cyber security Crossword Puzzles
Information security test 2025-03-14
Across
- Napad koji preplavljuje sistem ogromnim brojem zahtjeva kako bi ga onemogućio.
- Virtualna privatna mreža koja šifrira saobraćaj kako bi osigurala privatnost na internetu.
- KOPIJA Najbolja zaštita od ransomware napada – redovno čuvanje podataka.
- SOFTVER Zajednički naziv za zlonamjerne softvere poput virusa, trojanaca i crva.
- Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima.
- Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.
- Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.
- ZID Sigurnosni sistem koji filtrira mrežni saobraćaj kako bi spriječio neovlašteni pristup.
- Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.
- TESTIRANJE Simulirani napad na sistem s ciljem identifikacije ranjivosti.
Down
- KONJ Vrsta zlonamjernog softvera koji se prikazuje kao legitimni softver, ali sadrži zlonamjerne funkcije.
- NIVO POVJERENJA Sigurnosni model koji podrazumijeva nepovjerenje prema svim korisnicima dok se ne autentifikuju.
- RANJIVOSTI Iskorištavanje slabosti softvera ili sistema radi neovlaštenog pristupa.
- AUTENTIFIKACIJA Sigurnosna metoda koja zahtijeva više faktora autentifikacije.
- IDENTITETA Krađa ličnih podataka radi prevare ili financijske dobiti.
- Napad koji koristi lažne e-mailove kako bi prevario korisnike da otkriju svoje podatke.
- BRUTALNOM SILOM Napad u kojem napadač isprobava veliki broj kombinacija lozinki dok ne pronađe ispravnu.
17 Clues: Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu. • Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a. • Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu. • Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima. • ...
Learning Unit 9: Security Risk Reviews 2023-05-05
Across
- refer to the specialized knowledge and expertise needed to accomplish complex actions, tasks, and processes relating to computational and physical technology as well as a diverse group of other enterprises.
- Through _____________, our goal is to understand how well the current security program operates within the technical architecture.
- As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis.
- These controls are used to manage the organization’s information security and compliance efforts and to address the people part of security. These types of controls include things like policies, standards, procedures, and training. These are not exciting, but are absolutely critical to good information security and compliance management.
- Typically the controls that you can touch. These controls are designed to manage physical access to information and include things like door locks, alarm systems, and camera surveillance. It really doesn’t matter how good your antivirus software is if someone can easily steal your server.
- is a collaborative process used to identify security-related issues, determine the level of risk associated with those issues, and make informed decisions about risk mitigation or acceptance.
Down
- This is the IT part of security. Notice how the IT part of security is only one part of security and not all parts of security? Technical controls are what most people think of when they think of information security. These controls include things like firewalls, antivirus software, passwords, and permissions.
- is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.
- should be a planned part of the risk management process and involve regular checking or surveillance. The results should be recorded and reported externally and internally, as appropriate. The results should also be an input to the review and continuous improvement of the firm's risk management framework.
- was founded in 1901 and is now part of the U.S. Department of Commerce. _____________ is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time — a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany and other economic rivals.
- is ensuring that information is accurate. Accurate information is critical to us in making sound decisions. The opposite of integrity is (unauthorized) alteration.
11 Clues: is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure. • As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis. • ...
Chapter 2 Vocabulary 2022-11-21
Across
- A type of ETF transaction; money is deposited directly into the customer's checking account.
- someone who assists you with purchasing stocks and bonds
- Any organization that provides services related to money
- A security that pays interest over terms of ten or thirty years.
- owners are personally liable for their company’s losses
- A security that matures in a year or loss.
Down
- A financial institution that does not accept deposits
- Action taken to manage supply of money and interest rate.
- A financial institution that accepts money from customers and deposits it into the customer's account.
- A document guaranteeing payment of a specific amount.
- A security that pays interest over terms ranging from two to ten years.
- A financial investment issued by a corporation, government, or other organization.
12 Clues: A security that matures in a year or loss. • A financial institution that does not accept deposits • A document guaranteeing payment of a specific amount. • owners are personally liable for their company’s losses • someone who assists you with purchasing stocks and bonds • Any organization that provides services related to money • ...
Once Upon a Time C 2021-09-30
Across
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- The ? gardener was willing to travel to different places where there was work.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- For their safety, they ? to the Neighbourhood Watch program.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
- After many false alarms, the family wondered about the ? of the security system.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Nervously, the resident noticed the ? of a figure below the street light.
- When slicing bread or tomato, it is easier using a knife with ?.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- Residents ? their fears of criminals by installing sophisticated security devices.
- cherished red wagon with the supplies for phys. Ed.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Smart City Crossword Puzzle 2019-03-20
Across
- effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
- the process of combining software components, hardware components, or both into an overall system
- act of periodically checking processes, equipment and environment in order to detect any changes
- big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
- ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
- an extended social group having a distinctive cultural and economic organization
Down
- collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
- process by which people become residents of cities
- ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
- a native or naturalized member of a state or other political community
- ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
- the organized action of making of goods and services for sale
- ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
13 Clues: process by which people become residents of cities • the organized action of making of goods and services for sale • a native or naturalized member of a state or other political community • an extended social group having a distinctive cultural and economic organization • ...
Private Security Chapter 1-3 Terminology 2019-09-27
Across
- the aim of punishment is to prevent or deter persons from engaging in future crime
- when security organizations work to prevent crime
- official data on crime that are reported to law enforcement agencies across the United States
- a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
- when security officers respond for security purposes after a crime has been attempted or committed
- the eight major crimes included in Part 1 of the Uniform Crime Report
Down
- any action taken to reduce crime risks and build individual and community safety
- the first regular police force in London
- when security organizations police the community all work together to solve crime
- who formed Chicago's first private detective agency in 1850
- Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
- Scanning Analysis Response Assess
- a call to citizens to assist in an emergency situation
13 Clues: Scanning Analysis Response Assess • the first regular police force in London • when security organizations work to prevent crime • a call to citizens to assist in an emergency situation • who formed Chicago's first private detective agency in 1850 • the eight major crimes included in Part 1 of the Uniform Crime Report • ...
Orientation 2023-01-06
11 Clues: email • expenses • customer data • bank security • bnh intranet page • Clock in/Clock out • compliance training • peer to peer ackowledgment • employee assistance program • information security training • volunteer and charitable giving
Information Security crossword 2021-07-06
Across
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
- ISO 27001 is the international standard for _____________
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Guarantee of reliable access to the information by authorized people
- 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
- An asset that is essential to an organization and must be suitably protected
- Prevents the unauthorized use or disclosure of information
- You should never share this with anyone
- In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
- You should report Phishing emails in the ___________ console
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Protecting the accuracy and completeness of information and processing methods
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- Encodes the data in such a way that it is unintelligible without a key
- A software program that is designed to prevent malware
- Where to report a security incident? - __________@tavant.com
- Effect of uncertainty on objectives
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
18 Clues: Effect of uncertainty on objectives • You should never share this with anyone • A software program that is designed to prevent malware • ISO 27001 is the international standard for _____________ • Prevents the unauthorized use or disclosure of information • You should report Phishing emails in the ___________ console • ...
AI Security Awareness 2025-04-25
Across
- A type of machine learning where the model finds patterns and relationships in unstructured data without labeled responses.
- Data that requires protection due to its confidential nature.
- A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
- The simulation of human intelligence processes by machines, especially computer systems.
- Most AI chatbots are this type of LLM. Stands for generative pre-trained transformer.
- A type of neural network architecture used for natural language processing tasks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- A type of machine learning where the model is trained on labeled or structured data.
- A type of AI that enables computers to learn from data and improve their performance over time without being explicitly programmed.
- The ability of AI to interact and converse with humans in a natural way through human language.
- Refers to AI models that can create new content, such as text, images, or music.
- AI-generated media that mimics real people, often used to create misleading or false content.
- A method of trying to gather personal information using deceptive e-mails and websites.
- The right of individuals to keep their personal information secure and free from unauthorized access.
- Systematic error introduced into data or algorithms that can lead to unfair outcomes.
- An AI program designed to simulate conversation with human users.
- Large Language Model; an AI model trained on vast amounts of text data to understand and generate human language.
17 Clues: Data that requires protection due to its confidential nature. • An AI program designed to simulate conversation with human users. • Refers to AI models that can create new content, such as text, images, or music. • A type of neural network architecture used for natural language processing tasks. • ...
Digital security fundamentals 2022-12-17
Across
- The strongest password is: Crrrrrrrr@!!!, Gi0rg10, Mino012106, It@l1@, C@neSalutoFrutta
- Attack attempting to discover a password by systematically trying every possible combination
- 2 factors is a kind of strong …….
- Program used to detect unsolicited, unwanted and virus-infected emails is a …… filter
- When criminals use scam email they are trying to …. you
- A piece of code capable of copying itself
- Using this tool you can find out who an IP address belongs to
- Using a social handle or username of a person or business in your post or photo
Down
- Hostile online interaction that involves insulting messages between users
- Your computer will have many popups….
- Bronze medal again in 2022 as a password: an evergreen!
- Searching for and publishing private or identifying information about a particular individual on the internet
- Do not open if you don’t trust the sender
- A person who takes or use your computer information
- When criminals use scam sms they are trying to …. you
- A sequence of words or other text used to control access to a computer
- Fraudulent calls or voicemails
17 Clues: Fraudulent calls or voicemails • 2 factors is a kind of strong ……. • Your computer will have many popups…. • Do not open if you don’t trust the sender • A piece of code capable of copying itself • A person who takes or use your computer information • When criminals use scam sms they are trying to …. you • Bronze medal again in 2022 as a password: an evergreen! • ...
Safety/Security Meeting 2025-09-24
Across
- Vernon & Fortino are the branch
- Put away all _____ information before helping a new client
- Always file a ______ incident within 72 hours
- We report media concerns to media
- Try to _______ disruptive behavior
- Fire, Gas & Bomb threats warrant immediate
- The yellow emergency Binder contains _______ procedures
- Who we call in the event of an emergency
- If you're approached in the lobby by the robber, get the money from the _____ line
Down
- Go to the ____ when the opening signal is not set or set incorrectly
- We use this checklist at the end of the day
- During a robbery, pay close attention to the person's
- Lock your ____ when leaving your computer
- Comply with the robber's
- Use the alarm keypad if the _____ button isn't available
- Know the procedure to allow _____ for unknown vendors
- A normal opening of the branch requires ____ employees
17 Clues: Comply with the robber's • Vernon & Fortino are the branch • We report media concerns to media • Try to _______ disruptive behavior • Who we call in the event of an emergency • Lock your ____ when leaving your computer • Fire, Gas & Bomb threats warrant immediate • We use this checklist at the end of the day • Always file a ______ incident within 72 hours • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Smart City Crossword Puzzle 2019-03-20
Across
- big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
- a native or naturalized member of a state or other political community
- ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
- the process of combining software components, hardware components, or both into an overall system
- effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
- an extended social group having a distinctive cultural and economic organization
Down
- ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
- the organized action of making of goods and services for sale
- ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
- process by which people become residents of cities
- act of periodically checking processes, equipment and environment in order to detect any changes
- collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
- ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
13 Clues: process by which people become residents of cities • the organized action of making of goods and services for sale • a native or naturalized member of a state or other political community • an extended social group having a distinctive cultural and economic organization • ...
Synopsys 12 Days of AppSec 2023-12-08
Across
- A method of AppSec testing in which testers examine an application while it’s running, but have no knowledge of the application’s internal interactions or designs at the system level, and no access or visibility into the source program.
