cyber security Crossword Puzzles
I can't find you, Mum! 2025-11-19
Across
- Jessie followed her mom to the clothing shop and found it ____.
- Jessie and her mother went ____.
- The stranger ___ Jessie, and she ran away.
- Mom ___ that they were safe and sound now.
- Don't talk to strangers, even if they are ____.
Down
- Jessie mistook the security guard for a ____.
- Jessie and her mother were back ____, safe and sound.
- She didn't ____ when someone came into the room.
- Jessie ___ back the curtain.
- They will tell their ____ that Jessie is in the office.
- The security guard took Jessie into his ____.
- The security ___ promised to help Jessie.
12 Clues: Jessie ___ back the curtain. • Jessie and her mother went ____. • The security ___ promised to help Jessie. • The stranger ___ Jessie, and she ran away. • Mom ___ that they were safe and sound now. • Jessie mistook the security guard for a ____. • The security guard took Jessie into his ____. • Don't talk to strangers, even if they are ____. • ...
Once Upon a Time Ada 2021-10-01
Across
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Nervously, the resident noticed the ? of a figure below the street light.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- The ? gardener was willing to travel to different places where there was work.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
Down
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Residents ? their fears of criminals by putting in security devices for their homes.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
Bullying 2022-10-24
9 Clues: words • over a computer • wants to hurt you • a person that watches • bully that threats you • the person that stops it • punching hitting and kicking • the person that is being bullied • the person that touch’s you in spots you don’t want to be touch
FITDVocab.jg 2013-05-15
Across
- A port for a PlayStation2
- Where is something processed
- A written set of instructions
- Host A host that is on the internet, or a site hoster
- Manners Online
- When a new president gets assigned and uses a bible
- Random.........
- A server in the "sky"
- What is that tower thingy called?
- "Fidelity"
- Protecting Passwords online
- The made layout by a company or software
- A device that you use for the computer using a mechanical ball
- To restart your computer
- A HUGE search engine
- What "things" are installed on your computer?
- The way things are arranged
- Light emitting diodes, Light crystal display
- A website that is like an "engine"
- Where documents and Power-points are stored in
- A catchy phrase a company uses
- Online safety
- You need 8 of these to make a byte
- What is your screen called
Down
- Feeding something "out" of your computer
- Things you plug into your computer
- What does "©" stand for?
- What do you plug your flash-drive in?
- Those square things on your homepage on an iPhone
- A drive that is very, very important
- OSX,MAC,PC,WINDOWS7
- Online
- where do you plug in your headphones?
- the stuff inside your computer
- .docs .xcxl .pp
- Someone who provides their internet service
- think of a "disc Drive"
- Something that you type in, like "word"
- 1,000 of these equals a terabyte
- Something that feeds info "into" your computer
- Extra slots
- Something that you can call off of
- do you have 4G or 3G?
- A host that connects you to the internet
- When you "cite" a source, what is that called?
- A picture for a business
- Social security i_
47 Clues: Online • "Fidelity" • Extra slots • Online safety • Manners Online • .docs .xcxl .pp • Random......... • Social security i_ • OSX,MAC,PC,WINDOWS7 • A HUGE search engine • A server in the "sky" • do you have 4G or 3G? • think of a "disc Drive" • What does "©" stand for? • To restart your computer • A picture for a business • A port for a PlayStation2 • What is your screen called • ...
Semester 2 Religion Crossword 2022-05-15
Across
- church law enforced by force/violence
- no supernatural
- Islamic word for "God"
- western European philosophical movement
- monk inspired by Antony of Syria (wanted structure)
- a false teaching
- the killing of an unborn child
- what language was mass used to be said in?
- national internal order
- Islamic follower
- absolute Muslim law
- most depicted figure besides Jesus
- battles for the holy land
- anyone who didn't speak Latin or Greek
- monk who gave all Christians the Bible
- someone who dies for the faith
- warriors for God
- first book printed by Gutenberg's press
- became Paul after Jesus appeared to him on the road to Damascus
- international law and order to avoid war
- fired for massacring Samaritans, sent Jesus to his crucifixion
- God's plan of salvation in Jesus Christ
- Putin's experience with computers and cyber attacks
Down
- sister of Benedict
- "for the people," everyone can read it
- no belief in any god
- What country is under Putin's attack?
- place of the pope
- life should be centered around this gospel's chapter 28
- the supernatural is accepted
- a person who isn't Jewish
- What's one thing that depicts Christianity?
- war crimes, "just war"
- ninth month of the Islamic calendar
- biggest and strongest barbarian tribe
- "most holy"
- How was around 1,000,000 Muslims converted?
- english priest that was sentenced but never executed
- founder of Islam
- states rights vs omnipotent Federal gov.
- "God's true religion"
- freedom of speech, religion, etc (replaced European bias)
- equal maximum rights for all citizens under primary "law"
- patriarch for Putin
- Roman emperor who killed 400,000 Christians
- wealth, power, glory, and pleasure at the center of your life
- right wing extreme begun by Mussolini
- Roman officials (wear a collar)
- essential absolute truths of God
- corrupt priest who sold salvation
- who was Gabriel really to the Protestants?
51 Clues: "most holy" • no supernatural • a false teaching • Islamic follower • founder of Islam • warriors for God • place of the pope • sister of Benedict • absolute Muslim law • patriarch for Putin • no belief in any god • "God's true religion" • Islamic word for "God" • war crimes, "just war" • national internal order • a person who isn't Jewish • battles for the holy land • the supernatural is accepted • ...
Brices Puzzle 2024-01-05
Across
- The code of acceptable behaviors users should follow while on the Internet
- Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
- Device Any hardware component that allows you to enter data and instructions
- An applied science devoted to incorporating comfort
- Extortionist Someone who demands payment to stop an attack
- A small text file that a web server stores on your computer.
- A business transaction that occurs over an electronic network
- A collection of computers and mobile devices connected
- Device Any hardware component that conveys information from a computer or mobile device
- The number of horizontal and vertical pixels in a display device.
- The electronic component of a computer that interprets and carries
- Firewall A security tool that detects and protects a personal computer and its data
Down
- Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
- Device Convergence The trend of computers and devices with technologies
- Web Design A website development approach that adapts the layout of a website to fit the screen
- A program designed to make users more productive
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Compression Tool Tool that shrinks the size of a file(s).
- A computer that delivers requested webpages
- Protector A device that uses electrical components to provide a stable current flow and minimize
- Someone who accesses a computer or network illegally.
- Vision Syndrome A technology-related health condition that affects eyesight.
- A compromised computer or device whose owner is unaware
- Aggregation A website or web app sometimes called a curation website
- Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
- System Number system that has just two unique digits, 0 and 1, called bits.
26 Clues: A computer that delivers requested webpages • A program designed to make users more productive • An applied science devoted to incorporating comfort • Someone who accesses a computer or network illegally. • A collection of computers and mobile devices connected • A compromised computer or device whose owner is unaware • ...
Computer Security and Ethics 2024-08-23
Across
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- You should regularly make a ____ of your data/photos.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- If you download software, ____ it before running it.
Down
- Malware that damages files on your computer or stops your computer from running properly.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- When you copy sections of someone else's work and claim it is your own.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- Keep your operating system secure by running all the latest.
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
informatika keresztrejtvény 2023-06-07
Across
- valami kiadása megosztása
- valótlan fotók,hirek terjesztése másról
- lábnyom az interneten rólunk tárolt adatok,keresési előzmények
- véletlenszerű számot generál
- lopás valaki másnak
Down
- a számítógép kézzrl fogható részei
- funkcionalitás rendszerek amiket telepítve újabb és ujabb funkciok erhetők el
- személyes titkok,információk megosztása másról
- visszatérő sértő/bántó üzenetek
- bullying egy személy online térben való zaklatása
- betűk gyakoritsága magyar nyelvben
11 Clues: lopás valaki másnak • valami kiadása megosztása • véletlenszerű számot generál • visszatérő sértő/bántó üzenetek • a számítógép kézzrl fogható részei • betűk gyakoritsága magyar nyelvben • valótlan fotók,hirek terjesztése másról • személyes titkok,információk megosztása másról • bullying egy személy online térben való zaklatása • ...
9.8 Institutions Developing in a Globalized World 2025-05-19
Across
- 1948 declaration adopted to promote human dignity and freedom
- Group that provides food aid globally
- Powerful UN council with veto powers
- Term for people fleeing war or disaster
- Created in 1944 to offer loans to countries for infrastructure and development
- Organization that promotes science, culture, and education
- The first global organization after WWI that failed to prevent WWII
Down
- International financial organization helping with short-term economic issues
- NGO known for monitoring human rights abuses
- Former trust territory that gained independence in 1994
- UN agency that helps children, originally post-WWII
- UN body where all nations are represented
- Peacekeeping force country involved in conflicts in Congo and Haiti
- One of the five permanent members of the Security Council, formerly USSR
- Powerful nations have this privilege in the Security Council
15 Clues: Powerful UN council with veto powers • Group that provides food aid globally • Term for people fleeing war or disaster • UN body where all nations are represented • NGO known for monitoring human rights abuses • UN agency that helps children, originally post-WWII • Former trust territory that gained independence in 1994 • ...
Cyber Security Crossword Puzzle 2022-01-30
Across
- The act of creating a fake identity online to exploit individuals they connect with on dating sites
- Malicious software which can be obtained after downloading suspicious files
- Ensure it is ''strong'' to reduce chances of getting hacked
Down
- Beware of these online thieves who uses computers to gain unauthorized access to data
4 Clues: Ensure it is ''strong'' to reduce chances of getting hacked • Malicious software which can be obtained after downloading suspicious files • Beware of these online thieves who uses computers to gain unauthorized access to data • The act of creating a fake identity online to exploit individuals they connect with on dating sites
Goog Test 2023-03-31
CySec 2025-06-05
Across
- Attack exploiting built-in processors in hardware to execute malicious code
- Preferred framework for IP level security analysis
- Attack technique doesn't physically alter the chip but changes behavior through environmental stress
- Security impact leading to loss of core vehicle function
- Speculative execution attack targeting x86-64 processors
- Security Property most impacted by Denial of Service attack
Down
- Attack that adds hidden functionality during chip design
- Measurement setup often used in side-channel analysis
- Security Property ensuring information is accessible to only authorized agents
- Hardware protection that can be bypassed by repeatedly accessing memory
10 Clues: Preferred framework for IP level security analysis • Measurement setup often used in side-channel analysis • Attack that adds hidden functionality during chip design • Security impact leading to loss of core vehicle function • Speculative execution attack targeting x86-64 processors • Security Property most impacted by Denial of Service attack • ...
