cyber security Crossword Puzzles

I can't find you, Mum! 2025-11-19

I can't find you, Mum! crossword puzzle
Across
  1. Jessie followed her mom to the clothing shop and found it ____.
  2. Jessie and her mother went ____.
  3. The stranger ___ Jessie, and she ran away.
  4. Mom ___ that they were safe and sound now.
  5. Don't talk to strangers, even if they are ____.
Down
  1. Jessie mistook the security guard for a ____.
  2. Jessie and her mother were back ____, safe and sound.
  3. She didn't ____ when someone came into the room.
  4. Jessie ___ back the curtain.
  5. They will tell their ____ that Jessie is in the office.
  6. The security guard took Jessie into his ____.
  7. The security ___ promised to help Jessie.

12 Clues: Jessie ___ back the curtain.Jessie and her mother went ____.The security ___ promised to help Jessie.The stranger ___ Jessie, and she ran away.Mom ___ that they were safe and sound now.Jessie mistook the security guard for a ____.The security guard took Jessie into his ____.Don't talk to strangers, even if they are ____....

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  2. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  3. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  4. For their safety, they ? to the Neighbourhood Watch program.
  5. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  6. Nervously, the resident noticed the ? of a figure below the street light.
  7. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  8. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
  9. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  10. The ? gardener was willing to travel to different places where there was work.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
Down
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Residents ? their fears of criminals by putting in security devices for their homes.
  3. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  4. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  5. Due to neglect, some of the ? of the homes required some painting and repairs.
  6. As ? for the broken security alarm, the company offered them six months of service for no charge.
  7. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  8. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  9. As usual, the father was ? by the beeping of his phone at 6:00 am.
  10. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  11. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  12. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  13. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. over a computer
  2. bully that threats you
  3. words
  4. a person that watches
Down
  1. punching hitting and kicking
  2. the person that is being bullied
  3. the person that touch’s you in spots you don’t want to be touch
  4. the person that stops it
  5. wants to hurt you

9 Clues: wordsover a computerwants to hurt youa person that watchesbully that threats youthe person that stops itpunching hitting and kickingthe person that is being bulliedthe person that touch’s you in spots you don’t want to be touch

FITDVocab.jg 2013-05-15

FITDVocab.jg crossword puzzle
Across
  1. A port for a PlayStation2
  2. Where is something processed
  3. A written set of instructions
  4. Host A host that is on the internet, or a site hoster
  5. Manners Online
  6. When a new president gets assigned and uses a bible
  7. Random.........
  8. A server in the "sky"
  9. What is that tower thingy called?
  10. "Fidelity"
  11. Protecting Passwords online
  12. The made layout by a company or software
  13. A device that you use for the computer using a mechanical ball
  14. To restart your computer
  15. A HUGE search engine
  16. What "things" are installed on your computer?
  17. The way things are arranged
  18. Light emitting diodes, Light crystal display
  19. A website that is like an "engine"
  20. Where documents and Power-points are stored in
  21. A catchy phrase a company uses
  22. Online safety
  23. You need 8 of these to make a byte
  24. What is your screen called
Down
  1. Feeding something "out" of your computer
  2. Things you plug into your computer
  3. What does "©" stand for?
  4. What do you plug your flash-drive in?
  5. Those square things on your homepage on an iPhone
  6. A drive that is very, very important
  7. OSX,MAC,PC,WINDOWS7
  8. Online
  9. where do you plug in your headphones?
  10. the stuff inside your computer
  11. .docs .xcxl .pp
  12. Someone who provides their internet service
  13. think of a "disc Drive"
  14. Something that you type in, like "word"
  15. 1,000 of these equals a terabyte
  16. Something that feeds info "into" your computer
  17. Extra slots
  18. Something that you can call off of
  19. do you have 4G or 3G?
  20. A host that connects you to the internet
  21. When you "cite" a source, what is that called?
  22. A picture for a business
  23. Social security i_

47 Clues: Online"Fidelity"Extra slotsOnline safetyManners Online.docs .xcxl .ppRandom.........Social security i_OSX,MAC,PC,WINDOWS7A HUGE search engineA server in the "sky"do you have 4G or 3G?think of a "disc Drive"What does "©" stand for?To restart your computerA picture for a businessA port for a PlayStation2What is your screen called...

Semester 2 Religion Crossword 2022-05-15

Semester 2 Religion Crossword crossword puzzle
Across
  1. church law enforced by force/violence
  2. no supernatural
  3. Islamic word for "God"
  4. western European philosophical movement
  5. monk inspired by Antony of Syria (wanted structure)
  6. a false teaching
  7. the killing of an unborn child
  8. what language was mass used to be said in?
  9. national internal order
  10. Islamic follower
  11. absolute Muslim law
  12. most depicted figure besides Jesus
  13. battles for the holy land
  14. anyone who didn't speak Latin or Greek
  15. monk who gave all Christians the Bible
  16. someone who dies for the faith
  17. warriors for God
  18. first book printed by Gutenberg's press
  19. became Paul after Jesus appeared to him on the road to Damascus
  20. international law and order to avoid war
  21. fired for massacring Samaritans, sent Jesus to his crucifixion
  22. God's plan of salvation in Jesus Christ
  23. Putin's experience with computers and cyber attacks
Down
  1. sister of Benedict
  2. "for the people," everyone can read it
  3. no belief in any god
  4. What country is under Putin's attack?
  5. place of the pope
  6. life should be centered around this gospel's chapter 28
  7. the supernatural is accepted
  8. a person who isn't Jewish
  9. What's one thing that depicts Christianity?
  10. war crimes, "just war"
  11. ninth month of the Islamic calendar
  12. biggest and strongest barbarian tribe
  13. "most holy"
  14. How was around 1,000,000 Muslims converted?
  15. english priest that was sentenced but never executed
  16. founder of Islam
  17. states rights vs omnipotent Federal gov.
  18. "God's true religion"
  19. freedom of speech, religion, etc (replaced European bias)
  20. equal maximum rights for all citizens under primary "law"
  21. patriarch for Putin
  22. Roman emperor who killed 400,000 Christians
  23. wealth, power, glory, and pleasure at the center of your life
  24. right wing extreme begun by Mussolini
  25. Roman officials (wear a collar)
  26. essential absolute truths of God
  27. corrupt priest who sold salvation
  28. who was Gabriel really to the Protestants?

51 Clues: "most holy"no supernaturala false teachingIslamic followerfounder of Islamwarriors for Godplace of the popesister of Benedictabsolute Muslim lawpatriarch for Putinno belief in any god"God's true religion"Islamic word for "God"war crimes, "just war"national internal ordera person who isn't Jewishbattles for the holy landthe supernatural is accepted...

Brices Puzzle 2024-01-05

Brices Puzzle crossword puzzle
Across
  1. The code of acceptable behaviors users should follow while on the Internet
  2. Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
  3. Device Any hardware component that allows you to enter data and instructions
  4. An applied science devoted to incorporating comfort
  5. Extortionist Someone who demands payment to stop an attack
  6. A small text file that a web server stores on your computer.
  7. A business transaction that occurs over an electronic network
  8. A collection of computers and mobile devices connected
  9. Device Any hardware component that conveys information from a computer or mobile device
  10. The number of horizontal and vertical pixels in a display device.
  11. The electronic component of a computer that interprets and carries
  12. Firewall A security tool that detects and protects a personal computer and its data
Down
  1. Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
  2. Device Convergence The trend of computers and devices with technologies
  3. Web Design A website development approach that adapts the layout of a website to fit the screen
  4. A program designed to make users more productive
  5. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  6. Compression Tool Tool that shrinks the size of a file(s).
  7. A computer that delivers requested webpages
  8. Protector A device that uses electrical components to provide a stable current flow and minimize
  9. Someone who accesses a computer or network illegally.
  10. Vision Syndrome A technology-related health condition that affects eyesight.
  11. A compromised computer or device whose owner is unaware
  12. Aggregation A website or web app sometimes called a curation website
  13. Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
  14. System Number system that has just two unique digits, 0 and 1, called bits.

26 Clues: A computer that delivers requested webpagesA program designed to make users more productiveAn applied science devoted to incorporating comfortSomeone who accesses a computer or network illegally.A collection of computers and mobile devices connectedA compromised computer or device whose owner is unaware...

Computer Security and Ethics 2024-08-23

Computer Security and Ethics crossword puzzle
Across
  1. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  2. Make sure you use a different ____ for different sites and keep them long and complex.
  3. Computer activities often leave a digital ____ that leads back to the offender.
  4. You should regularly make a ____ of your data/photos.
  5. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  6. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  7. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
  8. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
  9. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  10. If you download software, ____ it before running it.
Down
  1. Malware that damages files on your computer or stops your computer from running properly.
  2. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  3. When you copy sections of someone else's work and claim it is your own.
  4. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  5. Emails can spread malware, most often when you click links or open ____.
  6. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  7. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  8. Keep your operating system secure by running all the latest.
  9. Avoid making financial transactions on ____ networks or computers.
  10. Tries to open security holes in your computer so a hacker can gain access.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

informatika keresztrejtvény 2023-06-07

informatika keresztrejtvény crossword puzzle
Across
  1. valami kiadása megosztása
  2. valótlan fotók,hirek terjesztése másról
  3. lábnyom az interneten rólunk tárolt adatok,keresési előzmények
  4. véletlenszerű számot generál
  5. lopás valaki másnak
Down
  1. a számítógép kézzrl fogható részei
  2. funkcionalitás rendszerek amiket telepítve újabb és ujabb funkciok erhetők el
  3. személyes titkok,információk megosztása másról
  4. visszatérő sértő/bántó üzenetek
  5. bullying egy személy online térben való zaklatása
  6. betűk gyakoritsága magyar nyelvben

11 Clues: lopás valaki másnakvalami kiadása megosztásavéletlenszerű számot generálvisszatérő sértő/bántó üzeneteka számítógép kézzrl fogható részeibetűk gyakoritsága magyar nyelvbenvalótlan fotók,hirek terjesztése másrólszemélyes titkok,információk megosztása másrólbullying egy személy online térben való zaklatása...

9.8 Institutions Developing in a Globalized World 2025-05-19

9.8 Institutions Developing in a  Globalized World crossword puzzle
Across
  1. 1948 declaration adopted to promote human dignity and freedom
  2. Group that provides food aid globally
  3. Powerful UN council with veto powers
  4. Term for people fleeing war or disaster
  5. Created in 1944 to offer loans to countries for infrastructure and development
  6. Organization that promotes science, culture, and education
  7. The first global organization after WWI that failed to prevent WWII
Down
  1. International financial organization helping with short-term economic issues
  2. NGO known for monitoring human rights abuses
  3. Former trust territory that gained independence in 1994
  4. UN agency that helps children, originally post-WWII
  5. UN body where all nations are represented
  6. Peacekeeping force country involved in conflicts in Congo and Haiti
  7. One of the five permanent members of the Security Council, formerly USSR
  8. Powerful nations have this privilege in the Security Council

15 Clues: Powerful UN council with veto powersGroup that provides food aid globallyTerm for people fleeing war or disasterUN body where all nations are representedNGO known for monitoring human rights abusesUN agency that helps children, originally post-WWIIFormer trust territory that gained independence in 1994...