- A trending practice in application security (AppSec) that involves introducing security earlier in the software development life cycle (SDLC).
- A descriptive model that provides a baseline of observed activities for software security initiatives.
- An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities.
- Software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
- A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users.
Down
- The processes, practices, and tools used to identify, repair, and protect against vulnerabilities in applications, throughout the software development life cycle (SDLC)
- The combination of practices and tools designed to increase an organization’s ability to deliver applications and services faster than traditional software development processes
- A structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
- An authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system.
- Flaw in a computer system that weaken the overall security of the device/system.
- An inventory of what makes up a software application
12 Clues: An inventory of what makes up a software application • Flaw in a computer system that weaken the overall security of the device/system. • A descriptive model that provides a baseline of observed activities for software security initiatives. • A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users. • ...
Matt 2016-06-07
Across
- showing the violence
- friends is when you play on the phone
- is an a electronic
- a site for exploring
- strangers that you can meet
- a bigger screen than an iPad
- is a thing that you are youse for my Computer
- taking a screen of when you can get back on again
- a small square showing your face
- somebody that cheats
Down
- that you play online with
- a site were you can post stuff.
- is a device
- a site for videos
- people that teach you
- reports that come out
- are people that help you
- to protect your device
- bully somebody that is mean online
- small activities
20 Clues: is a device • small activities • a site for videos • is an a electronic • showing the violence • a site for exploring • somebody that cheats • people that teach you • reports that come out • to protect your device • are people that help you • that you play online with • strangers that you can meet • a bigger screen than an iPad • a site were you can post stuff. • ...
Airport Crossword 2019-02-12
Across
- Centre provides comprehensive ... and booking service
- Located on top floor of the terminal. Provides a view of airfield
- Go there to eat/drink
- Located throughout international airport terminal to communicate. Have to pay to use
- Responsibility for aviation security should be shared between the NZ Police and the Military of transport
- Available throughout terminals to assist passengers
- Rooms with cots and changing tables are available.
- You can access this for computer or mobile usage
- Available for emergancy use
Down
- Where you can buy items cheaper and non-taxed
- Where you can buy small goods for yourself or as a gift
- Provided as a quiet place for contemplation to all travellers
- Will check you to ensure no transporting of any dangerous goods
- Available to help transfer luggage
- Changing currency types
- Secure baggage storage and luggage wrapping is available at SmartCarte
- Passengers first contact with airport to book a space. Can be long term or short term
- Available for transit passengers. Can buy supplies from vending machine
- Can access smoking lounge after security
- Getting cash out
20 Clues: Getting cash out • Go there to eat/drink • Changing currency types • Available for emergancy use • Available to help transfer luggage • Can access smoking lounge after security • Where you can buy items cheaper and non-taxed • You can access this for computer or mobile usage • Rooms with cots and changing tables are available. • ...
CROSSWORD 2023-03-18
Across
- Facilitated by ensuring
- Consequences of individual actions
- PATTERN, Theory explain crimes committed
- Theory minimize other factors
- Formal, human, and security
- Theory visible of crime
- Have four major components
- Engage in crime
- Theories classified three types
- 36,8 Volumes published
- Father of Sociology
- Act law makes punishable
- Grandfather of Charles Darwin
- Father of Criminal Justice
- Defensible space theory
- Human cells 22 pairs
- Classical school began
Down
- Act becomes morally right
- Greek word "physis" meaning
- Punishing who do offend
- Human behavior impact behavior
- Theory called " consequentialist"
- Laws enacted in 1926
- TRAITS, Theories determine person's character
- Theories external influences
- Mind and Logos meaning
- Heavy or obese
- Were antisocial and apathetic
- Link criminal behavior twins
- Somatotype thin and flat
- Deterrence from criminal act
- Were manic-depressive
- Personal location called
- Person's awareness space
- TOPINARD, French Anthropologist
- Incorporation of security hardware
- Theory relation criminal offending
- Basic security and behavioral
- "Structurally significant phenomenon"
- LANGE, Studied DZ,MZ twins
40 Clues: Heavy or obese • Engage in crime • Father of Sociology • Laws enacted in 1926 • Human cells 22 pairs • Were manic-depressive • Mind and Logos meaning • 36,8 Volumes published • Classical school began • Punishing who do offend • Theory visible of crime • Defensible space theory • Facilitated by ensuring • Somatotype thin and flat • Personal location called • Person's awareness space • ...
Chapter 15 2013-04-25
Across
- agreement between an organization and a vendor
- this act governs the disclosure and protection of health information
- individual well-known for social engineering
- scavenging for private data in trash
- more than one person is required to complete a task
- the safeguarding of personnel's rights
- a targeted social engineering attack
- documentation about evidence location and usage
- helps protect cable from EMI and RFI
Down
- a violation of physical security
- a formal process for managing changes to the IT environment
- this act helps protect the privacy of your social security number
- this type of fire extinguisher can be class A, B, C, D, or K
- an event that affects the security of an organization
- this system helps remove heat from a server room
- wiping or purging data
- this type of fire suppression system can be wet pipe or dry pipe
- a dry pipe fire suppression system with special features
- this act governs the disclosure of financial and accounting information
- assuring that risks are known and managed
20 Clues: wiping or purging data • a violation of physical security • scavenging for private data in trash • a targeted social engineering attack • helps protect cable from EMI and RFI • the safeguarding of personnel's rights • assuring that risks are known and managed • individual well-known for social engineering • agreement between an organization and a vendor • ...
Bonds and Mutual Funds 2014-11-20
Across
- A borrowed fund
- Fund that comes with sales charge
- A publicly traded investment
- Large urban area
- Income return on an investment
- Does not have restrictions on the amount of shares
- Debt obligation with coupon
- Security that tracks an index
- Doesn't pay interest but is traded
- Promissory note or corporate bond
- Value printed on a coin
- Bond whose owner is registered
- Completely used up
- Bond that can be converted
- Debit security issued by a business entity
- To make up for something
Down
- Distribution of dividends
- Mutual fund that comes with sales charge
- Municipal bond that has a low risk
- Debt security issued by a state
- Mutual fund's price per share
- Bond secured by mortgage
- Final payment date of a loan
- Bond that matures at regular intervals
- High risk of loss
- Stocks in somebody's possession
- Shares are sold without commissioner sales charge
- Difference between higher priced paid
- Ascertaining liabilities
29 Clues: A borrowed fund • Large urban area • High risk of loss • Completely used up • Value printed on a coin • Bond secured by mortgage • Ascertaining liabilities • To make up for something • Distribution of dividends • Bond that can be converted • Debt obligation with coupon • A publicly traded investment • Final payment date of a loan • Security that tracks an index • ...
Maria's favourite words. 2015-12-11
Across
- / Information.
- / Maria’s main concern in the thesis.
- / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- / A set of connected things or parts forming a complex whole, in particular.
- / Security building blocks
- / Antonym: vague.
- / A person with a role to promote, display or advertise commercial products.
- / Judgement.
- / A person’s bodily shape.
- / Area or territory controlled by a ruler or government.
Down
- / A series of actions or steps taken in order to achieve a particular end.
- / A raised level surface on which people or things can stand.
- / A thing or things belonging to someone; possessions collectively.
- / Action against someone or something.
- / Existing or firmly attached within something or under a surface.
- / Formal request to an authority for something (e.g., job).
- / Put, lay, or stand (something) in a specified place or position.
- / Dealing with the nature of being.
- / A part of a whole.
- / Associated with, able to, or designed for performing one or more practical activities.
- / Security-Enhanced Embedded system Design.
- / Useful or valuable thing.
- / Synonym: sketch, blueprint, outline.
23 Clues: / Judgement. • / Information. • / Antonym: vague. • / A part of a whole. • / Security building blocks • / A person’s bodily shape. • / Useful or valuable thing. • / Dealing with the nature of being. • / Maria’s main concern in the thesis. • / Action against someone or something. • / Synonym: sketch, blueprint, outline. • / Security-Enhanced Embedded system Design. • ...
invest retire unit 2024-03-20
Across
- government retire account
- federal insurance contrabutions act
- how much you are willing to risk
- makes it difficult to change,hack or cheat the system
- Mike Washington jr's workplace
- union collected retirement
- age in which you can start investing
- government healthcare
- age in which you can collect social security
- place of investing and trading
- year that social security funds will run out
- s&p five hundred
- tax free individual retirement account
- guilty of 7 counts of fraud and conspiracy (last name)
- what makes Bitcoin have worth
- exaggerating worth and selling high
Down
- president that conseived social security
- bad day in stocks pessimisstic
- interest on interest
- good day in stocks optimist
- when a large number of bank customers withdrawl all of their money
- not like the movies
- how much does the FDIC insured up to
- year that medicare funds will run out
- when you stop working
- he lost 30 million with ftx
- a word for gambling with crypto
- not fiat money
28 Clues: not fiat money • s&p five hundred • not like the movies • interest on interest • when you stop working • government healthcare • government retire account • union collected retirement • good day in stocks optimist • he lost 30 million with ftx • what makes Bitcoin have worth • bad day in stocks pessimisstic • Mike Washington jr's workplace • place of investing and trading • ...
Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02
Across
- control of what users may do after accessing network
- technology that makes data unusuable and unreadable to all but authorized users
- A public certification authority organization
- The most widely used method for encrypting data
- A white hat's role
- unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
- EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
- Inherence refers to ... traits
- A black hat's role
- Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
- ethical hacker who probes networks or OSs and reports on vulnerabilities
- control of access to network
- A common security tool used by Linux administrators
- Three credential categories for multifactor authentication: knowledge, possession, and ...
- Windows domain associated mutual authentication protocol
- A built-in firewall included in many Linux distributions
- common client-server authentication protocol
- A good security option for servers that are not physically secure
- A Linux Files tool that offers a trash can for deleting files permanently
- Windows Server Update Services
20 Clues: A white hat's role • A black hat's role • control of access to network • Inherence refers to ... traits • Windows Server Update Services • common client-server authentication protocol • A public certification authority organization • The most widely used method for encrypting data • A common security tool used by Linux administrators • ...