Français Aéroport Crossword 2023-11-24
10 Clues: luggage • passport • suitcases • plane ticket • security belt • boarding pass • check in counter • seat (on the plane) • security checkpoint • gate (for boarding)
Gone Phishing 2017-09-08
Across
- Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
- Policy that indicates what kind of information a website will take from you and what they intend to do with it.
- A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
- Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
- Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
- A type of fraud that targets high-profile end users.
- Crime conducted via the Internet or some other computer network.
- A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
- A secret word or phrase known only to you.
- What tells you that the website is secure in the browser.
14 Clues: A secret word or phrase known only to you. • A type of fraud that targets high-profile end users. • What tells you that the website is secure in the browser. • Crime conducted via the Internet or some other computer network. • Conversion of data into a form that cannot be easily understood by unauthorized people. • ...
Rule of Thoughts Crossword Puzzle 2023-02-27
Across
- computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist
- VirtNet Security
- a computer generated life-form created by Kaine in the VirtNet which is transferred to the real world placed in the body of a human being and essentially removing that person's identity and replacing it with their manufactured ones
Down
- a program designed by Kaine in order to resurrect Tangents from the VirtNet and insert them into the real world and using human bodies as the hosts taking over the planet
- an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience.
5 Clues: VirtNet Security • computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist • an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience. • ...
CrytoMaze 3 2024-12-09
Across
- Replacing sensitive data with non-sensitive equivalents.
- Faking the origin of a message or communication to deceive the recipient.
- Measures taken to protect information from unauthorized access or damage.
- Malicious software that replicates itself to spread to other systems.
- Digital document used to verify identities in secure communications.
- An incident where unauthorized access to data occurs.
- To convert information into a secure format.
- A method of bypassing normal authentication or security controls.
Down
- Entity that issues digital certificates in a PKI.
- The discovery and interpretation of meaningful patterns in data, often used for security monitoring.
- Process of identifying and evaluating risks to information assets.
- An isolated environment for safely executing untested code.
- A piece of software or code that takes advantage of a vulnerability.
- Ensuring data consistency across multiple systems.
- Set of rules governing data communication.
- Secure area within a system for processing sensitive data.
- To convert encrypted data back to its original form.
- Fraudulent attempt to obtain sensitive information by deception.
18 Clues: Set of rules governing data communication. • To convert information into a secure format. • Entity that issues digital certificates in a PKI. • Ensuring data consistency across multiple systems. • To convert encrypted data back to its original form. • An incident where unauthorized access to data occurs. • Replacing sensitive data with non-sensitive equivalents. • ...
Hanshaft Crossword 2015-06-18
Across
- / Acquire shares
- / payout
- buy 100_
- / money earned
- / Intelligent _
- / assets held here
- / buyout
- / 1 ½ by 1 ¾
- / expiring contract
- stocks traded
- / holdings
- / paper form
- / transferrable
- / cash or stock _
- / opposite of DK'ed
- / broker
Down
- / cash or _
- / It is a debt security
- / money due you
- / A preliminary prospectus
- / not today but tomorrow
- / into two or more
- / Another word for shares
- / reregistration company
- / taxes
- / another word for money
- identifying number
- / bid price
- / shares in a basket
- / attorney letter
- / trade shares
- / to vote
- / trading happens
- / __exchange
34 Clues: / taxes • / payout • buy 100_ • / buyout • / broker • / to vote • / holdings • / cash or _ • / bid price • / 1 ½ by 1 ¾ • / paper form • / __exchange • stocks traded • / money earned • / trade shares • / money due you • / Intelligent _ • / transferrable • / Acquire shares • / attorney letter • / cash or stock _ • / trading happens • / into two or more • / assets held here • identifying number • / expiring contract • ...
Drew's Crossword puzzle 2023-08-24
Across
- Attackers who are strongly motivated
- collection of harmful computer code
- security method of “scrambling” information
- Program that stores multiple passcodes
- Malware hiding inside another program
- A false warning
- An individual who launches attacks
- Stalking through use of technology.
- State of freedom from public
Down
- Social manipulation to receive information
- process of unlocking encrypted information
- Science of healthy computer practices
- Inside security threat to companies
- Electronic waste from discarded devices
- Backup power source
- stealing someone’s personal information
- Malicious software, like viruses,spyware
- malicious computer code that reproduces
- A wireless high-speed data network
- consistent unwanted emails or messages
20 Clues: A false warning • Backup power source • State of freedom from public • A wireless high-speed data network • An individual who launches attacks • Inside security threat to companies • collection of harmful computer code • Stalking through use of technology. • Attackers who are strongly motivated • Science of healthy computer practices • Malware hiding inside another program • ...
D2 Me Too! 2020-11-23
Across
- Subtitles
- DBX OM's first name
- Lion's site
- Prevents purchases/sets viewing limits
- short-range wireless connection
- Sometimes downloaded on Fire sticks
- Last name of a D2 TM
- Must do for security
- System used by D2 team
- Amazon's AI
- Should not be suppressed in most cases
Down
- Pay every month
- AMZ Device for reading
- This includes talk time, ACW, hold time
- Customer's security code
- D2 SOM's maiden name
- Tool which tells us what to do for Cx
- Manually reset the device
- D2's major KPI
- AMZ preferred customer
- Screen-sharing tool
- 5-Digit code ending Cx address
22 Clues: Subtitles • Lion's site • Amazon's AI • D2's major KPI • Pay every month • DBX OM's first name • Screen-sharing tool • D2 SOM's maiden name • Last name of a D2 TM • Must do for security • AMZ Device for reading • AMZ preferred customer • System used by D2 team • Customer's security code • Manually reset the device • 5-Digit code ending Cx address • short-range wireless connection • ...
Cybersecurity Crossword Puzzle 2023-03-17
Across
- Prevents unauthorized axes.
- Encrypts user data.
- Malware disguised as legit files.
- Provides services over the internet.
- Scrambles data for security.
- Dangerous and can bypass security.
- A group of applications.
- Series of computers and peripherals.
- Waves of requests force shutdown.
- Malware that collects and transmits.
- Changes, corrupts, or destroys information.
Down
- Protects data during encryption.
- Shields users against viruses.
- Hacker changes the IP address.
- Malware that hijacks and encrypts.
- Network of compromised computers.
- Bad, evil software.
- Fools victim into giving information.
- A series of numbers.
- Malware that reproduces and spreads.
20 Clues: Encrypts user data. • Bad, evil software. • A series of numbers. • A group of applications. • Prevents unauthorized axes. • Scrambles data for security. • Shields users against viruses. • Hacker changes the IP address. • Protects data during encryption. • Network of compromised computers. • Malware disguised as legit files. • Waves of requests force shutdown. • ...
Series 6 Puzzle #1 2022-12-28
Across
- Leveraged Purchase of Securities
- Entity Offering Securities for Sale
- Rights of Accumulation, Abrev
- Debt Security
- Net Asset Value, Abrev
- Amount Added to NAV to Arrive at Offer Price
- Individual Retirement Account, Abrev
- Owning a Security
- Modern Portfolio Theory, Abrev
- Not Entitled to Dividends
Down
- Easily Convert an Asset Into Cash
- Excessive Trading
- Financial Industry Regulatory Authority, Abrev
- Schedule of Sales Charge Discounts
- Letter of Intent, Abrev
- Transfer of Funds from One Qualified Retirement Plan to Another
- Price at Which Investor Can Buy
- Self Regulatory Organization, Abrev
- Price at Which Investor Can Sell
- Increase in Asset Value
20 Clues: Debt Security • Excessive Trading • Owning a Security • Net Asset Value, Abrev • Letter of Intent, Abrev • Increase in Asset Value • Not Entitled to Dividends • Rights of Accumulation, Abrev • Modern Portfolio Theory, Abrev • Price at Which Investor Can Buy • Leveraged Purchase of Securities • Price at Which Investor Can Sell • Easily Convert an Asset Into Cash • ...
Government Acronyms 2024-10-24
Across
- National Institute of Standard and Technology
- Department of Justice
- Department of Interior
- National Oceanic Atmospheric Administration
- Housing and Development
- Approves food, cosmetics and drugs
- Department of Health and Human Services
- Securities and Exchange Commission
- Social Security Administration
- Federal Deposit Insurance Cooperation
- Department of Veterans Affairs
- Environmental Protection Agency
Down
- Department of Transportation
- Department of Agriculture
- National Institute of Health
- Department of Defense
- National Aeronautics and Space Administration
- Department of Homeland Security
- Provides DoD with personnel during national emergency
- Federal Communications Commission
- Bus, Rails, Mass Transportation
- Central Intelligence Agency
- Small Business Administration
- Health, Education and Welfare
24 Clues: Department of Justice • Department of Defense • Department of Interior • Housing and Development • Department of Agriculture • Central Intelligence Agency • Department of Transportation • National Institute of Health • Small Business Administration • Health, Education and Welfare • Social Security Administration • Department of Veterans Affairs • Department of Homeland Security • ...
COMMERCE INVESTMENT 2022-06-07
Across
- use of money to purchase equipment for a new business or an existing business
- to overcharge or swindle (a threat to financial security)
- an estimate of income for a set period of time (a step that can minimise impacts of events)
- Expand your portfolio with different types of shares
- personal group with lots of money that are willing to lose it
- Real estate that is bought with the aim of earning some kind of financial return
- money owing to external sources (e.g a bank)
- a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
- illegal business practice (a threat to financial security)
- a type of investment that is acceptable to society’s current standards
- spending more money than your disposable income allows (a threat to financial security)
- a collection of financial investments like stocks and cash etc.