Cyber Security Crossword Puzzle 2022-01-30

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. The act of creating a fake identity online to exploit individuals they connect with on dating sites
  2. Malicious software which can be obtained after downloading suspicious files
  3. Ensure it is ''strong'' to reduce chances of getting hacked
Down
  1. Beware of these online thieves who uses computers to gain unauthorized access to data

4 Clues: Ensure it is ''strong'' to reduce chances of getting hackedMalicious software which can be obtained after downloading suspicious filesBeware of these online thieves who uses computers to gain unauthorized access to dataThe act of creating a fake identity online to exploit individuals they connect with on dating sites

Goog Test 2023-03-31

Goog Test crossword puzzle
Across
  1. Barista
  2. Android
  3. Google
  4. Cloud
Down
  1. Facilities
  2. Security
  3. Develop
  4. Campus
  5. Tech

9 Clues: TechCloudCampusGoogleBaristaDevelopAndroidSecurityFacilities

CySec 2025-06-05

CySec crossword puzzle
Across
  1. Attack exploiting built-in processors in hardware to execute malicious code
  2. Preferred framework for IP level security analysis
  3. Attack technique doesn't physically alter the chip but changes behavior through environmental stress
  4. Security impact leading to loss of core vehicle function
  5. Speculative execution attack targeting x86-64 processors
  6. Security Property most impacted by Denial of Service attack
Down
  1. Attack that adds hidden functionality during chip design
  2. Measurement setup often used in side-channel analysis
  3. Security Property ensuring information is accessible to only authorized agents
  4. Hardware protection that can be bypassed by repeatedly accessing memory

10 Clues: Preferred framework for IP level security analysisMeasurement setup often used in side-channel analysisAttack that adds hidden functionality during chip designSecurity impact leading to loss of core vehicle functionSpeculative execution attack targeting x86-64 processorsSecurity Property most impacted by Denial of Service attack...

Français Aéroport Crossword 2023-11-24

Français Aéroport Crossword crossword puzzle
Across
  1. plane ticket
  2. security checkpoint
  3. security belt
  4. boarding pass
Down
  1. check in counter
  2. passport
  3. suitcases
  4. luggage
  5. seat (on the plane)
  6. gate (for boarding)

10 Clues: luggagepassportsuitcasesplane ticketsecurity beltboarding passcheck in counterseat (on the plane)security checkpointgate (for boarding)

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  2. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  3. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  5. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  6. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  2. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  4. A type of fraud that targets high-profile end users.
  5. Crime conducted via the Internet or some other computer network.
  6. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. A secret word or phrase known only to you.
  8. What tells you that the website is secure in the browser.

14 Clues: A secret word or phrase known only to you.A type of fraud that targets high-profile end users.What tells you that the website is secure in the browser.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Rule of Thoughts Crossword Puzzle 2023-02-27

Rule of Thoughts Crossword Puzzle crossword puzzle
Across
  1. computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist
  2. VirtNet Security
  3. a computer generated life-form created by Kaine in the VirtNet which is transferred to the real world placed in the body of a human being and essentially removing that person's identity and replacing it with their manufactured ones
Down
  1. a program designed by Kaine in order to resurrect Tangents from the VirtNet and insert them into the real world and using human bodies as the hosts taking over the planet
  2. an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience.

5 Clues: VirtNet Securitycomputer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terroristan advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience....

CrytoMaze 3 2024-12-09

CrytoMaze 3 crossword puzzle
Across
  1. Replacing sensitive data with non-sensitive equivalents.
  2. Faking the origin of a message or communication to deceive the recipient.
  3. Measures taken to protect information from unauthorized access or damage.
  4. Malicious software that replicates itself to spread to other systems.
  5. Digital document used to verify identities in secure communications.
  6. An incident where unauthorized access to data occurs.
  7. To convert information into a secure format.
  8. A method of bypassing normal authentication or security controls.
Down
  1. Entity that issues digital certificates in a PKI.
  2. The discovery and interpretation of meaningful patterns in data, often used for security monitoring.
  3. Process of identifying and evaluating risks to information assets.
  4. An isolated environment for safely executing untested code.
  5. A piece of software or code that takes advantage of a vulnerability.
  6. Ensuring data consistency across multiple systems.
  7. Set of rules governing data communication.
  8. Secure area within a system for processing sensitive data.
  9. To convert encrypted data back to its original form.
  10. Fraudulent attempt to obtain sensitive information by deception.

18 Clues: Set of rules governing data communication.To convert information into a secure format.Entity that issues digital certificates in a PKI.Ensuring data consistency across multiple systems.To convert encrypted data back to its original form.An incident where unauthorized access to data occurs.Replacing sensitive data with non-sensitive equivalents....

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. / Acquire shares
  2. / payout
  3. buy 100_
  4. / money earned
  5. / Intelligent _
  6. / assets held here
  7. / buyout
  8. / 1 ½ by 1 ¾
  9. / expiring contract
  10. stocks traded
  11. / holdings
  12. / paper form
  13. / transferrable
  14. / cash or stock _
  15. / opposite of DK'ed
  16. / broker
Down
  1. / cash or _
  2. / It is a debt security
  3. / money due you
  4. / A preliminary prospectus
  5. / not today but tomorrow
  6. / into two or more
  7. / Another word for shares
  8. / reregistration company
  9. / taxes
  10. / another word for money
  11. identifying number
  12. / bid price
  13. / shares in a basket
  14. / attorney letter
  15. / trade shares
  16. / to vote
  17. / trading happens
  18. / __exchange

34 Clues: / taxes/ payoutbuy 100_/ buyout/ broker/ to vote/ holdings/ cash or _/ bid price/ 1 ½ by 1 ¾/ paper form/ __exchangestocks traded/ money earned/ trade shares/ money due you/ Intelligent _/ transferrable/ Acquire shares/ attorney letter/ cash or stock _/ trading happens/ into two or more/ assets held hereidentifying number/ expiring contract...

Drew's Crossword puzzle 2023-08-24

Drew's Crossword puzzle crossword puzzle
Across
  1. Attackers who are strongly motivated
  2. collection of harmful computer code
  3. security method of “scrambling” information
  4. Program that stores multiple passcodes
  5. Malware hiding inside another program
  6. A false warning
  7. An individual who launches attacks
  8. Stalking through use of technology.
  9. State of freedom from public
Down
  1. Social manipulation to receive information
  2. process of unlocking encrypted information
  3. Science of healthy computer practices
  4. Inside security threat to companies
  5. Electronic waste from discarded devices
  6. Backup power source
  7. stealing someone’s personal information
  8. Malicious software, like viruses,spyware
  9. malicious computer code that reproduces
  10. A wireless high-speed data network
  11. consistent unwanted emails or messages

20 Clues: A false warningBackup power sourceState of freedom from publicA wireless high-speed data networkAn individual who launches attacksInside security threat to companiescollection of harmful computer codeStalking through use of technology.Attackers who are strongly motivatedScience of healthy computer practicesMalware hiding inside another program...

D2 Me Too! 2020-11-23

D2 Me Too! crossword puzzle
Across
  1. Subtitles
  2. DBX OM's first name
  3. Lion's site
  4. Prevents purchases/sets viewing limits
  5. short-range wireless connection
  6. Sometimes downloaded on Fire sticks
  7. Last name of a D2 TM
  8. Must do for security
  9. System used by D2 team
  10. Amazon's AI
  11. Should not be suppressed in most cases
Down
  1. Pay every month
  2. AMZ Device for reading
  3. This includes talk time, ACW, hold time
  4. Customer's security code
  5. D2 SOM's maiden name
  6. Tool which tells us what to do for Cx
  7. Manually reset the device
  8. D2's major KPI
  9. AMZ preferred customer
  10. Screen-sharing tool
  11. 5-Digit code ending Cx address

22 Clues: SubtitlesLion's siteAmazon's AID2's major KPIPay every monthDBX OM's first nameScreen-sharing toolD2 SOM's maiden nameLast name of a D2 TMMust do for securityAMZ Device for readingAMZ preferred customerSystem used by D2 teamCustomer's security codeManually reset the device5-Digit code ending Cx addressshort-range wireless connection...

Cybersecurity Crossword Puzzle 2023-03-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Prevents unauthorized axes.
  2. Encrypts user data.
  3. Malware disguised as legit files.
  4. Provides services over the internet.
  5. Scrambles data for security.
  6. Dangerous and can bypass security.
  7. A group of applications.
  8. Series of computers and peripherals.
  9. Waves of requests force shutdown.
  10. Malware that collects and transmits.
  11. Changes, corrupts, or destroys information.
Down
  1. Protects data during encryption.
  2. Shields users against viruses.
  3. Hacker changes the IP address.
  4. Malware that hijacks and encrypts.
  5. Network of compromised computers.
  6. Bad, evil software.
  7. Fools victim into giving information.
  8. A series of numbers.
  9. Malware that reproduces and spreads.

20 Clues: Encrypts user data.Bad, evil software.A series of numbers.A group of applications.Prevents unauthorized axes.Scrambles data for security.Shields users against viruses.Hacker changes the IP address.Protects data during encryption.Network of compromised computers.Malware disguised as legit files.Waves of requests force shutdown....

Series 6 Puzzle #1 2022-12-28

Series 6 Puzzle #1 crossword puzzle
Across
  1. Leveraged Purchase of Securities
  2. Entity Offering Securities for Sale
  3. Rights of Accumulation, Abrev
  4. Debt Security
  5. Net Asset Value, Abrev
  6. Amount Added to NAV to Arrive at Offer Price
  7. Individual Retirement Account, Abrev
  8. Owning a Security
  9. Modern Portfolio Theory, Abrev
  10. Not Entitled to Dividends
Down
  1. Easily Convert an Asset Into Cash
  2. Excessive Trading
  3. Financial Industry Regulatory Authority, Abrev
  4. Schedule of Sales Charge Discounts
  5. Letter of Intent, Abrev
  6. Transfer of Funds from One Qualified Retirement Plan to Another
  7. Price at Which Investor Can Buy
  8. Self Regulatory Organization, Abrev
  9. Price at Which Investor Can Sell
  10. Increase in Asset Value

20 Clues: Debt SecurityExcessive TradingOwning a SecurityNet Asset Value, AbrevLetter of Intent, AbrevIncrease in Asset ValueNot Entitled to DividendsRights of Accumulation, AbrevModern Portfolio Theory, AbrevPrice at Which Investor Can BuyLeveraged Purchase of SecuritiesPrice at Which Investor Can SellEasily Convert an Asset Into Cash...

Government Acronyms 2024-10-24

Government Acronyms crossword puzzle
Across
  1. National Institute of Standard and Technology
  2. Department of Justice
  3. Department of Interior
  4. National Oceanic Atmospheric Administration
  5. Housing and Development
  6. Approves food, cosmetics and drugs
  7. Department of Health and Human Services
  8. Securities and Exchange Commission
  9. Social Security Administration
  10. Federal Deposit Insurance Cooperation
  11. Department of Veterans Affairs
  12. Environmental Protection Agency
Down
  1. Department of Transportation
  2. Department of Agriculture
  3. National Institute of Health
  4. Department of Defense
  5. National Aeronautics and Space Administration
  6. Department of Homeland Security
  7. Provides DoD with personnel during national emergency
  8. Federal Communications Commission
  9. Bus, Rails, Mass Transportation
  10. Central Intelligence Agency
  11. Small Business Administration
  12. Health, Education and Welfare

24 Clues: Department of JusticeDepartment of DefenseDepartment of InteriorHousing and DevelopmentDepartment of AgricultureCentral Intelligence AgencyDepartment of TransportationNational Institute of HealthSmall Business AdministrationHealth, Education and WelfareSocial Security AdministrationDepartment of Veterans AffairsDepartment of Homeland Security...

