cyber security Crossword Puzzles

CYBER LAW 2021-09-03

CYBER LAW crossword puzzle
Across
  1. the making, altering, use, or possession of a false writing in order to commit a fraud
  2. registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  3. The communication via any electronic device of false data that damages a person's reputation
  4. process of converting information into a digital
  5. Business conducted electronically (buying/selling on web)
  6. Web page to summon different elements from diverse pages or servers to create a new Web page
Down
  1. the process of using Internet-based socializing and communication techniques to create, operate and manage activism of any type
  2. Using a computer to steal personal data
  3. when someone forcefully takes control of a website by cracking the password and later changing it
  4. Make sure a buyer and seller can identify themselves

10 Clues: Using a computer to steal personal dataprocess of converting information into a digitalMake sure a buyer and seller can identify themselvesBusiness conducted electronically (buying/selling on web)the making, altering, use, or possession of a false writing in order to commit a fraud...

CYBER LAW 2021-09-04

CYBER LAW crossword puzzle
Across
  1. sending a fake email to steal other people's information
  2. offence where a hacker gains access and control over someone else's website
  3. buying and selling of goods and services over internet
  4. process of recognizing a user's identity
  5. process of displaying a graphic file on one website that originates at another
  6. use of defamatory statement over social networking sites
Down
  1. conversion of information into digital format
  2. selling, registering or using a domain name with an intention of earning profit from someone else's trademark
  3. material alteration of a legal instruments with an intention of doing fraud
  4. using social networking tools and platforms to share and broadcast mottos and messages and to interact with netizens

10 Clues: process of recognizing a user's identityconversion of information into digital formatbuying and selling of goods and services over internetsending a fake email to steal other people's informationuse of defamatory statement over social networking sitesoffence where a hacker gains access and control over someone else's website...

Cyber Crime 2022-11-14

Cyber Crime crossword puzzle
Across
  1. a virus on your computer that is intstalled when you open/download something that harvests your information
  2. when people are contacted and are tricked into giving the scammer money
  3. the first real cyber attack in 1971, it was a virus
  4. the first anti-virus software that hunted down the creeper
  5. stealing other people's identities
Down
  1. connecting a device to your phone so you can secretly listen to other people's calls
  2. making a perfect pitch to confuse a phone to give you a free call
  3. similar to phishing, but it runs a code on your computer, without you clicking a link.
  4. presenting a fake situation to the victim to either get money or information from them
  5. a virus that scammed over 80 million USD from people at a time

10 Clues: stealing other people's identitiesthe first real cyber attack in 1971, it was a virusthe first anti-virus software that hunted down the creepera virus that scammed over 80 million USD from people at a timemaking a perfect pitch to confuse a phone to give you a free callwhen people are contacted and are tricked into giving the scammer money...

Cyber Crime 2022-09-07

Cyber Crime crossword puzzle
Across
  1. redirects you to bad website
  2. someone who tests secure sites
  3. uses email to trick you
  4. reliable website has this in url line
  5. information about who you are
  6. produce 80% damage
Down
  1. deep technical skills
  2. wannabe hacker
  3. promise of goods is never made
  4. to steal something

10 Clues: wannabe hackerto steal somethingproduce 80% damagedeep technical skillsuses email to trick youredirects you to bad websiteinformation about who you aresomeone who tests secure sitespromise of goods is never madereliable website has this in url line

Cyber Mobbing 2019-05-03

Cyber Mobbing crossword puzzle
Across
  1. Belästigung im …
  2. Was solltest du machen wenn dich eine Person belästigt?
  3. Mit welcher Person solltest du als erstes reden?
  4. Belästigung im Internet
  5. Meist wir aus "Spaß" und … gemobbt!
  6. nicht gewollt
Down
  1. hinter einem stehen
  2. Verrate niemals deine persönlichen …
  3. Person die andere Menschen Belästigt
  4. Bei wem kannst du die Belästigung einer Person melden?

10 Clues: nicht gewolltBelästigung im …hinter einem stehenBelästigung im InternetMeist wir aus "Spaß" und … gemobbt!Verrate niemals deine persönlichen …Person die andere Menschen BelästigtMit welcher Person solltest du als erstes reden?Bei wem kannst du die Belästigung einer Person melden?Was solltest du machen wenn dich eine Person belästigt?

CYBER SAFTY 2019-09-24

CYBER SAFTY crossword puzzle
Across
  1. trying to break into computer system
  2. being harassed or threatened online
  3. flag feeling when you feel in danger or in pain by what someone did
  4. someone who intentionally and illegally hacks into another person's system to obtain information
  5. protection for your computer
Down
  1. something you shouldn't give online.
  2. software protecting computers from danger
  3. being pursed by someone online trough social media
  4. someone who has knowledge on programing and on computers
  5. sending a fake e-mail to get others personal information

10 Clues: protection for your computerbeing harassed or threatened onlinesomething you shouldn't give online.trying to break into computer systemsoftware protecting computers from dangerbeing pursed by someone online trough social mediasomeone who has knowledge on programing and on computerssending a fake e-mail to get others personal information...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Talking someone into revealing secrets or embarrassing information, then sharing it online
  2. intentionally or cruelly excluding someone from an online group
  3. a disease that spreads through the computer
  4. sharing someone secrets or embarassing info
  5. Repeated, intense harassment that includes threats or creates significant fear.
Down
  1. Using someones work without their permission
  2. Repeated mean, rude and insulting
  3. Online messages with angry language
  4. Bullying Online
  5. Theft When someone steals another Persons identity

10 Clues: Bullying OnlineRepeated mean, rude and insultingOnline messages with angry languagea disease that spreads through the computersharing someone secrets or embarassing infoUsing someones work without their permissionTheft When someone steals another Persons identityintentionally or cruelly excluding someone from an online group...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. stalking repeated intense harrasment
  2. to share someone else secerets or information ofimages online
  3. pretending to be someone or posting vidoes online to get them introuble
  4. to trick someone to reveal secrets or embarrisingInfromation online
  5. means to diss someone or spread rumors.
Down
  1. intentionally and cruely exculuding someone froman online group
  2. theft means to stels someones identity
  3. means to send mean or insulting messages.
  4. means to use angry and vulgar launage online
  5. denigration that includes threats and significant fear

10 Clues: stalking repeated intense harrasmenttheft means to stels someones identitymeans to diss someone or spread rumors.means to send mean or insulting messages.means to use angry and vulgar launage onlinedenigration that includes threats and significant fearto share someone else secerets or information ofimages online...

CYBER SAFTEY 2023-05-18

CYBER SAFTEY crossword puzzle
Across
  1. LIKE A HUMAN VIRUS BUT FPR COMPUTERS
  2. YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU
  3. IT IS WHAT IS YOURS
  4. WHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.
  5. KEEPS EVERYTHING OF YOURS SAFE
Down
  1. ONLINE BULLYING
  2. WHEN PEOPLE BOTHER YOU OVER AND OVER
  3. HAPPENS TO KIDS ALL AROUND THE WORLD
  4. STALKING PEOPLE ONLINE
  5. USE THEM TO KEEP ONLINE THINGS SAFE

10 Clues: ONLINE BULLYINGIT IS WHAT IS YOURSSTALKING PEOPLE ONLINEKEEPS EVERYTHING OF YOURS SAFEUSE THEM TO KEEP ONLINE THINGS SAFEWHEN PEOPLE BOTHER YOU OVER AND OVERLIKE A HUMAN VIRUS BUT FPR COMPUTERSHAPPENS TO KIDS ALL AROUND THE WORLDWHAT BAD PEOPLE DO TO STEAL PASSWORD ECT.YOU DO THIS TO STOP A CERTAIN PERSON FROM CONTACTING YOU

CYBER ATTACK 2024-01-22

CYBER ATTACK crossword puzzle
Across
  1. to put at the disposal of; furnish or supply
  2. to gain unauthorized access to another computer system
  3. to stop something from happening or someone from doing something
  4. deliberate publication of private information for personal or corporate interest
Down
  1. in addition
  2. fabricated or deliberately manipulated audio or visual content
  3. observe and check the progress or quality of
  4. to regard as probable or likely; anticipate
  5. unintentional mistakes suh as inaccurate dates, statistics
  6. serve as evidence or proof that something exists or is the case

10 Clues: in additionto regard as probable or likely; anticipateto put at the disposal of; furnish or supplyobserve and check the progress or quality ofto gain unauthorized access to another computer systemunintentional mistakes suh as inaccurate dates, statisticsfabricated or deliberately manipulated audio or visual content...

CYBER ATTACK 2024-01-22

CYBER ATTACK crossword puzzle
Across
  1. to put at the disposal of; furnish or supply
  2. to gain unauthorized access to another computer system
  3. to stop something from happening or someone from doing something
  4. deliberate publication of private information for personal or corporate interest
Down
  1. in addition
  2. fabricated or deliberately manipulated audio or visual content
  3. observe and check the progress or quality of
  4. to regard as probable or likely; anticipate
  5. unintentional mistakes suh as inaccurate dates, statistics
  6. serve as evidence or proof that something exists or is the case

10 Clues: in additionto regard as probable or likely; anticipateto put at the disposal of; furnish or supplyobserve and check the progress or quality ofto gain unauthorized access to another computer systemunintentional mistakes suh as inaccurate dates, statisticsfabricated or deliberately manipulated audio or visual content...

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

Cyber Month! 2023-09-19

Cyber Month! crossword puzzle
Across
  1. Name of the person who knows a lot about Big Risk because he IS a Big Risk
  2. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
  3. Animal you played during last week's Knowbe4 training
  4. Password storing software available to CAMPUS employees
  5. it refers to any software specifically designed to harm, disrupt, or gain unauthorized access to computer systems or data.
  6. Clearly the best type of ice cream, don't argue
Down
  1. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decipher and read it.
  2. The process of verifying the identity of a user, system, or application to ensure that access is granted only to authorized individuals or entities.
  3. A security system designed to protect a network or computer from unauthorized access by monitoring and controlling incoming and outgoing network traffic.
  4. secret combination of characters, numbers, or symbols that you use to access something

10 Clues: Clearly the best type of ice cream, don't argueAnimal you played during last week's Knowbe4 trainingPassword storing software available to CAMPUS employeesName of the person who knows a lot about Big Risk because he IS a Big Risksecret combination of characters, numbers, or symbols that you use to access something...

Cyber Safety 2024-06-24

Cyber Safety crossword puzzle
Across
  1. Being tracked or followed online which makes you feel uncomfortable
  2. Online apps focused on communication eg.snapchat,tiktok
  3. someone who is repeatedly mean to someone online
  4. Faking an online identity to manipulate others
  5. Spending too much time on online gaming
Down
  1. online devices eg phone,ipad
  2. somewhere you can go if you need help
  3. Being safe online
  4. When someone tries to steal your identity
  5. A romantic relationship with someone online

10 Clues: Being safe onlineonline devices eg phone,ipadsomewhere you can go if you need helpSpending too much time on online gamingWhen someone tries to steal your identityA romantic relationship with someone onlineFaking an online identity to manipulate otherssomeone who is repeatedly mean to someone online...