Government 2024-07-08
Across
- The President's personal advisors
- to approve or confirm officially
- High ranking official in executive branch
- group of advisers to the president
- head of the Department of Justice
- department that oversees the federal budget
- Head of the U.S. armed forces
- department managing the nation's finances
- principal Advisor to the President on national security
- second in command in the executive branch
- formal agreement between countries
- authority or influence over an organization
- Federal law enforcement agency
- federal organization managing emergency response
- informal advisory group
- to make or enforce rules or policies
- A document issued by the President
Down
- Secretary heading the Treasury of Department
- Position in the Executive branch
- title for the leader of the Department of Defence
- government department of Foreign Affairs
- official statement or directive by the president
- meeting between heads and state
- Secretray heading the Treasury Department
- collection of all executive agencies and departments
- federal agency for national security
- president's official residence Bureaucracyace
- Set principles guiding the government's actions
- Government entity responsible for creating laws
- leader of the executive branch
30 Clues: informal advisory group • Head of the U.S. armed forces • Federal law enforcement agency • leader of the executive branch • meeting between heads and state • Position in the Executive branch • to approve or confirm officially • The President's personal advisors • head of the Department of Justice • group of advisers to the president • formal agreement between countries • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
CIS178 Cybersecurity Crossword Puzzle 2023-04-19
Across
- authentication using physical characteristics
- people carrying out specific actions
- software that installs itself secretly
- highly targeted phishing attacks
- virus disguised as legitimate software
- protect personal data
- users directed towards fake websites
- updates to improve security
Down
- permission to be on hard-drive
- security feature to detect hacking
- users denied access to services
- mathematical fuction that protects information
- attempting to obtain sensitive information
- prevents unauthorized access
- program added for entertainment
- emails asking for sensitive information
- detect and remove viruses
- software that makes data unstable
- secret software installed on hard-drive
- shared storage accessed online
20 Clues: protect personal data • detect and remove viruses • updates to improve security • prevents unauthorized access • permission to be on hard-drive • shared storage accessed online • users denied access to services • program added for entertainment • highly targeted phishing attacks • software that makes data unstable • security feature to detect hacking • ...
spanish travel words 2020-04-10
Across
- What you go through before you enter a country with costumes
- train checker
- sleeping car
- security screenings
- train car
- first class
- boarding pass
- flight
- suitcase
- bunk bed
- safety belt
- delayed
- airport
- platform
- ticket
- window
- passenger
- waiting room
- passport
- arrival
- train station
- visa
- seat
- on time
Down
- economy class
- a stop
- security agent
- flight assistant
- departure
- second class
- aisle
- carry on luggage
- luggage
- boarding gate
- international airport
- baggage claim
- window
- flight connection
- event ticket
- layover
- check in counter
- ticket
- trip/travel
43 Clues: visa • seat • aisle • a stop • flight • window • ticket • window • ticket • luggage • delayed • airport • layover • arrival • on time • suitcase • bunk bed • platform • passport • departure • train car • passenger • first class • safety belt • trip/travel • second class • sleeping car • event ticket • waiting room • economy class • train checker • boarding gate • baggage claim • boarding pass • train station • security agent • flight assistant • ...
fnaf crossword 2023-05-19
Across
- possess the puppet
- this is where your story ends
- was the first, saw everything
- main character
- most confusing character
- the most brutal thing in all of fnaf
- died in the bite of 83
- hello, hello?
- gave his creator nightmares
- leave the demon to his demons
- main villain
- everybody hates
Down
- but that's just a theory
- remember
- who we play as in security breach
- the dj in security breach
- most confusing minigame
- main mascot
- caused the bite of 87
- the king of fnaf
- the most popular character
- possess baby
- the vengeful spirit
23 Clues: remember • main mascot • possess baby • main villain • hello, hello? • main character • everybody hates • the king of fnaf • possess the puppet • the vengeful spirit • caused the bite of 87 • died in the bite of 83 • most confusing minigame • but that's just a theory • most confusing character • the dj in security breach • the most popular character • gave his creator nightmares • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Fmm project 2024-07-21
Across
- which window displays security capital market segments
- expand sureon
- nse has a main computer which is connected through
- expand SQ
- cancelation expand OCXL
- Full form of SBRS
- which order is to enable the user to view the outstanding orders fir a security
- Which manager is a term assigned to a user placed at the highest level in a trading firm
- who are the users at the lowest level of the hierarchy
Down
- expand NEAT
- which displays trading system bar
- which market are initiated by the exchange on behalf of tm for settlement related seasons
- which wait indicates that price have increased
- order which order are orders to buy or sell shares at a stated quantity and price.
- expand MBP
- which feature allows a TM to get instanteous market information on any desired security
16 Clues: expand SQ • expand MBP • expand NEAT • expand sureon • Full form of SBRS • cancelation expand OCXL • which displays trading system bar • which wait indicates that price have increased • nse has a main computer which is connected through • which window displays security capital market segments • who are the users at the lowest level of the hierarchy • ...
FNAF 2022-03-09
Across
- Animatronic that runs down the hall in FNAF1
- Animatronic who was taken apart in FNAF2
- Animatronic which is missing a face in FNAF2
- Animatronic controlled by the puppet
- Halloween Chica in FNAF4
- A very powerful freddy
- What the animatronics in FNAF4 are believed as
- The main 'animatronic' in FNAF3
- Gives you his life story when he jumpscares you in UCN
- Nerdylooking Freddy in FNAF6
- Upgraded Bonnie in FNAF2
- Animatronic in FNAF1 that LOVES pizza.
- Crocodile animatronic in Security Breach
- Chubby bear in FNAF2
Down
- Helps you in FNAF Security Breach
- Animatronic which requires music in FNAF2
- Elephant in FNAF6
- The animatronic in Help Wanted called a glitch
- The small bear in FNAF6
- Disables your cameras if you don't catch his fish in UCN
- Who we play as in FNAF1
- In your closet in FNAF4
- The main animatronic in FNAF1
- Probably the most scariest fanmade game
- He can see through your mask in FNAF2
- Merge of all the Funtime animatronics in Sister Location
- The wolf in Security Breach
- Big baby in Sister Location
28 Clues: Elephant in FNAF6 • Chubby bear in FNAF2 • A very powerful freddy • The small bear in FNAF6 • Who we play as in FNAF1 • In your closet in FNAF4 • Halloween Chica in FNAF4 • Upgraded Bonnie in FNAF2 • The wolf in Security Breach • Big baby in Sister Location • Nerdylooking Freddy in FNAF6 • The main animatronic in FNAF1 • The main 'animatronic' in FNAF3 • ...
Domestic & International Airports 2018-08-15
Across
- What is the abbreviation for Aviation Security Officer?
- The wall of an a/c.
- What can you use for free at most airports (excluding bathroom facilities)?
- What is the 'code'(hint)of an a/c called?
- What is the area where you go through security at the airport?
- What city airport is PPQ?
- What is'N' in phonetic alphabet?
- If I get on a plane what am I doing?
- A passenger who does not turn up to their flight.
- This is an area, usually adjacent to a terminal, where a/c park.
Down
- Where can passengers go if they are wanting to pray before a flight?
- What is the area before departing passengers through security at the airport?
- Where can you go to ask for help at an airport?
- Who play a vital role in customs work and are most referred to as "sniffer dogs"?
- Who flies the plane?
- What is 'S' in the phonetic alphabet?
- What is the airline code of MH?
- What is the airport code for Queenstown?
- What is 'B' in phonetic alphabet?
- Another word for passenger.
20 Clues: The wall of an a/c. • Who flies the plane? • What city airport is PPQ? • Another word for passenger. • What is the airline code of MH? • What is'N' in phonetic alphabet? • What is 'B' in phonetic alphabet? • If I get on a plane what am I doing? • What is 'S' in the phonetic alphabet? • What is the airport code for Queenstown? • What is the 'code'(hint)of an a/c called? • ...
Chapter 15 2013-11-26
Across
- helps protect cable from EMI and RFI
- this act governs the disclosure and protection of health information
- Due ________ is the sageguarding of personnel's rights
- this act helps protect the privacy of your social security number
- Chain of ___________ documentation about evidence location and usage
- a violation of physical security
- individual well-known for social engineering
- ______ phishing is a targeted social engineering attack
- ________ management is a formal process for managing changes to the IT environment
- ________ diving is scavenging for private data in trash
- this type of fire supression system can be wet pipe or dry pipe
Down
- an event that affects the security of an organization
- wiping or purging data
- this system helps remove heat from a server room
- a dry pipe fire supression system with special features
- Separation Of ______ means more than one person is required to complete a task
- Due __________ is assuring that risks are known and managed
- this type of fire extinguisher can be class A, B, C, D, or K
- this act governs the disclosure of financial and accounting information
- agreement between an organization and a vendor
20 Clues: wiping or purging data • a violation of physical security • helps protect cable from EMI and RFI • individual well-known for social engineering • agreement between an organization and a vendor • this system helps remove heat from a server room • an event that affects the security of an organization • Due ________ is the sageguarding of personnel's rights • ...
Cyber security cross word 2023-04-28
Across
- A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
- A file or code that infects, explores, steals or conducts any behavior an attacker wants.
Down
- A wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- A security network that protects your network/devices from unwanted traffic.
4 Clues: A security network that protects your network/devices from unwanted traffic. • A file or code that infects, explores, steals or conducts any behavior an attacker wants. • A wireless networking technology that uses radio waves to provide wireless high-speed Internet access. • ...
Block 3, Unit 1 2017-09-06
Across
- Windows Event ____ lets you monitor system events.
- The ____ toner fault isolation tool has two parts: the toner & the probe
- Security management subsystems work by partitioning resources into ____ & unauthorized areas
- This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
- Per the NSA IATF there are ____ classes of attacks
- In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
- Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
- Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
- There are 2 types of fault management: passive & ____
Down
- Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
- There are ____ steps in the troubleshooting model
- This network management area ensures internetwork performance can be maintained at an acceptable level
- ____ Manager provides information about programs running on your computer
- The ____ event logs can only be accessed by administrators
- The goal of this network management is to measure network utilization parameters so it can be regulated
- Air Force security management is provided by the ____ systems suite of tools (acronym)
- The first step in accounting management is to ____ usage of all important network resources
- The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
- There are 3 types of event log: Application, Security & ____
19 Clues: There are ____ steps in the troubleshooting model • Windows Event ____ lets you monitor system events. • Per the NSA IATF there are ____ classes of attacks • There are 2 types of fault management: passive & ____ • The ____ event logs can only be accessed by administrators • There are 3 types of event log: Application, Security & ____ • ...
Once Upon a Time Ada 2021-10-01
Across
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- The ? gardener was willing to travel to different places where there was work.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
Down
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- Nervously, the resident noticed the ? of a figure below the street light.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- For their safety, they ? to the Neighbourhood Watch program.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Residents ? their fears of criminals by putting in security devices for their homes.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
EMD Polices & Procedures 2024-04-12
Across
- All visitors must have a _____ completed in order to be allowed into the facility or do work on the grounds.
- Document needed when taking company property off site.
- Members of_____ assume control over all emergency situations.
- How many steps to disable or enable fire panel.
- Temporary badges can only be issued and returned to _____.
- Issued to employees and long term contractor to identify a vehicle in the parking lot.
- what document is to be completed every time a foreign national enter the shop for a tour.
- This report is a firsthand account of the activities the security officer performed while on duty.
- FN are permitted to have electronics in this area ONLY.
- _____ book is used by CW-EMD security to alert security officers of individuals who previously had access but have been temporarily or permanently rescinded.
- These passes are issued for a maximum of 5 days at at time.
- This form is used for all reports including an injury report or bomb threat.
- Badge worn by contractors who are sole US citizens who have a business relationship that requires daily or frequent visits but will not require access to classified information.
- Badge color reserved specifically for foreign nationals.
- Application used for alarms and event view.
- 2 Pop-up windows in security expert.
- _____ visitors wearing this badge must always have an EMD escort with them.
Down
- Only post that is manned from 0630-2230 Monday thru Friday.
- CW-EMD cleared employees have a _____ on their badge.
- Form generated and issued by the purchasing department authorizing equipment to be removed.
- Inspection performed by security officers to ensure that employees are using their assigned badge.
- Form used by employees to declare and drop off incoming business necessary computer storage/media at central guard.
- what type of alarm is High Water Bldg 12.
- Special arrangements have been made to allow _____ employees to bring company provided cell phones thru property.
- _____ are issued if a person's vehicle information is not in the system.
- Required any time work is being done inside the building that could potentially spark a fire.
- Sticker on a personally owned cell phone that has been approved by EMD security.
- This badge has a yellow background with red lettering.
- Post where you control and perform 100% vehicle inspections.
