of intelligence at the school
Chapter 8 & 9 Vocabulary 2013-04-01
Across
- President may not legally hold office and can exercise power as if he were president
- top officials, advisors, and administrators of large bureaucracies appointed by the President
- Succession- president after current one
- appointment to political office
- Security Advisors- a special assistant for national security affairs
- votes of each State
- postponement of legal punishment
- president puts aside or refuses to spend, money congress put aside for a specific purpose
- group pardon for an offense against government
- voters of electoral vote (congress)
- delivery disclosed information
Down
- formal agreements between the government of two or more countries
- salary determined by congress
- medium for discussion
- privilege- the right of the president and other high ranking officials to refuse to provide information
- release from legal punishment
- expressed will of people
- Security- one of the Presidents top assistants who is in charge of Media Relations.
- Clearance- also reviews all legislature proposals executive agencies prepare
19 Clues: votes of each State • medium for discussion • expressed will of people • salary determined by congress • release from legal punishment • delivery disclosed information • appointment to political office • postponement of legal punishment • voters of electoral vote (congress) • Succession- president after current one • group pardon for an offense against government • ...
airport terminology 2019-02-28
Across
- its only accessible to passengers who are travelling
- a persons belongings that have to be checked in
- a series of actions conducted in a certain manner
- you need to declare these goods to be able to bring them into the country
- something that's required to be used for a specific purpose eg toilets or smoking areas
- carry on bag
- the area before you pass through security
- require international passengers to complete a departure card and show passport before entry
- arriving in a country on a plane
- helping someone with their needs
Down
- leaving the airport in the plane
- prevents potential risks from international trade and travel
- place to obtain boarding pass
- a compulsory need for eligibility
- you cannot bring these into the country without a permit
- screens passengers and their baggage
- a place to purchase items without tax or gst
- location where aviation transport takes off and lands
- passengers purchase their tickets, transfer their luggage and go through security
19 Clues: carry on bag • place to obtain boarding pass • leaving the airport in the plane • arriving in a country on a plane • helping someone with their needs • a compulsory need for eligibility • screens passengers and their baggage • the area before you pass through security • a place to purchase items without tax or gst • a persons belongings that have to be checked in • ...
Jared's Crossword, 2 2014-04-23
8 Clues: classroom environment • cruel, or physical harm • service with instruction • unwanted sexual advances • a sense of common purpose • social and academic learning • bullying threw electronic means • with instruction and reflection
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
hello 2025-06-11
Across
- Unité de base d’une image numérique
- Intelligence Artificielle
- L’acte d’observer des activités ou un lieu
- Simulation perçue comme réalité
- Le premier film du genre cyber-punk
- Graphisme sans perte de qualité
- Commande pour annuler une action
Down
- Nom principale de l’affiche à la page 87
- L’action d’accéder illégalement à un système
- Code malveillant qui infecte et altère les systèmes
- groupe musique
- L’abréviation de Portable Document Format
- Bug visuel, effet prisé en design
- Lumière vive typique des villes futurists
- Temps à venir, souvent inquiétant ici
- Moitié Homme, Moitié Robot
16 Clues: groupe musique • Intelligence Artificielle • Moitié Homme, Moitié Robot • Simulation perçue comme réalité • Graphisme sans perte de qualité • Commande pour annuler une action • Bug visuel, effet prisé en design • Unité de base d’une image numérique • Le premier film du genre cyber-punk • Temps à venir, souvent inquiétant ici • Nom principale de l’affiche à la page 87 • ...
Infant Safety/Abduction 2023-02-24
12 Clues: Gender • Mom & Dad • Watch out • Tiniest patient • Mom's loving hug • # still not found • Baby ID band spot • Call Security STAT • Check the contents • Opposite of pro-active • Infant security measure • Emergency formerly known as
Casino 2024-02-29
Across
- team, who fills Kiosk
- What color is the security thread in a 100
- currency is made of linen and
- Card for veterans
- Finance Director
- who's portrait is on a 20 dollar bill
- eyes in the sky
- 21
- one arm bandit
Down
- provides an escort
- Fake currency
- Coin counter
- Highest Card Status
- one of four service drivers
- Another name for ATM
- what color is a 10's strap
16 Clues: 21 • Coin counter • Fake currency • one arm bandit • eyes in the sky • Finance Director • Card for veterans • provides an escort • Highest Card Status • Another name for ATM • team, who fills Kiosk • what color is a 10's strap • one of four service drivers • currency is made of linen and • who's portrait is on a 20 dollar bill • What color is the security thread in a 100
Cyber Safety Crossword 2013-11-03
Across
- When a computer calls out to another computer to see if it is active.