Cyber crossword 2024-06-01

Cyber crossword crossword puzzle
Across
  1. |Email indesiderata che spesso contiene pubblicità o truffe.
  2. |Una copia di sicurezza dei file importanti.
  3. |Un programma dannoso che può infettare un computer.
  4. |Un programma che protegge il computer bloccando i cattivi accessi.
  5. |Una persona che cerca di entrare nei computer senza permesso.
Down
  1. |Software dannoso progettato per danneggiare il computer.
  2. |Un messaggio inviato da un computer a un altro attraverso internet.
  3. |Una parola segreta usata per accedere a un computer o a un sito web.
  4. |Un miglioramento o correzione per un programma del computer.
  5. |Un trucco per ottenere informazioni personali come password e numeri di carta di credito.

10 Clues: |Una copia di sicurezza dei file importanti.|Un programma dannoso che può infettare un computer.|Software dannoso progettato per danneggiare il computer.|Email indesiderata che spesso contiene pubblicità o truffe.|Un miglioramento o correzione per un programma del computer.|Una persona che cerca di entrare nei computer senza permesso....

Cyber Crossword 2024-10-24

Cyber Crossword crossword puzzle
Across
  1. A tool that helps block unauthorized access to networks.
  2. Software that collects data from your device without consent.
  3. Verifying your identity, often with passwords or biometrics.
  4. False information spread to deceive or manipulate people.
Down
  1. Malicious software that harms devices or steals data.
  2. Encoding data to keep it secure from unauthorized access.
  3. Your login details needed to access accounts.
  4. Information that must be protected from unauthorized access.
  5. An incident where data is accessed without permission.
  6. A deceptive attempt to steal personal data through fake emails or SMS.

10 Clues: Your login details needed to access accounts.Malicious software that harms devices or steals data.An incident where data is accessed without permission.A tool that helps block unauthorized access to networks.Encoding data to keep it secure from unauthorized access.False information spread to deceive or manipulate people....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. WHERE YOUR MONEY IS KEPT
  2. A METHOD OF PAYMENT
  3. A PLACE ONLINE TO SHOP
  4. A SHORT-TERM SALE
  5. A LINE OR LIST OF WAITING ITEMS
Down
  1. WHAT YOU NEED TO ACCESS A WEBSITE
  2. THE NAME OF A COMPANY
  3. PHYSICAL MONEY
  4. PART OF A WEBSITE
  5. SOMETHING WITH NO COST

10 Clues: PHYSICAL MONEYPART OF A WEBSITEA SHORT-TERM SALEA METHOD OF PAYMENTTHE NAME OF A COMPANYA PLACE ONLINE TO SHOPSOMETHING WITH NO COSTWHERE YOUR MONEY IS KEPTA LINE OR LIST OF WAITING ITEMSWHAT YOU NEED TO ACCESS A WEBSITE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. NEEDED TO SHOP ONLINE
  2. A PROMOTIONAL MESSAGE
  3. AVAILABILITY OF ITEMS
  4. THE COST OF AN ITEM
Down
  1. HOLDS YOUR CASH
  2. PLAN FOR SPENDING MONEY
  3. TO VERIFY ITEMS IN YOUR CART
  4. A DEAL OR DISCOUNT
  5. A WAITING GROUP
  6. TO GIVE MONEY FOR SOMETHING

10 Clues: HOLDS YOUR CASHA WAITING GROUPA DEAL OR DISCOUNTTHE COST OF AN ITEMNEEDED TO SHOP ONLINEA PROMOTIONAL MESSAGEAVAILABILITY OF ITEMSPLAN FOR SPENDING MONEYTO GIVE MONEY FOR SOMETHINGTO VERIFY ITEMS IN YOUR CART

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. RECEIPT OR PAYMENT NOTE
  2. USED TO CARRY ITEMS
  3. DISCOUNT IDENTIFIER
  4. WHAT YOU DO ONLINE
  5. SPEED OF DELIVERY
  6. CURRENCY USED
Down
  1. MAKER OF ITEMS
  2. TOTAL YOU SPEND
  3. SHIPPING SERVICE
  4. NO CHARGE

10 Clues: NO CHARGECURRENCY USEDMAKER OF ITEMSTOTAL YOU SPENDSHIPPING SERVICESPEED OF DELIVERYWHAT YOU DO ONLINEUSED TO CARRY ITEMSDISCOUNT IDENTIFIERRECEIPT OR PAYMENT NOTE

cyber bullying 2025-03-11

cyber bullying crossword puzzle
Across
  1. to help someone
  2. someone hurting someone else
  3. hurtful person
  4. something you go on
  5. Hacking
  6. looking out for someone
Down
  1. something you use in everyday life
  2. knowing your on a device
  3. hurting someone online
  4. mentally attacking someone

10 Clues: Hackinghurtful personto help someonesomething you go onhurting someone onlinelooking out for someoneknowing your on a devicementally attacking someonesomeone hurting someone elsesomething you use in everyday life

Cyber Ehics 2025-06-16

Cyber Ehics crossword puzzle
Across
  1. simplest way to prevent plagiarism
  2. criminal activities
  3. malicious software
  4. unwanted bulk emails
  5. set of programs that disrupts the functioning
  6. sending bulk emails till the server gets full
  7. combination of voice and phishing
Down
  1. a security system that prevents unauthorisation
  2. legal rules for online users
  3. hacking done for a good cause

10 Clues: malicious softwarecriminal activitiesunwanted bulk emailslegal rules for online usershacking done for a good causecombination of voice and phishingsimplest way to prevent plagiarismset of programs that disrupts the functioningsending bulk emails till the server gets fulla security system that prevents unauthorisation

Cyber Ethics 2025-06-16

Cyber Ethics crossword puzzle
Across
  1. a simple way of preventing plagiarism
  2. criminal activities
  3. malicious software
  4. unwanted bulk emails
  5. a set of programs that disrupts the functioning
  6. sending bulk emails until the server gets full
  7. combination of voice and phishing
Down
  1. a security system that prevents un authorisation
  2. rules for online users
  3. hacking done for a good cause

10 Clues: malicious softwarecriminal activitiesunwanted bulk emailsrules for online usershacking done for a good causecombination of voice and phishinga simple way of preventing plagiarismsending bulk emails until the server gets fulla set of programs that disrupts the functioninga security system that prevents un authorisation

Cyber Ethics 2025-06-06

Cyber Ethics crossword puzzle
Across
  1. Unwanted bulk emails from unknown sources
  2. Behaving responsibly and ethically on the internet
  3. Legal term for ownership of creative work
  4. Illegally accessing a computer system
  5. Legal rights over creations of the mind
Down
  1. Copying someone’s work and calling it your own
  2. The trace a person leaves online.
  3. Right to control information about yourself
  4. 💻 Moral principles for using computers and the internet
  5. Copying and using software illegally

10 Clues: The trace a person leaves online.Copying and using software illegallyIllegally accessing a computer systemLegal rights over creations of the mindUnwanted bulk emails from unknown sourcesLegal term for ownership of creative workRight to control information about yourselfCopying someone’s work and calling it your own...

Cyber Search 2025-06-24

Cyber Search crossword puzzle
Across
  1. Impersonation attack on the web
  2. System‑weakness hunt
  3. Network barrier that screens traffic
  4. Scrambling data for secrecy
Down
  1. Process of identity verification
  2. Malicious code demanding money
  3. Fake‑site fraud to steal data
  4. Virus‑killing program
  5. Unintentional human error causing breach
  6. Secret string for access

10 Clues: System‑weakness huntVirus‑killing programSecret string for accessScrambling data for secrecyFake‑site fraud to steal dataMalicious code demanding moneyImpersonation attack on the webProcess of identity verificationNetwork barrier that screens trafficUnintentional human error causing breach

Cyber Ethics 2025-05-21

Cyber Ethics crossword puzzle
Across
  1. ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic.
  2. ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software that blocks access to a computer system or data until a sum of money is paid.
  3. ㅤㅤㅤㅤ ㅤㅤㅤ A scam attempting to acquire sensitive information by masquerading as a trustworthy entity.
  4. ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.
  5. ㅤㅤㅤㅤ ㅤㅤㅤ The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  6. password ㅤㅤㅤㅤ A combination of uppercase and lowercase letters, numbers, and symbols, difficult to guess.
Down
  1. ㅤㅤㅤㅤ ㅤㅤㅤ Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.
  3. ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.
  4. ㅤㅤㅤㅤ ㅤㅤㅤ The exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something.

10 Clues: ㅤㅤㅤㅤ ㅤㅤㅤ The correct or acceptable way of communicating on the internet.ㅤㅤㅤㅤ ㅤㅤㅤ A type of malware that disguises itself as legitimate software.ㅤㅤㅤㅤ ㅤㅤㅤ The state or condition of being free from public attention to the degree that you choose.ㅤㅤㅤㅤ ㅤㅤㅤ A network security system that monitors and controls incoming and outgoing network traffic....

Cyber Crossword 2025-10-21

Cyber Crossword crossword puzzle
Across
  1. Data leak
  2. To encrypt data
  3. Phishing
  4. Attack
Down
  1. The practice of protecting systems
  2. Protects computers from unauthorized access
  3. Protection
  4. Person who breaks into systems
  5. To report a scam
  6. Password

10 Clues: AttackPasswordPhishingData leakProtectionTo encrypt dataTo report a scamPerson who breaks into systemsThe practice of protecting systemsProtects computers from unauthorized access

Cyber bullying 2026-02-10

Cyber bullying crossword puzzle
Across
  1. dampak psikologis pada korban,seperti perasaan sedih mendalam.
  2. perilaku menyakitkan yang dilakukan melaluli media digital.
  3. sebutan untuk orang yang menjadi korban bullying.
  4. tindakan pencegahan awal cyberbullying.
  5. tindakan mengirim pesan kasar secara berulang.
Down
  1. langkah untuk melindungi dari cyberbullying.
  2. media yang sering digunakkan untuk cyberbullying.
  3. jenis cyberbullying dengan menyebarkan kabar bohong.
  4. tempat untuk melaporkan tindakan Cyber bullying.
  5. asasi hak yang dilanggar ketika seseorang mengalami cyberbullying.

10 Clues: tindakan pencegahan awal cyberbullying.langkah untuk melindungi dari cyberbullying.tindakan mengirim pesan kasar secara berulang.tempat untuk melaporkan tindakan Cyber bullying.media yang sering digunakkan untuk cyberbullying.sebutan untuk orang yang menjadi korban bullying.jenis cyberbullying dengan menyebarkan kabar bohong....