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. use of money to purchase equipment for a new business or an existing business
  2. to overcharge or swindle (a threat to financial security)
  3. an estimate of income for a set period of time (a step that can minimise impacts of events)
  4. Expand your portfolio with different types of shares
  5. personal group with lots of money that are willing to lose it
  6. Real estate that is bought with the aim of earning some kind of financial return
  7. money owing to external sources (e.g a bank)
  8. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  9. illegal business practice (a threat to financial security)
  10. a type of investment that is acceptable to society’s current standards
  11. spending more money than your disposable income allows (a threat to financial security)
  12. a collection of financial investments like stocks and cash etc.
  13. Part ownership of a company
Down
  1. Australian Stock exchange
  2. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  3. a payment made into a fund by an employee towards a future pension
  4. portion of a company's profit paid to common and preferred shareholders
  5. A currency used to invest in stocks, shares as well as goods and services etc.
  6. A practice of funding a project by raising money from a large number of people
  7. the profit you receive on your investment as a percentage of your original investment
  8. Investments that provide regulate profits
  9. Any investment that grows or has potential to grow

22 Clues: Australian Stock exchangePart ownership of a companyInvestments that provide regulate profitsmoney owing to external sources (e.g a bank)Any investment that grows or has potential to growExpand your portfolio with different types of sharesto overcharge or swindle (a threat to financial security)...

Cyber 2024-09-24

Cyber crossword puzzle
Across
  1. Virus that infects
  2. Man's best friend
  3. Likes to chase mice
  4. Flying mammal
Down
  1. Large marsupial
  2. Has a trunk

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendVirus that infectsLikes to chase mice

balduini paolo 2021-11-21

balduini paolo crossword puzzle
Across
  1. indirizzo web o ....
  2. bullismo in rete
  3. netiquette ti insegna il ...... del web
  4. "mi piace navigare sul ....."
  5. sul web ce ne sono tantissimi
Down
  1. non puoi postare tutto ciò che vuoi...
  2. chi fa bullismo in rete
  3. non usarle a caso!
  4. strumento di ricerca più usato al mondo
  5. una lettera scritta dal computer
  6. prima di navigare sul web chiedi il .... ai tuoi genitori
  7. abbreviazione di "applicazione"

12 Clues: bullismo in retenon usarle a caso!indirizzo web o ....chi fa bullismo in rete"mi piace navigare sul ....."sul web ce ne sono tantissimiabbreviazione di "applicazione"una lettera scritta dal computernon puoi postare tutto ciò che vuoi...strumento di ricerca più usato al mondonetiquette ti insegna il ...... del web...

Cyberbullying 2022-09-29

Cyberbullying crossword puzzle
Across
  1. to be protected from risks and danger
  2. a false story about someone else
  3. extremely offensive or insulting
  4. controlled or connected to a computer
  5. computer, information, technology
  6. someone's individual online account
Down
  1. someone who feels hurt and upset
  2. online communication via typing
  3. share videos and photos with friends
  4. a person who purposely intimidates people

10 Clues: online communication via typingsomeone who feels hurt and upseta false story about someone elseextremely offensive or insultingcomputer, information, technologysomeone's individual online accountshare videos and photos with friendsto be protected from risks and dangercontrolled or connected to a computera person who purposely intimidates people

internet saftey 2024-02-27

internet saftey crossword puzzle
Across
  1. steal your personal info
  2. can show you bad stuff
  3. to use there matrial
  4. has a lot of dangerous stuff
Down
  1. bullies are trying to hurt your feelings
  2. email is trying to get you to spread your info
  3. needs to be strong
  4. try to take your money
  5. info needs to be private
  6. are mean people

10 Clues: are mean peopleneeds to be strongto use there matrialtry to take your moneycan show you bad stuffsteal your personal infoinfo needs to be privatehas a lot of dangerous stuffbullies are trying to hurt your feelingsemail is trying to get you to spread your info

Stop Bullying 2024-09-13

Stop Bullying crossword puzzle
Across
  1. penyebab anak melakukan bullying
  2. Karakteristik perilaku pelaku bullying
  3. mengintimidasi, mengucilkan, mengabaikan
  4. memaki, memfitnah, mengejek, mengancam
Down
  1. Perilaku agresif dan negatip seseorang atau sekelompok orang secara berulang kali
  2. Dampak korban bullying
  3. cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang
  4. Ketika melihat kejadian bullying di sekolah
  5. memukul, menampar, memalak, mendorong
  6. Upaya mencegah bullying

10 Clues: Dampak korban bullyingUpaya mencegah bullyingpenyebab anak melakukan bullyingmemukul, menampar, memalak, mendorongKarakteristik perilaku pelaku bullyingmemaki, memfitnah, mengejek, mengancammengintimidasi, mengucilkan, mengabaikanKetika melihat kejadian bullying di sekolahcyber bullying yang mengirimkan kata-kata kasar mengenai seseorang...

Pass the B___ 2021-02-18

Pass the B___ crossword puzzle
Across
  1. hail the computer
  2. generic doesn't mean boring
  3. it's not Korea, China, or Japan
  4. the other one
Down
  1. I am the walrus
  2. this supernatural rpg is a ball
  3. where the cyber-pope lives
  4. jyhad no more

8 Clues: jyhad no morethe other oneI am the walrushail the computerwhere the cyber-pope livesgeneric doesn't mean boringthis supernatural rpg is a ballit's not Korea, China, or Japan

teka teki silang keamanan jaringan 2025-11-29

teka teki silang keamanan jaringan crossword puzzle
Across
  1. Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
  2. Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
  3. SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
  4. Metode keamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
  5. SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
  6. Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
  7. DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
  8. Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
  9. Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
  10. Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
Down
  1. Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.
  2. Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
  3. Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
  4. Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
  5. MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
  6. SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
  7. Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
  8. (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
  9. Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
  10. SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
  11. IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.

21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah.SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.Memastikan hanya pengguna yang berwenang yang dapat mengakses data.MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak....

Compliance Champions League 2023 - Crossword 2023-11-22

Compliance Champions League 2023 - Crossword crossword puzzle
Across
  1. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance
  2. The _____ feature enables SAP to secure the usage of any application specific function
  3. What should be the status of a product security incident if you get a CVSS score of 0.0
  4. _______ field ensures that the action plan step documented will be visible to the custome
  5. Software with rating ___________ at SAP should not be installed:
  6. Which tool is used to access cloud systems?
  7. Who approves the cloud corrections
  8. Which Board area does AIS belong to?
  9. _______ tools targets at providing missing functionality and enhancements to Agent Workspace
  10. _______ notes must be entered to put the case to status Resolved
  11. SLA that guarantees the continuous communication with SAP S/4Hana Customers
  12. What is the frequency of Hot-Fix deployment
Down
  1. Who deploys cloud correction to customer systems
  2. Attachments are made visible externally by setting the _ flag
  3. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com
  4. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security inciden
  5. What should be the final status of a Security Incident
  6. _____________ team is responsible for the hotfix and its processes involved until the deployment to the customer system.
  7. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP
  8. S4hana cloud systems upgrade happens every __________ month/months

20 Clues: Who approves the cloud correctionsWhich Board area does AIS belong to?Which tool is used to access cloud systems?What is the frequency of Hot-Fix deploymentWho deploys cloud correction to customer systemsWhat should be the final status of a Security IncidentAttachments are made visible externally by setting the _ flag...

Electronic Payment Systems and Security 2023-03-29

Electronic Payment Systems and Security crossword puzzle
Across
  1. Adherence to security standards to protect against fraud
  2. Verification of user or system identity
  3. Process of granting access to a system or resource
  4. Electronic devices worn on the body that collect and transmit data
  5. Payment authentication method that uses physical characteristics such as fingerprints or facial recognition
  6. Digital currency that uses encryption techniques for secure transactions
  7. Software that damages or disrupts computer systems
  8. Payment method that allows customers to complete transactions by tapping or waving their card or mobile device
  9. Use of physical or behavioral characteristics for authentication
  10. Payment system that operates on a peer-to-peer network without a central authority or intermediary
  11. Type of artificial intelligence that allows devices to learn and improve without explicit programming
  12. Ability of devices to connect and communicate with other devices or networks
  13. Network security system that controls access
  14. Payment method that allows customers to complete transactions using their smartphone or other mobile device
Down
  1. Residence equipped with Internet of Things devices that can be controlled remotely
  2. Cryptographic method of verifying document authenticity
  3. Data security technique that replaces sensitive data with unique identification symbols
  4. Security process that requires two methods of authentication
  5. Deliberate deception for unlawful gain
  6. Dispute resolution process where a customer can reverse a transaction
  7. Use of algorithms to identify and prevent fraudulent activity
  8. The process of verifying and adding transactions to a blockchain by solving complex mathematical equations
  9. Service that authorizes and processes electronic payments
  10. Process of encoding data for secure transmission
  11. Devices that detect and respond to changes in the physical environment

25 Clues: Deliberate deception for unlawful gainVerification of user or system identityNetwork security system that controls accessProcess of encoding data for secure transmissionProcess of granting access to a system or resourceSoftware that damages or disrupts computer systemsCryptographic method of verifying document authenticity...

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. (eng.)za elektroničko nasilje
  2. kod koji netko koristi za privatnost
  3. na njima se treba biti oprezan
  4. komuniciranje s drugima preko interneta
  5. namjenjeno za povećanje znajna onome kome je namijenjeno
  6. nasilje preko elektronike
  7. tragovi tragovi koje ne namjerno stavljamo na internet
Down
  1. ogromno i opasno mijesto
  2. neispravna informacija
  3. naša sigurnost na svakoj stranici
  4. (eng.) za kolačići
  5. tragovi tragovi koje namjerno stavljamo na internet
  6. tragovi koje ostavljaš na internetu
  7. neželjna pošta

14 Clues: neželjna pošta(eng.) za kolačićineispravna informacijaogromno i opasno mijestonasilje preko elektronike(eng.)za elektroničko nasiljena njima se treba biti oprezannaša sigurnost na svakoj stranicitragovi koje ostavljaš na internetukod koji netko koristi za privatnostkomuniciranje s drugima preko interneta...

Bullying 2023-02-14

Bullying crossword puzzle
Across
  1. You're a loser no one likes you
  2. causing harm or injury to another
  3. posting or sending mean info
  4. The NH state ______ is for people under 18
  5. you shouldn't share ________ info online
  6. leaving someone out to humiliate them
  7. to spread embarrassing information about someone
Down
  1. what you should do if you see bullying happening
  2. Watches ignores or laughs
  3. Bullying creates an imbalance of power
  4. The person making someone feel unsafe
  5. making someone feel alone
  6. feels unsafe or is harmed
  7. someone who helps

14 Clues: someone who helpsWatches ignores or laughsmaking someone feel alonefeels unsafe or is harmedposting or sending mean infoYou're a loser no one likes youcausing harm or injury to anotherThe person making someone feel unsafeleaving someone out to humiliate themBullying creates an imbalance of poweryou shouldn't share ________ info online...