- Secured area located in Bldg 3A 2nd floor.
- Looking for on visitor ID.
- Document with information that must be reported to the next officer.
32 Clues: Looking for on visitor ID. • 2 Pop-up windows in security expert. • what type of alarm is High Water Bldg 12. • Secured area located in Bldg 3A 2nd floor. • Application used for alarms and event view. • How many steps to disable or enable fire panel. • CW-EMD cleared employees have a _____ on their badge. • Document needed when taking company property off site. • ...
Investing Unit 2024-03-20
Across
- At what age can you collect even more benefits from Social Security if you wait
- Ease with which an asset or security can be converted into cash without affecting the market price
- A sustained period of rising prices and optimistic sentiment in a financial market
- These funds are sold actively throughout the day and are Passively managed
- How can I buy a Mutual Fund
- An individual who buys and sells with the intention of profiting short term
- Bonds issued by company that have a fixed interest rate and face value
- At what age can you invest in Crypto
- Portion of the company's earnings distributed to shareholders as a return on investment
- Profit realized from sale of a capital asset like stock or real estate
- What indices comprises 30 blue chip companies?
- Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
- An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
- Buying different stocks from different companies
- Investing equal amounts of money at regular intervals
- At what age must you take a minimum from your retirement accounts each year (RMD)
- These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
- The age you can start collecting Social Security
- The process of offering shares f a private corporation to the public in a new stock issuance
- This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
- A unique combination of letters to represent a particular public ally traded company's stock or security
- A security that represents ownership of a fraction of a corporation
- Retirement account where money goes in after tax and is taken out penalty and tax free
- Bonds issued by the Government where you pay under face value and don't pay interest
- Retirement account where money is put in before taxes but is taken out taxed
- A market where prices are falling and a pessimistic outlook overall
- Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
- This is a federal payroll tax that is deducted from every paycheck
- Types of jobs that usually offer a pension
- Investing a big sum of money in one go
30 Clues: How can I buy a Mutual Fund • At what age can you invest in Crypto • Investing a big sum of money in one go • Types of jobs that usually offer a pension • What indices comprises 30 blue chip companies? • Buying different stocks from different companies • The age you can start collecting Social Security • Investing equal amounts of money at regular intervals • ...
cybersecurity 2022-05-24
Across
- A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company
- Designed to detect and destroy computer virus
- An individual who gains unauthorized access to a computer system/network for social or political purposes.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- internet Is the global system of interconnected computer networks that use the Internet protocol suite
- A network point that acts as an entrance to another network
- A feature or defect of a computer system that allows surreptitious unauthorized access to data
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
- Gaining access into a computer system/network illegally.
- an automated program that runs over the Internet
- Self-replicating virus that does not alter files but resides in active memory and duplicates itself
- Data confidentiality is a measure of the ability of a system to protect its data
- A person who uses computers to gain unauthorized access to data
- It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- Software that is intended to damage or disable computers and computer systems
- Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
- management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
- Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
- Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.
26 Clues: Designed to detect and destroy computer virus • an automated program that runs over the Internet • Gaining access into a computer system/network illegally. • A network point that acts as an entrance to another network • A person who uses computers to gain unauthorized access to data • Software that is intended to damage or disable computers and computer systems • ...
Cybersecurity Terms 2023-03-17
Across
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
- Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
- The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
- You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
- A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- is a method of connecting a series of computers and devices in a private encrypted network
- Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
- Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
- it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
- A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- is used to protect your information from hackers.
- is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
- A form of malware used by hackers to spy on you and your computer activities
- also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
- Any technology, be it software or hardware, used to keep intruders out.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
20 Clues: is used to protect your information from hackers. • Any technology, be it software or hardware, used to keep intruders out. • A form of malware used by hackers to spy on you and your computer activities • is a method of connecting a series of computers and devices in a private encrypted network • ...
Chapter 2 Vocabulary 2022-11-21
Across
- A type of ETF transaction; money is deposited directly into the customer's checking account.
- someone who assists you with purchasing stocks and bonds
- Any organization that provides services related to money
- A security that pays interest over terms of ten or thirty years.
- owners are personally liable for their company’s losses
- A security that matures in a year or loss.
Down
- A financial institution that does not accept deposits
- Action taken to manage supply of money and interest rate.
- A financial institution that accepts money from customers and deposits it into the customer's account.
- A document guaranteeing payment of a specific amount.
- A security that pays interest over terms ranging from two to ten years.
- A financial investment issued by a corporation, government, or other organization.
12 Clues: A security that matures in a year or loss. • A financial institution that does not accept deposits • A document guaranteeing payment of a specific amount. • owners are personally liable for their company’s losses • someone who assists you with purchasing stocks and bonds • Any organization that provides services related to money • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Health class 2022-10-24
10 Clues: words • helps 3 • internet/tech • hands and feet/touch • to choose to something • a person who supports 1 • feeling down for a long time • a person who is the target of 1 • a person who targets someone for a long time • bystander a person who see someone bullying but does nothing
Health crossword 2022-10-24
10 Clues: hitting punching • being mean online • of process of decisions • name calling and mean words • being sad for 1 or more weeks • a process of hurting yourself • someone who stands and watches • someone who stands up for victim • someone who constantly hurts someone • being sad for a small portion of time
Bullying dan emosional 2024-01-16
Across
- cara mengendalikan emosi pada diri sendiri...
- apa itu emosional...
- bullying dengan cacian dan umpatan kebencian merupakan bullying berupa
- bagaimana cara mengendalikan emosi...
- apa penyebab terjadinya emosional...
Down
- apa dampak emosional..
- pembullyan melalui teknologi, merupakan ..... Bullying
- tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
- pihak yang terlibat dalam bullying?
- bullying adalah suatu tindakan...
10 Clues: apa itu emosional... • apa dampak emosional.. • bullying adalah suatu tindakan... • pihak yang terlibat dalam bullying? • apa penyebab terjadinya emosional... • bagaimana cara mengendalikan emosi... • cara mengendalikan emosi pada diri sendiri... • pembullyan melalui teknologi, merupakan ..... Bullying • ...
Bullying, Conflict and Being Mean 2024-03-10
10 Clues: Two sides • In secret • In the open • Yin and Yang • Every now and then • Synonym for repeated • Bullying through the use of words • Bullying through the digital world • Bullying through the use of physical actions • A Maori representation of a person's life through their wellbeing
QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen 2025-07-24
Across
- - Zweiter Faktor, der kompromittiert wurde
- - Die Art des Cyberangriffs
- - Wohin der QR-Code tatsächlich führt
- - Der visuelle Köder im Angriff
Down
- - Der Übertragungsweg des Angriffs
- - Die App zur Login-Verifizierung
- - Psychologischer Trick in der Nachricht
- - Das gestohlene Element zur Umgehung des Logins
- - Der gefälschte Login-Dienst
- - Rogers Rolle in diesem Cyber-Drama
10 Clues: - Die Art des Cyberangriffs • - Der gefälschte Login-Dienst • - Der visuelle Köder im Angriff • - Die App zur Login-Verifizierung • - Der Übertragungsweg des Angriffs • - Rogers Rolle in diesem Cyber-Drama • - Wohin der QR-Code tatsächlich führt • - Psychologischer Trick in der Nachricht • - Zweiter Faktor, der kompromittiert wurde • ...
teka teki keamanan jaringan 2025-11-29
Across
- SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
- Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
- (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
- Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
- SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
- IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.
- DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
- MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
- Metodekeamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
- Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
- SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
- Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
- Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
Down
- Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
- Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
- Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
- Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
- Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
- SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
- Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
- Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.
21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah. • Memastikan hanya pengguna yang berwenang yang dapat mengakses data. • SECURITY Menjaga keamanan saat mengakses dan menjelajahi web. • Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah. • MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak. • ...
Puzzle on Security 2020-06-02
Across
- When an information is protected from disclosure or exposure to unauthorized individuals or systems
- When an information is whole, complete, and uncorrupted
- Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
- Software programs that hide their true nature and reveal their designed behavior only when activated
- These software components or programs are designed to damage, destroy, or deny service to the target
- the act of sending an e-mail message with a modified field
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
- When an information is free from mistakes or errors and it has the value that the end user expect
Down
- A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
- Computer Security centered on a system
- A computer consists of segments of code that perform malicious actions
- A well-known and broad category of electronic and human activities that can breach the confidentiality of information
- A malicious program that replicates itself constantly, without requiring another program environment
- This German code machine _______ were first broken by the Poles in the year 1930
- A category of objects, persons, or other entities that presents a danger to an asset
- The probability that something unwanted will happen
- An intentional or unintentional act that can cause damage to information and/or the systems that support it
17 Clues: Computer Security centered on a system • The probability that something unwanted will happen • When an information is whole, complete, and uncorrupted • the act of sending an e-mail message with a modified field • A computer consists of segments of code that perform malicious actions • ...
Information Security crossword 2021-07-06
Across
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- An asset that is essential to an organization and must be suitably protected
- You should report Phishing emails in the ___________ console
- Guarantee of reliable access to the information by authorized people
- In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
- Prevents the unauthorized use or disclosure of information
- Effect of uncertainty on objectives
- 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
Down
- You should never share this with anyone
- A software program that is designed to prevent malware
- Where to report a security incident? - __________@tavant.com
- Protecting the accuracy and completeness of information and processing methods
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- ISO 27001 is the international standard for _____________
- Encodes the data in such a way that it is unintelligible without a key
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
18 Clues: Effect of uncertainty on objectives • You should never share this with anyone • A software program that is designed to prevent malware • ISO 27001 is the international standard for _____________ • Prevents the unauthorized use or disclosure of information • Where to report a security incident? - __________@tavant.com • ...
CYBER SAFETY 2023-01-02
8 Clues: BAD OR DANGEROUS • CODE TO HARM COMPUTERS • SHOULD BE STRONG AND LONG • LIKE CATFISHING BUT ONLINE • PROGRAMS USED BY COMPUTERS • SHORT FOR MALICIOUS SOFWARE • CODE TO STEAL COMPUTER DATA • RELATING TO THE COMPUTER CULTURE
profesions 2021-04-23
Across
- someone who has a business
- driver a person that drive buss
- person who teach student
- a person who flies a plane
- the person who works on a farm
- a person that take photos
- a person that gives lectures usually in a university
- bank employee the person who serving the people in bank
- they make bread and cakes and work in bakery
- the person in charge of maintaining security
- the person checking the others
Down
- the person in charge of maintaining security of the country
- a person that can fix the problem you have with your teeth
- the person who serving the people in restorant
- a person who catch fish
- the man who lead the mass
- person who act in film
- a person trained to help a doctor look after the sick or injured
- a person who has the jobs of designing things
- a person that works in the science industry
- the person who work in kitchen
- a person that defends people in court and gives legal advice
22 Clues: person who act in film • a person who catch fish • person who teach student • the man who lead the mass • a person that take photos • someone who has a business • a person who flies a plane • the person who works on a farm • the person who work in kitchen • the person checking the others • driver a person that drive buss • a person that works in the science industry • ...
11.5 Testout Crossword 2023-03-28
Across
- uses radio waves to transmit data from small circuit boards
- the standard mechanism to dynamically assign IP addresses within a network
- a triple-A protocol
- an encrypted security protocol that protects internet traffic on wireless networks.
- electromagnetic radiation with wavelengths longer than those of visible light and shorter than radio waves
- developed at MIT and is a key component of Windows Active Directory
- a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
- a file-level storage architecture that makes stored data more accessible to networked devices
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- Internet Protocol Address
- is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs
- a symmetric block cipher chosen by the U.S. government to protect classified information.