TEKA-TEKI silang 2025-06-03

TEKA-TEKI silang crossword puzzle
Across
  1. internet tindakan kriminal yang dilakukan melalui internet (14h)
  2. perbuatan menyebar informasi yang merugikan orang lain (18h)
  3. tindakan menyebar informasi yang salah secara sengaja (14h)
  4. infromasi yang ditinggalkan secara sengaja didunia maya (10 h)
  5. praktik ilegal yang bertujuan untuk menipu penggunaan online (14 h)
  6. yang melibatkan pengungkapan konfirmasi pribadi (18h)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (11 h)
  8. kejahatan yang dilakuakan dengan menggunakan teknologi informasi (14h)
  9. jenit data yang hanya dapat diakses oleh pihak tertentu (11h)
  10. penyebaran informasi palsu yang meluas (4 huruf)
  11. aturan dan norma berperilaku baik di media sosial (11 h)
  12. pencurian hak cipta (11 h)
  13. pelindungan hukum terhadap pencemaran nama baik (15 huruf)
  14. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15h)
  15. perbuatan melanggar hukum didunia maya (10 huruf)
  16. program kecil yang dapat merusak sistem komputer (5 huruf)
  17. undang-undang yang mengatur informasi dan transaksi Elektronik (5 h)
Down
  1. informasi yang mengidentifikasi seseorang secara unik (12h)
  2. perilaku online yang bertujuan untuk mengganggu atau menakut-nakuti (14h)
  3. peraturan yang melindungi data pribadi (16h)
  4. menjaga keamanan data pribadi di internet (13h)
  5. informasi umum tentang seseorang yang tidak bersifat rahasia (15h)
  6. sistem yang mengatur irurtan informasi yang ditampilkan (9 h)
  7. pesan atau lancanan yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. ancaman online yang bertujuan untuk menakut-nakuti ( 13h)
  9. serangan Cyber yang bertujuan untuk melumpuhkan sistem (12h)
  10. jejak digital yang tercipta tanpa disadari penggunaan (10 h)
  11. jenis pinjaman yang dilakuakan melalui platfrom online (14h)
  12. serang Cyber yang bertujuan untuk mencari data pribadi (14h)
  13. perilaku tidak sopan/kasar didunia maya (10 h)

30 Clues: pencurian hak cipta (11 h)peraturan yang melindungi data pribadi (16h)perilaku tidak sopan/kasar didunia maya (10 h)menjaga keamanan data pribadi di internet (13h)penyebaran informasi palsu yang meluas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)yang melibatkan pengungkapan konfirmasi pribadi (18h)...

Security meeting 2021-08-31

Security meeting crossword puzzle
Across
  1. the best of the H&M departments
  2. It's used to fight against fire.
  3. It's used for employee to create and improve awareness and knowledge.
  4. It's used to align the company commitment and company principles.
  5. Those are used to identify or highlight a security/emergency equipment.
Down
  1. It will be a problem if a lack of_ exist.
  2. It's a situation where it's necessary to react quickly.
  3. It's used to measure the security compliance level.
  4. it's a situation where you have to put yourself secure.
  5. It affects all around the world.
  6. We have to be prepared to manage it, creating clear routines and guidelines also training for employees.

11 Clues: the best of the H&M departmentsIt's used to fight against fire.It affects all around the world.It will be a problem if a lack of_ exist.It's used to measure the security compliance level.It's a situation where it's necessary to react quickly.it's a situation where you have to put yourself secure....

Security Guide 2021-09-10

Security Guide crossword puzzle
Across
  1. checklist used during bomb threat call
  2. Where do we find the security guide?
  3. How should we remain during a robbery?
  4. Member's information is always kept "________"
  5. # of Months pass to replace all-clear (non-numerical)
Down
  1. "Hi can I speak to __________?"
  2. Sym duress code
  3. where do we meet in emergencies?
  4. Item inside vault box
  5. Fabric Item inside vault box
  6. money kept inside drawer at all times

11 Clues: Sym duress codeItem inside vault boxFabric Item inside vault box"Hi can I speak to __________?"where do we meet in emergencies?Where do we find the security guide?money kept inside drawer at all timeschecklist used during bomb threat callHow should we remain during a robbery?Member's information is always kept "________"...

Network Security 2024-01-30

Network Security crossword puzzle
Across
  1. these are attached to a document or spreadsheet and use the macro/ scripting function
  2. this is a self-replicating computer program
  3. regular backups should be made so data can be ___________
  4. these will lie dormant until a specific piece of program code is activated
Down
  1. these are assigned to each user to ensure they may only access certain files
  2. word to describe programs that can steal/ alter data
  3. passwords can be guessed as users _____ passwords
  4. these will prevent unauthorised access to data
  5. where a user can take a copy of a file it is ____ & ____ access
  6. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
  7. these replicate without the use of a host file

11 Clues: this is a self-replicating computer programthese will prevent unauthorised access to datathese replicate without the use of a host filepasswords can be guessed as users _____ passwordsword to describe programs that can steal/ alter dataregular backups should be made so data can be ___________...

Food Security 2024-02-05

Food Security crossword puzzle
Across
  1. State with most food insecure people
  2. The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is
  3. Most devastating famine faced by India
  4. The price at which foodgrains are distributed in the deficit areas and among the poor strata of the society.
  5. Antyodaya card is meant for people below
Down
  1. Who emphasized access to food security?
  2. co-operative societies working in Dehli
  3. Which government organisation buys foodgrains from the farmers and supplies to the fair price shops?
  4. A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as
  5. co-operative societies working in Gujrat
  6. The acronym for government program ensuring food security

11 Clues: State with most food insecure peopleMost devastating famine faced by IndiaWho emphasized access to food security?co-operative societies working in Dehlico-operative societies working in GujratAntyodaya card is meant for people belowThe acronym for government program ensuring food security...

Security crossword 2022-07-21

Security crossword crossword puzzle
Across
  1. is a nonprofit foundation dedicated to improving software security
  2. is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
  3. Place to store high privilege passwords
  4. IT Governance framework from ISACA
  5. Unplanned downtime of IT resources
  6. Information security triad
Down
  1. Need to impart to everyone to protect the organization
  2. process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
  3. is a framework for securing organizations in the cloud and mobile world that asserts that no user or application should be trusted by default
  4. seamless integration of security testing and protection throughout the software development and deployment lifecycle
  5. is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.

11 Clues: Information security triadIT Governance framework from ISACAUnplanned downtime of IT resourcesPlace to store high privilege passwordsNeed to impart to everyone to protect the organizationis a nonprofit foundation dedicated to improving software security...

Network Security 2022-08-03

Network Security crossword puzzle
Across
  1. This decides what areas of the network you can access. For example, you have full access to your home drive (documents area), but you can only read some documents on the classwork area. There are some drives you can't even see (3 words)
  2. The method for encrypting the plaintext (2 words)
  3. Provides extra security for the word or term used to log on. Some companies insist this word must include letters, number, symbols and be at least 8 characters long (2 words)
  4. A network security device that monitors incoming and outgoing network traffic and decides whether to allow it or block it (1 word)
  5. A sequence of numbers used to encrypt or decrypt, often using a mathematical formula (1 word)
  6. The encrypted message (1 word)
  7. The original message to be encrypted (1 word)
Down
  1. A way of identifying if the user trying to access the system is genuine and authorised
  2. A method to determine which devices are allowed to access the network (1 word)
  3. The process of converting cyphertext into plaintext (1 word)
  4. The process of converting plaintext into ciphertext (1 word)

11 Clues: The encrypted message (1 word)The original message to be encrypted (1 word)The method for encrypting the plaintext (2 words)The process of converting cyphertext into plaintext (1 word)The process of converting plaintext into ciphertext (1 word)A method to determine which devices are allowed to access the network (1 word)...

Security Crosswords 2022-10-27

Security Crosswords crossword puzzle
Across
  1. Test which verifies that unexpected input cannot affect the system in an unpredictable way.
  2. A set of measures to be taken to protect our product.
  3. A process used by the software industry to design, develop and test high quality software.
  4. Person who uses their technical computer skill to breach computer system.
  5. Reactive approach used in Nokia to build secure product.
  6. Designing a new product or defining a new software, the three security elements shall always be considered: Confidentiality, Integrity, and Availability
Down
  1. Process which has it's own phases that run in parallel with SDLC phases
  2. design for security.
  3. Nokia has a process for developing secure products and systems.
  4. Attacker sends a bogus requests to exhaust system resources.
  5. Proactive process used in Nokia to build secure product.
  6. User require to enter multiple credentials for login.

12 Clues: design for security.A set of measures to be taken to protect our product.User require to enter multiple credentials for login.Proactive process used in Nokia to build secure product.Reactive approach used in Nokia to build secure product.Attacker sends a bogus requests to exhaust system resources....

IT SECURITY 2022-10-27

IT SECURITY crossword puzzle
Across
  1. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. the process of converting information or data into a code, especially to prevent unauthorized access.
  3. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. network security device that monitors and filters incoming and outgoing network traffic
  7. good privacy an open source and freely available software package for email security
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. The conversion of encrypted data into its original form
  3. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

11 Clues: The conversion of encrypted data into its original formgood privacy an open source and freely available software package for email securitynetwork security device that monitors and filters incoming and outgoing network trafficsoftware that is designed to disrupt, damage, or gain unauthorized access to a computer system....

Business Security 2024-06-10

Business Security crossword puzzle
Across
  1. Process to void a lost or stolen check
  2. Initials of state agency to recover expired money owed to someone
  3. What this unit is responsible for detecting daily
  4. Type of check that goes out when a lost check affidavit is received
  5. Something that occurs when a lost check is cashed for example
Down
  1. State of Oregon bank
  2. ___ checks must be entered into the SinglePoint system in order for the recipient to cash them.
  3. annual process to expire checks greater than 2 years old
  4. The name synonomous with the crossword title
  5. Type of checks field offices use for emergencies
  6. Payment ___ are set to flag cancelled checks to avoid overpayments

11 Clues: State of Oregon bankProcess to void a lost or stolen checkThe name synonomous with the crossword titleType of checks field offices use for emergenciesWhat this unit is responsible for detecting dailyannual process to expire checks greater than 2 years oldSomething that occurs when a lost check is cashed for example...

FOOD SECURITY 2024-12-17

FOOD SECURITY crossword puzzle
Across
  1. what is a green vegetable that is good for eyes ?
  2. What is the name of the fruit that is yellow, round, and grows on a tree?
  3. Which vegetable is white, long, and we use it to make mashed potatoes?
  4. Which vegetable is green, leafy, and we use it to make pesto?
  5. Which vegetable is red, round, and we use it to make tomato sauce?
Down
  1. What is the name of the fruit that is green, bumpy, and has small black seeds?
  2. what do you eat drink that comes from cow and colour is white ?
  3. what is green and crunchy that can eat in a salad ?
  4. What is the name of the fruit that is yellow, oval-shaped, and grows on a tree?
  5. which is orange colour and use in salad ?
  6. What is the name of the fruit that is purple, oval-shaped, and has a stone inside?

11 Clues: which is orange colour and use in salad ?what is a green vegetable that is good for eyes ?what is green and crunchy that can eat in a salad ?Which vegetable is green, leafy, and we use it to make pesto?what do you eat drink that comes from cow and colour is white ?Which vegetable is red, round, and we use it to make tomato sauce?...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. A type of climate event that causes a long period without rain, making hard to grow food
  2. a yellow fruit that monkeys love to eat
  3. A problem that happens when people dont get enough food to eat
  4. This is used to grow plants and crops. It is found in gardens and fields
  5. A small insect that damages crops and reduces food supply
  6. the process of growing food without using harmful chemicals
Down
  1. a place where fruits, vegetables, or grains are planted and harvested
  2. A major food crop grown in field, often used to make bread
  3. A nut that is good for heart and brain
  4. This system is used to bring water to crops in dry areas
  5. The word that means enough food for everyone to stay healthy and strong

11 Clues: A nut that is good for heart and braina yellow fruit that monkeys love to eatThis system is used to bring water to crops in dry areasA small insect that damages crops and reduces food supplyA major food crop grown in field, often used to make breadthe process of growing food without using harmful chemicals...