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
- Free software that can be downloaded from the internet.
- A computer that has been hacked into and is used to launch malicious attacks
- Buying products on the Internet using credit cards or other electronic payments
- A type of malware that spies on what you do on the internet and can steal information about you
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- Small text files that websites save in your web browser to store information like your username and password.
- Marking something or someone as suspicious or inappropriate.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The internet version of Junk mail
- Short for Random Access Memory
- The last part of a URL eg;.gov .com
- A name you use to identify yourself on a computer or website.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Cyber Cross-Word 2022-05-19
Across
- secret - cb5ceb103977f1271d0763ac75fcd8e9
- firewall keeps track of com sessions
- packet analyzer
- software/hardware that creates/runs VM
- type of AV-based thats unusual for the user
- software that displays unwanted ad
- SIEM tool that enable to search, analyze...
Down
- attract attackers
- tool that uses multiple antivirus engines
- shortest-path-first routing protocol
- secure communications techniques
- transmission media with cables
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- interaction between snmp agent manager
- an open-source EDR
15 Clues: packet analyzer • attract attackers • an open-source EDR • transmission media with cables • secure communications techniques • 8e8c92b1c360cbe3cd2b40d6b29278d5 • software that displays unwanted ad • firewall keeps track of com sessions • shortest-path-first routing protocol • software/hardware that creates/runs VM • interaction between snmp agent manager • ...
Cyber safety Edwin 2016-06-08
Across
- media is when people be so mean.
- opposite of dangerous.
- ups silly things come up on your device.
- pictures.
- can be rude.
- there can be a problem.
- educational apps only,no violence
Down
- it is safe like the dictionary.
- information-people can hack.
- don't write anything that is rude.
- people can interrupt it.
- same as unsafe to the internet.
- its a virus.
- it is private.
- makes you're device bad.
15 Clues: pictures. • its a virus. • can be rude. • it is private. • opposite of dangerous. • there can be a problem. • makes you're device bad. • people can interrupt it. • information-people can hack. • it is safe like the dictionary. • same as unsafe to the internet. • media is when people be so mean. • educational apps only,no violence • don't write anything that is rude. • ...
Casino 2024-02-29
Across
- team, who fills Kiosk
- What color is the security thread in a 100
- currency is made of linen and
- Card for veterans
- Finance Director
- who's portrait is on a 20 dollar bill
- eyes in the sky
- 21
- one arm bandit
Down
- provides an escort
- Fake currency
- Coin counter
- Highest Card Status
- one of four service drivers
- Another name for ATM
- what color is a 10's strap
16 Clues: 21 • Coin counter • Fake currency • one arm bandit • eyes in the sky • Finance Director • Card for veterans • provides an escort • Highest Card Status • Another name for ATM • team, who fills Kiosk • what color is a 10's strap • one of four service drivers • currency is made of linen and • who's portrait is on a 20 dollar bill • What color is the security thread in a 100
Safety online 2023-04-14
8 Clues: ..... bullying • always be .... online • becareful on social... • always stay ... online • ....anybad or abusive person • don't share your.... information • remember to have your.... settings on • if you are being bullied, tell a ... adult
SOUTH SLP SAW'23 2023-09-20
Across
- Facilitating anyone's entry/exit known as ------.
- --------is an official repository of critical information and resources with regard to a site.
- --------is the web-based application to digitize various registers used to capture data by SLP team in physical form at each site.
- All amazon vehicles should be checked by security as per the -------.
- --------allows you to link the physical alerts generated by Access Control Devices (Lenel) and pushes them to Milestone VMS.
- --------replaced rightcrowd for all Operation Sites globally.
- "If you see something,say something" Report all-------to security or managers.
- If you believe an incident has occurred that impacts life safety, operations, or the Amazon brand------should be notified.
- --------is defined as a spectrum of behaviors including acts of intentional or targeted violence, threats, and other conduct that generates a reasonable concern for future violence that threatens safety within the workplace.
- Stay --------and always be on the lookout for security incidents.
Down
- -------- is a search engine for AMZL operations.
- Never share your------to anyone.
- In the event of an emergency evacuation, security should not conduct -------.
- Amazon data should be kept under------classification.
- --------is used for masking/unmasking the alarm.
- --------is a one stop solution for AMZL recommended financial recovery.
