cyber security Crossword Puzzles
3B macchina energia-3 2024-01-29
Across
- inventore della fotografia
- denominazione della 3 rivoluzione industriale
- principale innovazione 4 rivoluzione industriale
- inventore telegrafo
- anno creazione motore 2 tempi
Down
- undici anno dei maggiori cambiamenti 4 rivoluzione
- creatore martello a vapore
- energia 2 rivoluzione industriale
- anno creazione martello a vapore
9 Clues: inventore telegrafo • inventore della fotografia • creatore martello a vapore • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale • undici anno dei maggiori cambiamenti 4 rivoluzione
3B macchine e energia-3 2024-01-29
Across
- anno creazione motore 2 tempi
- energia 2 rivoluzione industriale
- denominazione della 3 rivoluzione industriale
- creatore martello a vapore
Down
- principale innovazione 4 rivoluzione industriale
- anno creazione martello a vapore
- inventore telegrafo
- inventore della macchina fotografica
- anno dei maggiori cambiamenti 4 rivoluzione
9 Clues: inventore telegrafo • creatore martello a vapore • anno creazione motore 2 tempi • anno creazione martello a vapore • energia 2 rivoluzione industriale • inventore della macchina fotografica • anno dei maggiori cambiamenti 4 rivoluzione • denominazione della 3 rivoluzione industriale • principale innovazione 4 rivoluzione industriale
SS13/14 Terminology 2025-11-02
Across
- Security Department
- The unofficial mascot
- What cargo does every shift
- What sec does every shift
- What security ignores
- A squad of 3-6 agents destroying the station. Slang.
- What science does every shift
- Evolutionary cousin of the Space Carp
- The helpful tip delivering clown!
Down
- When the singularity is loose
- A man-eating beast, taking inspiration from the movie "The Thing"
- Genetics Subdepartment
- An evil version of the clown
- Med Department
- Science Department
- What med does every shift
- Engineering Department
- Traitor, slang.
18 Clues: Med Department • Traitor, slang. • Science Department • Security Department • The unofficial mascot • What security ignores • Genetics Subdepartment • Engineering Department • What sec does every shift • What med does every shift • What cargo does every shift • An evil version of the clown • When the singularity is loose • What science does every shift • The helpful tip delivering clown! • ...
Social Security Principles 2013-12-10
Across
- A type of redistribution from rich to poor.
- Feeling safe and secure is known as social "what"?
- The principle of pooling collective resources.
- A type of redistribution from childless families to families with children.
- What is social security usually said to be relieving.
- This refers to provision against injury or illness.
- Social security is also used to alter how people act thus changing their "what"?
- Another term for social "bonds" which universal social security provision could foster.
Down
- Transferring money from one group to another.
- Spreading income over your own lifetime.
- Stopping someone from becoming poor is another key aspect of social security, what is it called?
11 Clues: Spreading income over your own lifetime. • A type of redistribution from rich to poor. • Transferring money from one group to another. • The principle of pooling collective resources. • Feeling safe and secure is known as social "what"? • This refers to provision against injury or illness. • What is social security usually said to be relieving. • ...
CS UNIT-1 PUZZLE 2025-09-25
Across
- A security barrier that controls network traffic.
- The act of guaranteeing information is protected.
- Information safe from accidental or intentional disclosure.
- Exploit a vulnerability intentionally or accidentally.
- The process of converting data into a secret code.
- An electronic document used to prove identity online.
- The process of verifying who you are.
- A type of encryption using only one shared key.
Down
- Gaps in a security program.
- Ensuring data has not been altered or tampered with.
- Information is available to authorized users when needed.
- An object representing a user's security context in Windows.
- Act that uses vulnerability to do damage to systems.
- The process of a computer running a program's instructions.
- The art and science of secret communication.
15 Clues: Gaps in a security program. • The process of verifying who you are. • The art and science of secret communication. • A type of encryption using only one shared key. • A security barrier that controls network traffic. • The act of guaranteeing information is protected. • The process of converting data into a secret code. • ...