Fall 2024-09-21

Fall crossword puzzle
Across
  1. Disney's movie of celebration
  2. Be cautious with sharp edges and candles around them
  3. Day before Saints day
  4. Popular name for autumn celebrations
  5. Children dread going back
  6. Fattest day of the year
Down
  1. A staple poultry in November
  2. The most and best sign in the world
  3. 2 week celebration in Germany
  4. Important to do this before winter.
  5. Length in months
  6. Black Friday and Cyber Monday are ...... days???
  7. Bill signed June of 1984
  8. Most know for during this time

14 Clues: Length in monthsDay before Saints dayFattest day of the yearBill signed June of 1984Children dread going backA staple poultry in NovemberDisney's movie of celebration2 week celebration in GermanyMost know for during this timeThe most and best sign in the worldImportant to do this before winter.Popular name for autumn celebrations...

Online bullying 2024-06-11

Online bullying crossword puzzle
Across
  1. online platform
  2. when someone is picking on you constantly
  3. going to the police to fill in a
  4. someone to talk to at school
Down
  1. connected to a group of things
  2. someone you can seek out
  3. protecting yourself online
  4. another name for the internet
  5. a platform used with internet
  6. to stop people contacting you
  7. someone to talk to at home

11 Clues: online platformsomeone you can seek outprotecting yourself onlinesomeone to talk to at homesomeone to talk to at schoolanother name for the interneta platform used with internetto stop people contacting youconnected to a group of thingsgoing to the police to fill in awhen someone is picking on you constantly

balduini paolo 2021-11-21

balduini paolo crossword puzzle
Across
  1. indirizzo web o ....
  2. bullismo in rete
  3. netiquette ti insegna il ...... del web
  4. "mi piace navigare sul ....."
  5. sul web ce ne sono tantissimi
Down
  1. non puoi postare tutto ciò che vuoi...
  2. chi fa bullismo in rete
  3. non usarle a caso!
  4. strumento di ricerca più usato al mondo
  5. una lettera scritta dal computer
  6. prima di navigare sul web chiedi il .... ai tuoi genitori
  7. abbreviazione di "applicazione"

12 Clues: bullismo in retenon usarle a caso!indirizzo web o ....chi fa bullismo in rete"mi piace navigare sul ....."sul web ce ne sono tantissimiabbreviazione di "applicazione"una lettera scritta dal computernon puoi postare tutto ciò che vuoi...strumento di ricerca più usato al mondonetiquette ti insegna il ...... del web...

Mental Health 2022-10-11

Mental Health crossword puzzle
Across
  1. physical activity releases
  2. action or event that causes stress
  3. what does the T stand for in SMART
  4. when a person uses mindfulness to relax
  5. mental blank that is diagnosed
  6. progressive blank relaxation
Down
  1. meditation helps improve blank
  2. bullying when someone attacks your feelings
  3. what does the S stand for in SMART
  4. sadness is a
  5. when someone uses social media to bully
  6. someone who watches someone get bullied

12 Clues: sadness is aphysical activity releasesprogressive blank relaxationmeditation helps improve blankmental blank that is diagnosedaction or event that causes stresswhat does the S stand for in SMARTwhat does the T stand for in SMARTwhen someone uses social media to bullywhen a person uses mindfulness to relaxsomeone who watches someone get bullied...

La Citoyenneté Numérique 2024-11-22

La Citoyenneté Numérique crossword puzzle
Across
  1. resource
  2. an app
  3. unlimited
  4. Behavior
  5. to have access to
  6. To use
  7. to light up
  8. data
  9. To communicate
  10. To become
  11. to move a file
  12. Addicted
  13. To prevent
  14. risk, danger
  15. To report
  16. Addicted
  17. To behave
  18. smartphone
  19. Negative comment
  20. to post
  21. Private
  22. digital identity
  23. With difficulty
  24. to stay up to date/informed of
  25. Social media/networks
  26. search engine
  27. Targeted by
  28. Respectful
  29. Private life
  30. to save a file
  31. text message
  32. plan
  33. To permit/allow
  34. Cyber-bullying
  35. To forbid/prohibit
  36. To stream and watch a movie
Down
  1. connected, trendy, plugged-in
  2. Prudent/careful
  3. password
  4. To send
  5. home page
  6. To secure/protect oneś profile
  7. computer
  8. to download
  9. to broadcast, distribute
  10. To receive
  11. digital footprint
  12. user
  13. An account
  14. To remove
  15. Threat
  16. Easily
  17. to interact
  18. To protect oneself
  19. To choose to
  20. To belong to/be part of
  21. To have the right to
  22. Punished
  23. To learn
  24. network
  25. Plagiarism
  26. Hyperconected
  27. La
  28. File
  29. Cyber-dependent
  30. screen
  31. internet user
  32. Victim
  33. To protect
  34. world

70 Clues: LauserdataFileplanworldan appTo useThreatEasilyscreenVictimTo sendto postPrivatenetworkresourcepasswordBehaviorcomputerAddictedAddictedPunishedTo learnhome pageunlimitedTo becomeTo removeTo reportTo behaveTo receiveAn accountTo preventsmartphonePlagiarismRespectfulTo protectto downloadto light upto interactTargeted byrisk, dangerTo choose to...

Digital Technology Cross Word 2021-07-23

Digital Technology Cross Word crossword puzzle
Across
  1. Online Theft
  2. A Portible Computer
  3. A Online Map
Down
  1. Two things join or ______
  2. A connection between devices
  3. Another word for smartphone
  4. A Large Technology Company

7 Clues: Online TheftA Online MapA Portible ComputerTwo things join or ______A Large Technology CompanyAnother word for smartphoneA connection between devices

Digital Citizenship crossword 2021-02-25

Digital Citizenship crossword crossword puzzle
Across
  1. Being polite online
  2. When you're tricked by a rando online
  3. A combination of #s letters and symbols
  4. A member of the online world
  5. a victim of Cyber bullying
  6. (bing, google, yahoo)
Down
  1. being mean online
  2. where you can search things up
  3. what you leave online
  4. Sending letters through a computer
  5. When someone steals your info online
  6. getting angry online and posting about it

12 Clues: being mean onlineBeing polite onlinewhat you leave online(bing, google, yahoo)a victim of Cyber bullyingA member of the online worldwhere you can search things upSending letters through a computerWhen someone steals your info onlineWhen you're tricked by a rando onlineA combination of #s letters and symbolsgetting angry online and posting about it

La Cyber-Société 2023-01-08

La Cyber-Société crossword puzzle
Across
  1. mobile Commerce électronique, acheter et vendre des produits ou services en ligne
  2. Ordinateurs, téléphones portables et tablettes
  3. Dangers
  4. Concept faisant référence à l'influence croissante de la technologie et de l'Internet sur notre vie quotidienne
  5. Cours en ligne
Down
  1. Harcèlement en ligne
  2. Criminalité informatique
  3. S'exprimer par écrit ou à haute voix
  4. Acheter des produits en ligne
  5. Travail en équipe en ligne
  6. Faits ou informations
  7. Commerce en ligne

12 Clues: DangersCours en ligneCommerce en ligneHarcèlement en ligneFaits ou informationsCriminalité informatiqueTravail en équipe en ligneAcheter des produits en ligneS'exprimer par écrit ou à haute voixOrdinateurs, téléphones portables et tablettesmobile Commerce électronique, acheter et vendre des produits ou services en ligne...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

November Crossword 2025-10-30

November Crossword crossword puzzle
Across
  1. Annual shopping frenzy, with 5-Down
  2. “Fall back” phenomenon, with 17-Across
  3. Day of the Dead altar
  4. Boat, to Pilgrims
  5. Seasonal crop roundup
  6. Popular flavor, for pie or cider
  7. Livestock lunch?
  8. “Fall back” phenomenon, with 4-Across
  9. Canned sauce flavor
  10. Mythical symbol of abundance
  11. Turkey substitute
  12. Thanksgiving spread
Down
  1. Lucky break?
  2. Touchdown territory
  3. ___ Moon: November supermoon
  4. Annual shopping frenzy, with 3-Across
  5. Soft potato preparation
  6. Backyard broom?
  7. Eaten on the cob
  8. Objects of gratitude
  9. Celebrated patriots
  10. Post-turkey sweet treat
  11. Cozy feeling, to the Danish
  12. Boat, to gravy
  13. Crispy potato preparation
  14. Day of online purchases, with “Cyber”

26 Clues: Lucky break?Boat, to gravyBackyard broom?Eaten on the cobLivestock lunch?Boat, to PilgrimsTurkey substituteTouchdown territoryCelebrated patriotsCanned sauce flavorThanksgiving spreadObjects of gratitudeDay of the Dead altarSeasonal crop roundupSoft potato preparationPost-turkey sweet treatCrispy potato preparationCozy feeling, to the Danish...

RAA NRTW Crossword 2025-10-30

RAA NRTW Crossword crossword puzzle
Across
  1. helping bones tell their story, one snapshot at a time
  2. the wizard protectors of cyber trolls
  3. people whisper
  4. compliance guardian
  5. first impression for patients, front lines
  6. patient wrangler
  7. facility maestro
  8. keeper of secrets
  9. body scanner extraordinaire
  10. master of forms , check in and friendly faces
Down
  1. masters of decoding
  2. master of sound waves
  3. multitasker and keeper of radiologist schedules
  4. the breast friend
  5. budget boss
  6. image detective
  7. our right hand for everything
  8. bone density detective
  9. invoice avengers
  10. plays with magnets
  11. support ninja 24hrs a day
  12. delivery prodigy
  13. chaos tamer in chief
  14. promotes our company
  15. magicians who start our patient care, one call at a time

25 Clues: budget bosspeople whisperimage detectivepatient wranglerinvoice avengersfacility maestrodelivery prodigythe breast friendkeeper of secretsplays with magnetsmasters of decodingcompliance guardianchaos tamer in chiefpromotes our companymaster of sound wavesbone density detectivesupport ninja 24hrs a daybody scanner extraordinaire...

Princess and the pop star 2020-12-04

Princess and the pop star crossword puzzle
Across
  1. Pop star' surname
  2. security guard #2
  3. What they made on the farm
  4. who Princess sang to each morning
  5. where Princess got the milk from
  6. Pop star's first name
  7. little brother
Down
  1. what is so special
  2. Dad's invention
  3. Surname of the family
  4. Name of girl on the farm
  5. where Princess was singing
  6. security guard #1
  7. Where the family went to find Princess
  8. God has one for us

15 Clues: little brotherDad's inventionPop star' surnamesecurity guard #2security guard #1what is so specialGod has one for usSurname of the familyPop star's first nameName of girl on the farmwhere Princess was singingWhat they made on the farmwhere Princess got the milk fromwho Princess sang to each morningWhere the family went to find Princess

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

klausimai 2023-05-17

klausimai crossword puzzle
Across
  1. Kas yra „object-oriented programming“?
  2. Kas yra žurnalavimas?
  3. Kas yra „data cente?
  4. Kas yra „software development life cycle“?
  5. Kas yra „operating system“?
  6. Kas yra „network protocol“?
  7. Kas yra „serveris“?
  8. Kas yra „cloud computing“?
  9. Kas yra „version control“?
  10. Kas yra „URL“?
  11. Kas yra „cybersecurity“?
  12. Kas yra „cache“?
  13. Kas yra „cyber attack“?
  14. Kas yra „bug“
  15. Kas yra „router“?
  16. Kas yra „firewall“?
Down
  1. Kas yra „artificial intelligence“?
  2. Kas yra „RAM“?
  3. Kas yra „encryption“?
  4. Kas yra „HTML“?
  5. Kas yra „API“?
  6. Kas yra „data backup“?
  7. Kas yra „malware“?
  8. Kas yra „database management system“?
  9. Kas yra algoritmas
  10. Kas yra duomenų bazė?
  11. Kas yra „programming language“?
  12. Kas yra „data mining“?
  13. Kas yra „open source“?
  14. Kas yra „user interface“?