- Part ownership of a company
Down
- Australian Stock exchange
- setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
- a payment made into a fund by an employee towards a future pension
- portion of a company's profit paid to common and preferred shareholders
- A currency used to invest in stocks, shares as well as goods and services etc.
- A practice of funding a project by raising money from a large number of people
- the profit you receive on your investment as a percentage of your original investment
- Investments that provide regulate profits
- Any investment that grows or has potential to grow
22 Clues: Australian Stock exchange • Part ownership of a company • Investments that provide regulate profits • money owing to external sources (e.g a bank) • Any investment that grows or has potential to grow • Expand your portfolio with different types of shares • to overcharge or swindle (a threat to financial security) • ...
Cyber 2024-09-24
balduini paolo 2021-11-21
Across
- indirizzo web o ....
- bullismo in rete
- netiquette ti insegna il ...... del web
- "mi piace navigare sul ....."
- sul web ce ne sono tantissimi
Down
- non puoi postare tutto ciò che vuoi...
- chi fa bullismo in rete
- non usarle a caso!
- strumento di ricerca più usato al mondo
- una lettera scritta dal computer
- prima di navigare sul web chiedi il .... ai tuoi genitori
- abbreviazione di "applicazione"
12 Clues: bullismo in rete • non usarle a caso! • indirizzo web o .... • chi fa bullismo in rete • "mi piace navigare sul ....." • sul web ce ne sono tantissimi • abbreviazione di "applicazione" • una lettera scritta dal computer • non puoi postare tutto ciò che vuoi... • strumento di ricerca più usato al mondo • netiquette ti insegna il ...... del web • ...
Cyberbullying 2022-09-29
Across
- to be protected from risks and danger
- a false story about someone else
- extremely offensive or insulting
- controlled or connected to a computer
- computer, information, technology
- someone's individual online account
Down
- someone who feels hurt and upset
- online communication via typing
- share videos and photos with friends
- a person who purposely intimidates people
10 Clues: online communication via typing • someone who feels hurt and upset • a false story about someone else • extremely offensive or insulting • computer, information, technology • someone's individual online account • share videos and photos with friends • to be protected from risks and danger • controlled or connected to a computer • a person who purposely intimidates people
internet saftey 2024-02-27
10 Clues: are mean people • needs to be strong • to use there matrial • try to take your money • can show you bad stuff • steal your personal info • info needs to be private • has a lot of dangerous stuff • bullies are trying to hurt your feelings • email is trying to get you to spread your info
Stop Bullying 2024-09-13
Across
- penyebab anak melakukan bullying
- Karakteristik perilaku pelaku bullying
- mengintimidasi, mengucilkan, mengabaikan
- memaki, memfitnah, mengejek, mengancam
Down
- Perilaku agresif dan negatip seseorang atau sekelompok orang secara berulang kali
- Dampak korban bullying
- cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang
- Ketika melihat kejadian bullying di sekolah
- memukul, menampar, memalak, mendorong
- Upaya mencegah bullying
10 Clues: Dampak korban bullying • Upaya mencegah bullying • penyebab anak melakukan bullying • memukul, menampar, memalak, mendorong • Karakteristik perilaku pelaku bullying • memaki, memfitnah, mengejek, mengancam • mengintimidasi, mengucilkan, mengabaikan • Ketika melihat kejadian bullying di sekolah • cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang • ...
Pass the B___ 2021-02-18
8 Clues: jyhad no more • the other one • I am the walrus • hail the computer • where the cyber-pope lives • generic doesn't mean boring • this supernatural rpg is a ball • it's not Korea, China, or Japan
teka teki silang keamanan jaringan 2025-11-29
Across
- Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
- Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
- SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
- Metode keamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
- SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
- Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
- DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
- Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
- Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
- Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
Down
- Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.
- Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
- Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
- Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
- MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
- SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
- Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
- (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
- Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
- SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
- IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.
21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah. • SECURITY Menjaga keamanan saat mengakses dan menjelajahi web. • SECURITY Melindungi sistem dan pengguna dari ancaman melalui email. • Memastikan hanya pengguna yang berwenang yang dapat mengakses data. • MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak. • ...
Compliance Champions League 2023 - Crossword 2023-11-22
Across
- Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance
- The _____ feature enables SAP to secure the usage of any application specific function
- What should be the status of a product security incident if you get a CVSS score of 0.0
- _______ field ensures that the action plan step documented will be visible to the custome
- Software with rating ___________ at SAP should not be installed:
- Which tool is used to access cloud systems?
- Who approves the cloud corrections
- Which Board area does AIS belong to?
- _______ tools targets at providing missing functionality and enhancements to Agent Workspace
- _______ notes must be entered to put the case to status Resolved
- SLA that guarantees the continuous communication with SAP S/4Hana Customers
- What is the frequency of Hot-Fix deployment
Down
- Who deploys cloud correction to customer systems
- Attachments are made visible externally by setting the _ flag
- You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com
- If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security inciden
- What should be the final status of a Security Incident
- _____________ team is responsible for the hotfix and its processes involved until the deployment to the customer system.
- _____________ Maintenance Strategy is used by customers to request a quotation online in SMP
- S4hana cloud systems upgrade happens every __________ month/months
20 Clues: Who approves the cloud corrections • Which Board area does AIS belong to? • Which tool is used to access cloud systems? • What is the frequency of Hot-Fix deployment • Who deploys cloud correction to customer systems • What should be the final status of a Security Incident • Attachments are made visible externally by setting the _ flag • ...
Electronic Payment Systems and Security 2023-03-29
Across
- Adherence to security standards to protect against fraud
- Verification of user or system identity
- Process of granting access to a system or resource
- Electronic devices worn on the body that collect and transmit data
- Payment authentication method that uses physical characteristics such as fingerprints or facial recognition
- Digital currency that uses encryption techniques for secure transactions
- Software that damages or disrupts computer systems
- Payment method that allows customers to complete transactions by tapping or waving their card or mobile device
- Use of physical or behavioral characteristics for authentication
- Payment system that operates on a peer-to-peer network without a central authority or intermediary
- Type of artificial intelligence that allows devices to learn and improve without explicit programming
- Ability of devices to connect and communicate with other devices or networks
- Network security system that controls access
- Payment method that allows customers to complete transactions using their smartphone or other mobile device
Down
- Residence equipped with Internet of Things devices that can be controlled remotely
- Cryptographic method of verifying document authenticity
- Data security technique that replaces sensitive data with unique identification symbols
- Security process that requires two methods of authentication
- Deliberate deception for unlawful gain
- Dispute resolution process where a customer can reverse a transaction
- Use of algorithms to identify and prevent fraudulent activity
- The process of verifying and adding transactions to a blockchain by solving complex mathematical equations
- Service that authorizes and processes electronic payments
- Process of encoding data for secure transmission
- Devices that detect and respond to changes in the physical environment
25 Clues: Deliberate deception for unlawful gain • Verification of user or system identity • Network security system that controls access • Process of encoding data for secure transmission • Process of granting access to a system or resource • Software that damages or disrupts computer systems • Cryptographic method of verifying document authenticity • ...
Zajedno za bolji internet 2023-03-01
Across
- (eng.)za elektroničko nasilje
- kod koji netko koristi za privatnost
- na njima se treba biti oprezan
- komuniciranje s drugima preko interneta
- namjenjeno za povećanje znajna onome kome je namijenjeno
- nasilje preko elektronike
- tragovi tragovi koje ne namjerno stavljamo na internet
Down
- ogromno i opasno mijesto
- neispravna informacija
- naša sigurnost na svakoj stranici
- (eng.) za kolačići
- tragovi tragovi koje namjerno stavljamo na internet
- tragovi koje ostavljaš na internetu
- neželjna pošta
14 Clues: neželjna pošta • (eng.) za kolačići • neispravna informacija • ogromno i opasno mijesto • nasilje preko elektronike • (eng.)za elektroničko nasilje • na njima se treba biti oprezan • naša sigurnost na svakoj stranici • tragovi koje ostavljaš na internetu • kod koji netko koristi za privatnost • komuniciranje s drugima preko interneta • ...
Bullying 2023-02-14
Across
- You're a loser no one likes you
- causing harm or injury to another
- posting or sending mean info
- The NH state ______ is for people under 18
- you shouldn't share ________ info online
- leaving someone out to humiliate them
- to spread embarrassing information about someone
Down
- what you should do if you see bullying happening
- Watches ignores or laughs
- Bullying creates an imbalance of power
- The person making someone feel unsafe
- making someone feel alone
- feels unsafe or is harmed
- someone who helps
14 Clues: someone who helps • Watches ignores or laughs • making someone feel alone • feels unsafe or is harmed • posting or sending mean info • You're a loser no one likes you • causing harm or injury to another • The person making someone feel unsafe • leaving someone out to humiliate them • Bullying creates an imbalance of power • you shouldn't share ________ info online • ...
Fall 2024-09-21
Across
- Disney's movie of celebration
- Be cautious with sharp edges and candles around them
- Day before Saints day
- Popular name for autumn celebrations
- Children dread going back
- Fattest day of the year
Down
- A staple poultry in November
- The most and best sign in the world
- 2 week celebration in Germany
- Important to do this before winter.
- Length in months
- Black Friday and Cyber Monday are ...... days???
- Bill signed June of 1984
- Most know for during this time
14 Clues: Length in months • Day before Saints day • Fattest day of the year • Bill signed June of 1984 • Children dread going back • A staple poultry in November • Disney's movie of celebration • 2 week celebration in Germany • Most know for during this time • The most and best sign in the world • Important to do this before winter. • Popular name for autumn celebrations • ...