Study 2025-09-23

Study crossword puzzle
Across
  1. Weakness in a system
  2. Protects sensitive information
  3. Security-related event
  4. Permission to use resources
  5. Ensures systems are accessible
  6. Testing for security weaknesses
  7. Ensures data is accurate and unaltered
  8. Restriction of access
  9. Potential cause of harm
Down
  1. Notification of suspicious activity
  2. Action taken after an incident
  3. Adherence to regulations
  4. Observing system activity
  5. Restoring after a breach
  6. Takes advantage of a vulnerability

15 Clues: Weakness in a systemRestriction of accessSecurity-related eventPotential cause of harmAdherence to regulationsRestoring after a breachObserving system activityPermission to use resourcesAction taken after an incidentProtects sensitive informationEnsures systems are accessibleTesting for security weaknessesTakes advantage of a vulnerability...

15.1 Understanding Money Created by Yash Gupta 2024-05-09

15.1 Understanding Money Created by Yash Gupta crossword puzzle
Across
  1. is a transfer of money from one bank account to another
  2. the mechanism a nation uses to provide and manage money for itself
  3. money received today can be invested or deposited in the bank to earn interest
  4. allows customers to pay for purchases directly from their checking account
  5. action taken to manage the supply of money and interest rates in an economy
  6. a security that pays interest over terms of ten to thirty years
  7. money can be saved and used at a later date
  8. coins or banknotes that must be accepted if offered in payment of a debt.
  9. Anything of value that is accepted in return for goods and services
  10. is a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
  1. the process of transferring money from one individual or organization to another
  2. is a security that matures in a year or less
  3. is a security that pays interest over terms ranging from two to ten years
  4. money is used in exchange for goods and services needed by individuals, businesses, and governments
  5. money is a common measure of the worth or price of a good or service
  6. a type of financial investment issued by a corporation, government, or organization
  7. a type of a document guaranteeing the payment of a specific amount of money
  8. banks that are part of the Federal Reserve Systems
  9. exchange one good or service for another good or service
  10. another name for money

20 Clues: another name for moneymoney can be saved and used at a later dateis a security that matures in a year or lessbanks that are part of the Federal Reserve Systemsis a transfer of money from one bank account to anotherexchange one good or service for another good or servicea security that pays interest over terms of ten to thirty years...

Network requirements. 2024-08-07

Network requirements. crossword puzzle
Across
  1. Network is able to perform required functions without failing
  2. Distributing network traffic across many servers to optimize resource use and avoid overload
  3. Network is able to handle an increase in the number of users
  4. The physical or logical arrangement of network devices and connections.
  5. Policies that restrict network access to authorized users often involving authentication
  6. Rules set in place to protect network from attacks
  7. Additional pathways that ensure network availability in case of a failure
  8. Security devices that monitor and control incoming or outgoing network traffic based on security rules
  9. The process of converting data into a coded format to prevent unauthorized access
Down
  1. Techniques used to control network bandwidth to ensure optimal performance
  2. Measurement of a network(in Mbps or Gbps)
  3. Tools used to control network traffic for suspicious activity and take action to prevent or mitigate attacks
  4. The aberration in packet arrival times
  5. Making sure the network meets industry standards related to data handling and privacy
  6. Dividing a network into smaller segments to improve performance and security
  7. A delay in signals being received or sent. Crucial for gaming and video conferences
  8. Manners used to categorizing certain types of traffic to ensure performance of applications
  9. Creating virtual versions of network resources such as servers or switches to optimize flexibility
  10. Different systems and devices working together within a network ensuring a seamless communication
  11. The rate of successful data transfer across a network

20 Clues: The aberration in packet arrival timesMeasurement of a network(in Mbps or Gbps)Rules set in place to protect network from attacksThe rate of successful data transfer across a networkNetwork is able to handle an increase in the number of usersNetwork is able to perform required functions without failing...

Slande Cheridor 2024-12-07

Slande Cheridor crossword puzzle
Across
  1. testers who are paid to probe networks and report vulnerabilities
  2. what the user has (smart card or key)
  3. a server role that makes it possible for administrators to take control of Microsoft product updates
  4. The most widely used method for encrypting data
  5. security features that enable administrators to control who has access to the network
  6. an industry-standard client/server protocol that offers centralized control
  7. security features that enable administrators to control what users can do after they are logged on to the network
  8. used in a Windows domain environment and provides mutual authentication
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
  10. framework for other protocols that provide encryption and authentication
  11. A common tool used by many Linux administrators
  12. a good security enhancement for servers that aren’t physically secure
Down
  1. can be set in the Local Security Policy console found in Administrative Tools
  2. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  3. tool used to delete unneeded files in Windows
  4. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. a unique biometric identifying trait. What the user is
  6. document that describes the rules governing access to an organization’s information resources
  7. creates a barrier between two entities
  8. prevents people from using eavesdropping technology

20 Clues: what the user has (smart card or key)creates a barrier between two entitiestool used to delete unneeded files in WindowsThe most widely used method for encrypting dataA common tool used by many Linux administratorsprevents people from using eavesdropping technologya unique biometric identifying trait. What the user is...

Investing - Harper Staveley 2026-03-20

Investing - Harper Staveley crossword puzzle
Across
  1. system of recording information in way that makes it nearly impossible to hack into or change
  2. shared with other and managed by expert
  3. contributions are made pre tax, can withdraw funds with no penalty age 59
  4. index representing the top 500 market cap companies
  5. An Initial Public Offering
  6. retirement plan managed by employer
  7. data is stored across many digital systems
  8. based on community involvement
  9. where you buy and sell shares of stock
  10. contributions are made post tax, can withdraw funds with no penalty age 59
  11. an amount of money that is paid at one time
Down
  1. a debt security that makes no periodic interest payments and is purchased at a deep discount to its face value.
  2. 30 blue chip companies
  3. SECURITY US federal program designed to provide financial protection through retirement, disability, and survivor benefits
  4. age you can collect social security.
  5. the availability
  6. social security and medicare taxes combined
  7. have a face value,fixed interest rate, and maturity date
  8. Exchange-traded funds
  9. retirement plan, contributions are taken out of your paycheck with no taxes
  10. fixed-income investment representing a loan made by an investor to a borrower (typically corporate or governmental)
  11. cryptocurrency is a high risk investment because prices can change rapidly
  12. dedicated pool of money or resources set aside for a specific purpose, such as investments, savings, or projects
  13. EXPECTANCY how long your projected to live
  14. your employer will ____ what you put in

25 Clues: the availabilityExchange-traded funds30 blue chip companiesAn Initial Public Offeringbased on community involvementretirement plan managed by employerage you can collect social security.where you buy and sell shares of stockshared with other and managed by expertyour employer will ____ what you put indata is stored across many digital systems...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Human rights - Yr 7 catholic studies - Hunter Leeson 2023-07-27

Human rights - Yr 7 catholic studies - Hunter Leeson crossword puzzle
Across
  1. the right to _____
  2. food and ______ for all
  3. Social security
  4. The right to seek a _____ place to live
  5. no one can take away your ______ rights
  6. The right to ____
  7. don't ___________
  8. we are all ____ free and equal
Down
  1. Your human rights are _________ by the law
  2. we're always ________ till proven guilty
  3. we're all ______ before the law
  4. the right to ________
  5. a _____ and free world
  6. ______ to move
  7. marriage and _______
  8. the right to ______

16 Clues: ______ to moveSocial securityThe right to ____don't ___________the right to _____the right to ______marriage and _______the right to ________a _____ and free worldfood and ______ for allwe are all ____ free and equalwe're all ______ before the lawThe right to seek a _____ place to liveno one can take away your ______ rights...

Computer Science 2022-11-08

Computer Science crossword puzzle
Across
  1. central Processing Unit
  2. a part of something
  3. continues messages
  4. a device
  5. a barrier that separates your private network from the internet
  6. internet manners
  7. solid state drives
  8. random access memory
  9. A Universal Serial Bus
Down
  1. protected by a legal agreement
  2. use lets you use copyrighted material with permission from the owner
  3. wide area network
  4. Copying someone’s work without permission
  5. hard disk drives
  6. local area network
  7. Drive similar to USB
  8. Security protects your data and network from malware and security breaches

17 Clues: a devicehard disk drivesinternet mannerswide area networkcontinues messageslocal area networksolid state drivesa part of somethingrandom access memoryA Universal Serial Buscentral Processing UnitDrive similar to USBprotected by a legal agreementCopying someone’s work without permission...

Week 16 puzzle 2022-03-24

Week 16 puzzle crossword puzzle
Across
  1. shortened form of malicious software
  2. very cruel _ _ _ _ A L
  3. describes good gardener, a green _ _ _ _ _
  4. to divide, p _ _ _ _ I Z E
  5. word used in question about possession
  6. digital currency, _ _ _ _ _ _ CURRENCY
Down
  1. fraud to steal someone's money
  2. idiom:understanding of something unclear
  3. idiom: lots of 'paperwork', bureaucracy
  4. online 'attack' _ _ _ _ _ W A R
  5. idiom: surprise, out of the _ _ _ _
  6. phrase used in a culture,not literal

12 Clues: very cruel _ _ _ _ A Lto divide, p _ _ _ _ I Z Efraud to steal someone's moneyonline 'attack' _ _ _ _ _ W A Ridiom: surprise, out of the _ _ _ _shortened form of malicious softwarephrase used in a culture,not literalword used in question about possessiondigital currency, _ _ _ _ _ _ CURRENCYidiom: lots of 'paperwork', bureaucracy...

puzzle 2023-07-15

puzzle crossword puzzle
Across
  1. Has a trunk
  2. which one is first web browser invented is 1990?
  3. what is short from of star cyber secure user?
  4. Flying mammal
  5. where is iant regional office?
  6. what is collection of facts and figures?
  7. Man's best friend
Down
  1. how many digit enter the password?
  2. what is used to secure our phone?
  3. an open source operating system?
  4. Likes to chase mice
  5. Large marsupial

12 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase micewhere is iant regional office?an open source operating system?what is used to secure our phone?how many digit enter the password?what is collection of facts and figures?what is short from of star cyber secure user?which one is first web browser invented is 1990?