Life Skill 2023-07-20
8 Clues: very useful • use time wisely • bad for your health • the way it is organised • involving computer networks • path in which a person going • manners respecting each other • exchanging information between two people
Intro to the Mortgage Industry 2014-08-04
Across
- The transfer of an interest in real property, given as security for the payment of a loan
- The repayment of a debt from the proceeds of a new loan using the same property as security
- The borrower in a mortgage transaction
- A legal process of taking possession of a mortgaged property as a result of the borrower’s failure make payments
- The legal document conveying title to a real property
- Payment of a debt in regular, periodic installments of combined principal and interest
- A legal claim or attachment against property as security for payment of an obligation
- The portion of a property's value over and above the liens against it
Down
- Principal, interest, taxes & insurance
- Money paid to make up the difference between the purchase price and the mortgage amount
- A mortgage that has rights that are subordinate to the rights of the first mortgage
- Cost of credit on a yearly basis, expressed as a percentage
- A mortgage in which the interest rate is adjusted periodically according to a pre-selected index
- A form of revolving credit secured by a borrower’s home
- Property pledged as security for a debt
- The lender on a mortgage transaction
- Document signed by a borrower that is an acknowledgment of a debt and an agreement to repay that debt
17 Clues: The lender on a mortgage transaction • Principal, interest, taxes & insurance • The borrower in a mortgage transaction • Property pledged as security for a debt • The legal document conveying title to a real property • A form of revolving credit secured by a borrower’s home • Cost of credit on a yearly basis, expressed as a percentage • ...
Once Upon a Time D 2021-09-30
Across
- Residents ? their fears of criminals by installing sophisticated security devices.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- The ? gardener was willing to travel to different places where there was work.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- After many false alarms, the family wondered about the ? of the security system.
Down
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- When slicing bread or tomato, it is easier using a knife with ?.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- cherished red wagon with the supplies for phys. Ed.
- Nervously, the resident noticed the ? of a figure below the street light.
- For their safety, they ? to the Neighbourhood Watch program.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Once Upon a Time D 2021-10-01
Across
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- The ? gardener was willing to travel to different places where there was work.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
Down
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- When slicing bread or tomato, it is easier using a knife with ?.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. cornwell’s cherished red wagon with the supplies for phys. Ed.
- For their safety, they ? to the Neighbourhood Watch program.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Nervously, the resident noticed the ? of a figure below the street light.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- After many false alarms, the family wondered about the ? of the security system.
- Residents ? their fears of criminals by installing sophisticated security devices.
28 Clues: For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • The ? gardener was willing to travel to different places where there was work. • ...
digital citizenship lucas buskirk 2017-09-07
Across
- safety on the internet
- copyright taking images from the internet
- Passwords to keep people out
Down
- Plagiarism taking stuff from the internet illegally
- search and research online research
- Danger people you don't know
- domain public information to the internet
- bullying hurting others on the internet
- media Instagram snap chat
- use using the internet fairly
10 Clues: safety on the internet • media Instagram snap chat • Danger people you don't know • Passwords to keep people out • use using the internet fairly • search and research online research • bullying hurting others on the internet • domain public information to the internet • copyright taking images from the internet • Plagiarism taking stuff from the internet illegally
Cybersecurity Hex Crossword 2023-11-03
10 Clues: 46 55 4E • 4D 41 54 48 • 54 45 53 54 • 4C 49 46 45 • 43 4C 41 53 53 • 43 59 42 45 52 • 50 48 4F 4E 45 • 53 43 48 4F 4F 4C • 4C 41 50 54 4F 50 0A • 43 52 4F 53 53 57 4F 52 44
Bullying dan emosional 2024-01-16
Across
- bullying dengan cacian dan umpatan kebencian merupakan bullying berupa...
- bullying adalah suatu tindakan...
- bagaimana cara mengendalikan emosi...
- pembullyan melalui teknologi, merupakan ..... Bullying
- pihak yang terlibat dalam bullying...
Down
- apa itu emosional...
- cara mengendalikan emosi pada diri sendiri...
- apa penyebab terjadinya emosional...
- tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
- apa dampak emosional..
10 Clues: apa itu emosional... • apa dampak emosional.. • bullying adalah suatu tindakan... • apa penyebab terjadinya emosional... • bagaimana cara mengendalikan emosi... • pihak yang terlibat dalam bullying... • cara mengendalikan emosi pada diri sendiri... • pembullyan melalui teknologi, merupakan ..... Bullying • ...