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
- a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
- a new WFA security standard for personal and enterprise networks
- network that uses wireless data connections between network nodes.
- Characters that give wifi a unique name
- allows the antennae to divide streams between multiple devices.
18 Clues: a triple-A protocol • Internet Protocol Address • Characters that give wifi a unique name • uses radio waves to transmit data from small circuit boards • allows the antennae to divide streams between multiple devices. • a new WFA security standard for personal and enterprise networks • network that uses wireless data connections between network nodes. • ...
Online bullying 2024-06-11
Across
- online platform
- when someone is picking on you constantly
- going to the police to fill in a
- someone to talk to at school
Down
- connected to a group of things
- someone you can seek out
- protecting yourself online
- Another name for the internet
- a platform used with internet
- to stop people contacting you
- someone to talk to at home
11 Clues: online platform • someone you can seek out • protecting yourself online • someone to talk to at home • someone to talk to at school • Another name for the internet • a platform used with internet • to stop people contacting you • connected to a group of things • going to the police to fill in a • when someone is picking on you constantly
BackLash 2020-03-04
10 Clues: Brother of Bree • The sister of Lara • Lara makes this team • What does Bree to Lara • Lara’s former best friend • who is Lara’s best friend • Came to Lara to ask question • Took pills because of bullying • Where does Liam ad Sydney hang out • What is the boy name on the fake account
Forensic Midterm 2022-03-14
Across
- Online criminal activity
- plaster replica of an impression
- Dents left behind as evidence
- The study of a crime
Down
- The way humans write
- A device used to access the internet
- The investigation of fire
- Medicine for the teeth
- Rapid oxidization releasing light and heat
- A handheld device used to perform a function
10 Clues: The way humans write • The study of a crime • Medicine for the teeth • Online criminal activity • The investigation of fire • Dents left behind as evidence • plaster replica of an impression • A device used to access the internet • Rapid oxidization releasing light and heat • A handheld device used to perform a function
IT-Security 2016-01-29
Across
- illegale Personen die sich in Computersysteme einloggen?
- Information eines dritten?
- Engineering Manipulation ohne Technische Geräte?
- unerwünschte Werbenachrichten?
- Viren , die in einem Programm drinnen sind?
Down
- Ansprechen von Minderjährigen?
- Versteck in einem nützlichen Programm?
- Überbegriff für unerwünschte, Schädliche Software?
- Surfing Beobachtung bei der Eingabe von Daten?
- Hintertür zu einem anderen Computer?
10 Clues: Information eines dritten? • Ansprechen von Minderjährigen? • unerwünschte Werbenachrichten? • Hintertür zu einem anderen Computer? • Versteck in einem nützlichen Programm? • Viren , die in einem Programm drinnen sind? • Surfing Beobachtung bei der Eingabe von Daten? • Engineering Manipulation ohne Technische Geräte? • Überbegriff für unerwünschte, Schädliche Software? • ...
internet saftey 2024-02-27
10 Clues: are mean people • needs to be strong • to use there matrial • try to take your money • can show you bad stuff • steal your personal info • info needs to be private • has a lot of dangerous stuff • bullies are trying to hurt your feelings • email is trying to get you to spread your info
TETATEKI 2025-05-07
Across
- Kumpulan data atau dokumen yang disimpan di komputer
- Satuan terkecil dalam data digital
- Alat elektronik untuk mengolah data
- Alat input yang digunakan untuk menggerakkan pointer di layar
- Aplikasi untuk membuka halaman web
- Amanat atau wilayah dunia maya
- Fakta mentah yang bisa diolah menjadi informasi
- Surat elektronik
Down
- Perangkat lunak yang membantu komputer menjalankan tugas
- Hasil dari pengolahan data
- Perangkat output yang menampilkan gambar atau teks
- Jaringan komunikasi global yang menghubungkan komputer di seluruh dunia
- Tempat penyimpanan data secara online
- Perangkat keras dalam sistem komputer
- Alat input berupa papan ketik
15 Clues: Surat elektronik • Hasil dari pengolahan data • Alat input berupa papan ketik • Amanat atau wilayah dunia maya • Satuan terkecil dalam data digital • Aplikasi untuk membuka halaman web • Alat elektronik untuk mengolah data • Tempat penyimpanan data secara online • Perangkat keras dalam sistem komputer • Fakta mentah yang bisa diolah menjadi informasi • ...
CYBER 2017-04-20
6 Clues: Man's best friend • MOBBING IM INTERNET NENNT SICH • OPFER BRAUCHEN UNTERSTÜTZUNG VON.. • WAS FINDET MAN OFT AUF STREAMING SEITEN • SOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMT • WIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?
FITD Vocab.af 2013-05-15
Across
- the internet and online world
- Where you connect to a network using a wired connection (internet)
- searches all search engines and gets the top results
- SSID
- Alternatively to as high-speed Internet or wide band transmission
- a program that allows you to search the internet for information
- long term memory
- the way you behave online
- a readable file
- Homeland Security (NCSA)
- CPU
- examples: headphones, speakers
- the heart of the computer
- the software of a laptop
- hand free speaking device
- set of structured activies (safari, firefox)
- 8 bits make a ____
- is a sequence of instructions
- created with a copyright symbol on it
- location for CD in your laptop
- a device that displays signals on a computer screen
- a brief background of your history
Down
- is equal to 1,099,511,627,776 bytes
- ISP
- portable device
- where all information is stored
- when the computer isn't working you ____ it back up
- this is a program
- What do they want? who is asking? Why do they want it?
- a port used to connect a computer a mouse or a keyboard to an IBM compatible computer
- is an object on a computer that stores data
- rules and behavior to keep you and your computer safe
- short term memory
- USB (flash drive)
- examples: flashdrive, keyboard, mouse, etc
- LCD
- the purpose of this is to upgrade your computer
- LED
- a device that receives data and projected data
- a storage device or backup device that you can access
- A electronical and physical port
- to protect information and networks
- a program on your device that allows you to download and upload
- is a physical components of computer wiring (the inside of the computer)
- cloud based presentation on the internet. There is only one slide that can be edited. .
45 Clues: ISP • LCD • CPU • LED • SSID • portable device • a readable file • long term memory • this is a program • short term memory • USB (flash drive) • 8 bits make a ____ • Homeland Security (NCSA) • the software of a laptop • the way you behave online • the heart of the computer • hand free speaking device • the internet and online world • is a sequence of instructions • examples: headphones, speakers • ...
6 grade vocabulary crossword puzzle 2025-01-30
Across
- bullying online bullying
- Place where the photo was taken
- To not be nown
- punching or fighting someone
- To hit someone
- To increase or widen participation or impact
- The person doing the harassing or bullying
- A winess to harassment
- an argument or disagreement that isn't nescessarily repepeated
Down
- Information about what's in the photo
- A form of harassment or bullying used
- Can't talk
- abuse To tell a police offshore of a abuse
- mesing around with someone
- A Target privately or publicly
- To go for one person
- a wepsite that no one can use
17 Clues: Can't talk • To not be nown • To hit someone • To go for one person • A winess to harassment • bullying online bullying • mesing around with someone • punching or fighting someone • a wepsite that no one can use • A Target privately or publicly • Place where the photo was taken • Information about what's in the photo • A form of harassment or bullying used • ...
November Cross word 2023-11-24
8 Clues: It's giving. • We need more! • Community heroes. • The new Monday champion. • Student-written and delicious. • Highest ranked pre-season team. • I'm not a veggie; I'm a fall fruit. • Re-issued the Thanksgiving proclamation in 1863.
Security Crossword Puzzle 2022-10-17
Across
- All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected
- Improper Security Practices, Classified data spills, Improper marking of classified information, Introduction, or use of unauthorized electronics
- An ongoing screening process to review the background of an individual who is already assigned to a sensitive position or has access to classified information.
- You must notify your FSO/CPSO of this at least 30 days before
- Giovanni Fiorella
- Controlled Unclassified Information
- Information or material the unauthorized disclosure of which reasonably could be expected to cause SERIOUS damage to national security
Down
- 800-424-9098
- Jay Triplett, Jason Hughes, and Bradley Beatty
- Non-Disclosure agreement
- Joey Barone
- Information or material the unauthorized disclosure of which reasonably could be expected to cause EXCEPTIONALLY GRAVE damage to national security
12 Clues: Joey Barone • 800-424-9098 • Giovanni Fiorella • Non-Disclosure agreement • Controlled Unclassified Information • Jay Triplett, Jason Hughes, and Bradley Beatty • You must notify your FSO/CPSO of this at least 30 days before • All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected • ...
Standards Law & Ethics of Cybersecurity 2023-06-08
Across
- Link that is ______ often found on social media and SMS is one of the Phishing Scams.
- By sharing ______ date it potentially threatens personal safety.
- What should you do if you receive suspicious links on your mobile phone?
- Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
- Resending fake emails to everyone who knows you can be identified as _______.
- Do not ______ your password.
- _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
- Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.
8 Clues: Do not ______ your password. • By sharing ______ date it potentially threatens personal safety. • What should you do if you receive suspicious links on your mobile phone? • Resending fake emails to everyone who knows you can be identified as _______. • Link that is ______ often found on social media and SMS is one of the Phishing Scams. • ...
Cyber Safety Crossword 2013-11-03
Across
- Free software that can be downloaded from the internet.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The internet version of Junk mail
- Buying products on the Internet using credit cards or other electronic payments
- Short for Random Access Memory
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
- Small text files that websites save in your web browser to store information like your username and password.
- A name you use to identify yourself on a computer or website.
- A type of malware that spies on what you do on the internet and can steal information about you
- A computer that has been hacked into and is used to launch malicious attacks
- The last part of a URL eg;.gov .com
- Marking something or someone as suspicious or inappropriate.
- When a computer calls out to another computer to see if it is active.
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Cyber Cross-Word 2022-05-19
Across
- shortest-path-first routing protocol
- type of AV-based thats unusual for the user
- software that displays unwanted ad
- transmission media with cables
- secure communications techniques
- SIEM tool that enable to search, analyze...
- tool that uses multiple antivirus engines
Down
- firewall keeps track of com sessions
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- packet analyzer
- software/hardware that creates/runs VM
- attract attackers
- secret - cb5ceb103977f1271d0763ac75fcd8e9
- an open-source EDR
- interaction between snmp agent manager
15 Clues: packet analyzer • attract attackers • an open-source EDR • transmission media with cables • 8e8c92b1c360cbe3cd2b40d6b29278d5 • secure communications techniques • software that displays unwanted ad • firewall keeps track of com sessions • shortest-path-first routing protocol • software/hardware that creates/runs VM • interaction between snmp agent manager • ...
Cyber Crossword Puzzle 2025-09-15
Across
- Something like a phone, laptop, or tablet
- A fix for a security problem in software
- Software that protects against malware
- Protects your network from threats
- Someone who breaks into systems
- Scrambles information to keep it safe
- A copy of your files kept safe
Down
- A secret code you use to log in
- A fake email that tries to trick you
- Keeps your software current and safe
- A secure way to connect on the internet
- Bad software that harms your computer
- A common way hackers send scams
- What you should do to your device when away
- Unwanted or junk emails
15 Clues: Unwanted or junk emails • A copy of your files kept safe • A secret code you use to log in • A common way hackers send scams • Someone who breaks into systems • Protects your network from threats • A fake email that tries to trick you • Keeps your software current and safe • Bad software that harms your computer • Scrambles information to keep it safe • ...