30 Clues: Kas yra „bug“Kas yra „RAM“?Kas yra „API“?Kas yra „URL“?Kas yra „HTML“?Kas yra „cache“?Kas yra „router“?Kas yra „malware“?Kas yra algoritmasKas yra „serveris“?Kas yra „firewall“?Kas yra „data cente?Kas yra „encryption“?Kas yra žurnalavimas?Kas yra duomenų bazė?Kas yra „data backup“?Kas yra „data mining“?Kas yra „open source“?Kas yra „cyber attack“?...

Teka-Teki Silang kata serapan dan konjungsi 2025-09-15

Teka-Teki Silang kata serapan dan konjungsi crossword puzzle
Across
  1. kata siber diserap dari kata
  2. luring contoh kata serapan
  3. Sarah suka baca buku.baca merupakan jenis kata serapan
  4. seperti dan seolah-olah termasuk subordinatif
  5. kata "atau"merupakan konjungsi
  6. kata "terakhir "merupakan konjungsi
  7. biarpun dan meskipun termasuk subordinatif
  8. kata "sebelumnya" merupakan konjungsi
  9. konjungsi merupakan kata...dalam suatu kalimat
  10. kata angka diserap dari bahasa
Down
  1. kata"tetapi, melainkan"merupakan kata hubung
  2. peramban merupakan serapan dari kata
  3. kata yang digunakan untuk menghilangkan frasa/klausa disebut konjungsi
  4. memperkaya kosakata merupakan fungsi dari
  5. dosen berasal dari bahasa Belanda yaitu
  6. salah satu dari klausa itu adalah anak
  7. bola berasal dari bahasa
  8. bisnis berasal dari bahasa
  9. kata "guna" merupakan konjungsi
  10. rekening adalah contoh kata serapan

20 Clues: bola berasal dari bahasaluring contoh kata serapanbisnis berasal dari bahasakata siber diserap dari katakata "atau"merupakan konjungsikata angka diserap dari bahasakata "guna" merupakan konjungsikata "terakhir "merupakan konjungsirekening adalah contoh kata serapanperamban merupakan serapan dari katakata "sebelumnya" merupakan konjungsi...

Computer management - safe-guardung our data 2016-04-14

Computer management - safe-guardung our data crossword puzzle
Across
  1. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  2. 9. An error is also known as a …
  3. Array of Inexpensive 1. What does RAID stand for ?
  4. 1. A water related natural disaster
  5. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  6. verification 8. Checking for the accuracy of data from a human perspective
  7. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  8. Power Supply 10. What does “UPS” stand for ?
  9. 5. What is the term for ‘fishing for Information’
  10. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
Down
  1. 5. ‘Garbage In, Garbage Out’
  2. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  3. 7. Volatile memory
  4. 6. The first line of defence is
  5. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  6. 3. A form of malware disguised as a useful program
  7. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  8. problems 8. Power outages or power dips are also known as…
  9. User Interface 2. What does GUI stand for?
  10. issues 2. A category of threats to data beginning with H

20 Clues: 7. Volatile memory5. ‘Garbage In, Garbage Out’6. The first line of defence is9. An error is also known as a …1. A water related natural disasterUser Interface 2. What does GUI stand for?Power Supply 10. What does “UPS” stand for ?5. What is the term for ‘fishing for Information’Array of Inexpensive 1. What does RAID stand for ?...

Computer management - safe-guardung our data 2016-04-14

Computer management - safe-guardung our data crossword puzzle
Across
  1. 9. An error is also known as a …
  2. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  3. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  4. issues 2. A category of threats to data beginning with H
  5. Power Supply 10. What does “UPS” stand for ?
  6. 6. The first line of defence is
  7. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  8. 5. What is the term for ‘fishing for Information’
  9. 1. A water related natural disaster
  10. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
  11. 7. Volatile memory
Down
  1. 3. A form of malware disguised as a useful program
  2. 5. ‘Garbage In, Garbage Out’
  3. User Interface 2. What does GUI stand for?
  4. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  5. Array of Inexpensive 1. What does RAID stand for ?
  6. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  7. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  8. problems 8. Power outages or power dips are also known as…
  9. verification 8. Checking for the accuracy of data from a human perspective

20 Clues: 7. Volatile memory5. ‘Garbage In, Garbage Out’6. The first line of defence is9. An error is also known as a …1. A water related natural disasterUser Interface 2. What does GUI stand for?Power Supply 10. What does “UPS” stand for ?5. What is the term for ‘fishing for Information’3. A form of malware disguised as a useful program...

Chapter 6 Advance Cyber 2025-11-16

Chapter 6 Advance Cyber crossword puzzle
Across
  1. Unpatched or outdated applications that create security holes.
  2. An attack that compromises a website known to be frequented by a specific target group.
  3. False information spread intentionally to deceive.
  4. The social engineering tactic of creating a fabricated scenario to obtain information.
  5. A network connected using physical cables, like Ethernet.
  6. A threat delivered via an attachment, like a malicious PDF or DOC file.
  7. Phishing conducted via SMS text message.
  8. A potential physical threat vector, like a USB drive.
  9. False information that is spread, regardless of the intent to deceive.
  10. Registering a domain name very similar to a popular one, relying on user mistypes.
  11. End-of-life (EOL) software that no longer receives security patches. (2 Words)
  12. A network that uses radio waves, like Wi-Fi.
  13. A short-range wireless protocol used for PANs (Personal Area Networks).
Down
  1. A type of spam that embeds its message in a picture to evade text filters.
  2. Network ports left accessible and running services, creating potential entry points.
  3. Security software installed directly on an endpoint, like a laptop or PC.
  4. An attack that mimics the look and feel of a legitimate company's logo, website, or email.
  5. Security scanning performed remotely, without installing software on the target device.
  6. A social engineering attack using email to trick a user into revealing credentials.
  7. Phishing conducted over a voice call.
  8. Unsolicited and unwanted bulk email.
  9. The technical name for text messaging (Abbr: SMS).
  10. An attack that targets a trusted third-party vendor to compromise the final target.
  11. The medium used for a 'vishing' attack.

24 Clues: Unsolicited and unwanted bulk email.Phishing conducted over a voice call.The medium used for a 'vishing' attack.Phishing conducted via SMS text message.A network that uses radio waves, like Wi-Fi.False information spread intentionally to deceive.The technical name for text messaging (Abbr: SMS).A potential physical threat vector, like a USB drive....

Security CW 2023-04-24

Security CW crossword puzzle
Across
  1. A type of security testing that simulates an attacker with knowledge of the system ( ____ testing)
  2. A security principle that means users should have access only to the resources they need (least ____)
  3. A type of vulnerability that allows attackers to execute code remotely (remote code ____)
Down
  1. A type of security control that can help prevent cross-site scripting attacks (input ____)
  2. A type of security control that can help prevent buffer overflow attacks (stack ____)
  3. A type of security control that can help prevent cross-site request forgery attacks (____ token)
  4. A type of vulnerability that can allow attackers to access sensitive information (____ injection)
  5. A common technique used to prevent SQL injection attacks (____ parameters)
  6. A type of security testing that tries to break an application by feeding unexpected input (_____testing)

9 Clues: A common technique used to prevent SQL injection attacks (____ parameters)A type of security control that can help prevent buffer overflow attacks (stack ____)A type of vulnerability that allows attackers to execute code remotely (remote code ____)A type of security control that can help prevent cross-site scripting attacks (input ____)...

LEGAL 2024-11-13

LEGAL crossword puzzle
Across
  1. refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
  2. Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
  3. These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
  4. is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
  1. refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
  2. is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
  3. theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
  4. refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization

8 Clues: theft refers to obtaining or possessing another’s identity and information to commit a legal offense.refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization...

The eye of minds cross word 2024-05-10

The eye of minds cross word crossword puzzle
Across
  1. Michaels friend know for her coding
  2. how they access the vetnet
  3. the name of the game
  4. the main character
  5. Michaels best friends also known as the best gamer
Down
  1. the main way Micheal gets information
  2. the agency trying to stop kaine
  3. the network of the game
  4. when your in the game
  5. the name of the virus
  6. what protects the coding
  7. the cyber-terrarist in the game

12 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamewhat protects the codinghow they access the vetnetthe agency trying to stop kainethe cyber-terrarist in the gameMichaels friend know for her codingthe main way Micheal gets informationMichaels best friends also known as the best gamer

11.2 Cabinet Departments and Independent Agencies 2021-04-22

11.2 Cabinet Departments and Independent Agencies crossword puzzle
Across
  1. counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
  2. providing the military forces needed to deter war and protect the security of our country.
  3. the health of all Americans and providing essential human services.
  4. enforcing the laws of the United States federal government
  5. representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
  6. manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
  7. national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
  8. manage the liquidity of a business.
Down
  1. planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
  2. integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
  3. oversees the American farming industry
  4. the management and distribution of the federal budget for education initiatives.
  5. what is the title of the head of the executive branch departments?
  6. laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.

14 Clues: manage the liquidity of a business.oversees the American farming industryenforcing the laws of the United States federal governmentwhat is the title of the head of the executive branch departments?the health of all Americans and providing essential human services.the management and distribution of the federal budget for education initiatives....

Private Security Chapter 1-3 Terminology 2019-09-27

Private Security Chapter 1-3 Terminology crossword puzzle
Across
  1. the first regular police force in London
  2. a call to citizens to assist in an emergency situation
  3. Scanning Analysis Response Assess
  4. any action taken to reduce crime risks and build individual and community safety
  5. official data on crime that are reported to law enforcement agencies across the United States
  6. Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
Down
  1. a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
  2. the aim of punishment is to prevent or deter persons from engaging in future crime
  3. when security officers respond for security purposes after a crime has been attempted or committed
  4. when security organizations police the community all work together to solve crime
  5. the eight major crimes included in Part 1 of the Uniform Crime Report
  6. when security organizations work to prevent crime

12 Clues: Scanning Analysis Response Assessthe first regular police force in Londonwhen security organizations work to prevent crimea call to citizens to assist in an emergency situationthe eight major crimes included in Part 1 of the Uniform Crime ReportConducted by the Bureau of Justice Statistics and the U.S. Census Bureau...

Cyber safety-Hugh barry 2016-05-31

Cyber safety-Hugh barry crossword puzzle
Across
  1. social media
  2. a persons details
  3. ups don't click on them because bad things will happen
  4. they block viruses
  5. bullying someone who bullies online
  6. someone sends you a discusting picture
  7. ask to do it
  8. internet
  9. a website comes out and persuades you
  10. don't tell anyone
  11. so I can tell what's appropriate
  12. one per class
  13. a thing that hacks electronic devices
Down
  1. controls so I can't see inappropriate websites
  2. someone who makes up a name to be someone else
  3. don't let enyone see
  4. one per school
  5. a way to communicate with some else
  6. don't let people go on it
  7. someone who looks after you

20 Clues: internetsocial mediaask to do itone per classone per schoola persons detailsdon't tell anyonethey block virusesdon't let enyone seedon't let people go on itsomeone who looks after youso I can tell what's appropriatebullying someone who bullies onlinea way to communicate with some elsea website comes out and persuades you...