Muchlis budi utomo 2025-07-24
Across
- Contoh konten digital
- Nama lain komputasi awan
- Siapa yg mencetuskan istilah big data
- Rapid elasticity disebut juga dengan
- Cyber physical system sering disebut juga dengan
Down
- kepanjangan dari AI
- Pengetahuan dan kemampuan untuk menggunakan teknologi digital
- Teknik komputasional untuk mengelola dan menganalisis informasi biologis
- kepanjangan loT
- salah satu contoh kegiatan literasi digital
10 Clues: kepanjangan loT • kepanjangan dari AI • Contoh konten digital • Nama lain komputasi awan • Rapid elasticity disebut juga dengan • Siapa yg mencetuskan istilah big data • salah satu contoh kegiatan literasi digital • Cyber physical system sering disebut juga dengan • Pengetahuan dan kemampuan untuk menggunakan teknologi digital • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
CAB 2021-03-04
Across
- saying mean thing online
- yo have been attacked
- spreading rumors
- abcds of bullying -c
- telling some one you are going to do somthing to them
- abcds of bullying -b
- abcds of bulling- a
Down
- getting people to say false information
- acting like a famous person even if you are not
- an isolated event
- punching hitting kicking
- abcds of bullying- d
- no one is having fun
- saying you are a certain age or a boy but you are a girl
14 Clues: spreading rumors • an isolated event • abcds of bulling- a • abcds of bullying- d • no one is having fun • abcds of bullying -c • abcds of bullying -b • yo have been attacked • punching hitting kicking • saying mean thing online • getting people to say false information • acting like a famous person even if you are not • telling some one you are going to do somthing to them • ...
Fall 2024-09-21
Across
- Black Friday and Cyber Monday are ...... days???
- Be cautious with sharp edges and candles around them
- Popular name for autumn celebrations
- Bill signed June of 1984
- The most and best sign in the world
- Children dread going back
- Length in months
- 2 week celebration in Germany
Down
- Fattest day of the year
- A staple poultry in November
- Most know for during this time
- Day before Saints day
- Important to do this before winter.
- Disney's movie of celebration
14 Clues: Length in months • Day before Saints day • Fattest day of the year • Bill signed June of 1984 • Children dread going back • A staple poultry in November • Disney's movie of celebration • 2 week celebration in Germany • Most know for during this time • The most and best sign in the world • Important to do this before winter. • Popular name for autumn celebrations • ...
Cyberbullying 2021-10-29
Across
- Bullying online, is called .....
- If you are bullied, tell an ......
- Cyberbullying is against the law.
- A wireless handheld device to communicate.
- Denial of access to internet.
- Repeated or deliberate harassment.
Down
- An example of cyberbullying.
- You can report bullying on websites.
- An effect of cyberbullying.
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An effect of cyberbullying. • An example of cyberbullying. • Denial of access to internet. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell an ...... • Repeated or deliberate harassment. • You can report bullying on websites. • A wireless handheld device to communicate.
TYPHOON Patron Saints 2024-03-24
9 Clues: before today • Jay's jilting science pal • possible prom date for Jay • "-for survival" poem title • Jun acquired these adornments • mysterious business card locale • Jay tells aunts he has to do this • Jay starts reading this at Chato's • world where Jay's source originated
Information Security Crossword 2017-02-17
Across
- When you receive an email with a link to a bogus website it is called _________
- This should only be installed on Society systems by approved administrators ______
- It should be changed immediately if suspected of being compromised
- Completion of Information Security and DPA annual training is ____________
- When you received unsolicited email from unknown sources this is called ______
- Media Society customers should not be contacted via _______
- A tidy desk is also known as a _________ desk
- Skipton may ______________ your internet usage
Down
- Information Security policies are published on it ___________
- These should never be shared __________
- A type of use that should be limited when using Society systems ________
- Personal information is protected by this act _______
- Something that can infect a PC/Laptop is known as a ________
- You should not allow others to do this when accessing Society premises ______
- Minimize the amount of documents taken offsite ___________
- This should be worn at all times when on Society premises __________
- Always ensure your _________ is locked when you are away from your computer.
17 Clues: These should never be shared __________ • A tidy desk is also known as a _________ desk • Skipton may ______________ your internet usage • Personal information is protected by this act _______ • Minimize the amount of documents taken offsite ___________ • Media Society customers should not be contacted via _______ • ...
Information Security Puzzle 2017-04-11
Across
- Never share your _________ with another person.