16 Clues: Never share your------to anyone. • -------- is a search engine for AMZL operations. • --------is used for masking/unmasking the alarm. • Facilitating anyone's entry/exit known as ------. • Amazon data should be kept under------classification. • --------replaced rightcrowd for all Operation Sites globally. • ...
coding club 2022-12-02
13 Clues: the coo • the ceo • the retiree • the clubs name • what we code on • whats the maskot • the main security • the do nothing guy • our lead supervisor • the clubs best coder • one of the activities • the classroom we code in • the cfo/assintant security
security technology 2014-07-07
13 Clues: risk • layer • layer • layer • system • private network • reads your mail • key distribution • control protocol • encryption scheme • protocol/internet layer • mail and sign your name • intercepts your mail and modify
Security Questions 2020-04-14
11 Clues: Crappy car • Summer treat • It's not FDIC • Macintosh or Fuji • window All clear sign • Where first aid kit is • 2nd evacuation location • 1st evacuation location • drawer Where robbery kit is • Top drawer limit (thousands) • Bottom drawer limit (thousands)
Security Training 2020-06-26
Across
- we have a plan! In the event we need to activiate our ______ plan, JQ and KR will tell you where to go and what to do.
- If you are held up outside, explain that you do not have _____ to cash
- who is CPR certified in our department?
- You should keep your cellphone volume on during an active shooter situation?
- The 4th floors color dot to report to for fire evactuation is _______
- In the event of an emergency situation with an employee or member requiring medical attention, you should _____ with the member and ask another employee to call an ambulance. Alert your manager.
Down
- what order of action should you take during an active shooter situation?
- if you recieve a bomb threat who do you transfer the call to ________
- If a robbery has been announced, you should ____ _____ and continue daily operation
- You can find instructions on ______ training under Departments>_______ Program
- Our second meeting location is ________
11 Clues: who is CPR certified in our department? • Our second meeting location is ________ • if you recieve a bomb threat who do you transfer the call to ________ • The 4th floors color dot to report to for fire evactuation is _______ • If you are held up outside, explain that you do not have _____ to cash • ...
Security Awareness 2017-05-10
Across
- ____ Hotline
- Requirements for safeguarding and handling classified information
- ______ Threat
- Refers to information gathered to protect against espionage
- Be Alert! Be _____
- You are required to ______ suspicious behavior
Down
- Highest level of classification (two words)
- Report change of name and __________
- ________ Classification Training
- Discuss classified information in an _________, classified area
- Last name of your FSO
11 Clues: ____ Hotline • ______ Threat • Be Alert! Be _____ • Last name of your FSO • ________ Classification Training • Report change of name and __________ • Highest level of classification (two words) • You are required to ______ suspicious behavior • Refers to information gathered to protect against espionage • Discuss classified information in an _________, classified area • ...
Information Security 2019-05-13
Across
- Technique for overwhelming a computer with requests
- A malicious software used by criminals to encrypt a victim's files
- A computer virus capable of spreading itself
- Using something you have and something you know to login
- Malicious messages used to trick people
- A form of ditigal currency that is often used for anonymous transactions
- The study of secret or encrypted messages
- Software that records keystrokes on a computer
Down
- Software used by criminals to extort money from a victim
- Manipulating people to do things
- Common term for malicious software
11 Clues: Manipulating people to do things • Common term for malicious software • Malicious messages used to trick people • The study of secret or encrypted messages • A computer virus capable of spreading itself • Software that records keystrokes on a computer • Technique for overwhelming a computer with requests • Software used by criminals to extort money from a victim • ...
1. Security 2023-06-22
Across
- Protecting networks, computers, and information from digital attacks, like viruses or hacking.
- Protecting your money and personal information from theft or fraud when using banks or making purchases.
- Actions you take to stay safe, like not sharing personal information with strangers or walking home with a buddy.
- Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals.
- Event Precautions taken to keep people safe at large gatherings like concerts or festivals, including crowd control and first aid.
Down
- Measures to protect cars, bikes, or other vehicles from theft or damage, like alarms, locks, or tracking devices.
- Measures employers take to keep employees safe while they work, including training, rules, and safety equipment.
- Protecting your computer and online accounts from people who want to steal your information or cause harm.
- Measures to keep students and teachers safe at school, like monitoring visitors and having rules for behavior.
- Systems at airports that check people and their belongings to prevent dangerous items or actions on airplanes.
- Measures to protect your living space from intruders, like locks on doors and windows, or alarms.
11 Clues: Protecting networks, computers, and information from digital attacks, like viruses or hacking. • Measures to protect your living space from intruders, like locks on doors and windows, or alarms. • Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals. • ...
Food Security 2024-12-18
Across
- The primary source of protein for many people, often derived from livestock.
- The global issue of insufficient food supply for a population.
- A method of farming that uses minimal tillage to preserve soil health.