Perth Forensic Crossword 2023-10-20

Perth Forensic Crossword crossword puzzle
Across
  1. Strong moral principles
  2. Meet the team, clue: Russell
  3. Meeting to discussion allegations
  4. Meet the team, clue: East USA
  5. Digital forensics
  6. Meet the team, clue: South-east USA
  7. May provide information
  8. Process of improving a situation
  9. Meet the team, clue: Eddard
  10. Used to make findings
  11. Meet the team, clue: Sansa
  12. Subject of investigations
Down
  1. Personal relationship that can affect work
  2. Deception for gain
  3. Preliminary assessment
  4. Examination of allegations
  5. Financial crime
  6. Collection of information
  7. A party with an interest
  8. Dishonest conduct
  9. Meet the team, clue: The Great
  10. Provides a service
  11. Acronym for a type of investigation against a person
  12. Vetting a client carefully

24 Clues: Financial crimeDigital forensicsDishonest conductDeception for gainProvides a serviceUsed to make findingsPreliminary assessmentStrong moral principlesMay provide informationA party with an interestCollection of informationSubject of investigationsExamination of allegationsMeet the team, clue: SansaVetting a client carefully...

enkkuristikko 2016-02-23

enkkuristikko crossword puzzle
Across
  1. hierarkia
  2. luova
  3. joustava
  4. vastuullisuus
  5. yritys
  6. motivaatio
  7. työnjohto
  8. resurssit
  9. turvallisuus
Down
  1. sopeutuva
  2. ansioluettelo
  3. kilpailuhenkinen
  4. työnjohtaja
  5. aikaraja
  6. neuvottelu
  7. tiedottaja
  8. työ
  9. ongelma
  10. työntekijä
  11. kunnianhimoinen

20 Clues: työluovayritysongelmaaikarajajoustavahierarkiasopeutuvatyönjohtoresurssitneuvottelutiedottajamotivaatiotyöntekijätyönjohtajaturvallisuusansioluettelovastuullisuuskunnianhimoinenkilpailuhenkinen

computer engineer vocab(both verbs and nouns) 2023-02-09

computer engineer vocab(both verbs and nouns) crossword puzzle
Across
  1. lograr
  2. cybernetic
  3. Moniter
  4. protect
  5. investigacion
  6. computer
  7. pensar
  8. teclado
  9. silla
  10. adaptar
  11. online
Down
  1. aprender
  2. resolver
  3. electritcity
  4. work
  5. Specialist
  6. codigo
  7. Security
  8. mirar
  9. tipo

20 Clues: worktipomirarsillalograrcodigopensaronlineMoniterprotecttecladoadaptaraprenderresolverSecuritycomputercyberneticSpecialistelectritcityinvestigacion

June 2022 Crossword 2022-05-26

June 2022 Crossword crossword puzzle
Across
  1. the Lord
  2. future
  3. him
  4. path
  5. through
  6. fiction
  7. wilderness
  8. test
Down
  1. she
  2. hope
  3. Your
  4. man
  5. blessed
  6. hope
  7. show
  8. bodily
  9. works
  10. comfort
  11. work
  12. redirect
  13. hears
  14. take

22 Clues: shemanhimhopeYourhopeshowpathworktaketestworkshearsbodilyfutureblessedthroughcomfortfictionthe Lordredirectwilderness

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. passport
  2. vacation
  3. luggage
  4. ticket
  5. airport
  6. to travel
  7. customs
  8. confirm
  9. train
Down
  1. call
  2. suitcase
  3. security
  4. buy
  5. flight
  6. arrive
  7. station
  8. board
  9. passenger
  10. reclaim
  11. screen

20 Clues: buycallboardtrainflightarriveticketscreenluggagestationairportreclaimcustomsconfirmsuitcasesecuritypassportvacationto travelpassenger

el aeropuerto 2022-10-13

el aeropuerto crossword puzzle
Across
  1. passenger
  2. identification
  3. departure
  4. aboard
  5. passport
  6. airport
  7. gate
  8. taxi
  9. flight
  10. vacation
  11. security
Down
  1. suitcase
  2. check
  3. itinerary
  4. customs
  5. ticket
  6. screen
  7. arrival
  8. luggage
  9. airplane

20 Clues: gatetaxicheckticketscreenaboardflightcustomsarrivalairportluggagesuitcasepassportvacationairplanesecuritypassengeritinerarydepartureidentification

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente 2023-10-19

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente crossword puzzle
Across
  1. Universidade
  2. Tiro
  3. Exaustivo
  4. Técnico
  5. Academia
  6. Família
  7. Revolucionando
  8. Diferente
  9. Atraído
Down
  1. Apresentando
  2. Expansão
  3. Segurança
  4. Educação
  5. Organizado
  6. Crianças
  7. Completamente
  8. Chuveiro
  9. Recrutamento
  10. Dois
  11. honesto

20 Clues: TiroDoisTécnicoFamíliahonestoAtraídoExpansãoEducaçãoCriançasChuveiroAcademiaSegurançaExaustivoDiferenteOrganizadoUniversidadeApresentandoRecrutamentoCompletamenteRevolucionando

dgeconomy 2025-03-12

dgeconomy crossword puzzle
Across
  1. Fifth-generation wireless technology
  2. Protection of digital systems from cyber threats
  3. Large and complex data sets
  4. A newly established business
  5. Secure and decentralized digital ledger
  6. Immersive virtual reality technology
  7. Use of technology to perform tasks with minimal human intervention
  8. Technology overlaying digital images onto the real world
Down
  1. Electronic system for storing and making transactions
  2. Internet-based computing services
  3. Digital or virtual currency
  4. Technology-driven financial services
  5. Online buying and selling of goods and services
  6. Network of connected smart devices
  7. Machines performing human-like intelligence tasks

15 Clues: Digital or virtual currencyLarge and complex data setsA newly established businessInternet-based computing servicesNetwork of connected smart devicesFifth-generation wireless technologyTechnology-driven financial servicesImmersive virtual reality technologySecure and decentralized digital ledgerOnline buying and selling of goods and services...

Misc 2024-07-29

Misc crossword puzzle
Across
  1. A KNOWN C2 AND Adversary Simulations and Red Team Operations
  2. HACKER WHO DIED THIS YEAR
  3. A THREAT ACTOR WHICH WAS INVOLVED IN BANGLADESH BANK HEIST
  4. CONFERENCE DEDICATED FOR MACOS SECURITY
  5. created by the Spanish security company Hispasec Sistemas
  6. RECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TO
Down
  1. standard for sending and receiving notification messages
  2. first modern and online darknet market
  3. Launched in 1989 as a cooperative for information security thought leadership,
  4. Who shifted to a new threat actor naming taxonomy?
  5. A standard programming language used, supported, and promoted by Apple
  6. A subsystem to be termination next year
  7. Largest acquisition of Salesforce till date

13 Clues: HACKER WHO DIED THIS YEARfirst modern and online darknet marketCONFERENCE DEDICATED FOR MACOS SECURITYA subsystem to be termination next yearLargest acquisition of Salesforce till dateRECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TOWho shifted to a new threat actor naming taxonomy?standard for sending and receiving notification messages...

System Hardening Quiz 1 2023-08-23

System Hardening Quiz 1 crossword puzzle
Across
  1. Prove an identity through login
  2. Security ____ uses predefined set of security settings to configure security settings of a computer
  3. Data is accessible only to authorized users
  4. Type _____ Multifactor Authentication is based on something you know
  5. Type _____ Multifactor Authentication is based on something you have
  6. Data can only be created and modified by authorized users
Down
  1. Grant access to resources based on user
  2. Type _____ Multifactor Authentication is based on something you are
  3. Data is available and accessible when required
  4. This encryption uses the same key to encrypt and decrypt
  5. Control which application can be executed
  6. Tracks and audit access and capabilities
  7. Data can only be created and modified by authorized users
  8. Filter contents of packets and traffic

14 Clues: Prove an identity through loginFilter contents of packets and trafficGrant access to resources based on userTracks and audit access and capabilitiesControl which application can be executedData is accessible only to authorized usersData is available and accessible when requiredThis encryption uses the same key to encrypt and decrypt...

Choice Board Crossword Puzzle 2021-03-05

Choice Board Crossword Puzzle crossword puzzle
Across
  1. avion
  2. traer
  3. pasaporte
  4. saber
  5. pasillo
  6. tener
  7. seguridad
  8. conducir
  9. caber
Down
  1. producir
  2. decir
  3. traducir
  4. andar
  5. poder
  6. venir
  7. hacer
  8. despegar
  9. querer
  10. poner
  11. boleto

20 Clues: deciraviontraerandarpodervenirhacersabertenerponercaberquererboletopasilloproducirtraducirdespegarconducirpasaporteseguridad

Unit 3 vocabulary 2016-11-20

Unit 3 vocabulary crossword puzzle
Across
  1. schuldig
  2. overval
  3. vermijden
  4. onschuldig
  5. liever
  6. getuige
  7. straffen
  8. wet
  9. onbeleefd
  10. zaak
Down
  1. kwaadaardig
  2. grijpen
  3. gevangenis
  4. crimineel
  5. beveiliging
  6. verward
  7. verspillen
  8. oplossen
  9. achterkant
  10. ontkennen

20 Clues: wetzaaklievergrijpenovervalverwardgetuigeschuldigoplossenstraffencrimineelvermijdenonbeleefdontkennengevangenisonschuldigverspillenachterkantkwaadaardigbeveiliging

D 3 Reisenvokabeln 2020-11-16

D 3 Reisenvokabeln crossword puzzle
Across
  1. baggage_claim
  2. arrive
  3. motion_sickness
  4. traffic_ticket
  5. toll_booth
  6. round_trip
  7. flat_tire
  8. customs
  9. to_turn
  10. redeye_flight
  11. sights
Down
  1. carry-on_luggage
  2. straight_ahead
  3. to_cross
  4. layover
  5. security
  6. speed_trap
  7. breakdown
  8. intersection
  9. traffic_jam

20 Clues: arrivesightslayovercustomsto_turnto_crosssecurityflat_tirebreakdownspeed_traptoll_boothround_triptraffic_jamintersectionbaggage_claimredeye_flightstraight_aheadtraffic_ticketmotion_sicknesscarry-on_luggage

Ok 2023-09-21

Ok crossword puzzle
Across
  1. fix
  2. light
  3. miss
  4. excited
  5. lazy
  6. sister
  7. girl
  8. security
  9. wrong
  10. careless
  11. floor
  12. destroy
Down
  1. son
  2. repair
  3. fear
  4. laugh
  5. sell
  6. safe
  7. narrow
  8. human