Arciniegas 2022-02-10

Arciniegas crossword puzzle
Across
  1. officer: he commands the duty officer
  2. officer: He is in charge of intelligence at the school
  3. the camp: school garden manager
Down
  1. Security of people
  2. technical officer: school weapon manager
  3. police: martiality
  4. commander: Security school
  5. no duty: service of company
  6. soldiers Security
  7. officer: send to school services

10 Clues: soldiers SecuritySecurity of peoplepolice: martialitycommander: Security schoolno duty: service of companythe camp: school garden managerofficer: send to school servicesofficer: he commands the duty officertechnical officer: school weapon managerofficer: He is in charge of intelligence at the school

Chapter 8 & 9 Vocabulary 2013-04-01

Chapter 8 & 9 Vocabulary crossword puzzle
Across
  1. President may not legally hold office and can exercise power as if he were president
  2. top officials, advisors, and administrators of large bureaucracies appointed by the President
  3. Succession- president after current one
  4. appointment to political office
  5. Security Advisors- a special assistant for national security affairs
  6. votes of each State
  7. postponement of legal punishment
  8. president puts aside or refuses to spend, money congress put aside for a specific purpose
  9. group pardon for an offense against government
  10. voters of electoral vote (congress)
  11. delivery disclosed information
Down
  1. formal agreements between the government of two or more countries
  2. salary determined by congress
  3. medium for discussion
  4. privilege- the right of the president and other high ranking officials to refuse to provide information
  5. release from legal punishment
  6. expressed will of people
  7. Security- one of the Presidents top assistants who is in charge of Media Relations.
  8. Clearance- also reviews all legislature proposals executive agencies prepare

19 Clues: votes of each Statemedium for discussionexpressed will of peoplesalary determined by congressrelease from legal punishmentdelivery disclosed informationappointment to political officepostponement of legal punishmentvoters of electoral vote (congress)Succession- president after current onegroup pardon for an offense against government...

airport terminology 2019-02-28

airport terminology crossword puzzle
Across
  1. its only accessible to passengers who are travelling
  2. a persons belongings that have to be checked in
  3. a series of actions conducted in a certain manner
  4. you need to declare these goods to be able to bring them into the country
  5. something that's required to be used for a specific purpose eg toilets or smoking areas
  6. carry on bag
  7. the area before you pass through security
  8. require international passengers to complete a departure card and show passport before entry
  9. arriving in a country on a plane
  10. helping someone with their needs
Down
  1. leaving the airport in the plane
  2. prevents potential risks from international trade and travel
  3. place to obtain boarding pass
  4. a compulsory need for eligibility
  5. you cannot bring these into the country without a permit
  6. screens passengers and their baggage
  7. a place to purchase items without tax or gst
  8. location where aviation transport takes off and lands
  9. passengers purchase their tickets, transfer their luggage and go through security

19 Clues: carry on bagplace to obtain boarding passleaving the airport in the planearriving in a country on a planehelping someone with their needsa compulsory need for eligibilityscreens passengers and their baggagethe area before you pass through securitya place to purchase items without tax or gsta persons belongings that have to be checked in...

Jared's Crossword, 2 2014-04-23

Jared's Crossword, 2 crossword puzzle
Across
  1. service with instruction
  2. bullying threw electronic means
  3. social and academic learning
  4. cruel, or physical harm
Down
  1. a sense of common purpose
  2. classroom environment
  3. unwanted sexual advances
  4. with instruction and reflection

8 Clues: classroom environmentcruel, or physical harmservice with instructionunwanted sexual advancesa sense of common purposesocial and academic learningbullying threw electronic meanswith instruction and reflection

Life Skill 2023-07-20

Life Skill crossword puzzle
Across
  1. the way it is organised
  2. path in which a person going
  3. use time wisely
  4. involving computer networks
Down
  1. exchanging information between two people
  2. manners respecting each other
  3. bad for your health
  4. very useful

8 Clues: very usefuluse time wiselybad for your healththe way it is organisedinvolving computer networkspath in which a person goingmanners respecting each otherexchanging information between two people

hello 2025-06-11

hello crossword puzzle
Across
  1. Unité de base d’une image numérique
  2. Intelligence Artificielle
  3. L’acte d’observer des activités ou un lieu
  4. Simulation perçue comme réalité
  5. Le premier film du genre cyber-punk
  6. Graphisme sans perte de qualité
  7. Commande pour annuler une action
Down
  1. Nom principale de l’affiche à la page 87
  2. L’action d’accéder illégalement à un système
  3. Code malveillant qui infecte et altère les systèmes
  4. groupe musique
  5. L’abréviation de Portable Document Format
  6. Bug visuel, effet prisé en design
  7. Lumière vive typique des villes futurists
  8. Temps à venir, souvent inquiétant ici
  9. Moitié Homme, Moitié Robot

16 Clues: groupe musiqueIntelligence ArtificielleMoitié Homme, Moitié RobotSimulation perçue comme réalitéGraphisme sans perte de qualitéCommande pour annuler une actionBug visuel, effet prisé en designUnité de base d’une image numériqueLe premier film du genre cyber-punkTemps à venir, souvent inquiétant iciNom principale de l’affiche à la page 87...

Infant Safety/Abduction 2023-02-24

Infant Safety/Abduction crossword puzzle
Across
  1. Call Security STAT
  2. Gender
  3. Baby ID band spot
  4. Mom & Dad
  5. Infant security measure
  6. Watch out
Down
  1. Tiniest patient
  2. Emergency formerly known as
  3. # still not found
  4. Opposite of pro-active
  5. Mom's loving hug
  6. Check the contents

12 Clues: GenderMom & DadWatch outTiniest patientMom's loving hug# still not foundBaby ID band spotCall Security STATCheck the contentsOpposite of pro-activeInfant security measureEmergency formerly known as

Casino 2024-02-29

Casino crossword puzzle
Across
  1. team, who fills Kiosk
  2. What color is the security thread in a 100
  3. currency is made of linen and
  4. Card for veterans
  5. Finance Director
  6. who's portrait is on a 20 dollar bill
  7. eyes in the sky
  8. 21
  9. one arm bandit
Down
  1. provides an escort
  2. Fake currency
  3. Coin counter
  4. Highest Card Status
  5. one of four service drivers
  6. Another name for ATM
  7. what color is a 10's strap

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skyFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMteam, who fills Kioskwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. When a computer calls out to another computer to see if it is active.
  2. Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
  3. Free software that can be downloaded from the internet.
  4. A computer that has been hacked into and is used to launch malicious attacks
  5. Buying products on the Internet using credit cards or other electronic payments
  6. A type of malware that spies on what you do on the internet and can steal information about you
  7. Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
  1. From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
  2. Small text files that websites save in your web browser to store information like your username and password.
  3. Marking something or someone as suspicious or inappropriate.
  4. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  5. The internet version of Junk mail
  6. Short for Random Access Memory
  7. The last part of a URL eg;.gov .com
  8. A name you use to identify yourself on a computer or website.

15 Clues: Short for Random Access MemoryThe internet version of Junk mailThe last part of a URL eg;.gov .comFree software that can be downloaded from the internet.Marking something or someone as suspicious or inappropriate.A name you use to identify yourself on a computer or website.When a computer calls out to another computer to see if it is active....

Cyber Cross-Word 2022-05-19

Cyber Cross-Word crossword puzzle
Across
  1. secret - cb5ceb103977f1271d0763ac75fcd8e9
  2. firewall keeps track of com sessions
  3. packet analyzer
  4. software/hardware that creates/runs VM
  5. type of AV-based thats unusual for the user
  6. software that displays unwanted ad
  7. SIEM tool that enable to search, analyze...
Down
  1. attract attackers
  2. tool that uses multiple antivirus engines
  3. shortest-path-first routing protocol
  4. secure communications techniques
  5. transmission media with cables
  6. 8e8c92b1c360cbe3cd2b40d6b29278d5
  7. interaction between snmp agent manager
  8. an open-source EDR

15 Clues: packet analyzerattract attackersan open-source EDRtransmission media with cablessecure communications techniques8e8c92b1c360cbe3cd2b40d6b29278d5software that displays unwanted adfirewall keeps track of com sessionsshortest-path-first routing protocolsoftware/hardware that creates/runs VMinteraction between snmp agent manager...

Cyber safety Edwin 2016-06-08

Cyber safety Edwin crossword puzzle
Across
  1. media is when people be so mean.
  2. opposite of dangerous.
  3. ups silly things come up on your device.
  4. pictures.
  5. can be rude.
  6. there can be a problem.
  7. educational apps only,no violence
Down
  1. it is safe like the dictionary.
  2. information-people can hack.
  3. don't write anything that is rude.
  4. people can interrupt it.
  5. same as unsafe to the internet.
  6. its a virus.
  7. it is private.
  8. makes you're device bad.

15 Clues: pictures.its a virus.can be rude.it is private.opposite of dangerous.there can be a problem.makes you're device bad.people can interrupt it.information-people can hack.it is safe like the dictionary.same as unsafe to the internet.media is when people be so mean.educational apps only,no violencedon't write anything that is rude....

Casino 2024-02-29

Casino crossword puzzle
Across
  1. team, who fills Kiosk
  2. What color is the security thread in a 100
  3. currency is made of linen and
  4. Card for veterans
  5. Finance Director
  6. who's portrait is on a 20 dollar bill
  7. eyes in the sky
  8. 21
  9. one arm bandit
Down
  1. provides an escort
  2. Fake currency
  3. Coin counter
  4. Highest Card Status
  5. one of four service drivers
  6. Another name for ATM
  7. what color is a 10's strap

16 Clues: 21Coin counterFake currencyone arm banditeyes in the skyFinance DirectorCard for veteransprovides an escortHighest Card StatusAnother name for ATMteam, who fills Kioskwhat color is a 10's strapone of four service driverscurrency is made of linen andwho's portrait is on a 20 dollar billWhat color is the security thread in a 100

Safety online 2023-04-14

Safety online crossword puzzle
Across
  1. ..... bullying
  2. always be .... online
  3. always stay ... online
Down
  1. if you are being bullied, tell a ... adult
  2. ....anybad or abusive person
  3. remember to have your.... settings on
  4. don't share your.... information
  5. becareful on social...

8 Clues: ..... bullyingalways be .... onlinebecareful on social...always stay ... online....anybad or abusive persondon't share your.... informationremember to have your.... settings onif you are being bullied, tell a ... adult

SOUTH SLP SAW'23 2023-09-20

SOUTH SLP SAW'23 crossword puzzle
Across
  1. Facilitating anyone's entry/exit known as ------.
  2. --------is an official repository of critical information and resources with regard to a site.
  3. --------is the web-based application to digitize various registers used to capture data by SLP team in physical form at each site.
  4. All amazon vehicles should be checked by security as per the -------.
  5. --------allows you to link the physical alerts generated by Access Control Devices (Lenel) and pushes them to Milestone VMS.
  6. --------replaced rightcrowd for all Operation Sites globally.
  7. "If you see something,say something" Report all-------to security or managers.
  8. If you believe an incident has occurred that impacts life safety, operations, or the Amazon brand------should be notified.
  9. --------is defined as a spectrum of behaviors including acts of intentional or targeted violence, threats, and other conduct that generates a reasonable concern for future violence that threatens safety within the workplace.
  10. Stay --------and always be on the lookout for security incidents.
Down
  1. -------- is a search engine for AMZL operations.
  2. Never share your------to anyone.
  3. In the event of an emergency evacuation, security should not conduct -------.
  4. Amazon data should be kept under------classification.
  5. --------is used for masking/unmasking the alarm.
  6. --------is a one stop solution for AMZL recommended financial recovery.