Bullying 2023-10-23
Across
- The use of technology to harass, threaten, embarrass, or target another person
- A tool to verbally bully
- Spread behind peoples back
- A Bird that cyberbullies
- Saying or writing mean things
- Involves hurting someone’s reputation or relationships
Down
- Person who is nearby or a witness to a bullying situation
- A tool to cyberbully
- Hurting a person’s body or possessions
- Person who steps in to stop a bullying situation
- A tool to physically bully
- Target
- Aggressor
13 Clues: Target • Aggressor • A tool to cyberbully • A tool to verbally bully • A Bird that cyberbullies • A tool to physically bully • Spread behind peoples back • Saying or writing mean things • Hurting a person’s body or possessions • Person who steps in to stop a bullying situation • Involves hurting someone’s reputation or relationships • ...
Information Security Crossword 2017-02-15
Across
- Completion of Information Security and DPA annual training is ____________
- When you receive an email with a link to a bogus website it is called _________
- A type of use that should be limited when using Society systems ________
- This should only be installed on Society systems by approved administrators ______
- Something that can infect a PC/Laptop is known as a ________
- Personal information is protected by this act _______
- All colleagues must comply with these information security documents _______
- This should be worn at all times when on Society premises __________
- You should not allow others to do this when accessing Society premises ______
Down
- Always ensure your _________ is locked when you are away from your computer.
- A tidy desk is also known as a _________ desk
- When you received unsolicited email from unknown sources this is called ______
- These should never be shared __________
- It should be changed immediately if suspected of being compromised
- Information Security policies are published on it ___________
- Skipton may ______________ your internet usage
- Personal journal published on the World Wide Web ________
17 Clues: These should never be shared __________ • A tidy desk is also known as a _________ desk • Skipton may ______________ your internet usage • Personal information is protected by this act _______ • Personal journal published on the World Wide Web ________ • Something that can infect a PC/Laptop is known as a ________ • ...
High Security Estate 2017-01-31
17 Clues: Hands on • Wireless • Part of me • Spikey steel • Silver stripe • To come and go • Stop drop roll • Above standard • After a shampoo • More then a scan • fixteen in a room • To pay for company • Untidy place to eat • Party after a wedding • American word for phone • Provide relevant information • Location to catch a plane from
IFG Security Knowledge 2025-11-24
Across
- Primary source for finding SAP CPI
- Accredited area to work SAP
- F-22 ISSM
- F-22 CSSO
- Report travel to CSSO __ days prior to travel
- Willful or negligent action
- Days to complete PSQ Template 3 after travel
- Used to Nominate an individual for SAP Access
Down
- Provides guidance on security baseline policies
- Utilized to indicate the SAP accesses of LM Aero Employees
- Secure Voice/fax capable
- Dedicated unclassified F-22 program area
- F-16 CSSO
- Required form to request network access
- F-16 ISSM
- Individual whose program access is not maintained by LM Aero
- Risk Management Methodology
17 Clues: F-22 ISSM • F-16 CSSO • F-22 CSSO • F-16 ISSM • Secure Voice/fax capable • Accredited area to work SAP • Willful or negligent action • Risk Management Methodology • Primary source for finding SAP CPI • Required form to request network access • Dedicated unclassified F-22 program area • Days to complete PSQ Template 3 after travel • Report travel to CSSO __ days prior to travel • ...
Word List 2020-04-28
Across
- a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
- evil which is commited by hackers every day
- is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- person who can intrude the system
- the process of encoding information
- characteristics or information
- a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
- two-dimensional barcode
- the utility that lets the hacker to trace the data of user's device
- to destroy the secret of the data
- the domain that lets the hacker trace the personal geolocation.
Down
- a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
- situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
- to kidnap the data
- any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
- a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
- the most popular remote access trojan
- the global system of interconnected computer networks
- case of programms for interacting with wireless networks
- to get the data in a dishonest way
- critical system error on Windows
23 Clues: to kidnap the data • two-dimensional barcode • characteristics or information • critical system error on Windows • person who can intrude the system • to destroy the secret of the data • to get the data in a dishonest way • the process of encoding information • the most popular remote access trojan • evil which is commited by hackers every day • ...
Chapter 36 2014-04-30
Across
- were the industries that include financial services?
- where did manufacturing jobs move out of?
- what were the names of the general people who left their country to move to safety in 2005?
- what is the creation of plants or animals that are genetically identical to an existing plant or animal?
- what was created in 2002 to coordinate national efforts against terrorism
- what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
- what is the abbreviation for European Economic community?
- what includes all financial interactions that cross international borders?
- what is the abbreviation for the North Atlantic Treaty Organization?
- since that late 1960s, more than 14,000 terrorist attacks have occurred where?
- in the late 1950s a new style of music emerged called what?
Down
- president Bush an anti-terrorism bill called what?
- access to TV, radio, and phones are known as
- what is a spread of nuclear weapons to other nations called?
- what is the working laboratory for experiments in space?
- who was one of the greatest champions of human rights that established the order of the missionaries of charity?
- what is the voluntary linkage of computer networks around the world?
- what is the 20th century attempt to increase food resources worldwide using economic processes?
- cultural elements that reflect groups of people with common backgrounds and interests?
- what is a major goal for globalization?
- the transferring of genes from one living thing to another in order to produce an organism with new traits?
- what is the use of violence, on people, or property
- the western mind set of placing a high value on acquiring material possessions is what?
- what is the greatest global health issue(disease) that was first discovered in the 1980s?
24 Clues: what is a major goal for globalization? • where did manufacturing jobs move out of? • access to TV, radio, and phones are known as • president Bush an anti-terrorism bill called what? • what is the use of violence, on people, or property • were the industries that include financial services? • what is the working laboratory for experiments in space? • ...
Brices Puzzle 2024-01-05
Across
- Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
- Vision Syndrome A technology-related health condition that affects eyesight.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Compression Tool Tool that shrinks the size of a file(s).
- Web Design A website development approach that adapts the layout of a website to fit the screen
- System Number system that has just two unique digits, 0 and 1, called bits.
- An applied science devoted to incorporating comfort
- Device Any hardware component that conveys information from a computer or mobile device
- A computer that delivers requested webpages
- A small text file that a web server stores on your computer.
- The electronic component of a computer that interprets and carries
- The number of horizontal and vertical pixels in a display device.
- Aggregation A website or web app sometimes called a curation website
Down
- Device Any hardware component that allows you to enter data and instructions
- A business transaction that occurs over an electronic network
- The code of acceptable behaviors users should follow while on the Internet
- A program designed to make users more productive
- Firewall A security tool that detects and protects a personal computer and its data
- Device Convergence The trend of computers and devices with technologies
- A compromised computer or device whose owner is unaware
- Extortionist Someone who demands payment to stop an attack
- Someone who accesses a computer or network illegally.
- Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
- Protector A device that uses electrical components to provide a stable current flow and minimize
- Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
- A collection of computers and mobile devices connected
26 Clues: A computer that delivers requested webpages • A program designed to make users more productive • An applied science devoted to incorporating comfort • Someone who accesses a computer or network illegally. • A collection of computers and mobile devices connected • A compromised computer or device whose owner is unaware • ...
September Bootcamp 2022-08-03
Across
- How many hours does an admin have to respond to a ransomware event with Ransomware Rollback?
- A collection of bots. The term also refers to the malware executed on a connected device which transforms the device into a bot
- cloud platform used for partners and MSPs
- EDR provides three layers of protection: Network, Process and Desktop _?
- A content heavy resource where you can find internal and external facing information
- sales methodology that focuses on customer relationships
- recently released managed detection and response service
- Malwarebytes cofounder and CEO
- What is Malwarebytes best known for?
- the tool used to automate communication with your customers
- cloud console for customers
- Regional identifier for sales/support activity in Europe-Middle East- Africa
- the platform that hosts e-learning and video tutorials
- easy of use term to describe the nebula console
Down
- the V in VPM
- Technical Account Management
- How many layers of live protection does EP provide?
- sales enablement content guru who controls highspot and academy
- A type of malware which locks users out of their computer and/or encrypts their files, offering to unlock on the condition that the victim pays a ransom
- CSM stands for Customer _ Manager
- A module for the Nebula platform helps block access to malicious websites and limit threats introduced by suspicious content
- abbreviation for Malwarebytes
- our internal storage system for documents and files
- an open-source equivalent to the Unix operating system
- branch of the revops org that runs MWB tech stack
- is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
- sales enablement services guru who supports MDR
- tool for recording and reflecting on calls by reps
- form on contract used in Sandler methodology to establish clear intentions and agenda
- regional identifier for sales/support activity in Asia-Pacific
30 Clues: the V in VPM • cloud console for customers • Technical Account Management • abbreviation for Malwarebytes • Malwarebytes cofounder and CEO • CSM stands for Customer _ Manager • What is Malwarebytes best known for? • cloud platform used for partners and MSPs • sales enablement services guru who supports MDR • easy of use term to describe the nebula console • ...
AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE 2025-06-24
Across
- Auditors must _________ the results of the sample and their implications.
- Auditors need to address _______responsibilities related to data privacy, confidentiality, and the use of IT in the audit process.
- Auditors need to acquire and maintain ______ in using new IT tools and techniques.
- Performing Audit _________ on Selected Items
- Risk that conclusions based on a sample differ from those of the entire population.
- Auditors must ________ the nature and cause of deviations or misstatements.
- control IT can be used to implement and monitor ________ more effectively, improving the overall control environment.
- IT systems are vulnerable to _______ threats, data breaches, and other security risks that could compromise the integrity of audit evidence.
- Application of procedures to less than 100% of items in a population.
- Ensures each unit has an equal chance of selection.
Down
- IT auditors require specialized knowledge and skills to assess the effectiveness of IT controls and systems.
- Auditors must adapt to new technologies, manage increased _________ ___________, and address the associated risks to ensure the integrity and reliability of the audit process.
- Ongoing ___________ of IT systems and controls is necessary to ensure their effectiveness and identify potential issues.
- Electronic data processing and auditing can reduce the likelihood of _____ in audit work and increase the probability of identifying misstatements.
- IT enables auditors to analyze ________ datasets, identify anomalies, and detect potential errors or fraud more effectively.
- IT facilitates the shift towards ______ audits, reducing reliance on physical documents and streamlining the audit workflow.
- Entire set of data from which a sample is selected.
- Generally not recommended due to potential bias in contiguous items.
- Sample _____ should be sufficient to reduce sampling risk to an acceptably low level.
- ________ are projected for each stratum separately, combining results for overall assessment.Information technology (IT) has significantly transformed the audit process, enhancing efficiency and effectiveness while introducing new challenges.
20 Clues: Performing Audit _________ on Selected Items • Entire set of data from which a sample is selected. • Ensures each unit has an equal chance of selection. • Generally not recommended due to potential bias in contiguous items. • Application of procedures to less than 100% of items in a population. • ...