20 Clues: sonfixmissfearlazysellsafegirllightlaughwronghumanfloorrepairsisternarrowexciteddestroysecuritycareless

Everyday Uses: 2025-01-27

Everyday Uses: crossword puzzle
Across
  1. materials
  2. morning
  3. time
  4. evening
  5. eat
  6. home
  7. liquid
  8. Akre
  9. refugee
  10. oven
Down
  1. load
  2. Erbil
  3. community
  4. drive
  5. security
  6. Boss
  7. outside
  8. midday
  9. animal
  10. work

20 Clues: eatloadBosstimehomeAkreworkovenErbildrivemiddayanimalliquidmorningeveningoutsiderefugeesecuritymaterialscommunity

Stary Przyjaciel 2025-04-06

Stary Przyjaciel crossword puzzle
Across
  1. mask
  2. partner
  3. perpetrator
  4. hand
  5. box
  6. ink
  7. police
  8. friend
  9. escape
  10. money
Down
  1. gate
  2. passerby
  3. bank
  4. security
  5. criminal
  6. suspicion
  7. meeting
  8. cell
  9. car
  10. smile

20 Clues: boxcarinkgatebankmaskcellhandsmilemoneypolicefriendescapepartnermeetingpasserbysecuritycriminalsuspicionperpetrator

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. passport
  2. vacation
  3. luggage
  4. ticket
  5. airport
  6. to travel
  7. customs
  8. confirm
  9. train
Down
  1. call
  2. suitcase
  3. security
  4. buy
  5. flight
  6. arrive
  7. station
  8. board
  9. passenger
  10. reclaim
  11. screen

20 Clues: buycallboardtrainflightarriveticketscreenluggagestationairportreclaimcustomsconfirmsuitcasesecuritypassportvacationto travelpassenger

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. ToGetInLine
  2. airport
  3. ToGoOnVacasion
  4. GoThroughCustoms
  5. security
  6. itinerary
  7. passport
  8. moniter
  9. Flight
  10. ticket
Down
  1. TravelAgency
  2. ToBoard
  3. passenger
  4. ToCallSomeone
  5. boardingpass
  6. gate
  7. suitcase
  8. departure
  9. arrival
  10. luggage

20 Clues: gateFlightticketToBoardairportarrivalmoniterluggagesecuritysuitcasepassportpassengeritinerarydepartureToGetInLineTravelAgencyboardingpassToCallSomeoneToGoOnVacasionGoThroughCustoms

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. passport
  2. Flight
  3. suitcase
  4. airport
  5. GoThroughCustoms
  6. security
  7. arrival
  8. ToGoOnVacasion
  9. passenger
  10. moniter
  11. gate
Down
  1. itinerary
  2. luggage
  3. ToCallSomeone
  4. TravelAgency
  5. departure
  6. ToGetInLine
  7. ToBoard
  8. ticket
  9. boardingpass

20 Clues: gateFlightticketluggageairportToBoardarrivalmoniterpassportsuitcasesecurityitinerarydeparturepassengerToGetInLineTravelAgencyboardingpassToCallSomeoneToGoOnVacasionGoThroughCustoms

ISACA BC 2022-10-15

ISACA BC crossword puzzle
Across
  1. way to create a secure software
  2. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
  3. a computer malware program that was originally developed in the form of a banking Trojan
  4. integrates all of the cloud security capabilities into a single cloud-native solution
  5. Toughest privacy and security law in the world
Down
  1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  3. method that requires the user to provide two or more verification factors to gain access to a resource
  4. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse

10 Clues: way to create a secure softwareToughest privacy and security law in the worldintegrates all of the cloud security capabilities into a single cloud-native solutiona computer malware program that was originally developed in the form of a banking Trojan...

IT - Crossword 2024-11-25

IT - Crossword crossword puzzle
Across
  1. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that
  2. film, or record literary, artistic, or musical material, and to authorize
  3. The identification and assurance of the origin of information
  4. Unauthorized access of or interference with computer systems, servers, or
  5. author without authorization
  6. An act or instance of using or closely imitating the language and thoughts of
  7. A weakness, design, or implementation error that can lead to an
  8. event that compromises the security of the system.
  9. in order to induce individuals to reveal personal information, such as
  10. Action taken in advance to protect the system against potential threats or
  11. only by those authorized
  12. Ensuring that the information is accessible to authorized persons when required without delay.
  13. Any action derived from intelligent threats to violate the security of the
  14. fraudulent practice of sending emails purporting to be from reputable
  15. your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  16. to do the same
  17. phishing, spamming and child pornography) is used as a tool to commit
  18. may use computer technology to access personal information,
  19. of sexual organs or sexual activity with the aid of a computer system for favor or
Down
  1. A defined method of breaching the security of an IT system through
  2. information and communication systems
  3. and credit card numbers
  4. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
  5. Ensuring that the information/data can be
  6. Involves actions that supplement the precautionary measures
  7. A common type of online fraud
  8. An assurance for which someone cannot deny something
  9. trade secrets or use the internet for exploitative or malicious purposes.
  10. Any action of stealing information from a users’ system.
  11. offense
  12. a crime in which a computer is the object of the crime
  13. User security allows the system to set security rules to determine what is displayed to which user.
  14. The exclusive legal right, given to an originator or an assignee to print, publish,

33 Clues: offenseto do the sameand credit card numbersonly by those authorizedauthor without authorizationA common type of online fraudinformation and communication systemsEnsuring that the information/data can beevent that compromises the security of the system.An assurance for which someone cannot deny something...

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Conversion of data into a form that cannot be easily understood by unauthorized people.
  2. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  3. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  4. A secret word or phrase known only to you.
  5. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  6. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  7. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  8. Crime conducted via the Internet or some other computer network.
Down
  1. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  2. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  3. What tells you that the website is secure in the browser.
  4. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  5. Whaling A type of fraud that targets high-profile end users.
  6. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.

14 Clues: A secret word or phrase known only to you.What tells you that the website is secure in the browser.Whaling A type of fraud that targets high-profile end users.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. What tells you that the website is secure in the browser.
  2. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  6. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
Down
  1. Conversion of data into a form that cannot be easily understood by unauthorized people.
  2. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. A secret word or phrase known only to you.
  5. A type of fraud that targets high-profile end users.
  6. Crime conducted via the Internet or some other computer network.
  7. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

14 Clues: A secret word or phrase known only to you.A type of fraud that targets high-profile end users.What tells you that the website is secure in the browser.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

P&SD Xword Challenge 2017-11-13

P&SD Xword Challenge crossword puzzle
Across
  1. Close to Tommy Coopers head from Chirag
  2. More than three of the dib dib dib boys
  3. Beyoncé’s husband sizing in the cloud
  4. A number of Derek’s on the voice
  5. Approving the twinkle twinkle
  6. Apportioning F5 weight
  7. Nearly the Bullseye presenter Bid.
  8. PM with Skyfall hit
Down
  1. 24 / 7 Lancashire Cyber Town
  2. Society of Swindon based Customers building
  3. Made up place name with an OA's building material
  4. Heating the registration number
  5. Burning interior structure
  6. Vendor stop and search area
  7. Supplier with Archery kit

15 Clues: PM with Skyfall hitApportioning F5 weightSupplier with Archery kitBurning interior structureVendor stop and search area24 / 7 Lancashire Cyber TownApproving the twinkle twinkleHeating the registration numberA number of Derek’s on the voiceNearly the Bullseye presenter Bid.Beyoncé’s husband sizing in the cloudClose to Tommy Coopers head from Chirag...

Kuis Materi Perkembangan Teknlologi Industri 2024-01-31

Kuis Materi Perkembangan Teknlologi Industri crossword puzzle
Across
  1. Chloro Fluoro Carbon
  2. salah satu lapisan atmosfer bumi
  3. salah satu yang meningkat, dampak dari penggunaan IoT
  4. dampak kehilangan 23 juta lapangan pekerjaan pada tahun 2030
  5. manusia dan mesin akan bekerja sama pada era digitalisasi
  6. Sistem Cyber Physical
  7. teknologi yang memungkinkan untuk membuat prototipe
Down
  1. mahluk hidup dengan mahluk hidup lain
  2. salah satu contoh senyawa
  3. Merupakan otak dari sebuah perangkat keras
  4. teknologi yang sudah memiliki keahlian seperti manusia
  5. salah satu komponen IoT
  6. penyimpanan data dengan jumlah tidak terbatas
  7. bahan bekas hasil produksi industri
  8. teknologi yang ada pada perangkat fisik

15 Clues: Chloro Fluoro CarbonSistem Cyber Physicalsalah satu komponen IoTsalah satu contoh senyawasalah satu lapisan atmosfer bumibahan bekas hasil produksi industrimahluk hidup dengan mahluk hidup lainteknologi yang ada pada perangkat fisikMerupakan otak dari sebuah perangkat keraspenyimpanan data dengan jumlah tidak terbatas...

EMPLOYMENT OPPORTUNITIES IN LODI UNIFIED 2021-08-13

EMPLOYMENT OPPORTUNITIES IN LODI UNIFIED crossword puzzle
Across
  1. driver: transports students to school
  2. guard: helps students cross streets
  3. accounts for expenses
  4. assistant: prepares meals for students
  5. repairs and maintains vehicles
  6. clerical assistance in school office
  7. repairs and maintains wiring
Down
  1. cleans and maintains the school
  2. maintains the school grounds
  3. customer service and clerical duties
  4. assists classroom teachers
  5. manager: supervises the cafeteria
  6. security: provides security at school
  7. monitor: monitors students at school
  8. repairs and maintains plumbing

15 Clues: accounts for expensesassists classroom teachersmaintains the school groundsrepairs and maintains wiringrepairs and maintains vehiclesrepairs and maintains plumbingcleans and maintains the schoolmanager: supervises the cafeteriaguard: helps students cross streetscustomer service and clerical dutiesmonitor: monitors students at school...

Human Rights 2025-05-12

Human Rights crossword puzzle
Across
  1. Solving an argument through discussion.
  2. Applying to everyone.
  3. Having the tendency to attack or harm others.
  4. Time spent awake.
  5. Given formal approval or permission for something.
  6. Supports.
Down
  1. The person or team against which the sport is played.
  2. Relating to computer and the web.
  3. Behavior that is cruel or unkind.
  4. Protects something for being changed.

10 Clues: Supports.Time spent awake.Applying to everyone.Relating to computer and the web.Behavior that is cruel or unkind.Protects something for being changed.Solving an argument through discussion.Having the tendency to attack or harm others.Given formal approval or permission for something.The person or team against which the sport is played.

ISACA BC 2022-10-15

ISACA BC crossword puzzle
Across
  1. Toughest privacy and security law in the world
  2. integrates all of the cloud security capabilities into a single cloud-native solution
  3. a computer malware program that was originally developed in the form of a banking Trojan
  4. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  5. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
Down
  1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. way to create a secure software
  3. method that requires the user to provide two or more verification factors to gain access to a resource
  4. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)

10 Clues: way to create a secure softwareToughest privacy and security law in the worldintegrates all of the cloud security capabilities into a single cloud-native solutiona computer malware program that was originally developed in the form of a banking Trojan...

ж2 2025-11-24

ж2 crossword puzzle
Across
  1. – Process to reduce risk.
  2. – Risk of not being able to meet short-term obligations.
  3. – Risk of damage to a company’s public image.
  4. – Prefix for risks related to computers and networks.
  5. – Measure to manage or reduce risk.
Down
  1. – Adhering to laws and regulations.
  2. – Formal examination of financial records.
  3. – An event that disrupts normal operations.
  4. – Protection against financial risk.
  5. – Risk of borrower default.
  6. – Penalty for non-compliance.
  7. – Deceptive act for personal gain.
  8. – Financial damage or disadvantage.