16 Clues: Never share your------to anyone.-------- is a search engine for AMZL operations.--------is used for masking/unmasking the alarm.Facilitating anyone's entry/exit known as ------.Amazon data should be kept under------classification.--------replaced rightcrowd for all Operation Sites globally....

coding club 2022-12-02

coding club crossword puzzle
Across
  1. the main security
  2. the do nothing guy
  3. the retiree
  4. whats the maskot
  5. the cfo/assintant security
  6. our lead supervisor
Down
  1. one of the activities
  2. the coo
  3. the ceo
  4. what we code on
  5. the clubs best coder
  6. the clubs name
  7. the classroom we code in

13 Clues: the coothe ceothe retireethe clubs namewhat we code onwhats the maskotthe main securitythe do nothing guyour lead supervisorthe clubs best coderone of the activitiesthe classroom we code inthe cfo/assintant security

security technology 2014-07-07

security technology crossword puzzle
Across
  1. layer
  2. encryption scheme
  3. system
  4. control protocol
  5. reads your mail
Down
  1. layer
  2. private network
  3. key distribution
  4. layer
  5. protocol/internet layer
  6. intercepts your mail and modify
  7. mail and sign your name
  8. risk

13 Clues: risklayerlayerlayersystemprivate networkreads your mailkey distributioncontrol protocolencryption schemeprotocol/internet layermail and sign your nameintercepts your mail and modify

Security Questions 2020-04-14

Security Questions crossword puzzle
Across
  1. Top drawer limit (thousands)
  2. 2nd evacuation location
  3. It's not FDIC
  4. Where first aid kit is
  5. Crappy car
  6. Macintosh or Fuji
  7. drawer Where robbery kit is
Down
  1. window All clear sign
  2. Bottom drawer limit (thousands)
  3. Summer treat
  4. 1st evacuation location

11 Clues: Crappy carSummer treatIt's not FDICMacintosh or Fujiwindow All clear signWhere first aid kit is2nd evacuation location1st evacuation locationdrawer Where robbery kit isTop drawer limit (thousands)Bottom drawer limit (thousands)

Security Training 2020-06-26

Security Training crossword puzzle
Across
  1. we have a plan! In the event we need to activiate our ______ plan, JQ and KR will tell you where to go and what to do.
  2. If you are held up outside, explain that you do not have _____ to cash
  3. who is CPR certified in our department?
  4. You should keep your cellphone volume on during an active shooter situation?
  5. The 4th floors color dot to report to for fire evactuation is _______
  6. In the event of an emergency situation with an employee or member requiring medical attention, you should _____ with the member and ask another employee to call an ambulance. Alert your manager.
Down
  1. what order of action should you take during an active shooter situation?
  2. if you recieve a bomb threat who do you transfer the call to ________
  3. If a robbery has been announced, you should ____ _____ and continue daily operation
  4. You can find instructions on ______ training under Departments>_______ Program
  5. Our second meeting location is ________

11 Clues: who is CPR certified in our department?Our second meeting location is ________if you recieve a bomb threat who do you transfer the call to ________The 4th floors color dot to report to for fire evactuation is _______If you are held up outside, explain that you do not have _____ to cash...

Security Awareness 2017-05-10

Security Awareness crossword puzzle
Across
  1. ____ Hotline
  2. Requirements for safeguarding and handling classified information
  3. ______ Threat
  4. Refers to information gathered to protect against espionage
  5. Be Alert! Be _____
  6. You are required to ______ suspicious behavior
Down
  1. Highest level of classification (two words)
  2. Report change of name and __________
  3. ________ Classification Training
  4. Discuss classified information in an _________, classified area
  5. Last name of your FSO

11 Clues: ____ Hotline______ ThreatBe Alert! Be _____Last name of your FSO________ Classification TrainingReport change of name and __________Highest level of classification (two words)You are required to ______ suspicious behaviorRefers to information gathered to protect against espionageDiscuss classified information in an _________, classified area...

Information Security 2019-05-13

Information Security crossword puzzle
Across
  1. Technique for overwhelming a computer with requests
  2. A malicious software used by criminals to encrypt a victim's files
  3. A computer virus capable of spreading itself
  4. Using something you have and something you know to login
  5. Malicious messages used to trick people
  6. A form of ditigal currency that is often used for anonymous transactions
  7. The study of secret or encrypted messages
  8. Software that records keystrokes on a computer
Down
  1. Software used by criminals to extort money from a victim
  2. Manipulating people to do things
  3. Common term for malicious software

11 Clues: Manipulating people to do thingsCommon term for malicious softwareMalicious messages used to trick peopleThe study of secret or encrypted messagesA computer virus capable of spreading itselfSoftware that records keystrokes on a computerTechnique for overwhelming a computer with requestsSoftware used by criminals to extort money from a victim...

1. Security 2023-06-22

1. Security crossword puzzle
Across
  1. Protecting networks, computers, and information from digital attacks, like viruses or hacking.
  2. Protecting your money and personal information from theft or fraud when using banks or making purchases.
  3. Actions you take to stay safe, like not sharing personal information with strangers or walking home with a buddy.
  4. Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals.
  5. Event Precautions taken to keep people safe at large gatherings like concerts or festivals, including crowd control and first aid.
Down
  1. Measures to protect cars, bikes, or other vehicles from theft or damage, like alarms, locks, or tracking devices.
  2. Measures employers take to keep employees safe while they work, including training, rules, and safety equipment.
  3. Protecting your computer and online accounts from people who want to steal your information or cause harm.
  4. Measures to keep students and teachers safe at school, like monitoring visitors and having rules for behavior.
  5. Systems at airports that check people and their belongings to prevent dangerous items or actions on airplanes.
  6. Measures to protect your living space from intruders, like locks on doors and windows, or alarms.

11 Clues: Protecting networks, computers, and information from digital attacks, like viruses or hacking.Measures to protect your living space from intruders, like locks on doors and windows, or alarms.Ensuring the foods we eat are clean, safe, and free from harmful things like bacteria or chemicals....

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. The primary source of protein for many people, often derived from livestock.
  2. The global issue of insufficient food supply for a population.
  3. A method of farming that uses minimal tillage to preserve soil health.
  4. The term for the variety of crops and livestock in a given area.
  5. A method of farming that focuses on sustainability and environmental health.
  6. The practice of cultivating soil, growing crops, and raising animals for food.
  7. The term for the amount of food produced per unit of land.
Down
  1. The seasonal movement of farmers and their livestock to find fresh pastures.
  2. A nutrient-rich food that is often fortified to combat malnutrition.
  3. The phenomenon of climate change affecting agricultural productivity.
  4. A staple food grain that is a primary source of calories for many people.

11 Clues: The term for the amount of food produced per unit of land.The global issue of insufficient food supply for a population.The term for the variety of crops and livestock in a given area.A nutrient-rich food that is often fortified to combat malnutrition.The phenomenon of climate change affecting agricultural productivity....

Network Security 2025-01-27

Network Security crossword puzzle
Across
  1. It is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
  2. It is slang commonly used to describe junk e-mail on the Internet.
  3. It is a process that ensures and confirms a user’s identity
  4. It is a malware computer program that replicates itself in order to spread to other computers.
  5. It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
  6. It is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet
Down
  1. These are small files which are stored on a user’s computer. It provide a way for the website to recognize you and keep track of your preferences
  2. These refers to any video in which faces have been either swapped or digitally altered, with the help of AI
  3. It is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware
  4. It refers to a flaw in a system that can leave it open to attack.
  5. It refers to any piece of software or application that displays advertisements on your computer.

11 Clues: It is a process that ensures and confirms a user’s identityIt refers to a flaw in a system that can leave it open to attack.It is slang commonly used to describe junk e-mail on the Internet.It is a malware computer program that replicates itself in order to spread to other computers....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. The practice of growing crops and raising animals for food
  2. A type of food that helps build muscles
  3. A large area where food is grown
  4. A person who works in agriculture
  5. A type of food that provides energy
  6. A system that provides food to people in different regions
Down
  1. A food that is produced using sustainable farming methods
  2. The number of servings of fruits and vegetables recommended per day
  3. The process of keeping food fresh for longer periods
  4. The essential nutrient in fruits and vegetables
  5. The state of having enough food for all people

11 Clues: A large area where food is grownA person who works in agricultureA type of food that provides energyA type of food that helps build musclesThe state of having enough food for all peopleThe essential nutrient in fruits and vegetablesThe process of keeping food fresh for longer periodsA food that is produced using sustainable farming methods...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. What is the practice of growing crops and raising animals called?
  2. What term refers to the variety of living organisms in a specific habitat or ecosystem?
  3. What do we call facilities or methods used to preserve crops after harvest?
  4. What is the process of supplying water to crops through channels or pipes?
  5. What do we call facilities or methods used to preserve crops after harvest?
Down
  1. What term describes a lack of proper nutrients in a person’s diet?
  2. What is the term for substances like nitrogen or phosphate used to enhance soil fertility?
  3. What is the term for chemicals used to control pests and diseases in crops?
  4. What is the resource most essential for irrigation and crop growth?
  5. What is the term for growing only enough food for a farmer's family?
  6. What are organisms that harm crops and reduce yields called?

11 Clues: What are organisms that harm crops and reduce yields called?What is the practice of growing crops and raising animals called?What term describes a lack of proper nutrients in a person’s diet?What is the resource most essential for irrigation and crop growth?What is the term for growing only enough food for a farmer's family?...

Food security 2024-11-28

Food security crossword puzzle
Across
  1. END OF LIFE
  2. OPPOSITE OF CLEAN
  3. CAN BE FOUND IN CURD
  4. SIGNIFICATANT MEASURES TO PREVENT FROM HARM
  5. OPPOSITE OF TIDY
Down
  1. SOURCE OF MULTIVITAMIN
  2. MEDICINE TO REMOVE PESTS
  3. GOOD FOR DIGESTIVE SYSTEM
  4. MANDATORY ACTIVITY BEFORE EATING
  5. NAME TAG
  6. PROCESS OF REMOVING INFECTIOUS THINGS

11 Clues: NAME TAGEND OF LIFEOPPOSITE OF TIDYOPPOSITE OF CLEANCAN BE FOUND IN CURDSOURCE OF MULTIVITAMINMEDICINE TO REMOVE PESTSGOOD FOR DIGESTIVE SYSTEMMANDATORY ACTIVITY BEFORE EATINGPROCESS OF REMOVING INFECTIOUS THINGSSIGNIFICATANT MEASURES TO PREVENT FROM HARM

Security Crossword 2022-11-29

Security Crossword crossword puzzle
Across
  1. Are passwords with no ‘L’ safe…
  2. Body measurements and calculations related to human characteristics
  3. a social engineering attack focussed on texts
  4. This word is added to the subject line of an email to send a secure message.
  5. A method of scrambling information, such as passwords, so they are not human-readable
  6. Who bypasses all security measures in your house once a year
  7. Using something in addition to your username and password
  8. Modify a device to remove some sort of restrictions
Down
  1. Web browsers use this to track your identity across websites.. Also Left out for Santa on Christmas eve
  2. The first part of the CIA…
  3. Malware that encrypts data, and payment must be made to decrypt

11 Clues: The first part of the CIA…Are passwords with no ‘L’ safe…a social engineering attack focussed on textsModify a device to remove some sort of restrictionsUsing something in addition to your username and passwordWho bypasses all security measures in your house once a yearMalware that encrypts data, and payment must be made to decrypt...