Online bullying 2024-06-11
Across
- online platform
- when someone is picking on you constantly
- going to the police to fill in a
- someone to talk to at school
Down
- connected to a group of things
- someone you can seek out
- protecting yourself online
- another name for the internet
- a platform used with internet
- to stop people contacting you
- someone to talk to at home
11 Clues: online platform • someone you can seek out • protecting yourself online • someone to talk to at home • someone to talk to at school • another name for the internet • a platform used with internet • to stop people contacting you • connected to a group of things • going to the police to fill in a • when someone is picking on you constantly
balduini paolo 2021-11-21
Across
- indirizzo web o ....
- bullismo in rete
- netiquette ti insegna il ...... del web
- "mi piace navigare sul ....."
- sul web ce ne sono tantissimi
Down
- non puoi postare tutto ciò che vuoi...
- chi fa bullismo in rete
- non usarle a caso!
- strumento di ricerca più usato al mondo
- una lettera scritta dal computer
- prima di navigare sul web chiedi il .... ai tuoi genitori
- abbreviazione di "applicazione"
12 Clues: bullismo in rete • non usarle a caso! • indirizzo web o .... • chi fa bullismo in rete • "mi piace navigare sul ....." • sul web ce ne sono tantissimi • abbreviazione di "applicazione" • una lettera scritta dal computer • non puoi postare tutto ciò che vuoi... • strumento di ricerca più usato al mondo • netiquette ti insegna il ...... del web • ...
Mental Health 2022-10-11
Across
- physical activity releases
- action or event that causes stress
- what does the T stand for in SMART
- when a person uses mindfulness to relax
- mental blank that is diagnosed
- progressive blank relaxation
Down
- meditation helps improve blank
- bullying when someone attacks your feelings
- what does the S stand for in SMART
- sadness is a
- when someone uses social media to bully
- someone who watches someone get bullied
12 Clues: sadness is a • physical activity releases • progressive blank relaxation • meditation helps improve blank • mental blank that is diagnosed • action or event that causes stress • what does the S stand for in SMART • what does the T stand for in SMART • when someone uses social media to bully • when a person uses mindfulness to relax • someone who watches someone get bullied • ...
La Citoyenneté Numérique 2024-11-22
Across
- resource
- an app
- unlimited
- Behavior
- to have access to
- To use
- to light up
- data
- To communicate
- To become
- to move a file
- Addicted
- To prevent
- risk, danger
- To report
- Addicted
- To behave
- smartphone
- Negative comment
- to post
- Private
- digital identity
- With difficulty
- to stay up to date/informed of
- Social media/networks
- search engine
- Targeted by
- Respectful
- Private life
- to save a file
- text message
- plan
- To permit/allow
- Cyber-bullying
- To forbid/prohibit
- To stream and watch a movie
Down
- connected, trendy, plugged-in
- Prudent/careful
- password
- To send
- home page
- To secure/protect oneś profile
- computer
- to download
- to broadcast, distribute
- To receive
- digital footprint
- user
- An account
- To remove
- Threat
- Easily
- to interact
- To protect oneself
- To choose to
- To belong to/be part of
- To have the right to
- Punished
- To learn
- network
- Plagiarism
- Hyperconected
- La
- File
- Cyber-dependent
- screen
- internet user
- Victim
- To protect
- world
70 Clues: La • user • data • File • plan • world • an app • To use • Threat • Easily • screen • Victim • To send • to post • Private • network • resource • password • Behavior • computer • Addicted • Addicted • Punished • To learn • home page • unlimited • To become • To remove • To report • To behave • To receive • An account • To prevent • smartphone • Plagiarism • Respectful • To protect • to download • to light up • to interact • Targeted by • risk, danger • To choose to • ...
Digital Technology Cross Word 2021-07-23
7 Clues: Online Theft • A Online Map • A Portible Computer • Two things join or ______ • A Large Technology Company • Another word for smartphone • A connection between devices
Digital Citizenship crossword 2021-02-25
Across
- Being polite online
- When you're tricked by a rando online
- A combination of #s letters and symbols
- A member of the online world
- a victim of Cyber bullying
- (bing, google, yahoo)
Down
- being mean online
- where you can search things up
- what you leave online
- Sending letters through a computer
- When someone steals your info online
- getting angry online and posting about it
12 Clues: being mean online • Being polite online • what you leave online • (bing, google, yahoo) • a victim of Cyber bullying • A member of the online world • where you can search things up • Sending letters through a computer • When someone steals your info online • When you're tricked by a rando online • A combination of #s letters and symbols • getting angry online and posting about it
La Cyber-Société 2023-01-08
Across
- mobile Commerce électronique, acheter et vendre des produits ou services en ligne
- Ordinateurs, téléphones portables et tablettes
- Dangers
- Concept faisant référence à l'influence croissante de la technologie et de l'Internet sur notre vie quotidienne
- Cours en ligne
Down
- Harcèlement en ligne
- Criminalité informatique
- S'exprimer par écrit ou à haute voix
- Acheter des produits en ligne
- Travail en équipe en ligne
- Faits ou informations
- Commerce en ligne
12 Clues: Dangers • Cours en ligne • Commerce en ligne • Harcèlement en ligne • Faits ou informations • Criminalité informatique • Travail en équipe en ligne • Acheter des produits en ligne • S'exprimer par écrit ou à haute voix • Ordinateurs, téléphones portables et tablettes • mobile Commerce électronique, acheter et vendre des produits ou services en ligne • ...
Digital Citizenship Vocabulary 2022-11-04
Across
- imagine feelings
- facts for different purposes
- piece of advice
- storing app or item
- app using information
- someone who shares your information
- online bulling
- over sharing feelings
- someone who supports you to a cyber bully
- using something without any permission
- something that collects data from you
Down
- something that makes you uncomfortable
- something that lasts
- something that you do and share online
- something to ask before using
- someone who helps you defeat a bully
- merging copyright music with other music
- buys products
- balance using media in a healthy way
- something that uses all info of you
- using something online on certain situations
21 Clues: buys products • online bulling • piece of advice • imagine feelings • storing app or item • something that lasts • app using information • over sharing feelings • facts for different purposes • something to ask before using • something that uses all info of you • someone who shares your information • someone who helps you defeat a bully • balance using media in a healthy way • ...
November Crossword 2025-10-30
Across
- Annual shopping frenzy, with 5-Down
- “Fall back” phenomenon, with 17-Across
- Day of the Dead altar
- Boat, to Pilgrims
- Seasonal crop roundup
- Popular flavor, for pie or cider
- Livestock lunch?
- “Fall back” phenomenon, with 4-Across
- Canned sauce flavor
- Mythical symbol of abundance
- Turkey substitute
- Thanksgiving spread
Down
- Lucky break?
- Touchdown territory
- ___ Moon: November supermoon
- Annual shopping frenzy, with 3-Across
- Soft potato preparation
- Backyard broom?
- Eaten on the cob
- Objects of gratitude
- Celebrated patriots
- Post-turkey sweet treat
- Cozy feeling, to the Danish
- Boat, to gravy
- Crispy potato preparation
- Day of online purchases, with “Cyber”
26 Clues: Lucky break? • Boat, to gravy • Backyard broom? • Eaten on the cob • Livestock lunch? • Boat, to Pilgrims • Turkey substitute • Touchdown territory • Celebrated patriots • Canned sauce flavor • Thanksgiving spread • Objects of gratitude • Day of the Dead altar • Seasonal crop roundup • Soft potato preparation • Post-turkey sweet treat • Crispy potato preparation • Cozy feeling, to the Danish • ...
RAA NRTW Crossword 2025-10-30
Across
- helping bones tell their story, one snapshot at a time
- the wizard protectors of cyber trolls
- people whisper
- compliance guardian
- first impression for patients, front lines
- patient wrangler
- facility maestro
- keeper of secrets
- body scanner extraordinaire
- master of forms , check in and friendly faces
Down
- masters of decoding
- master of sound waves
- multitasker and keeper of radiologist schedules
- the breast friend
- budget boss
- image detective
- our right hand for everything
- bone density detective
- invoice avengers
- plays with magnets
- support ninja 24hrs a day
- delivery prodigy
- chaos tamer in chief
- promotes our company
- magicians who start our patient care, one call at a time
25 Clues: budget boss • people whisper • image detective • patient wrangler • invoice avengers • facility maestro • delivery prodigy • the breast friend • keeper of secrets • plays with magnets • masters of decoding • compliance guardian • chaos tamer in chief • promotes our company • master of sound waves • bone density detective • support ninja 24hrs a day • body scanner extraordinaire • ...
Princess and the pop star 2020-12-04
Across
- Pop star' surname
- security guard #2
- What they made on the farm
- who Princess sang to each morning
- where Princess got the milk from
- Pop star's first name
- little brother
Down
- what is so special
- Dad's invention
- Surname of the family
- Name of girl on the farm
- where Princess was singing
- security guard #1
- Where the family went to find Princess
- God has one for us
15 Clues: little brother • Dad's invention • Pop star' surname • security guard #2 • security guard #1 • what is so special • God has one for us • Surname of the family • Pop star's first name • Name of girl on the farm • where Princess was singing • What they made on the farm • where Princess got the milk from • who Princess sang to each morning • Where the family went to find Princess
Digital Citizenship Vocabulary 2022-11-04
Across
- imagine feelings
- facts for different purposes
- piece of advice
- storing app or item
- app using information
- someone who shares your information
- online bulling
- over sharing feelings
- someone who supports you to a cyber bully
- using something without any permission
- something that collects data from you
Down
- something that makes you uncomfortable
- something that lasts
- something that you do and share online
- something to ask before using
- someone who helps you defeat a bully
- merging copyright music with other music
- buys products
- balance using media in a healthy way
- something that uses all info of you
- using something online on certain situations
21 Clues: buys products • online bulling • piece of advice • imagine feelings • storing app or item • something that lasts • app using information • over sharing feelings • facts for different purposes • something to ask before using • something that uses all info of you • someone who shares your information • someone who helps you defeat a bully • balance using media in a healthy way • ...