- The term for the variety of crops and livestock in a given area.
- A method of farming that focuses on sustainability and environmental health.
- The practice of cultivating soil, growing crops, and raising animals for food.
- The term for the amount of food produced per unit of land.
Down
- The seasonal movement of farmers and their livestock to find fresh pastures.
- A nutrient-rich food that is often fortified to combat malnutrition.
- The phenomenon of climate change affecting agricultural productivity.
- A staple food grain that is a primary source of calories for many people.
11 Clues: The term for the amount of food produced per unit of land. • The global issue of insufficient food supply for a population. • The term for the variety of crops and livestock in a given area. • A nutrient-rich food that is often fortified to combat malnutrition. • The phenomenon of climate change affecting agricultural productivity. • ...
Network Security 2025-01-27
Across
- It is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
- It is slang commonly used to describe junk e-mail on the Internet.
- It is a process that ensures and confirms a user’s identity
- It is a malware computer program that replicates itself in order to spread to other computers.
- It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
- It is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet
Down
- These are small files which are stored on a user’s computer. It provide a way for the website to recognize you and keep track of your preferences
- These refers to any video in which faces have been either swapped or digitally altered, with the help of AI
- It is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware
- It refers to a flaw in a system that can leave it open to attack.
- It refers to any piece of software or application that displays advertisements on your computer.
11 Clues: It is a process that ensures and confirms a user’s identity • It refers to a flaw in a system that can leave it open to attack. • It is slang commonly used to describe junk e-mail on the Internet. • It is a malware computer program that replicates itself in order to spread to other computers. • ...
Food Security 2024-11-28
Across
- The practice of growing crops and raising animals for food
- A type of food that helps build muscles
- A large area where food is grown
- A person who works in agriculture
- A type of food that provides energy
- A system that provides food to people in different regions
Down
- A food that is produced using sustainable farming methods
- The number of servings of fruits and vegetables recommended per day
- The process of keeping food fresh for longer periods
- The essential nutrient in fruits and vegetables
- The state of having enough food for all people
11 Clues: A large area where food is grown • A person who works in agriculture • A type of food that provides energy • A type of food that helps build muscles • The state of having enough food for all people • The essential nutrient in fruits and vegetables • The process of keeping food fresh for longer periods • A food that is produced using sustainable farming methods • ...
Food security 2024-11-28
Across
- What is the practice of growing crops and raising animals called?
- What term refers to the variety of living organisms in a specific habitat or ecosystem?
- What do we call facilities or methods used to preserve crops after harvest?
- What is the process of supplying water to crops through channels or pipes?
- What do we call facilities or methods used to preserve crops after harvest?
Down
- What term describes a lack of proper nutrients in a person’s diet?
- What is the term for substances like nitrogen or phosphate used to enhance soil fertility?
- What is the term for chemicals used to control pests and diseases in crops?
- What is the resource most essential for irrigation and crop growth?
- What is the term for growing only enough food for a farmer's family?
- What are organisms that harm crops and reduce yields called?
11 Clues: What are organisms that harm crops and reduce yields called? • What is the practice of growing crops and raising animals called? • What term describes a lack of proper nutrients in a person’s diet? • What is the resource most essential for irrigation and crop growth? • What is the term for growing only enough food for a farmer's family? • ...
Food security 2024-11-28
11 Clues: NAME TAG • END OF LIFE • OPPOSITE OF TIDY • OPPOSITE OF CLEAN • CAN BE FOUND IN CURD • SOURCE OF MULTIVITAMIN • MEDICINE TO REMOVE PESTS • GOOD FOR DIGESTIVE SYSTEM • MANDATORY ACTIVITY BEFORE EATING • PROCESS OF REMOVING INFECTIOUS THINGS • SIGNIFICATANT MEASURES TO PREVENT FROM HARM
Security Crossword 2022-11-29
Across
- Are passwords with no ‘L’ safe…
- Body measurements and calculations related to human characteristics
- a social engineering attack focussed on texts
- This word is added to the subject line of an email to send a secure message.
- A method of scrambling information, such as passwords, so they are not human-readable
- Who bypasses all security measures in your house once a year
- Using something in addition to your username and password
- Modify a device to remove some sort of restrictions
Down
- Web browsers use this to track your identity across websites.. Also Left out for Santa on Christmas eve
- The first part of the CIA…
- Malware that encrypts data, and payment must be made to decrypt
11 Clues: The first part of the CIA… • Are passwords with no ‘L’ safe… • a social engineering attack focussed on texts • Modify a device to remove some sort of restrictions • Using something in addition to your username and password • Who bypasses all security measures in your house once a year • Malware that encrypts data, and payment must be made to decrypt • ...