SDL Crossword 2019-06-05

SDL Crossword crossword puzzle
Across
  1. What code is for Kapiti Coast?
  2. How will the expansion of Auckland Airport impact on the local region?
  3. By 2025 what does Auckland Airport hope to have?
  4. How many passenger terminals does Auckland Airport have?
  5. After security means what?
  6. What is the city for the code NSN?
  7. How many baggage claim belts does Auckland Airport have?
  8. Screening passengers and their carry-on baggage is what step for Aviation Security?
Down
  1. What is the city for the code ZQN?
  2. Can anyone be on landside?
  3. How many cargo terminals do Auckland Airport have?
  4. Passport, e-ticket and ______ is what Customer Service Offices would need you to present to them after landing?
  5. Before security means what?
  6. Can anyone be on airside?
  7. How far away is Auckland city from the airport?
  8. What is 1900 in 24 hour clock?
  9. What code is for Hamilton?

17 Clues: Can anyone be on airside?Can anyone be on landside?After security means what?What code is for Hamilton?Before security means what?What code is for Kapiti Coast?What is 1900 in 24 hour clock?What is the city for the code ZQN?What is the city for the code NSN?How far away is Auckland city from the airport?...

The Department of Homeland Security Crossword 2024-12-09

The Department of Homeland Security Crossword crossword puzzle
Across
  1. The main mission of DHS is to stop this threat.
  2. CISA, stands for ___________ and Infrastructure Security Agency.
  3. ______ days after the September 11 terrorist attacks, the Office of Homeland Security was established.
  4. DHS operates at the ______ level.
  5. One weakness of the DHS is the __________ jurisdiction.
  6. The DHS Oversees ______ security and lawful immigration.
Down
  1. One of the DHS agencies.
  2. The person who appoints the Secretary of Homeland Security.
  3. DHS works to help communities recover through ________.
  4. The DHS is the newest _______-level department.

10 Clues: One of the DHS agencies.DHS operates at the ______ level.The main mission of DHS is to stop this threat.The DHS is the newest _______-level department.DHS works to help communities recover through ________.One weakness of the DHS is the __________ jurisdiction.The DHS Oversees ______ security and lawful immigration....

Netiquet 2013-03-06

Netiquet crossword puzzle
Across
  1. When you tag something relevent.
  2. Someone who you accept or like.
  3. A shortend word or phrase.
  4. To block or stop someone from seeing you.
  5. Space on the network.
  6. An internet mail message.
Down
  1. A short message that one sends to other or others.
  2. The most popular social networking.
  3. A special way of networking.
  4. Meeting others.
  5. An electronic book.
  6. A search engine.
  7. A place were you store messages or emails.

13 Clues: Meeting others.A search engine.An electronic book.Space on the network.An internet mail message.A shortend word or phrase.A special way of networking.Someone who you accept or like.When you tag something relevent.The most popular social networking.To block or stop someone from seeing you.A place were you store messages or emails....

Higher difficulty 2018-04-07

Higher difficulty crossword puzzle
Across
  1. someone highly motivated
  2. to bring together
  3. something happening on the internet
  4. writing a letter without giving your name
  5. an animal that might become extinct soon
  6. a very profitable business
  7. something much faster than normal, could be very tiring
Down
  1. animals that live in the wild
  2. could be in danger
  3. makes something worse
  4. a person who illegally hunts or captures animals
  5. something very bad
  6. a huge piece of floating ice

13 Clues: to bring togethercould be in dangersomething very badmakes something worsesomeone highly motivateda very profitable businessa huge piece of floating iceanimals that live in the wildsomething happening on the internetan animal that might become extinct soonwriting a letter without giving your namea person who illegally hunts or captures animals...

GLOBAL FOOD SECURITY 2025-06-16

GLOBAL FOOD SECURITY crossword puzzle
Across
  1. | A condition caused by lack of food |
  2. | Poor nutrition from lack of food or unbalanced diet
  3. | The way food is used and absorbed by the body
  4. | Not having enough food to be healthy
  5. | One of the main pillars of food security, referring to having enough food
  6. | Food security also depends on this over time
  7. | Essential nutrient found in meat and legumes |
  8. | When there is not enough of a resource like food or water
  9. | Vitamins and minerals needed in small amounts |
Down
  1. | Energy unit found in food |
  2. | A basic food like rice or wheat |
  3. | Key pillar of food security: physical and economic ______ to food
  4. | Process of adding nutrients to food |
  5. | Capacity to recover from food shocks
  6. | Extreme scarcity of food

15 Clues: | Extreme scarcity of food| Not having enough food to be healthy| Capacity to recover from food shocks| Food security also depends on this over time| The way food is used and absorbed by the body| Energy unit found in food || A basic food like rice or wheat || Process of adding nutrients to food |...

Mobile Security 2013-05-21

Mobile Security crossword puzzle
Across
  1. A piece of software designed to prevent viruses from entering a computer system or network.
  2. A string of numbers and/or letters used to unlock a device.
  3. Converting data or information into a code to be deciphered.
  4. A mobile operating system created by Google.
Down
  1. A method of connecting your device to the network wirelessly
  2. A copy of data that can be used if the original data is lost.
  3. A mobile operating system made by Apple for use on iphones, ipods, and ipads.
  4. A device that combines a cell phone with a handheld computer.
  5. An electronic system that uses satellites to determine the position of a vehicle, person, etc.
  6. When each user is allowed to bring his/her own device and use it for work purposes.
  7. A person who uses computers to gain unauthorized access to data.

11 Clues: A mobile operating system created by Google.A string of numbers and/or letters used to unlock a device.A method of connecting your device to the network wirelesslyConverting data or information into a code to be deciphered.A copy of data that can be used if the original data is lost.A device that combines a cell phone with a handheld computer....

Information Security 2021-07-12

Information Security crossword puzzle
Across
  1. it block the user to access his own data and give threats
  2. it is a network security system designed to protect a trusted private netswork from unauthorised access
  3. the main purpose of this to record the key pressed by user on the keyboard
  4. this creates unnecessary junk in receiver's email
  5. secretly listening to a conversation
Down
  1. the short term used for malacious software
  2. it is harassment and stalking through phones or the internet
  3. when user access certain website small files downloaded on to the computer
  4. it is the practice of sending fraudulent communication that appear to come from reputable source
  5. It is a malware that do damaging activity on an infected computer
  6. a piece of software code created to perform malacious activities

11 Clues: secretly listening to a conversationthe short term used for malacious softwarethis creates unnecessary junk in receiver's emailit block the user to access his own data and give threatsit is harassment and stalking through phones or the interneta piece of software code created to perform malacious activities...

BSA / Security 2022-05-19

BSA / Security crossword puzzle
Across
  1. It is important to remain calm during a ____
  2. A Mexican Matricula Card is considered ____ Identification
  3. The teller should do this to all cash bought into their unit
  4. ____ is the number one deterrent for robberies
  5. Fill this out if you suspect a customer of structuring a deposit
  6. Never leave a teller ____ on the line
Down
  1. ____ is required in all vault rooms
  2. There should never be more than $10K in your
  3. The number of initials required on vault tickets
  4. Needed if a customer exchanges $5K in cash for larger bills
  5. Before leaving the branch, staff should do a ____

11 Clues: ____ is required in all vault roomsNever leave a teller ____ on the lineThere should never be more than $10K in yourIt is important to remain calm during a ________ is the number one deterrent for robberiesThe number of initials required on vault ticketsBefore leaving the branch, staff should do a ____...

IT SECURITY 2022-10-27

IT SECURITY crossword puzzle
Across
  1. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
  2. a verbal, written, or recorded communication sent to or left for a recipient who cannot be contacted directly.
  3. an open source and freely available software package for email security
  4. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  5. software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  6. the process of converting information or data into a code, especially to prevent unauthorized access.
Down
  1. network security device that monitors and filters incoming and outgoing network traffic
  2. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  4. The conversion of encrypted data into its original form
  5. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

11 Clues: The conversion of encrypted data into its original forman open source and freely available software package for email securitynetwork security device that monitors and filters incoming and outgoing network trafficsoftware that is designed to disrupt, damage, or gain unauthorized access to a computer system....

System Security 2018-06-08

System Security crossword puzzle
Across
  1. A suite of technologies that can identify unauthorised users of a computer system (7,9)
  2. Software whose purpose is to remove harmful software from your system (4-7)
  3. The process of scrambling data so it can be sent securely over networks (10)
  4. Checking for weaknesses in your own system before a hacker finds them (11,7)
  5. Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
  6. A generic term to describe any piece of software that is harmful to your computer (7)
  7. A means of hacking that tries every possible password in quick succession (5,5)
Down
  1. Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
  2. When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
  3. The act of gathering information by spoofing trustworthy websites for malicious intent (8)
  4. A set of rules that govern how a network is managed and used (7,8)

11 Clues: A set of rules that govern how a network is managed and used (7,8)Software whose purpose is to remove harmful software from your system (4-7)The process of scrambling data so it can be sent securely over networks (10)Checking for weaknesses in your own system before a hacker finds them (11,7)...

INTERNET SECURITY 2024-12-11

INTERNET SECURITY crossword puzzle
Across
  1. GETTING PASSWORDS FOR ONLINE BANK ACCOUNTS BY FAKE BANK EMAIL
  2. IAN MURPHY ______ INTO THE WHITE HOUSE
  3. ONLINE HARASSMENT
  4. PROGRAM WRITTEN BY PHIL ZIMMERMAN
  5. THE MOST COMMON METHOD OF PROTECTION
  6. THE ILLEGAL COPY OF COPYRIGHTED SOFTWARE
Down
  1. PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN
  2. SMALL FILES PLACED ON YOUR HARD DRIVE
  3. WHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN?
  4. PROGRAMS THAT DAMAGE YOUR COMPUTER?
  5. PROCESS OF CONVERTING INFORMATION OR DATA INTO A CODE

11 Clues: ONLINE HARASSMENTPROGRAM WRITTEN BY PHIL ZIMMERMANPROGRAMS THAT DAMAGE YOUR COMPUTER?THE MOST COMMON METHOD OF PROTECTIONSMALL FILES PLACED ON YOUR HARD DRIVEIAN MURPHY ______ INTO THE WHITE HOUSETHE ILLEGAL COPY OF COPYRIGHTED SOFTWAREWHO BREAKS INTO COMPUTER SYSTEMS JUST FOR FUN?PRETENDING THAT SOMEONE ELSE'S WORK IS YOUR OWN...