Online Safety 2023-01-29
Across
- security updates for software
- An unsecure Wi-Fi network
- Norton, McAfee, AVAST, or AVG
- weak-point in a network or system
- broad term for viruses
- like adware but sent to hackers
- confirming a user's identity
- using your click against you
- records info for advertising purposes
Down
- records keystrokes
- scan an IP address for open ports
- username and password
- common in forums and social media
- Login now www.amazon1.com
- Encrypts data, demands payment
- rule-based network security
- unsolicited or malicious emails
- Browse securely, or work remotely
- scrambled text meant to confuse bots
- overwhelms a servers resources
20 Clues: records keystrokes • username and password • broad term for viruses • An unsecure Wi-Fi network • Login now www.amazon1.com • rule-based network security • confirming a user's identity • using your click against you • security updates for software • Norton, McAfee, AVAST, or AVG • Encrypts data, demands payment • overwhelms a servers resources • unsolicited or malicious emails • ...
Volunteer 2013-03-04
Across
- Alcohol-based hand rub
- Body system supporting the spine
- Who is responsible for security?
- The most single effective way of removing bacteria from hands
- Security office location
- Bacteria in or on the body not causing illness
- Fibrous tissue that links together two bones
- Remove Alert Contain Evacuate
- Potential to harm health & safety of a person
Down
- Posture position with least stress
- Work Health & Safety
- Used to wash hands
- 33 (2 words)
- Micro-organisms
- A spinal structure
- Relates to work evironment
- Bacteria in or on the body causing illness
- Attach muscles to bone
- Code Red
- Report incidents to
20 Clues: Code Red • 33 (2 words) • Micro-organisms • Used to wash hands • A spinal structure • Report incidents to • Work Health & Safety • Alcohol-based hand rub • Attach muscles to bone • Security office location • Relates to work evironment • Remove Alert Contain Evacuate • Body system supporting the spine • Who is responsible for security? • Posture position with least stress • ...
La Snoer crosswords 2014-09-10
Across
- Spreker
- Toegangscontrole tot beschermd gebied
- Renaissancestad in Italie
- Afkorting van Nuclear Security Summit
- Vliegbelasting
- Moment waarop aandelen van een NV voor de eerste keer naar de effectenbeurs worden gebracht
- zoutjes gemaakt van flinterdunne aardappelschijfjes
- Getallen in kalenderjaar
- Ruggenraat (Engelse vertaling)
- Hoofdstad van Flevoland
- Film met Tom Hanks
- Engelse lowcost carrier
- Zuid Afrikaanse antilope
Down
- Onderricht
- voormalig bezoekerscentrum van Schiphol
- Vulkaan in IJsland
- Spaanse lowcost carrier
- Iranier
- Start- en landingsbaan ten westen van de Zwanenburgbaan
- Neerleggen van werk
- Watervogel
- Veiligheid
- Rechterhand van Sinterklaas
- Vloeistoffen (Engelse vertaling)
- Haarspul
- Miscalculatie
26 Clues: Spreker • Iranier • Haarspul • Onderricht • Watervogel • Veiligheid • Miscalculatie • Vliegbelasting • Vulkaan in IJsland • Film met Tom Hanks • Neerleggen van werk • Spaanse lowcost carrier • Hoofdstad van Flevoland • Engelse lowcost carrier • Getallen in kalenderjaar • Zuid Afrikaanse antilope • Renaissancestad in Italie • Rechterhand van Sinterklaas • Ruggenraat (Engelse vertaling) • ...
Hanshaft Crossword 2015-06-18
Across
- opposite of DK'ed
- cash or stock _
- attorney letter
- not today but tomorrow
- buyout
- identifying number
- broker
- money due you
- reregistration company
- paper form
- into two or more
- holdings
- to vote
- bid price
- trading happens
- another word for money
- __exchange
Down
- Intelligent _
- Acquire shares
- cash or _
- transferrable
- trade shares
- It is a debt security
- 1 ½ by 1 ¾
- shares in a basket
- payout
- Another word for shares
- assets held here
- money earned
- stocks traded
- taxes
- buy 100_
- A preliminary prospectus
- expiring contract
34 Clues: taxes • payout • buyout • broker • to vote • holdings • buy 100_ • cash or _ • bid price • 1 ½ by 1 ¾ • paper form • __exchange • trade shares • money earned • Intelligent _ • transferrable • stocks traded • money due you • Acquire shares • cash or stock _ • attorney letter • trading happens • assets held here • into two or more • opposite of DK'ed • expiring contract • shares in a basket • identifying number • ...
Once Upon a Time Ada 2021-10-01
Across
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The ? gardener was willing to travel to different places where there was work.
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
Down
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Nervously, the resident noticed the ? of a figure below the street light.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Residents ? their fears of criminals by putting in security devices for their homes.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
Investing Unit 2024-03-20
Across
- At what age can you collect even more benefits from Social Security if you wait
- Ease with which an asset or security can be converted into cash without affecting the market price
- A sustained period of rising prices and optimistic sentiment in a financial market
- These funds are sold actively throughout the day and are Passively managed
- How can I buy a Mutual Fund
- An individual who buys and sells with the intention of profiting short term
- Bonds issued by company that have a fixed interest rate and face value
- At what age can you invest in Crypto
- Portion of the company's earnings distributed to shareholders as a return on investment
- Profit realized from sale of a capital asset like stock or real estate
- What indices comprises 30 blue chip companies?
- Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
- An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
- Buying different stocks from different companies
- Investing equal amounts of money at regular intervals
- At what age must you take a minimum from your retirement accounts each year (RMD)
- These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
- The age you can start collecting Social Security
- The process of offering shares of a private corporation to the public in a new stock issuance
- This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
- A unique combination of letters to represent a particular publically traded company's stock or security
- A security that represents ownership of a fraction of a corporation
- Retirement account where money goes in after tax and is taken out penalty and tax free
- Bonds issued by the Government where you pay under face value and don't pay interest
- Retirement account where money is put in before taxes but is taken out taxed
- A market where prices are falling and a pessimistic outlook overall
- Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
- This is a federal payroll tax that is deducted from every paycheck
- Types of jobs that usually offer a pension
- Investing a big sum of money in one go
30 Clues: How can I buy a Mutual Fund • At what age can you invest in Crypto • Investing a big sum of money in one go • Types of jobs that usually offer a pension • What indices comprises 30 blue chip companies? • Buying different stocks from different companies • The age you can start collecting Social Security • Investing equal amounts of money at regular intervals • ...
EMD Polices & Procedures 2024-04-09
Across
- _______ is to be completed every time a foreign national enters the shop for a tour
- Badge worn by visitors who are sole US citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
- Looking for on visitor ID
- Application used for alarms and event view
- This badge has a yellow background with red lettering
- Required any time work is being done inside the building that could potentially spark a fire
- Post where you control and perform 100% vehicle inspections
- Sticker on a personal owned cell phone that have been approved by EMD security
- Members of _______ assume control over all emergency situations
- Temporary badges can only be issued and returned to _______
- Only post that is manned from 0630-2230 Monday thru Friday
- Issued to employees and long term contractors to identify a vehicle in the parking lot
- These passes are issued for a maximum of 5 days at a time
- This form is used for all reports beside that of an injury report bomb threat or the DAR
- Inspection performed by security officers to ensure that employees are using their assigned badge
- _______are issued if a person's vehicle information is not in the system
Down
- Form generated by and issued by the purchasing department authorizing equipment to be removed
- Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
- CW-EMD cleared employee has a _______on their badge
- 2 pop-up windows in security expert
- _______ book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
- All visitors must have a _______completed in order to allowed into the facility or do work on the grounds
- Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard
- _______visitors wearing this must always have a EMD escort with them
- Document needed when taking company property off site
- FN are permitted to have electronics in this area ONLY
- How many steps to disable or enable fire panel
- Document with information that must be reported to the next officer
- Badge color reserved specifically for Foreign Nationals
- Secured area located in Bldg 3A 2nd floor
- This report is a firsthad account of the activities the security officer performed while on duty
- What type of alarm is High Water bldg 12
32 Clues: Looking for on visitor ID • 2 pop-up windows in security expert • What type of alarm is High Water bldg 12 • Secured area located in Bldg 3A 2nd floor • Application used for alarms and event view • How many steps to disable or enable fire panel • CW-EMD cleared employee has a _______on their badge • This badge has a yellow background with red lettering • ...
EMD Polices & Procedures 2024-04-08
Across
- All visitors must have a _______ completed in order to be allowed into the facility or do work on the grounds
- _______visitors wearing this must always have a EMD escort with them
- These passes are issued for a maximum of 5 days at a time
- Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
- Document with information that must be reported to the next officer
- Form generated by and issued by the purchasing department authorizing equipment to be removed from the site
- Badge worn by visitors who are sole US Citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
- Only post that is manned from 0630-2230 Monday thru Friday
- _______book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
- Issued to employees and long term contractors to identify a vehicle in the parking lot
- Application used for alarms and event view
- _________is to be completed every time a foreign national enters the shop for a tour
- What type of alarm is High Water bldg 12
- Looking for on visitor ID
- Stickers on a personal owned cell phone that have been approved by EMD Security
- Badge color reserved specifically for Foreign Nationals
- Inspection performed by security officers to ensure that employees are using their assigned badge
Down
- This badge has a yellow background with red lettering
- Post where you control and perform 100% vehicle inspections
- Form used by employee to declare and drop off incoming business necessary computer storage/media at Central guard
- 2 pop-up windows in security expert
- Document needed when taking company property off site
- CW-EMD cleared employee has a __________ on their badge
- Members of _______ assume control over all emergency situations
- Reuqired any time work is being done inside the building that could potentially spark a fire
- ________are issued if a person's vehicle information is not in the system
- Temporary badge can on be issued and returned to _______
- How many steps to disable or enable fire panel
- Secure area located in Bldg 3A 2nd floor
- This report is a firsthand account of the activities the security officer performed while on duty
- FN are permitted to have electronics in this area only
- This form is used for all reports besides that of an injury report bomb threat or the DAR
32 Clues: Looking for on visitor ID • 2 pop-up windows in security expert • Secure area located in Bldg 3A 2nd floor • What type of alarm is High Water bldg 12 • Application used for alarms and event view • How many steps to disable or enable fire panel • This badge has a yellow background with red lettering • Document needed when taking company property off site • ...
Positive Peer Influence 2021-01-22
8 Clues: Use _____________ for good. • __________ before you post. • Be _________ of what you post. • Do not spread ____________ news. • Respect for self and _____________. • Be a ___________ peer influence online. • Do not post ____________ messages online. • Be an _____________ and don't ignore cyber bullying.
Jace Keenhold 2017-09-07
Across
- Copyright / Taking something that's not yours
- Danger / Someone you don't know
- Media / Snapchat , Instagram
- Passwords / Good passwords
Down
- / The right way to communicate over the internet
- research / Finding things over the internet
- Domain / Public Information
- Plagiarism / Taking someone else's work
- bullying / Bullying over the internet
- Safety / Be safe on the internet
10 Clues: Passwords / Good passwords • Domain / Public Information • Media / Snapchat , Instagram • Danger / Someone you don't know • Safety / Be safe on the internet • bullying / Bullying over the internet • Plagiarism / Taking someone else's work • research / Finding things over the internet • Copyright / Taking something that's not yours • ...
STOP BULLYING !! 2024-02-19
Across
- memberi komentar negatif, menyebar gosip orang lain di medsos
- memukul, menendang, mendorong
- tempat untuk menuntut ilmu
- nama lain dari bullying
- pihak yang melihat terjadinya bullying
Down
- pihak yang melakukan tindakan bullying
- perilaku yang tidak menyenangkan secara verbal dan fisik
- pihak yang menerima tindakan bullying
- dengan sengaja mengabaikan, menyebarkan gosip
- menghina, menyindir, memanggil dengan julukan
10 Clues: nama lain dari bullying • tempat untuk menuntut ilmu • memukul, menendang, mendorong • pihak yang menerima tindakan bullying • pihak yang melakukan tindakan bullying • pihak yang melihat terjadinya bullying • dengan sengaja mengabaikan, menyebarkan gosip • menghina, menyindir, memanggil dengan julukan • perilaku yang tidak menyenangkan secara verbal dan fisik • ...