SDL Crossword 2019-06-05
Across
- What code is for Kapiti Coast?
- How will the expansion of Auckland Airport impact on the local region?
- By 2025 what does Auckland Airport hope to have?
- How many passenger terminals does Auckland Airport have?
- After security means what?
- What is the city for the code NSN?
- How many baggage claim belts does Auckland Airport have?
- Screening passengers and their carry-on baggage is what step for Aviation Security?
Down
- What is the city for the code ZQN?
- Can anyone be on landside?
- How many cargo terminals do Auckland Airport have?
- Passport, e-ticket and ______ is what Customer Service Offices would need you to present to them after landing?
- Before security means what?
- Can anyone be on airside?
- How far away is Auckland city from the airport?
- What is 1900 in 24 hour clock?
- What code is for Hamilton?
17 Clues: Can anyone be on airside? • Can anyone be on landside? • After security means what? • What code is for Hamilton? • Before security means what? • What code is for Kapiti Coast? • What is 1900 in 24 hour clock? • What is the city for the code ZQN? • What is the city for the code NSN? • How far away is Auckland city from the airport? • ...
The Department of Homeland Security Crossword 2024-12-09
Across
- The main mission of DHS is to stop this threat.
- CISA, stands for ___________ and Infrastructure Security Agency.
- ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
- DHS operates at the ______ level.
- One weakness of the DHS is the __________ jurisdiction.
- The DHS Oversees ______ security and lawful immigration.
Down
- One of the DHS agencies.
- The person who appoints the Secretary of Homeland Security.
- DHS works to help communities recover through ________.
- The DHS is the newest _______-level department.
10 Clues: One of the DHS agencies. • DHS operates at the ______ level. • The main mission of DHS is to stop this threat. • The DHS is the newest _______-level department. • DHS works to help communities recover through ________. • One weakness of the DHS is the __________ jurisdiction. • The DHS Oversees ______ security and lawful immigration. • ...
Netiquet 2013-03-06
Across
- When you tag something relevent.
- Someone who you accept or like.
- A shortend word or phrase.
- To block or stop someone from seeing you.
- Space on the network.
- An internet mail message.
Down
- A short message that one sends to other or others.
- The most popular social networking.
- A special way of networking.
- Meeting others.
- An electronic book.
- A search engine.
- A place were you store messages or emails.
13 Clues: Meeting others. • A search engine. • An electronic book. • Space on the network. • An internet mail message. • A shortend word or phrase. • A special way of networking. • Someone who you accept or like. • When you tag something relevent. • The most popular social networking. • To block or stop someone from seeing you. • A place were you store messages or emails. • ...
Higher difficulty 2018-04-07
Across
- someone highly motivated
- to bring together
- something happening on the internet
- writing a letter without giving your name
- an animal that might become extinct soon
- a very profitable business
- something much faster than normal, could be very tiring
Down
- animals that live in the wild
- could be in danger
- makes something worse
- a person who illegally hunts or captures animals
- something very bad
- a huge piece of floating ice
13 Clues: to bring together • could be in danger • something very bad • makes something worse • someone highly motivated • a very profitable business • a huge piece of floating ice • animals that live in the wild • something happening on the internet • an animal that might become extinct soon • writing a letter without giving your name • a person who illegally hunts or captures animals • ...
GLOBAL FOOD SECURITY 2025-06-16
Across
- | A condition caused by lack of food |
- | Poor nutrition from lack of food or unbalanced diet
- | The way food is used and absorbed by the body
- | Not having enough food to be healthy
- | One of the main pillars of food security, referring to having enough food
- | Food security also depends on this over time
- | Essential nutrient found in meat and legumes |
- | When there is not enough of a resource like food or water
- | Vitamins and minerals needed in small amounts |
Down
- | Energy unit found in food |
- | A basic food like rice or wheat |
- | Key pillar of food security: physical and economic ______ to food
- | Process of adding nutrients to food |
- | Capacity to recover from food shocks
- | Extreme scarcity of food
15 Clues: | Extreme scarcity of food • | Not having enough food to be healthy • | Capacity to recover from food shocks • | Food security also depends on this over time • | The way food is used and absorbed by the body • | Energy unit found in food | • | A basic food like rice or wheat | • | Process of adding nutrients to food | • ...
Mobile Security 2013-05-21
Across
- A piece of software designed to prevent viruses from entering a computer system or network.
- A string of numbers and/or letters used to unlock a device.
- Converting data or information into a code to be deciphered.
- A mobile operating system created by Google.