Digital Citizenship Vocabulary 2022-11-04
Across
- imagine feelings
- facts for different purposes
- piece of advice
- storing app or item
- app using information
- someone who shares your information
- online bulling
- over sharing feelings
- someone who supports you to a cyber bully
- using something without any permission
- something that collects data from you
Down
- something that makes you uncomfortable
- something that lasts
- something that you do and share online
- something to ask before using
- someone who helps you defeat a bully
- merging copyright music with other music
- buys products
- balance using media in a healthy way
- something that uses all info of you
- using something online on certain situations
21 Clues: buys products • online bulling • piece of advice • imagine feelings • storing app or item • something that lasts • app using information • over sharing feelings • facts for different purposes • something to ask before using • something that uses all info of you • someone who shares your information • someone who helps you defeat a bully • balance using media in a healthy way • ...
Digital Citizenship Vocabulary 2022-11-04
Across
- imagine feelings
- facts for different purposes
- piece of advice
- storing app or item
- app using information
- someone who shares your information
- online bulling
- over sharing feelings
- someone who supports you to a cyber bully
- using something without any permission
- something that collects data from you
Down
- something that makes you uncomfortable
- something that lasts
- something that you do and share online
- something to ask before using
- someone who helps you defeat a bully
- merging copyright music with other music
- buys products
- balance using media in a healthy way
- something that uses all info of you
- using something online on certain situations
21 Clues: buys products • online bulling • piece of advice • imagine feelings • storing app or item • something that lasts • app using information • over sharing feelings • facts for different purposes • something to ask before using • something that uses all info of you • someone who shares your information • someone who helps you defeat a bully • balance using media in a healthy way • ...
klausimai 2023-05-17
Across
- Kas yra „object-oriented programming“?
- Kas yra žurnalavimas?
- Kas yra „data cente?
- Kas yra „software development life cycle“?
- Kas yra „operating system“?
- Kas yra „network protocol“?
- Kas yra „serveris“?
- Kas yra „cloud computing“?
- Kas yra „version control“?
- Kas yra „URL“?
- Kas yra „cybersecurity“?
- Kas yra „cache“?
- Kas yra „cyber attack“?
- Kas yra „bug“
- Kas yra „router“?
- Kas yra „firewall“?
Down
- Kas yra „artificial intelligence“?
- Kas yra „RAM“?
- Kas yra „encryption“?
- Kas yra „HTML“?
- Kas yra „API“?
- Kas yra „data backup“?
- Kas yra „malware“?
- Kas yra „database management system“?
- Kas yra algoritmas
- Kas yra duomenų bazė?
- Kas yra „programming language“?
- Kas yra „data mining“?
- Kas yra „open source“?
- Kas yra „user interface“?
30 Clues: Kas yra „bug“ • Kas yra „RAM“? • Kas yra „API“? • Kas yra „URL“? • Kas yra „HTML“? • Kas yra „cache“? • Kas yra „router“? • Kas yra „malware“? • Kas yra algoritmas • Kas yra „serveris“? • Kas yra „firewall“? • Kas yra „data cente? • Kas yra „encryption“? • Kas yra žurnalavimas? • Kas yra duomenų bazė? • Kas yra „data backup“? • Kas yra „data mining“? • Kas yra „open source“? • Kas yra „cyber attack“? • ...
Teka-Teki Silang kata serapan dan konjungsi 2025-09-15
Across
- kata siber diserap dari kata
- luring contoh kata serapan
- Sarah suka baca buku.baca merupakan jenis kata serapan
- seperti dan seolah-olah termasuk subordinatif
- kata "atau"merupakan konjungsi
- kata "terakhir "merupakan konjungsi
- biarpun dan meskipun termasuk subordinatif
- kata "sebelumnya" merupakan konjungsi
- konjungsi merupakan kata...dalam suatu kalimat
- kata angka diserap dari bahasa
Down
- kata"tetapi, melainkan"merupakan kata hubung
- peramban merupakan serapan dari kata
- kata yang digunakan untuk menghilangkan frasa/klausa disebut konjungsi
- memperkaya kosakata merupakan fungsi dari
- dosen berasal dari bahasa Belanda yaitu
- salah satu dari klausa itu adalah anak
- bola berasal dari bahasa
- bisnis berasal dari bahasa
- kata "guna" merupakan konjungsi
- rekening adalah contoh kata serapan
20 Clues: bola berasal dari bahasa • luring contoh kata serapan • bisnis berasal dari bahasa • kata siber diserap dari kata • kata "atau"merupakan konjungsi • kata angka diserap dari bahasa • kata "guna" merupakan konjungsi • kata "terakhir "merupakan konjungsi • rekening adalah contoh kata serapan • peramban merupakan serapan dari kata • kata "sebelumnya" merupakan konjungsi • ...
Computer management - safe-guardung our data 2016-04-14
Across
- 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
- 9. An error is also known as a …
- Array of Inexpensive 1. What does RAID stand for ?
- 1. A water related natural disaster
- worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
- verification 8. Checking for the accuracy of data from a human perspective
- security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
- Power Supply 10. What does “UPS” stand for ?
- 5. What is the term for ‘fishing for Information’
- 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
Down
- 5. ‘Garbage In, Garbage Out’
- Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
- 7. Volatile memory
- 6. The first line of defence is
- 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
- 3. A form of malware disguised as a useful program
- Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
- problems 8. Power outages or power dips are also known as…
- User Interface 2. What does GUI stand for?
- issues 2. A category of threats to data beginning with H
20 Clues: 7. Volatile memory • 5. ‘Garbage In, Garbage Out’ • 6. The first line of defence is • 9. An error is also known as a … • 1. A water related natural disaster • User Interface 2. What does GUI stand for? • Power Supply 10. What does “UPS” stand for ? • 5. What is the term for ‘fishing for Information’ • Array of Inexpensive 1. What does RAID stand for ? • ...
Computer management - safe-guardung our data 2016-04-14
Across
- 9. An error is also known as a …
- security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
- Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
- issues 2. A category of threats to data beginning with H
- Power Supply 10. What does “UPS” stand for ?
- 6. The first line of defence is
- Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
- 5. What is the term for ‘fishing for Information’
- 1. A water related natural disaster
- 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
- 7. Volatile memory
Down
- 3. A form of malware disguised as a useful program
- 5. ‘Garbage In, Garbage Out’
- User Interface 2. What does GUI stand for?
- 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
- Array of Inexpensive 1. What does RAID stand for ?
- 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
- worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
- problems 8. Power outages or power dips are also known as…
- verification 8. Checking for the accuracy of data from a human perspective
20 Clues: 7. Volatile memory • 5. ‘Garbage In, Garbage Out’ • 6. The first line of defence is • 9. An error is also known as a … • 1. A water related natural disaster • User Interface 2. What does GUI stand for? • Power Supply 10. What does “UPS” stand for ? • 5. What is the term for ‘fishing for Information’ • 3. A form of malware disguised as a useful program • ...
Chapter 6 Advance Cyber 2025-11-16
Across
- Unpatched or outdated applications that create security holes.
- An attack that compromises a website known to be frequented by a specific target group.
- False information spread intentionally to deceive.
- The social engineering tactic of creating a fabricated scenario to obtain information.
- A network connected using physical cables, like Ethernet.
- A threat delivered via an attachment, like a malicious PDF or DOC file.
- Phishing conducted via SMS text message.
- A potential physical threat vector, like a USB drive.
- False information that is spread, regardless of the intent to deceive.
- Registering a domain name very similar to a popular one, relying on user mistypes.
- End-of-life (EOL) software that no longer receives security patches. (2 Words)
- A network that uses radio waves, like Wi-Fi.
- A short-range wireless protocol used for PANs (Personal Area Networks).
Down
- A type of spam that embeds its message in a picture to evade text filters.
- Network ports left accessible and running services, creating potential entry points.
- Security software installed directly on an endpoint, like a laptop or PC.
- An attack that mimics the look and feel of a legitimate company's logo, website, or email.
- Security scanning performed remotely, without installing software on the target device.
- A social engineering attack using email to trick a user into revealing credentials.
- Phishing conducted over a voice call.
- Unsolicited and unwanted bulk email.
- The technical name for text messaging (Abbr: SMS).
- An attack that targets a trusted third-party vendor to compromise the final target.
- The medium used for a 'vishing' attack.
24 Clues: Unsolicited and unwanted bulk email. • Phishing conducted over a voice call. • The medium used for a 'vishing' attack. • Phishing conducted via SMS text message. • A network that uses radio waves, like Wi-Fi. • False information spread intentionally to deceive. • The technical name for text messaging (Abbr: SMS). • A potential physical threat vector, like a USB drive. • ...
Security CW 2023-04-24
Across
- A type of security testing that simulates an attacker with knowledge of the system ( ____ testing)
- A security principle that means users should have access only to the resources they need (least ____)
- A type of vulnerability that allows attackers to execute code remotely (remote code ____)
Down
- A type of security control that can help prevent cross-site scripting attacks (input ____)
- A type of security control that can help prevent buffer overflow attacks (stack ____)
- A type of security control that can help prevent cross-site request forgery attacks (____ token)
- A type of vulnerability that can allow attackers to access sensitive information (____ injection)
- A common technique used to prevent SQL injection attacks (____ parameters)
- A type of security testing that tries to break an application by feeding unexpected input (_____testing)
9 Clues: A common technique used to prevent SQL injection attacks (____ parameters) • A type of security control that can help prevent buffer overflow attacks (stack ____) • A type of vulnerability that allows attackers to execute code remotely (remote code ____) • A type of security control that can help prevent cross-site scripting attacks (input ____) • ...
LEGAL 2024-11-13
Across
- refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
- Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
- These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
- is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
- refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
- is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
- theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
- refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization
8 Clues: theft refers to obtaining or possessing another’s identity and information to commit a legal offense. • refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization • ...