FOOD SECURITY 2024-12-17

FOOD SECURITY crossword puzzle
Across
  1. A healthy food made from ground-up grains, commonly eaten for breakfast.
  2. A sweet treat that comes from the sugar cane or sugar beets
  3. this is a type of nut that is often used in baking or eaten as a snack
  4. this green vegetable is shaped like a small tree and is very good for you.
  5. this fruit is yellow on the outside, but red, green, or yellow on the inside.
  6. this food is made from crushed tomatoes and is often used as a base for pizza or pasta.
Down
  1. this fruit is round, orange, and full of vitamin C.
  2. this is a green vegetable that is often used in soups and stews, and is full of vitamins.
  3. this fruit is small, round, and often used in fruit salads. It can be red, green, or purple
  4. this is staple food made from corn that can be cooked and eaten with butter.
  5. this food is a yellow vegetable that can be eaten on the cob or as kernels.

11 Clues: this fruit is round, orange, and full of vitamin C.A sweet treat that comes from the sugar cane or sugar beetsthis is a type of nut that is often used in baking or eaten as a snackA healthy food made from ground-up grains, commonly eaten for breakfast.this green vegetable is shaped like a small tree and is very good for you....

Jargon 4: Revenge of the Kev 2023-09-06

Jargon 4: Revenge of the Kev crossword puzzle
Across
  1. Security protocol used in wifi networks that offers greater protection through data encryption
  2. process of encoding information to a unrecognizable form.
  3. Part of an application that performs a task not apparent to the user
  4. A security protocol used in wifi networks designed to provide a level of security similar to a Wired/LAN connection.
  5. document sent with an email message
  6. Basic unit of information in computing.
  7. load and initialize the operating system on a computer
Down
  1. Physical place where a computer stores information, also known as its HDD.
  2. Network security system that monitors and controls incoming and outgoing traffic
  3. Hardware or Software component that stores data so future requests can be served faster
  4. a set of computers sharing resources located on a node
  5. application that provides a way to look at and interact with information on the Internet
  6. any goal-oriented activity requiring computer machinery
  7. Small blocks of data created by a web server while browsing a website

14 Clues: document sent with an email messageBasic unit of information in computing.a set of computers sharing resources located on a nodeload and initialize the operating system on a computerany goal-oriented activity requiring computer machineryprocess of encoding information to a unrecognizable form....

Vyper Language 2025-07-31

Vyper Language crossword puzzle
Across
  1. Interface that lets other applications interact with smart contracts
  2. A key blockchain feature — cannot be changed once deployed
  3. The unit of computation cost on Ethereum
  4. A piece of code that runs on Ethereum
  5. A system without a central authority
  6. Pythonic smart contract language focused on security
Down
  1. Where users and contracts live on the blockchain
  2. A thorough security check of a smart contract
  3. The syntax style that Vyper is inspired by
  4. The top priority in Vyper design philosophy
  5. Used in Vyper for error-checking
  6. A digital asset created on a blockchain
  7. Blockchain platform where Vyper contracts are deployed

13 Clues: Used in Vyper for error-checkingA system without a central authorityA piece of code that runs on EthereumA digital asset created on a blockchainThe unit of computation cost on EthereumThe syntax style that Vyper is inspired byThe top priority in Vyper design philosophyA thorough security check of a smart contract...

Employment Vocabulary 2022-09-02

Employment Vocabulary crossword puzzle
Across
  1. How an employer pays an employee who is not salary.
  2. Considered working 40 hours per week.
  3. Form a potential employee fills out to obtain a job.
  4. Paid vacation and paid sick time.
  5. How many digits your Social Security number is.
  6. Social Security and Medicare rates are expressed as this.
  7. The largest health insurance program for people 65 and older.
  8. 24 paychecks per year.
Down
  1. A benefit for employees that helps cover health, life, and disability.
  2. When a worker stops working permanently.
  3. Medicare and Social Security combined.
  4. Another word for commission.
  5. A job that receives royalties.

13 Clues: 24 paychecks per year.Another word for commission.A job that receives royalties.Paid vacation and paid sick time.Considered working 40 hours per week.Medicare and Social Security combined.When a worker stops working permanently.How many digits your Social Security number is.How an employer pays an employee who is not salary....

Cybersecurity Crossword 2023-02-15

Cybersecurity Crossword crossword puzzle
Across
  1. A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
  2. The practice of defending computers, mobile devices and IT systems against cyber criminals
  3. A series of letters, numbers and symbols to protect your device and online accounts
  4. The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
  1. A type of malware that blocks access to computer file until a ransom is paid
  2. A type of code or programme that can cause your device to slow down or malfunction
  3. The act of ensuring your account/device is using the latest software
  4. An icon that suggests the website is safe
  5. A dishonest scheme to cheat you of your data or money

9 Clues: An icon that suggests the website is safeA dishonest scheme to cheat you of your data or moneyThe act of ensuring your account/device is using the latest softwareA type of malware that blocks access to computer file until a ransom is paidA type of code or programme that can cause your device to slow down or malfunction...

Eli-cyber safety 2016-06-07

Eli-cyber safety crossword puzzle
Across
  1. the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
  2. media stuff
  3. its hard to control what i see and others see.
  4. programs that display adverts on the screen.Often installed without people realising.
  5. to get help from if your online and people do mean stuff to yo
  6. app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
  7. users share their music playlists on Facebook,Twitter and Google+friends.
Down
  1. privacy that you need to keep safe.
  2. cameras that are often attached to a computer so that a video image can be sent to another while communication.
  3. to keep them private (except from your parents)
  4. you use the internet to bully somebody
  5. bulling
  6. Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
  7. like a password you need to keep it safe from hackers .a.
  8. when your with friends in a group of people on phones texting to people and putting pictures of you or something.

15 Clues: bullingmedia stuffprivacy that you need to keep safe.you use the internet to bully somebodyits hard to control what i see and others see.to keep them private (except from your parents)like a password you need to keep it safe from hackers .a.to get help from if your online and people do mean stuff to yo...

Cyber Awareness Crossword 2023-11-27

Cyber Awareness Crossword crossword puzzle
Across
  1. A harmful program that can replicate itself and spread to other computers. (5 letters)
  2. An electronic message sent indiscriminately to large numbers of recipients. (4 letters)
  3. To copy files to a second medium (like a hard drive) as a precaution against loss or damage. (6 letters)
  4. The type of software used to protect your computer from viruses. (8 letters)
  5. A type of software that collects information about a computer user without their knowledge. (7 letters)
  6. The act of tricking someone into giving confidential information. (8 letters)
  7. A scam that tricks individuals into revealing sensitive personal information, often through deceptive emails. (8 letters)
  8. The act of monitoring someone's activities without their knowledge. (7 letters)
  9. An attempt to make someone reveal their password or other sensitive information under false pretenses. (8 letters)
Down
  1. A technique used to deceive users into thinking they are interacting with a trusted entity, commonly used in phishing attacks. (7 letters)
  2. The act of monitoring someone's activities without their knowledge. (7 letters)
  3. The process of converting information or data into a code to prevent unauthorized access. (11 letters)
  4. The act of making an unauthorized copy of data. (7 letters)
  5. The protective measure to keep your accounts safe; often a mix of letters, numbers, and symbols. (8 letters)
  6. An unauthorized attempt to gain access to someone's data or computer. (6 letters)
  7. The practice of using a computer to gain unauthorized access to data. (7 letters)

16 Clues: The act of making an unauthorized copy of data. (7 letters)The type of software used to protect your computer from viruses. (8 letters)The act of tricking someone into giving confidential information. (8 letters)The act of monitoring someone's activities without their knowledge. (7 letters)...

Crossword Cyber Games 2024-07-29

Crossword Cyber Games crossword puzzle
Across
  1. Secure connection over the internet
  2. Program that provides unwanted ads
  3. Secure data transmission method
  4. Olympic gold medalist swimmer Michael
  5. Network of compromised computers
  6. Strong password storage method
  7. Unauthorized surveillance
  8. Unauthorized access
Down
  1. Athletic contest with track and field events
  2. Olympic sport with a vault event
  3. Malicious software
  4. Malware that demands ransom
  5. Fraudulent attempt to obtain sensitive info
  6. Olympic event with swords
  7. Protection of personal data

15 Clues: Malicious softwareUnauthorized accessOlympic event with swordsUnauthorized surveillanceMalware that demands ransomProtection of personal dataStrong password storage methodSecure data transmission methodOlympic sport with a vault eventNetwork of compromised computersProgram that provides unwanted adsSecure connection over the internet...

U11 Cyber Threats 2025-09-30

U11 Cyber Threats crossword puzzle
Across
  1. Malicious code that attaches to files and spreads when opened.
  2. Malware disguised as legitimate software.
  3. Deliberate destruction or disruption of systems.
  4. Tool that records every keystroke made by a user.
  5. Fake alerts designed to trick users into downloading malware.
  6. Software that hides the existence of malware.
  7. Intercepting data packets on a network.
  8. Publishing private information about someone online.
Down
  1. Fraudulent attempt to obtain sensitive information via email.
  2. Software that secretly monitors user activity.
  3. Network of infected devices controlled remotely.
  4. Malware that encrypts data and demands payment.
  5. Self-replicating malware that spreads across networks.
  6. Hidden method of bypassing normal authentication.
  7. Impersonating another device or user to gain access.

15 Clues: Intercepting data packets on a network.Malware disguised as legitimate software.Software that hides the existence of malware.Software that secretly monitors user activity.Malware that encrypts data and demands payment.Network of infected devices controlled remotely.Deliberate destruction or disruption of systems....

Once Upon a Time B 2021-09-30

Once Upon a Time B crossword puzzle
Across
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. As usual, the father was ? by the beeping of his phone at 6:00 am.
  3. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  4. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  5. Due to neglect, some of the ? of the homes required some painting and repairs.
  6. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  7. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  8. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  9. Nervously, the resident noticed the ? of a figure below the street light.
  10. The ? gardener was willing to travel to different places where there was work.
  11. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
  12. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  13. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  14. cherished red wagon with the supplies for phys. Ed.
Down
  1. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  2. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  3. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  4. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  5. As ? for the broken security alarm, the company offered them six months of service for no charge.
  6. For their safety, they ? to the Neighbourhood Watch program.
  7. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  8. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  9. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  10. Residents ? their fears of criminals by installing sophisticated security devices.
  11. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  12. When slicing bread or tomato, it is easier using a knife with ?.
  13. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  14. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  15. After many false alarms, the family wondered about the ? of the security system.

29 Clues: cherished red wagon with the supplies for phys. Ed.For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light....

Cybersecurity Week! 2023-10-11

Cybersecurity Week! crossword puzzle
Across
  1. Software used to prevent, scan, detect and delete viruses from a computer.
  2. A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  4. A type of malware designed to give hackers access to and control over a target device.
  5. A cyber-attack that targets individuals through SMS or text messages.
  6. Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
  1. A type of malware that disguises itself as legitimate code or software.
  2. Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
  3. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  4. A technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. A network of compromised computers used to carry out cyberattacks on other systems.

11 Clues: A cyber-attack that targets individuals through SMS or text messages.A type of malware that disguises itself as legitimate code or software.Software used to prevent, scan, detect and delete viruses from a computer.A network of compromised computers used to carry out cyberattacks on other systems....