Down
- A method of connecting your device to the network wirelessly
- A copy of data that can be used if the original data is lost.
- A mobile operating system made by Apple for use on iphones, ipods, and ipads.
- A device that combines a cell phone with a handheld computer.
- An electronic system that uses satellites to determine the position of a vehicle, person, etc.
- When each user is allowed to bring his/her own device and use it for work purposes.
- A person who uses computers to gain unauthorized access to data.
11 Clues: A mobile operating system created by Google. • A string of numbers and/or letters used to unlock a device. • A method of connecting your device to the network wirelessly • Converting data or information into a code to be deciphered. • A copy of data that can be used if the original data is lost. • A device that combines a cell phone with a handheld computer. • ...
Information Security 2021-07-12
Across
- it block the user to access his own data and give threats
- it is a network security system designed to protect a trusted private netswork from unauthorised access
- the main purpose of this to record the key pressed by user on the keyboard
- this creates unnecessary junk in receiver's email
- secretly listening to a conversation
Down
- the short term used for malacious software
- it is harassment and stalking through phones or the internet
- when user access certain website small files downloaded on to the computer
- it is the practice of sending fraudulent communication that appear to come from reputable source
- It is a malware that do damaging activity on an infected computer
- a piece of software code created to perform malacious activities
11 Clues: secretly listening to a conversation • the short term used for malacious software • this creates unnecessary junk in receiver's email • it block the user to access his own data and give threats • it is harassment and stalking through phones or the internet • a piece of software code created to perform malacious activities • ...
BSA / Security 2022-05-19
Across
- It is important to remain calm during a ____
- A Mexican Matricula Card is considered ____ Identification
- The teller should do this to all cash bought into their unit
- ____ is the number one deterrent for robberies
- Fill this out if you suspect a customer of structuring a deposit
- Never leave a teller ____ on the line
Down
- ____ is required in all vault rooms
- There should never be more than $10K in your
- The number of initials required on vault tickets
- Needed if a customer exchanges $5K in cash for larger bills
- Before leaving the branch, staff should do a ____
11 Clues: ____ is required in all vault rooms • Never leave a teller ____ on the line • There should never be more than $10K in your • It is important to remain calm during a ____ • ____ is the number one deterrent for robberies • The number of initials required on vault tickets • Before leaving the branch, staff should do a ____ • ...
IT SECURITY 2022-10-27
Across
- Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
- an open source and freely available software package for email security
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- the process of converting information or data into a code, especially to prevent unauthorized access.
Down
- network security device that monitors and filters incoming and outgoing network traffic
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- The conversion of encrypted data into its original form
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
11 Clues: The conversion of encrypted data into its original form • an open source and freely available software package for email security • network security device that monitors and filters incoming and outgoing network traffic • software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
System Security 2018-06-08
Across
- A suite of technologies that can identify unauthorised users of a computer system (7,9)
- Software whose purpose is to remove harmful software from your system (4-7)
- The process of scrambling data so it can be sent securely over networks (10)
- Checking for weaknesses in your own system before a hacker finds them (11,7)
- Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
- A generic term to describe any piece of software that is harmful to your computer (7)
- A means of hacking that tries every possible password in quick succession (5,5)
Down
- Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
- When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
- The act of gathering information by spoofing trustworthy websites for malicious intent (8)
- A set of rules that govern how a network is managed and used (7,8)
11 Clues: A set of rules that govern how a network is managed and used (7,8) • Software whose purpose is to remove harmful software from your system (4-7) • The process of scrambling data so it can be sent securely over networks (10) • Checking for weaknesses in your own system before a hacker finds them (11,7) • ...
INTERNET SECURITY 2024-12-11
Across
- GETTING PASSWORDS FOR ONLINE BANK ACCOUNTS BY FAKE BANK EMAIL
- IAN MURPHY ______ INTO THE WHITE HOUSE
- ONLINE HARASSMENT
- PROGRAM WRITTEN BY PHIL ZIMMERMAN
- THE MOST COMMON METHOD OF PROTECTION
- THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE
Down
- PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN
- SMALL FILES PLACED ON YOUR HARD DRIVE
- WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN?
- PROGRAMS THAT DAMAGE YOUR COMPUTER?
- PROCESS OF CONVERTING INFORMATION OR DATA INTO A CODE
11 Clues: ONLINE HARASSMENT • PROGRAM WRITTEN BY PHIL ZIMMERMAN • PROGRAMS THAT DAMAGE YOUR COMPUTER? • THE MOST COMMON METHOD OF PROTECTION • SMALL FILES PLACED ON YOUR HARD DRIVE • IAN MURPHY ______ INTO THE WHITE HOUSE • THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE • WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN? • PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN • ...