The eye of minds cross word 2024-05-10
Across
- Michaels friend know for her coding
- how they access the vetnet
- the name of the game
- the main character
- Michaels best friends also known as the best gamer
Down
- the main way Micheal gets information
- the agency trying to stop kaine
- the network of the game
- when your in the game
- the name of the virus
- what protects the coding
- the cyber-terrarist in the game
12 Clues: the main character • the name of the game • when your in the game • the name of the virus • the network of the game • what protects the coding • how they access the vetnet • the agency trying to stop kaine • the cyber-terrarist in the game • Michaels friend know for her coding • the main way Micheal gets information • Michaels best friends also known as the best gamer
11.2 Cabinet Departments and Independent Agencies 2021-04-22
Across
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
- providing the military forces needed to deter war and protect the security of our country.
- the health of all Americans and providing essential human services.
- enforcing the laws of the United States federal government
- representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
- manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
- national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
- manage the liquidity of a business.
Down
- planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
- integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
- oversees the American farming industry
- the management and distribution of the federal budget for education initiatives.
- what is the title of the head of the executive branch departments?
- laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.
14 Clues: manage the liquidity of a business. • oversees the American farming industry • enforcing the laws of the United States federal government • what is the title of the head of the executive branch departments? • the health of all Americans and providing essential human services. • the management and distribution of the federal budget for education initiatives. • ...
Private Security Chapter 1-3 Terminology 2019-09-27
Across
- the first regular police force in London
- a call to citizens to assist in an emergency situation
- Scanning Analysis Response Assess
- any action taken to reduce crime risks and build individual and community safety
- official data on crime that are reported to law enforcement agencies across the United States
- Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
Down
- a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
- the aim of punishment is to prevent or deter persons from engaging in future crime
- when security officers respond for security purposes after a crime has been attempted or committed
- when security organizations police the community all work together to solve crime
- the eight major crimes included in Part 1 of the Uniform Crime Report
- when security organizations work to prevent crime
12 Clues: Scanning Analysis Response Assess • the first regular police force in London • when security organizations work to prevent crime • a call to citizens to assist in an emergency situation • the eight major crimes included in Part 1 of the Uniform Crime Report • Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau • ...
Cyber safety-Hugh barry 2016-05-31
Across
- social media
- a persons details
- ups don't click on them because bad things will happen
- they block viruses
- bullying someone who bullies online
- someone sends you a discusting picture
- ask to do it
- internet
- a website comes out and persuades you
- don't tell anyone
- so I can tell what's appropriate
- one per class
- a thing that hacks electronic devices
Down
- controls so I can't see inappropriate websites
- someone who makes up a name to be someone else
- don't let enyone see
- one per school
- a way to communicate with some else
- don't let people go on it
- someone who looks after you
20 Clues: internet • social media • ask to do it • one per class • one per school • a persons details • don't tell anyone • they block viruses • don't let enyone see • don't let people go on it • someone who looks after you • so I can tell what's appropriate • bullying someone who bullies online • a way to communicate with some else • a website comes out and persuades you • ...
Perth Forensic Crossword 2023-10-20
Across
- Strong moral principles
- Meet the team, clue: Russell
- Meeting to discussion allegations
- Meet the team, clue: East USA
- Digital forensics
- Meet the team, clue: South-east USA
- May provide information
- Process of improving a situation
- Meet the team, clue: Eddard
- Used to make findings
- Meet the team, clue: Sansa
- Subject of investigations
Down
- Personal relationship that can affect work
- Deception for gain
- Preliminary assessment
- Examination of allegations
- Financial crime
- Collection of information
- A party with an interest
- Dishonest conduct
- Meet the team, clue: The Great
- Provides a service
- Acronym for a type of investigation against a person
- Vetting a client carefully
24 Clues: Financial crime • Digital forensics • Dishonest conduct • Deception for gain • Provides a service • Used to make findings • Preliminary assessment • Strong moral principles • May provide information • A party with an interest • Collection of information • Subject of investigations • Examination of allegations • Meet the team, clue: Sansa • Vetting a client carefully • ...
enkkuristikko 2016-02-23
20 Clues: työ • luova • yritys • ongelma • aikaraja • joustava • hierarkia • sopeutuva • työnjohto • resurssit • neuvottelu • tiedottaja • motivaatio • työntekijä • työnjohtaja • turvallisuus • ansioluettelo • vastuullisuus • kunnianhimoinen • kilpailuhenkinen
computer engineer vocab(both verbs and nouns) 2023-02-09
20 Clues: work • tipo • mirar • silla • lograr • codigo • pensar • online • Moniter • protect • teclado • adaptar • aprender • resolver • Security • computer • cybernetic • Specialist • electritcity • investigacion
June 2022 Crossword 2022-05-26
22 Clues: she • man • him • hope • Your • hope • show • path • work • take • test • works • hears • bodily • future • blessed • through • comfort • fiction • the Lord • redirect • wilderness
Airport by: Madelyn Horner 2022-10-13
20 Clues: buy • call • board • train • flight • arrive • ticket • screen • luggage • station • airport • reclaim • customs • confirm • suitcase • security • passport • vacation • to travel • passenger
el aeropuerto 2022-10-13
20 Clues: gate • taxi • check • ticket • screen • aboard • flight • customs • arrival • airport • luggage • suitcase • passport • vacation • airplane • security • passenger • itinerary • departure • identification
2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente 2023-10-19
20 Clues: Tiro • Dois • Técnico • Família • honesto • Atraído • Expansão • Educação • Crianças • Chuveiro • Academia • Segurança • Exaustivo • Diferente • Organizado • Universidade • Apresentando • Recrutamento • Completamente • Revolucionando
dgeconomy 2025-03-12
Across
- Fifth-generation wireless technology
- Protection of digital systems from cyber threats
- Large and complex data sets
- A newly established business
- Secure and decentralized digital ledger
- Immersive virtual reality technology
- Use of technology to perform tasks with minimal human intervention
- Technology overlaying digital images onto the real world
Down
- Electronic system for storing and making transactions
- Internet-based computing services
- Digital or virtual currency
- Technology-driven financial services
- Online buying and selling of goods and services
- Network of connected smart devices
- Machines performing human-like intelligence tasks
15 Clues: Digital or virtual currency • Large and complex data sets • A newly established business • Internet-based computing services • Network of connected smart devices • Fifth-generation wireless technology • Technology-driven financial services • Immersive virtual reality technology • Secure and decentralized digital ledger • Online buying and selling of goods and services • ...
Misc 2024-07-29
Across
- A KNOWN C2 AND Adversary Simulations and Red Team Operations
- HACKER WHO DIED THIS YEAR
- A THREAT ACTOR WHICH WAS INVOLVED IN BANGLADESH BANK HEIST
- CONFERENCE DEDICATED FOR MACOS SECURITY
- created by the Spanish security company Hispasec Sistemas
- RECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TO
Down
- standard for sending and receiving notification messages
- first modern and online darknet market
- Launched in 1989 as a cooperative for information security thought leadership,
- Who shifted to a new threat actor naming taxonomy?
- A standard programming language used, supported, and promoted by Apple
- A subsystem to be termination next year
- Largest acquisition of Salesforce till date
13 Clues: HACKER WHO DIED THIS YEAR • first modern and online darknet market • CONFERENCE DEDICATED FOR MACOS SECURITY • A subsystem to be termination next year • Largest acquisition of Salesforce till date • RECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TO • Who shifted to a new threat actor naming taxonomy? • standard for sending and receiving notification messages • ...
System Hardening Quiz 1 2023-08-23
Across
- Prove an identity through login
- Security ____ uses predefined set of security settings to configure security settings of a computer
- Data is accessible only to authorized users
- Type _____ Multifactor Authentication is based on something you know
- Type _____ Multifactor Authentication is based on something you have
- Data can only be created and modified by authorized users
Down
- Grant access to resources based on user
- Type _____ Multifactor Authentication is based on something you are
- Data is available and accessible when required
- This encryption uses the same key to encrypt and decrypt
- Control which application can be executed
- Tracks and audit access and capabilities
- Data can only be created and modified by authorized users
- Filter contents of packets and traffic
14 Clues: Prove an identity through login • Filter contents of packets and traffic • Grant access to resources based on user • Tracks and audit access and capabilities • Control which application can be executed • Data is accessible only to authorized users • Data is available and accessible when required • This encryption uses the same key to encrypt and decrypt • ...
Choice Board Crossword Puzzle 2021-03-05
20 Clues: decir • avion • traer • andar • poder • venir • hacer • saber • tener • poner • caber • querer • boleto • pasillo • producir • traducir • despegar • conducir • pasaporte • seguridad
Unit 3 vocabulary 2016-11-20
20 Clues: wet • zaak • liever • grijpen • overval • verward • getuige • schuldig • oplossen • straffen • crimineel • vermijden • onbeleefd • ontkennen • gevangenis • onschuldig • verspillen • achterkant • kwaadaardig • beveiliging
D 3 Reisenvokabeln 2020-11-16
20 Clues: arrive • sights • layover • customs • to_turn • to_cross • security • flat_tire • breakdown • speed_trap • toll_booth • round_trip • traffic_jam • intersection • baggage_claim • redeye_flight • straight_ahead • traffic_ticket • motion_sickness • carry-on_luggage
Ok 2023-09-21
Everyday Uses: 2025-01-27
20 Clues: eat • load • Boss • time • home • Akre • work • oven • Erbil • drive • midday • animal • liquid • morning • evening • outside • refugee • security • materials • community
Stary Przyjaciel 2025-04-06
20 Clues: box • car • ink • gate • bank • mask • cell • hand • smile • money • police • friend • escape • partner • meeting • passerby • security • criminal • suspicion • perpetrator
Airport by: Madelyn Horner 2022-10-13
20 Clues: buy • call • board • train • flight • arrive • ticket • screen • luggage • station • airport • reclaim • customs • confirm • suitcase • security • passport • vacation • to travel • passenger
Sjdb 2025-10-01
20 Clues: gate • Flight • ticket • ToBoard • airport • arrival • moniter • luggage • security • suitcase • passport • passenger • itinerary • departure • ToGetInLine • TravelAgency • boardingpass • ToCallSomeone • ToGoOnVacasion • GoThroughCustoms
Sjdb 2025-10-01
20 Clues: gate • Flight • ticket • luggage • airport • ToBoard • arrival • moniter • passport • suitcase • security • itinerary • departure • passenger • ToGetInLine • TravelAgency • boardingpass • ToCallSomeone • ToGoOnVacasion • GoThroughCustoms
ISACA BC 2022-10-15
Across
- way to create a secure software
- is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
- a computer malware program that was originally developed in the form of a banking Trojan
- integrates all of the cloud security capabilities into a single cloud-native solution
- Toughest privacy and security law in the world
Down
- malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
- to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
- method that requires the user to provide two or more verification factors to gain access to a resource
- is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
- is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
10 Clues: way to create a secure software • Toughest privacy and security law in the world • integrates all of the cloud security capabilities into a single cloud-native solution • a computer malware program that was originally developed in the form of a banking Trojan • ...