13 Clues: – Process to reduce risk.– Risk of borrower default.– Penalty for non-compliance.– Deceptive act for personal gain.– Adhering to laws and regulations.– Measure to manage or reduce risk.– Financial damage or disadvantage.– Protection against financial risk.– Formal examination of financial records.– An event that disrupts normal operations....

Self-Esteem Word Search 2023-03-15

Self-Esteem Word Search crossword puzzle
Across
  1. People form these with each other
  2. Something you do in your spare time
  3. Something difficult/out of our comfort zone
  4. Where we live outside of school/hobbies/work
  5. Confidence in yourself
  6. We have co-workers, bosses here
  7. Where we get educated
  8. How to respond to a compliment
  9. Feeling certain in your abilities
Down
  1. Physical, Verbal, Cyber, Social
  2. Self-esteem is a _______ ranging from low, healthy, to overly high
  3. A comment which makes somebody feel good
  4. The opposite of unhealthy
  5. Overcoming our adversities
  6. Physical activity
  7. Getting past a challenge is to ___________

16 Clues: Physical activityWhere we get educatedConfidence in yourselfThe opposite of unhealthyOvercoming our adversitiesHow to respond to a complimentPhysical, Verbal, Cyber, SocialWe have co-workers, bosses herePeople form these with each otherFeeling certain in your abilitiesSomething you do in your spare timeA comment which makes somebody feel good...

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Crime conducted via the Internet or some other computer network.
  2. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  5. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  2. A secret word or phrase known only to you.
  3. Whaling A type of fraud that targets high-profile end users.
  4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  6. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  7. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  8. What tells you that the website is secure in the browser.
  9. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

14 Clues: A secret word or phrase known only to you.What tells you that the website is secure in the browser.Whaling A type of fraud that targets high-profile end users.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Malware 2024-04-26

Malware crossword puzzle
Across
  1. A cyber attack intended to redirect a website's traffic to another, fraudulent site.
  2. Attempts to crack passwords or keys through trial and error, not by exploiting any inherent weakness in the encryption but by sheer volume of attempts.
  3. The placement of malicious code in SQL statements, via web page input, to manipulate a database behind the website.
  4. The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
  5. Insufficient rules and guidelines that govern the use and security of a network, which can lead to vulnerabilities.
  6. The act of capturing and reading packets as they cross a network or part of a network. If the packets are not encrypted, their content can be read.
Down
  1. Any software package which automatically renders advertisements to generate revenue for its author.
  2. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. A form of malware designed to trick victims into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
  4. Malicious software that replicates itself by modifying other computer programs and inserting its own code.
  5. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  6. Malware that locks or encrypts the victim's data until a ransom is paid.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

14 Clues: Malware that locks or encrypts the victim's data until a ransom is paid.A cyber attack intended to redirect a website's traffic to another, fraudulent site.Software designed to disrupt, damage, or gain unauthorized access to a computer system.Any software package which automatically renders advertisements to generate revenue for its author....

Reportable Information 2023-07-27

Reportable Information crossword puzzle
Across
  1. Monetary management
  2. Actions in conflict with laws or policy
  3. A change in personal location, often for pleasure
  4. CH3−CH2−OH or C2H5OH
  5. Any event that threatens Security procedures
  6. Illegal activity
  7. Requests for classified information, unauthorized
  8. Of or from a country other than the USA
Down
  1. Breaching of security defenses
  2. Improper storage/transportation of classifieds
  3. Illegal substances
  4. Lawful detainment
  5. A state of being owed, usually financially
  6. Fraud/Scams/Trafficking via computer
  7. A formal partnering of two people
  8. A legal moniker

16 Clues: A legal monikerIllegal activityLawful detainmentIllegal substancesMonetary managementCH3−CH2−OH or C2H5OHBreaching of security defensesA formal partnering of two peopleFraud/Scams/Trafficking via computerActions in conflict with laws or policyOf or from a country other than the USAA state of being owed, usually financially...

Discharge Planning 2025-11-17

Discharge Planning crossword puzzle
Across
  1. supplemental security income
  2. single point of access
  3. ability to maintain a balanced mental state
  4. person/agency appointed to manage funds
  5. 24 hr supervised housing
  6. assertive community treatment
  7. engage in your own treatment
Down
  1. permanent housing, most independent
  2. middle level of spa housing
  3. determined, strong desire to do well/succeed
  4. assisted outpatient treatment
  5. treatment team in the community
  6. agreeable to treatment/medications
  7. social security disability
  8. state operated community residence
  9. ability to understand and accept diagnosis

16 Clues: single point of access24 hr supervised housingsocial security disabilitymiddle level of spa housingsupplemental security incomeengage in your own treatmentassisted outpatient treatmentassertive community treatmenttreatment team in the communityagreeable to treatment/medicationsstate operated community residencepermanent housing, most independent...

Is it possible to avoid risk? 2024-10-17

Is it possible to avoid risk? crossword puzzle
Across
  1. OSI layer that opens and closes conversation between two devices
  2. Refer to an incident where unauthorized individual gain access to a system
  3. Cryptography method that uses a pair of keys
  4. refers to a security measure put in place to mitigate security risk
  5. cloud services that is perfect for Application developers
  6. The Indian bill for personal information protection,
Down
  1. encrypted form of message
  2. type of cybercrime that involves the use of QR codes
  3. provider’s applications running on a cloud
  4. cloud services available for general public
  5. set of rules and standards that define how data is transmitted and received across a network.
  6. / ware made for spying
  7. Non-profit organization that dedicated to improving software security
  8. European laws for privacy

14 Clues: / ware made for spyingencrypted form of messageEuropean laws for privacyprovider’s applications running on a cloudcloud services available for general publicCryptography method that uses a pair of keystype of cybercrime that involves the use of QR codesThe Indian bill for personal information protection,...

FITCVocab.jeht 2013-05-15

FITCVocab.jeht crossword puzzle
Across
  1. a person who gives food
  2. games
  3. a place where you store things
  4. board the queen of your computer
  5. a graphic image for for your company
  6. elliptical or touch pad
  7. something that you put in
  8. a symbol that has a letter in a circle
  9. a server in the sky
  10. wireless internet
  11. online
Down
  1. online power point
  2. 4g 3g
  3. access memory ram
  4. a commercial
  5. disc drive like a flash drive
  6. of office what presidents have to do
  7. things that you can hear see or get
  8. what is the abbreviation for document
  9. processing unit cpu
  10. host a online director
  11. just a little

22 Clues: 4g 3ggamesonlinea commercialjust a littleaccess memory ramwireless internetonline power pointprocessing unit cpua server in the skyhost a online directora person who gives foodelliptical or touch padsomething that you put indisc drive like a flash drivea place where you store thingsboard the queen of your computerthings that you can hear see or get...

Kolletsch-Kreuzworträtsel 2021-04-16

Kolletsch-Kreuzworträtsel crossword puzzle
Across
  1. pädagogische Squaw
  2. Comic-er
  3. Guitar Hero
  4. Kolletsch Bürgermeister
  5. wer war's?
  6. kommt notorisch zu spät
  7. Rekordhalter speed talking
  8. schweizer E-Biker
  9. singende Basteltante
  10. sozialpäd. Menstruationszyklus
  11. wäre fast davon gerollt
  12. bakip Sportsfreundin
  13. lila Fee
  14. Häfnschwester
  15. Shoe-maniac
  16. ehem. Zirkusartistin
  17. Agnes
  18. Postschwimmerin
Down
  1. Kolletsch-Hausverstand
  2. Sägespähnenspanner
  3. Maskenfetischistin
  4. Dolmetscher für deutsch-altmann
  5. Cyber-Nonne
  6. bischöfliches Kulinarikum
  7. handwerken ugs.
  8. nachhaltiger Brötchenversorger
  9. mex. Komponistin
  10. Überläuferin aus Baden
  11. ehem. Direktorin, Vorname
  12. legasthenischer Wolleballtreina
  13. Rap-Slam-Queen
  14. Supervikinger (Nachname)
  15. Müch-man
  16. Chilli(ge)
  17. Kolleg ugs.
  18. stilles, aflenzer Wasser
  19. Mag.a Dr.in Eidschi-Beidschi
  20. legale Schoko-Dealerin
  21. SOS-Sitzformation
  22. Miesmacher alias Besserwisser

40 Clues: AgnesComic-erMüch-manlila Feewer war's?Chilli(ge)Cyber-NonneGuitar HeroKolleg ugs.Shoe-maniacHäfnschwesterRap-Slam-Queenhandwerken ugs.Postschwimmerinmex. Komponistinschweizer E-BikerSOS-SitzformationSägespähnenspannerMaskenfetischistinpädagogische Squawsingende Basteltantebakip Sportsfreundinehem. ZirkusartistinKolletsch-Hausverstand...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

B&P Holiday Edition 2023 2023-09-22

B&P Holiday Edition 2023 crossword puzzle
Across
  1. Popular sport to watch on Thanksgiving
  2. Scrooge’s first name from “A Christmas Carol”
  3. Christmas-themed Tchaikovsky ballet
  4. Candle holder for Kwanzaa
  5. A model of a person made with snow
  6. Sour and dark red berries
  7. Fall squash or gourd
  8. Brief and light snowfalls
Down
  1. Singing from one door to another
  2. A Hansel and Gretel inspired house
  3. Hung by the chimney with care
  4. Roasting on an open fire
  5. Elf on a ----
  6. Popular "Friday" shopping day
  7. This animal receives a President's pardon
  8. The most famous reindeer of all
  9. Wood that is burnt as fuel
  10. Synonym for corn
  11. Candle holder for Hanukkah
  12. Popular "Monday" shopping day
  13. Santa's ride

21 Clues: Santa's rideElf on a ----Synonym for cornFall squash or gourdRoasting on an open fireCandle holder for KwanzaaSour and dark red berriesBrief and light snowfallsWood that is burnt as fuelCandle holder for HanukkahHung by the chimney with carePopular "Friday" shopping dayPopular "Monday" shopping dayThe most famous reindeer of all...

Black Friday 2025-11-12

Black Friday crossword puzzle
Across
  1. Brick and ______
  2. Very brief promotion, or Barry Allen
  3. Get money back
  4. A collection of items you want
  5. Business selling goods
  6. Biggest shopping day of the _____
  7. In the ___
  8. Out of ____
  9. Where you keep your money
  10. Thanksgiving meat
  11. Where a Londoner waits
  12. Issue or warning
Down
  1. Bad deal, or what to do with a band-aid
  2. Place with many stores in close proximity
  3. Rainbow
  4. To just look around
  5. What you need to do if few items remain or if late
  6. To just look around, on Cyber Monday
  7. In the ___
  8. Attractive offer
  9. Booklet displaying a company's products
  10. Where a Bostonian waits
  11. Strategy to make you want to buy something right away

23 Clues: RainbowIn the ___In the ___Out of ____Get money backBrick and ______Attractive offerIssue or warningThanksgiving meatTo just look aroundBusiness selling goodsWhere a Londoner waitsWhere a Bostonian waitsWhere you keep your moneyA collection of items you wantBiggest shopping day of the _____Very brief promotion, or Barry Allen...