FOOD SECURITY 2024-12-17
Across
- A healthy food made from ground-up grains, commonly eaten for breakfast.
- A sweet treat that comes from the sugar cane or sugar beets
- this is a type of nut that is often used in baking or eaten as a snack
- this green vegetable is shaped like a small tree and is very good for you.
- this fruit is yellow on the outside, but red, green, or yellow on the inside.
- this food is made from crushed tomatoes and is often used as a base for pizza or pasta.
Down
- this fruit is round, orange, and full of vitamin C.
- this is a green vegetable that is often used in soups and stews, and is full of vitamins.
- this fruit is small, round, and often used in fruit salads. It can be red, green, or purple
- this is staple food made from corn that can be cooked and eaten with butter.
- this food is a yellow vegetable that can be eaten on the cob or as kernels.
11 Clues: this fruit is round, orange, and full of vitamin C. • A sweet treat that comes from the sugar cane or sugar beets • this is a type of nut that is often used in baking or eaten as a snack • A healthy food made from ground-up grains, commonly eaten for breakfast. • this green vegetable is shaped like a small tree and is very good for you. • ...
Jargon 4: Revenge of the Kev 2023-09-06
Across
- Security protocol used in wifi networks that offers greater protection through data encryption
- process of encoding information to a unrecognizable form.
- Part of an application that performs a task not apparent to the user
- A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
- document sent with an email message
- Basic unit of information in computing.
- load and initialize the operating system on a computer
Down
- Physical place where a computer stores information, also known as its HDD.
- Network security system that monitors and controls incoming and outgoing traffic
- Hardware or Software component that stores data so future requests can be served faster
- a set of computers sharing resources located on a node
- application that provides a way to look at and interact with information on the Internet
- any goal-oriented activity requiring computer machinery
- Small blocks of data created by a web server while browsing a website
14 Clues: document sent with an email message • Basic unit of information in computing. • a set of computers sharing resources located on a node • load and initialize the operating system on a computer • any goal-oriented activity requiring computer machinery • process of encoding information to a unrecognizable form. • ...
Vyper Language 2025-07-31
Across
- Interface that lets other applications interact with smart contracts
- A key blockchain feature — cannot be changed once deployed
- The unit of computation cost on Ethereum
- A piece of code that runs on Ethereum
- A system without a central authority
- Pythonic smart contract language focused on security
Down
- Where users and contracts live on the blockchain
- A thorough security check of a smart contract
- The syntax style that Vyper is inspired by
- The top priority in Vyper design philosophy
- Used in Vyper for error-checking
- A digital asset created on a blockchain
- Blockchain platform where Vyper contracts are deployed
13 Clues: Used in Vyper for error-checking • A system without a central authority • A piece of code that runs on Ethereum • A digital asset created on a blockchain • The unit of computation cost on Ethereum • The syntax style that Vyper is inspired by • The top priority in Vyper design philosophy • A thorough security check of a smart contract • ...
Employment Vocabulary 2022-09-02
Across
- How an employer pays an employee who is not salary.
- Considered working 40 hours per week.
- Form a potential employee fills out to obtain a job.
- Paid vacation and paid sick time.
- How many digits your Social Security number is.
- Social Security and Medicare rates are expressed as this.
- The largest health insurance program for people 65 and older.
- 24 paychecks per year.
Down
- A benefit for employees that helps cover health, life, and disability.
- When a worker stops working permanently.
- Medicare and Social Security combined.
- Another word for commission.
- A job that receives royalties.
13 Clues: 24 paychecks per year. • Another word for commission. • A job that receives royalties. • Paid vacation and paid sick time. • Considered working 40 hours per week. • Medicare and Social Security combined. • When a worker stops working permanently. • How many digits your Social Security number is. • How an employer pays an employee who is not salary. • ...
Cybersecurity Crossword 2023-02-15
Across
- A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
- The practice of defending computers, mobile devices and IT systems against cyber criminals
- A series of letters, numbers and symbols to protect your device and online accounts
- The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
- A type of malware that blocks access to computer file until a ransom is paid
- A type of code or programme that can cause your device to slow down or malfunction
- The act of ensuring your account/device is using the latest software
- An icon that suggests the website is safe
- A dishonest scheme to cheat you of your data or money
9 Clues: An icon that suggests the website is safe • A dishonest scheme to cheat you of your data or money • The act of ensuring your account/device is using the latest software • A type of malware that blocks access to computer file until a ransom is paid • A type of code or programme that can cause your device to slow down or malfunction • ...