IT - Crossword 2024-11-25
Across
- Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that
- film, or record literary, artistic, or musical material, and to authorize
- The identification and assurance of the origin of information
- Unauthorized access of or interference with computer systems, servers, or
- author without authorization
- An act or instance of using or closely imitating the language and thoughts of
- A weakness, design, or implementation error that can lead to an
- event that compromises the security of the system.
- in order to induce individuals to reveal personal information, such as
- Action taken in advance to protect the system against potential threats or
- only by those authorized
- Ensuring that the information is accessible to authorized persons when required without delay.
- Any action derived from intelligent threats to violate the security of the
- fraudulent practice of sending emails purporting to be from reputable
- your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
- to do the same
- phishing, spamming and child pornography) is used as a tool to commit
- may use computer technology to access personal information,
- of sexual organs or sexual activity with the aid of a computer system for favor or
Down
- A defined method of breaching the security of an IT system through
- information and communication systems
- and credit card numbers
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
- Ensuring that the information/data can be
- Involves actions that supplement the precautionary measures
- A common type of online fraud
- An assurance for which someone cannot deny something
- trade secrets or use the internet for exploitative or malicious purposes.
- Any action of stealing information from a users’ system.
- offense
- a crime in which a computer is the object of the crime
- User security allows the system to set security rules to determine what is displayed to which user.
- The exclusive legal right, given to an originator or an assignee to print, publish,
33 Clues: offense • to do the same • and credit card numbers • only by those authorized • author without authorization • A common type of online fraud • information and communication systems • Ensuring that the information/data can be • event that compromises the security of the system. • An assurance for which someone cannot deny something • ...
Gone Phishing 2017-09-08
Across
- Conversion of data into a form that cannot be easily understood by unauthorized people.
- Policy that indicates what kind of information a website will take from you and what they intend to do with it.
- Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- A secret word or phrase known only to you.
- Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
- A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
- Crime conducted via the Internet or some other computer network.
Down
- Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
- An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- What tells you that the website is secure in the browser.
- An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
- Whaling A type of fraud that targets high-profile end users.
- A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
14 Clues: A secret word or phrase known only to you. • What tells you that the website is secure in the browser. • Whaling A type of fraud that targets high-profile end users. • Crime conducted via the Internet or some other computer network. • Conversion of data into a form that cannot be easily understood by unauthorized people. • ...
Gone Phishing 2017-09-08
Across
- What tells you that the website is secure in the browser.
- An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
- An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
- Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
- Policy that indicates what kind of information a website will take from you and what they intend to do with it.
Down
- Conversion of data into a form that cannot be easily understood by unauthorized people.
- A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
- An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- A secret word or phrase known only to you.
- A type of fraud that targets high-profile end users.
- Crime conducted via the Internet or some other computer network.
- Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
14 Clues: A secret word or phrase known only to you. • A type of fraud that targets high-profile end users. • What tells you that the website is secure in the browser. • Crime conducted via the Internet or some other computer network. • Conversion of data into a form that cannot be easily understood by unauthorized people. • ...
P&SD Xword Challenge 2017-11-13
Across
- Close to Tommy Coopers head from Chirag
- More than three of the dib dib dib boys
- Beyoncé’s husband sizing in the cloud
- A number of Derek’s on the voice
- Approving the twinkle twinkle
- Apportioning F5 weight
- Nearly the Bullseye presenter Bid.
- PM with Skyfall hit
Down
- 24 / 7 Lancashire Cyber Town
- Society of Swindon based Customers building
- Made up place name with an OA's building material
- Heating the registration number
- Burning interior structure
- Vendor stop and search area
- Supplier with Archery kit
15 Clues: PM with Skyfall hit • Apportioning F5 weight • Supplier with Archery kit • Burning interior structure • Vendor stop and search area • 24 / 7 Lancashire Cyber Town • Approving the twinkle twinkle • Heating the registration number • A number of Derek’s on the voice • Nearly the Bullseye presenter Bid. • Beyoncé’s husband sizing in the cloud • Close to Tommy Coopers head from Chirag • ...
Kuis Materi Perkembangan Teknlologi Industri 2024-01-31
Across
- Chloro Fluoro Carbon
- salah satu lapisan atmosfer bumi
- salah satu yang meningkat, dampak dari penggunaan IoT
- dampak kehilangan 23 juta lapangan pekerjaan pada tahun 2030
- manusia dan mesin akan bekerja sama pada era digitalisasi
- Sistem Cyber Physical
- teknologi yang memungkinkan untuk membuat prototipe
Down
- mahluk hidup dengan mahluk hidup lain
- salah satu contoh senyawa
- Merupakan otak dari sebuah perangkat keras
- teknologi yang sudah memiliki keahlian seperti manusia
- salah satu komponen IoT
- penyimpanan data dengan jumlah tidak terbatas
- bahan bekas hasil produksi industri
- teknologi yang ada pada perangkat fisik
15 Clues: Chloro Fluoro Carbon • Sistem Cyber Physical • salah satu komponen IoT • salah satu contoh senyawa • salah satu lapisan atmosfer bumi • bahan bekas hasil produksi industri • mahluk hidup dengan mahluk hidup lain • teknologi yang ada pada perangkat fisik • Merupakan otak dari sebuah perangkat keras • penyimpanan data dengan jumlah tidak terbatas • ...
EMPLOYMENT OPPORTUNITIES IN LODI UNIFIED 2021-08-13
Across
- driver: transports students to school
- guard: helps students cross streets
- accounts for expenses
- assistant: prepares meals for students
- repairs and maintains vehicles
- clerical assistance in school office
- repairs and maintains wiring
Down
- cleans and maintains the school
- maintains the school grounds
- customer service and clerical duties
- assists classroom teachers
- manager: supervises the cafeteria
- security: provides security at school
- monitor: monitors students at school
- repairs and maintains plumbing
15 Clues: accounts for expenses • assists classroom teachers • maintains the school grounds • repairs and maintains wiring • repairs and maintains vehicles • repairs and maintains plumbing • cleans and maintains the school • manager: supervises the cafeteria • guard: helps students cross streets • customer service and clerical duties • monitor: monitors students at school • ...
Human Rights 2025-05-12
Across
- Solving an argument through discussion.
- Applying to everyone.
- Having the tendency to attack or harm others.
- Time spent awake.
- Given formal approval or permission for something.
- Supports.
Down
- The person or team against which the sport is played.
- Relating to computer and the web.
- Behavior that is cruel or unkind.
- Protects something for being changed.
10 Clues: Supports. • Time spent awake. • Applying to everyone. • Relating to computer and the web. • Behavior that is cruel or unkind. • Protects something for being changed. • Solving an argument through discussion. • Having the tendency to attack or harm others. • Given formal approval or permission for something. • The person or team against which the sport is played.
ISACA BC 2022-10-15
Across
- Toughest privacy and security law in the world
- integrates all of the cloud security capabilities into a single cloud-native solution
- a computer malware program that was originally developed in the form of a banking Trojan
- to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
- is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
Down
- malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
- way to create a secure software
- method that requires the user to provide two or more verification factors to gain access to a resource
- is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
- is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
10 Clues: way to create a secure software • Toughest privacy and security law in the world • integrates all of the cloud security capabilities into a single cloud-native solution • a computer malware program that was originally developed in the form of a banking Trojan • ...
ж2 2025-11-24
Across
- – Process to reduce risk.
- – Risk of not being able to meet short-term obligations.
- – Risk of damage to a company’s public image.
- – Prefix for risks related to computers and networks.
- – Measure to manage or reduce risk.
Down
- – Adhering to laws and regulations.
- – Formal examination of financial records.
- – An event that disrupts normal operations.
- – Protection against financial risk.
- – Risk of borrower default.
- – Penalty for non-compliance.
- – Deceptive act for personal gain.
- – Financial damage or disadvantage.
13 Clues: – Process to reduce risk. • – Risk of borrower default. • – Penalty for non-compliance. • – Deceptive act for personal gain. • – Adhering to laws and regulations. • – Measure to manage or reduce risk. • – Financial damage or disadvantage. • – Protection against financial risk. • – Formal examination of financial records. • – An event that disrupts normal operations. • ...
Self-Esteem Word Search 2023-03-15
Across
- People form these with each other
- Something you do in your spare time
- Something difficult/out of our comfort zone
- Where we live outside of school/hobbies/work
- Confidence in yourself
- We have co-workers, bosses here
- Where we get educated
- How to respond to a compliment
- Feeling certain in your abilities
Down
- Physical, Verbal, Cyber, Social
- Self-esteem is a _______ ranging from low, healthy, to overly high
- A comment which makes somebody feel good
- The opposite of unhealthy
- Overcoming our adversities
- Physical activity
- Getting past a challenge is to ___________
16 Clues: Physical activity • Where we get educated • Confidence in yourself • The opposite of unhealthy • Overcoming our adversities • How to respond to a compliment • Physical, Verbal, Cyber, Social • We have co-workers, bosses here • People form these with each other • Feeling certain in your abilities • Something you do in your spare time • A comment which makes somebody feel good • ...