- The state of being free from danger or threat.
- Always ___________ your computer when you leave your desk
- Passwords should be _________ every month.
- __________ is a popular web search engine.
- Email scam or attempt to trick you into giving your password or personal information.
- Do not __________ your password or account with anyone.
- A password is stronger by using a combination of both upper and lower case ___________.
Down
- Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
- Use this tool to dispose of documents that contain personal or financial information.
- When someone sends an email with a link to a bogus website, it is called_________.
- Do not _______ your password down or attach it to your keyword or monitor.
- Choose a password that is easy for you to____________ but hard for someone to guess.
- Do not leave your laptop or computer ____________.
- A software that is designed to detect and destroy compute viruses.
- Also known as malicious software; any program or file that is harmful to a computer user.
- Passwords should always be at least this many characters long.
17 Clues: Passwords should be _________ every month. • __________ is a popular web search engine. • The state of being free from danger or threat. • Never share your _________ with another person. • Do not leave your laptop or computer ____________. • Do not __________ your password or account with anyone. • Always ___________ your computer when you leave your desk • ...
Unit 6 Security + 2022-04-07
Across
- uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
- a list that identifies users or groups who have specific security assignments to an object.
- process of copying changes to Active Directory on the domain controllers.
- the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
- type of access that is allowed or denied for an object.
- a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
- group of related domains that share the same contiguous DNS namespace.
- Account policies help you control the composition and use of passwords.
- set of configuration settings applied to users or computers.
- can be your role, position, or current project. This information can be used to determine policy and permission.
Down
- The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
- collection of related domain trees.
- have limited permission
- The point at which the number of false positives matches the number of false negatives in a biometric system.
- developed by Microsoft, is a centralized database that contains user accounts and security information.
- have complete control of the system
- device or a file used to authenticate
17 Clues: have limited permission • collection of related domain trees. • have complete control of the system • device or a file used to authenticate • type of access that is allowed or denied for an object. • set of configuration settings applied to users or computers. • group of related domains that share the same contiguous DNS namespace. • ...
Compliance & Security Week 2023-11-16
Across
- It's like your underwear; don't share it with anyone and change it at least every 90 days
- Nasty software that can have a bad impact on your device or network
- What is HIPAA's (and DDID's) minimum training requirement for employees
- Unwanted emails or messages that usually try to sell you something
- What department (or Shane) should you report a suspected HIPAA breach to
- Universal Serial Bus, or a flash drive that you should never stick in a work computer
- What HIPAA rule protects individual rights
- A type of malicious software designed to block access until a sum of money is paid
Down
- Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
- The Health Act passed to protect individual's medical/dental records and other PHI
- A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
- Every aspect of protecting an organization and its employees/assets against cyber threats
- How should you send an email to outside recipients that contains PHI
- What is the acronym that identifies individual's information such as name, birthdate, and SSN
- The additional ways DDID uses to stop hackers getting into our system, even if they know your password
- An email that tricks you into clicking on a link or opening an attachment
- Using a device to gain unauthorized access to data in a system
17 Clues: What HIPAA rule protects individual rights • Using a device to gain unauthorized access to data in a system • Unwanted emails or messages that usually try to sell you something • Nasty software that can have a bad impact on your device or network • How should you send an email to outside recipients that contains PHI • ...
Everyday Security Challenge 2020-10-05
Across
- expert data destruction
- not your pet's name, if strong
- not in the open
- your best response
- sneaky followers
- how much data you should see?
- what secrets should be
- when hacks happen
- secure neckware, sometimes
- scams in your email
- required for access
Down
- the digital threat
- electronic infection
- vitamins for software
- for your eyes only
- do this to your computer when you walk away
- criminals payday
17 Clues: not in the open • sneaky followers • criminals payday • when hacks happen • the digital threat • your best response • for your eyes only • scams in your email • required for access • electronic infection • vitamins for software • what secrets should be • expert data destruction • secure neckware, sometimes • how much data you should see? • not your pet's name, if strong • ...