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
Cyber Awareness Crossword 2023-11-27
Across
- A harmful program that can replicate itself and spread to other computers. (5 letters)
- An electronic message sent indiscriminately to large numbers of recipients. (4 letters)
- To copy files to a second medium (like a hard drive) as a precaution against loss or damage. (6 letters)
- The type of software used to protect your computer from viruses. (8 letters)
- A type of software that collects information about a computer user without their knowledge. (7 letters)
- The act of tricking someone into giving confidential information. (8 letters)
- A scam that tricks individuals into revealing sensitive personal information, often through deceptive emails. (8 letters)
- The act of monitoring someone's activities without their knowledge. (7 letters)
- An attempt to make someone reveal their password or other sensitive information under false pretenses. (8 letters)
Down
- A technique used to deceive users into thinking they are interacting with a trusted entity, commonly used in phishing attacks. (7 letters)
- The act of monitoring someone's activities without their knowledge. (7 letters)
- The process of converting information or data into a code to prevent unauthorized access. (11 letters)
- The act of making an unauthorized copy of data. (7 letters)
- The protective measure to keep your accounts safe; often a mix of letters, numbers, and symbols. (8 letters)
- An unauthorized attempt to gain access to someone's data or computer. (6 letters)
- The practice of using a computer to gain unauthorized access to data. (7 letters)
16 Clues: The act of making an unauthorized copy of data. (7 letters) • The type of software used to protect your computer from viruses. (8 letters) • The act of tricking someone into giving confidential information. (8 letters) • The act of monitoring someone's activities without their knowledge. (7 letters) • ...
Crossword Cyber Games 2024-07-29
Across
- Secure connection over the internet
- Program that provides unwanted ads
- Secure data transmission method
- Olympic gold medalist swimmer Michael
- Network of compromised computers
- Strong password storage method
- Unauthorized surveillance
- Unauthorized access
Down
- Athletic contest with track and field events
- Olympic sport with a vault event
- Malicious software
- Malware that demands ransom
- Fraudulent attempt to obtain sensitive info
- Olympic event with swords
- Protection of personal data
15 Clues: Malicious software • Unauthorized access • Olympic event with swords • Unauthorized surveillance • Malware that demands ransom • Protection of personal data • Strong password storage method • Secure data transmission method • Olympic sport with a vault event • Network of compromised computers • Program that provides unwanted ads • Secure connection over the internet • ...
U11 Cyber Threats 2025-09-30
Across
- Malicious code that attaches to files and spreads when opened.
- Malware disguised as legitimate software.
- Deliberate destruction or disruption of systems.
- Tool that records every keystroke made by a user.
- Fake alerts designed to trick users into downloading malware.
- Software that hides the existence of malware.
- Intercepting data packets on a network.
- Publishing private information about someone online.
Down
- Fraudulent attempt to obtain sensitive information via email.
- Software that secretly monitors user activity.
- Network of infected devices controlled remotely.
- Malware that encrypts data and demands payment.
- Self-replicating malware that spreads across networks.
- Hidden method of bypassing normal authentication.
- Impersonating another device or user to gain access.
15 Clues: Intercepting data packets on a network. • Malware disguised as legitimate software. • Software that hides the existence of malware. • Software that secretly monitors user activity. • Malware that encrypts data and demands payment. • Network of infected devices controlled remotely. • Deliberate destruction or disruption of systems. • ...
Once Upon a Time B 2021-09-30
Across
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Nervously, the resident noticed the ? of a figure below the street light.
- The ? gardener was willing to travel to different places where there was work.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- cherished red wagon with the supplies for phys. Ed.
Down
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- For their safety, they ? to the Neighbourhood Watch program.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Residents ? their fears of criminals by installing sophisticated security devices.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- When slicing bread or tomato, it is easier using a knife with ?.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- After many false alarms, the family wondered about the ? of the security system.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Cybersecurity Week! 2023-10-11
Across
- Software used to prevent, scan, detect and delete viruses from a computer.
- A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- A type of malware designed to give hackers access to and control over a target device.
- A cyber-attack that targets individuals through SMS or text messages.
- Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
- A type of malware that disguises itself as legitimate code or software.
- Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- A technique through which a cybercriminal disguises themselves as a known or trusted source.
- A network of compromised computers used to carry out cyberattacks on other systems.
11 Clues: A cyber-attack that targets individuals through SMS or text messages. • A type of malware that disguises itself as legitimate code or software. • Software used to prevent, scan, detect and delete viruses from a computer. • A network of compromised computers used to carry out cyberattacks on other systems. • ...