Gone Phishing 2017-09-08
Across
- Crime conducted via the Internet or some other computer network.
- A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
- An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
- Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
- Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
- A secret word or phrase known only to you.
- Whaling A type of fraud that targets high-profile end users.
- Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
- Policy that indicates what kind of information a website will take from you and what they intend to do with it.
- Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
- A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
- What tells you that the website is secure in the browser.
- An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
14 Clues: A secret word or phrase known only to you. • What tells you that the website is secure in the browser. • Whaling A type of fraud that targets high-profile end users. • Crime conducted via the Internet or some other computer network. • Conversion of data into a form that cannot be easily understood by unauthorized people. • ...
Malware 2024-04-26
Across
- A cyber attack intended to redirect a website's traffic to another, fraudulent site.
- Attempts to crack passwords or keys through trial and error, not by exploiting any inherent weakness in the encryption but by sheer volume of attempts.
- The placement of malicious code in SQL statements, via web page input, to manipulate a database behind the website.
- The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Insufficient rules and guidelines that govern the use and security of a network, which can lead to vulnerabilities.
- The act of capturing and reading packets as they cross a network or part of a network. If the packets are not encrypted, their content can be read.
Down
- Any software package which automatically renders advertisements to generate revenue for its author.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- A form of malware designed to trick victims into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
- Malicious software that replicates itself by modifying other computer programs and inserting its own code.
- A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- Malware that locks or encrypts the victim's data until a ransom is paid.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
14 Clues: Malware that locks or encrypts the victim's data until a ransom is paid. • A cyber attack intended to redirect a website's traffic to another, fraudulent site. • Software designed to disrupt, damage, or gain unauthorized access to a computer system. • Any software package which automatically renders advertisements to generate revenue for its author. • ...
Reportable Information 2023-07-27
Across
- Monetary management
- Actions in conflict with laws or policy
- A change in personal location, often for pleasure
- CH3−CH2−OH or C2H5OH
- Any event that threatens Security procedures
- Illegal activity
- Requests for classified information, unauthorized
- Of or from a country other than the USA
Down
- Breaching of security defenses
- Improper storage/transportation of classifieds
- Illegal substances
- Lawful detainment
- A state of being owed, usually financially
- Fraud/Scams/Trafficking via computer
- A formal partnering of two people
- A legal moniker
16 Clues: A legal moniker • Illegal activity • Lawful detainment • Illegal substances • Monetary management • CH3−CH2−OH or C2H5OH • Breaching of security defenses • A formal partnering of two people • Fraud/Scams/Trafficking via computer • Actions in conflict with laws or policy • Of or from a country other than the USA • A state of being owed, usually financially • ...
Discharge Planning 2025-11-17
Across
- supplemental security income
- single point of access
- ability to maintain a balanced mental state
- person/agency appointed to manage funds
- 24 hr supervised housing
- assertive community treatment
- engage in your own treatment
Down
- permanent housing, most independent
- middle level of spa housing
- determined, strong desire to do well/succeed
- assisted outpatient treatment
- treatment team in the community
- agreeable to treatment/medications
- social security disability
- state operated community residence
- ability to understand and accept diagnosis
16 Clues: single point of access • 24 hr supervised housing • social security disability • middle level of spa housing • supplemental security income • engage in your own treatment • assisted outpatient treatment • assertive community treatment • treatment team in the community • agreeable to treatment/medications • state operated community residence • permanent housing, most independent • ...
Is it possible to avoid risk? 2024-10-17
Across
- OSI layer that opens and closes conversation between two devices
- Refer to an incident where unauthorized individual gain access to a system
- Cryptography method that uses a pair of keys
- refers to a security measure put in place to mitigate security risk
- cloud services that is perfect for Application developers
- The Indian bill for personal information protection,
Down
- encrypted form of message
- type of cybercrime that involves the use of QR codes
- provider’s applications running on a cloud
- cloud services available for general public
- set of rules and standards that define how data is transmitted and received across a network.
- / ware made for spying
- Non-profit organization that dedicated to improving software security
- European laws for privacy
14 Clues: / ware made for spying • encrypted form of message • European laws for privacy • provider’s applications running on a cloud • cloud services available for general public • Cryptography method that uses a pair of keys • type of cybercrime that involves the use of QR codes • The Indian bill for personal information protection, • ...
FITCVocab.jeht 2013-05-15
Across
- a person who gives food
- games
- a place where you store things
- board the queen of your computer
- a graphic image for for your company
- elliptical or touch pad
- something that you put in
- a symbol that has a letter in a circle
- a server in the sky
- wireless internet
- online
Down
- online power point
- 4g 3g
- access memory ram
- a commercial
- disc drive like a flash drive
- of office what presidents have to do
- things that you can hear see or get
- what is the abbreviation for document
- processing unit cpu
- host a online director
- just a little
22 Clues: 4g 3g • games • online • a commercial • just a little • access memory ram • wireless internet • online power point • processing unit cpu • a server in the sky • host a online director • a person who gives food • elliptical or touch pad • something that you put in • disc drive like a flash drive • a place where you store things • board the queen of your computer • things that you can hear see or get • ...
Kolletsch-Kreuzworträtsel 2021-04-16
Across
- pädagogische Squaw
- Comic-er
- Guitar Hero
- Kolletsch Bürgermeister
- wer war's?
- kommt notorisch zu spät
- Rekordhalter speed talking
- schweizer E-Biker
- singende Basteltante
- sozialpäd. Menstruationszyklus
- wäre fast davon gerollt
- bakip Sportsfreundin
- lila Fee
- Häfnschwester
- Shoe-maniac
- ehem. Zirkusartistin
- Agnes
- Postschwimmerin
Down
- Kolletsch-Hausverstand
- Sägespähnenspanner
- Maskenfetischistin
- Dolmetscher für deutsch-altmann
- Cyber-Nonne
- bischöfliches Kulinarikum
- handwerken ugs.
- nachhaltiger Brötchenversorger
- mex. Komponistin
- Überläuferin aus Baden
- ehem. Direktorin, Vorname
- legasthenischer Wolleballtreina
- Rap-Slam-Queen
- Supervikinger (Nachname)
- Müch-man
- Chilli(ge)
- Kolleg ugs.
- stilles, aflenzer Wasser
- Mag.a Dr.in Eidschi-Beidschi
- legale Schoko-Dealerin
- SOS-Sitzformation
- Miesmacher alias Besserwisser
40 Clues: Agnes • Comic-er • Müch-man • lila Fee • wer war's? • Chilli(ge) • Cyber-Nonne • Guitar Hero • Kolleg ugs. • Shoe-maniac • Häfnschwester • Rap-Slam-Queen • handwerken ugs. • Postschwimmerin • mex. Komponistin • schweizer E-Biker • SOS-Sitzformation • Sägespähnenspanner • Maskenfetischistin • pädagogische Squaw • singende Basteltante • bakip Sportsfreundin • ehem. Zirkusartistin • Kolletsch-Hausverstand • ...
Digital Citizenship Vocabulary 2022-11-04
Across
- imagine feelings
- facts for different purposes
- piece of advice
- storing app or item
- app using information
- someone who shares your information
- online bulling
- over sharing feelings
- someone who supports you to a cyber bully
- using something without any permission
- something that collects data from you
Down
- something that makes you uncomfortable
- something that lasts
- something that you do and share online
- something to ask before using
- someone who helps you defeat a bully
- merging copyright music with other music
- buys products
- balance using media in a healthy way
- something that uses all info of you
- using something online on certain situations
21 Clues: buys products • online bulling • piece of advice • imagine feelings • storing app or item • something that lasts • app using information • over sharing feelings • facts for different purposes • something to ask before using • something that uses all info of you • someone who shares your information • someone who helps you defeat a bully • balance using media in a healthy way • ...
B&P Holiday Edition 2023 2023-09-22
Across
- Popular sport to watch on Thanksgiving
- Scrooge’s first name from “A Christmas Carol”
- Christmas-themed Tchaikovsky ballet
- Candle holder for Kwanzaa
- A model of a person made with snow
- Sour and dark red berries
- Fall squash or gourd
- Brief and light snowfalls
Down
- Singing from one door to another
- A Hansel and Gretel inspired house
- Hung by the chimney with care
- Roasting on an open fire
- Elf on a ----
- Popular "Friday" shopping day
- This animal receives a President's pardon
- The most famous reindeer of all
- Wood that is burnt as fuel
- Synonym for corn
- Candle holder for Hanukkah
- Popular "Monday" shopping day
- Santa's ride
21 Clues: Santa's ride • Elf on a ---- • Synonym for corn • Fall squash or gourd • Roasting on an open fire • Candle holder for Kwanzaa • Sour and dark red berries • Brief and light snowfalls • Wood that is burnt as fuel • Candle holder for Hanukkah • Hung by the chimney with care • Popular "Friday" shopping day • Popular "Monday" shopping day • The most famous reindeer of all • ...
Black Friday 2025-11-12
Across
- Brick and ______
- Very brief promotion, or Barry Allen
- Get money back
- A collection of items you want
- Business selling goods
- Biggest shopping day of the _____
- In the ___
- Out of ____
- Where you keep your money
- Thanksgiving meat
- Where a Londoner waits
- Issue or warning
Down
- Bad deal, or what to do with a band-aid
- Place with many stores in close proximity
- Rainbow
- To just look around
- What you need to do if few items remain or if late
- To just look around, on Cyber Monday
- In the ___
- Attractive offer
- Booklet displaying a company's products
- Where a Bostonian waits
- Strategy to make you want to buy something right away
23 Clues: Rainbow • In the ___ • In the ___ • Out of ____ • Get money back • Brick and ______ • Attractive offer • Issue or warning • Thanksgiving meat • To just look around • Business selling goods • Where a Londoner waits • Where a Bostonian waits • Where you keep your money • A collection of items you want • Biggest shopping day of the _____ • Very brief promotion, or Barry Allen • ...