Crossword 2025-11-18
Across
- Watching somebody get picked on
- Who you should tell when somethings wrong
- media A way to communicate to others
- something that is yours
- bullying Picking on somebody online
Down
- a mean thing to say
- How to get into a account
- standing up for somebody
- Picking on somebody repeatedly
- How bullying can make someone feel
10 Clues: a mean thing to say • something that is yours • standing up for somebody • How to get into a account • Picking on somebody repeatedly • Watching somebody get picked on • How bullying can make someone feel • bullying Picking on somebody online • media A way to communicate to others • Who you should tell when somethings wrong
Shoulder surfing 2020-06-03
7 Clues: ponsel pintar • surat elektronik • bahasa inggris siber • akun punya id dan .... • orang yang melakukan hacking • yang dilakukan wanita di komik • facebook, whatsapp, instagram disebut
safe internet 2022-02-11
7 Clues: Διαδίκτυο • παιχνίδια (online gaming) • Hygiene υγιεινή των συσκευών • ερωτική επικοινωνία μέσω διαδικτύο • Κανόνες ορθής διαδικτυακής συμπεριφοράς • διαδικτυακός εκφοβισμός (cyberbullying) • Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Something used to protect Against Viruses
- Displays ads on your computer. May slow down your computer
- make sure to ____ your software when Needed.
- When someone gets your personal info and then does things pretending to be you.
- When you copy someone's work and claim it as your own.
- Emails that spread Malware often use _________.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- Everyone has a Digital _______ so be careful
- you should regularly make _______ to make sure that your things will be safe.
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
- Keeps track of every key you type and sends it to the hacker.
- To ensure your data is safe you could us ______ storage.
Down
- Spies on you, stealing information like passwords and credit card numbers
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- avoid using ______ Wi-fi.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- make sure to have strong an secure ________.
- Blocks you from accessing your files until you pay a ransom.
- __________ is when people steal intellectual property such as movies, music and software.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- A group of computers all being controlled by a remote hacker to perform illegal activity.
- if you are being cyber bullied Don't _____ the messages because they can be used as proof
- IF someone is completely _______ they cant be traced.
24 Clues: avoid using ______ Wi-fi. • Something used to protect Against Viruses • make sure to ____ your software when Needed. • make sure to have strong an secure ________. • Everyone has a Digital _______ so be careful • Emails that spread Malware often use _________. • IF someone is completely _______ they cant be traced. • ...
Year 7 Coding and Networking 2025-09-08
Across
- A device that requests services from a server
- A temporary IP address that can change, assigned by a DHCP server
- An action that causes something to happen in a program
- Internet protocol address that is 128 bits long
- Internet protocol address that is 32 binary digits long
- A seven-layer architecture for communication systems
- Text-based language that provides deep understanding of programming techniques
- A computer in a network that provides services like websites or emails
- The high-capacity network that carries internet traffic across the world
- System that translates easy-to-remember domain names into IP addresses
- Uses radio waves for transporting data without physical cables
- Fast, easy-to-learn and beginner-friendly text-based programming language
- An error in a program that prevents it from running as expected
- A list of steps to finish a task
- Protocol for dynamically assigning IP addresses to network devices
Down
- The most common form of cable used for wired networking
- A set of rules that defines how two entities communicate across a network
- A unique identifier assigned to internet-connected devices
- Small units of data into which messages are split for transmission across a network
- Text-based programming language for basic coding skills just like a programmer
- Device that guides data to its correct destination, preventing traffic jams
- A permanent address for a device, usually set up manually
- Free programming language from MIT that uses block-based technology
- Free programming language developed by Google which uses visual blocks
- Finding and fixing errors in programs that prevent them from running correctly
- Requires a physical medium for transporting information between nodes
- Programming language often used for creating modifications in Minecraft
- Programming language developed by Microsoft for creating 3D games
- The action of doing something over and over again in programming
- A cyber security threat that tricks victims into sharing sensitive data
30 Clues: A list of steps to finish a task • A device that requests services from a server • Internet protocol address that is 128 bits long • A seven-layer architecture for communication systems • An action that causes something to happen in a program • The most common form of cable used for wired networking • Internet protocol address that is 32 binary digits long • ...
Chapter 11 Crossword Puzzle 2023-10-19
Across
- A highly secure correctional facility which houses the worst criminal
- jail designed to encourage interactions between inmates and jail officials
- inmates separated at all times with activities in their individual cells
- The prison official in charge
- prison prison designed giving inmates a great deal of freedom
- the time spent in jail prior to being sentenced
- disciplinary action ordering inmates to their cells
- The security designation given to new inmates
Down
- Correctional facilities not operated by the government
- early form of correctional facility
- holds inmates awaiting trial or sentences of year or less
- inmates incarcerated in jail awaiting trial
- screening of inmates determining their security level
- Inmates kept in separate cells but worked together in silence
- reimbursement for costs of housing inmates
15 Clues: The prison official in charge • early form of correctional facility • reimbursement for costs of housing inmates • inmates incarcerated in jail awaiting trial • The security designation given to new inmates • the time spent in jail prior to being sentenced • disciplinary action ordering inmates to their cells • screening of inmates determining their security level • ...
Hanshaft Crossword 2015-06-18
Across
- trade shares
- opposite of DK'ed
- broker
- reregistration company
- to vote
- trading happens
- money due you
- paper form
- buyout
- attorney letter
- transferrable
- 1 ½ by 1 ¾
- buy 100_
- payout
- Another word for shares
- cash or stock _
- holdings
Down
- into two or more
- expiring contract
- assets held here
- stocks traded
- bid price
- not today but tomorrow
- taxes
- identifying number
- shares in a basket
- A preliminary prospectus
- Intelligent _
- It is a debt security
- money earned
- Acquire shares
- cash or _
- __exchange
- another word for money
34 Clues: taxes • broker • buyout • payout • to vote • buy 100_ • holdings • bid price • cash or _ • paper form • 1 ½ by 1 ¾ • __exchange • trade shares • money earned • stocks traded • money due you • Intelligent _ • transferrable • Acquire shares • trading happens • attorney letter • cash or stock _ • into two or more • assets held here • expiring contract • opposite of DK'ed • identifying number • shares in a basket • ...
AKS Crossword Puzzle 2024-07-22
Across
- Industry leader key machine
- Plug that hole
- Fill
- Keys or shavings
- .003 or .005, that is the question
- Picking & decoding in one
- High security key
- Favorite distributor of locksmith
- Metal tail
- Black mess lube
- Head
Down
- Slippery magic in a bottle
- High security angle cuts
- 10B
- Core quick-swap
- Recombinate
- Chicago ace
- Lock or nose
- Opposite of Kwikset
- The original ic core
- Push buttons and pull levers
- Pop a latch or pass a pin
- Favorite tool of the scammer
- Inner cylinder part
- Org loved and hated by auto locksmiths
25 Clues: 10B • Fill • Head • Metal tail • Recombinate • Chicago ace • Lock or nose • Plug that hole • Core quick-swap • Black mess lube • Keys or shavings • High security key • Opposite of Kwikset • Inner cylinder part • The original ic core • High security angle cuts • Picking & decoding in one • Pop a latch or pass a pin • Slippery magic in a bottle • Industry leader key machine • Push buttons and pull levers • ...
Cybersecurity crossword 2023-04-22
Across
- unaware software vulnerability attacked
- computer damaging, harmful software
- website shutdown using multiple devices
- security during initial production stages
- seemingly harmless but malicious malware
- locks computer until random paid
- scrambling data method
- slows computer with unwanted ads
- required identification changing system settings
- Online repeated harassment
Down
- implements security for computer system
- access blocked for unauthorized users
- click hidden element, opening malware
- work policy for personal device
- misleading edited picture or video
- program designed to remove malware
- compromised system infecting other systems
- service for remotely connected wifi
- the guarding against unauthorized access
- personal information stealing tactic
20 Clues: scrambling data method • Online repeated harassment • work policy for personal device • locks computer until random paid • slows computer with unwanted ads • misleading edited picture or video • program designed to remove malware • computer damaging, harmful software • service for remotely connected wifi • personal information stealing tactic • ...
Security Terminology Puzzle (Participation 3) - Emily Pedrazzi 2023-01-25
Across
- Many devices attack a target.
- Creates an encrypted tunnel.
- Many compromised computers sending cyberattacks.
- Detects and protects against malware.
- Pay to regain access to systems.
- Malicious software.
- Tricks users into providing information.
- Attack that exploits new vulnerabilities.
- Cisco's entry-level network certification.
- Someone who exploits vulnerabilities.
- Someone who penetration tests organizations.
Down
- Scrambles sensitive data; must decrypt.
- Saves hardware costs; increases risk.
- Legitimate app containing harmful malware.
- Free Internet access.
- Falsified media used for harm.
- Blocks unusual traffic and users.
- CompTIA's entry-level security certification.
- Sensitive information exposed to attackers.
- Requires users to confirm identity.
20 Clues: Malicious software. • Free Internet access. • Creates an encrypted tunnel. • Many devices attack a target. • Falsified media used for harm. • Pay to regain access to systems. • Blocks unusual traffic and users. • Requires users to confirm identity. • Saves hardware costs; increases risk. • Detects and protects against malware. • Someone who exploits vulnerabilities. • ...
Aidan's personality 2021-11-01
Across
- who I live with at the momment
- my fave yellowish colour
- being socially happy
- what I do when i'm sick and can't do anything else
- education
- what life is filled with! (words and all)
- what has me actively boogy
Down
- what I dance to!
- What the best cyber activity is
- what people love and deserve!
- my best friend (name starts with ge and ends with ge)
- my fave coding game
- fun with____
- what occupies me
14 Clues: education • fun with____ • what I dance to! • what occupies me • my fave coding game • being socially happy • my fave yellowish colour • what has me actively boogy • what people love and deserve! • who I live with at the momment • What the best cyber activity is • what life is filled with! (words and all) • what I do when i'm sick and can't do anything else • ...
INFORMATIKA 2024-08-13
Across
- Penghitungan dengan menggunakan komputer
- ilmu yang mempelajari tentang penggunaan komputer
- Salah satu aplikasi media sosial
- Pembelajaran secara online
- Dunia Maya
- Situs web berbagi video
- Media sosial yang didirikan oleh Mark Zuckerberg
Down
- Salah satu aplikasi penyedia layanan transportasi
- Salah satu aplikasi jual beli online
- Salah satu game online popular
- Pembelajaran secara offline
- Salah satu karakter dalam profil pelajar pancasila
- Seseorang yang tidak begitu mahir dalam bermain
- Metode pembayaran yang dilakukan secara langsung di tempat Pembeli setelah pesanan dari kurir diterima
14 Clues: Dunia Maya • Situs web berbagi video • Pembelajaran secara online • Pembelajaran secara offline • Salah satu game online popular • Salah satu aplikasi media sosial • Salah satu aplikasi jual beli online • Penghitungan dengan menggunakan komputer • Seseorang yang tidak begitu mahir dalam bermain • Media sosial yang didirikan oleh Mark Zuckerberg • ...