STOP BULLYING! 2021-10-06
Across
- Relating to computers, info technology and social media
- Include or become a part of
- The opposite of go
- Being peaceful and patient
- A person who stands by you
Down
- The opposite of being negative
- A person who hurts others
- Telling someone about something you saw or witnessed
- Being assertive if you're being bullied
- The opposite of mean
- The opposite of yes
11 Clues: The opposite of go • The opposite of yes • The opposite of mean • A person who hurts others • Being peaceful and patient • A person who stands by you • Include or become a part of • The opposite of being negative • Being assertive if you're being bullied • Telling someone about something you saw or witnessed • Relating to computers, info technology and social media
Actividad Jornada Mujer 2025-03-19
Across
- Related to internet
- The feeling of being alone
- Something that connects one thing to another
- A type of discrimination that occurs online
- Related to society
- A violent act towards an individual
Down
- The ability of taking your own decisions
- The obstacles in order to achieve something
- Related to establish relationships
- Prejudicial treatment of different categories of people
- Human beings
11 Clues: Human beings • Related to society • Related to internet • The feeling of being alone • Related to establish relationships • A violent act towards an individual • The ability of taking your own decisions • The obstacles in order to achieve something • A type of discrimination that occurs online • Something that connects one thing to another • ...
Security crossword 2022-07-21
Across
- Place to store high privilege passwords
- seamless integration of security testing and protection throughout the software development and deployment lifecycle
- Unplanned downtime of IT resources
- process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
Down
- Need to impart to everyone to protect the organization
- IT Governance framework from ISACA
- is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
- is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
- is a nonprofit foundation dedicated to improving software security
- Information security triad
10 Clues: Information security triad • IT Governance framework from ISACA • Unplanned downtime of IT resources • Place to store high privilege passwords • Need to impart to everyone to protect the organization • is a nonprofit foundation dedicated to improving software security • ...
Unit 25 LO1 2026-03-11
Across
- A potential danger that could cause harm to people, property or information.
- another word for humans
- Documents or badges used to prove who someone is before they enter secure areas.
- items owned by people
- A physical or visual check of a person, bag, or vehicle to find prohibited or dangerous items.
- When security staff regularly move around an area to check for suspicious activity.
- A camera system used to monitor and record activity in a specific area for security purposes.
- The chance that something harmful or dangerous might happen.
- A security procedure where movement is restricted and people stay inside a secure location.
Down
- A law that sets out police powers and procedures when dealing with suspects and investigations. (Police and Criminal Evidence Act)
- A person who enters a building or area without permission.
- buildings and houses
- A mnemonic used in search procedures to remind officers what a search needs to be.
- The outer boundary of a secure location that must be protected or monitored. Also used in Maths related to shapes.
- The organised removal of people from a building due to danger.
- Security measures designed to discourage people from committing crime.
- A commonly used abbreviation in policing for search grounds.
17 Clues: buildings and houses • items owned by people • another word for humans • A person who enters a building or area without permission. • A commonly used abbreviation in policing for search grounds. • The chance that something harmful or dangerous might happen. • The organised removal of people from a building due to danger. • ...
15.1 Understanding Money C.S. 2024-05-09
Across
- Security that pays interest over terms of 10 to thirty years
- Plastic card that allows holders to make credit purchases up to an authorized account
- Money is used in exchange for goods and services needed by individuals, businesses, and governments.
- Transfer of money from one bank account to another
- Type of a document guaranteeing the payment of a specific amount of money
- Money is a common measure of the worth or price of a good or services
- Mechanism a nation uses to provide and manage money for itself
Down
- Security that pays interest over terms ranging from two to ten years
- Process of transferring money from one individual or organization to another
- Anything of value that is accepted in return for good and services
- Security that matures in a year or less
- Allows customers to pay for purchases directly from their checking account
- Type of financial invested issues by a corporation, government, or other organizations
- It can be saved and used at a later date
14 Clues: Security that matures in a year or less • It can be saved and used at a later date • Transfer of money from one bank account to another • Security that pays interest over terms of 10 to thirty years • Mechanism a nation uses to provide and manage money for itself • Anything of value that is accepted in return for good and services • ...
Q1 Safety & Security 2021-03-04
Across
- A Shelter-in-Place will usually be announced by ____ communication.
- This will provide more traction across icy surfaces.
- If the fire alarm goes off during a lockdown, do not do this unless you have first hand knowledge of a fire or if told by emergency personnel.
- Make sure your cell phone is always this when leaving the house in case of emergency.
- To help maintain balance, walk like one of these – short steps and as flat-footed as possible.
- This many inches of water can become dangerous.
- When it comes to gloves vs mittens, these may save your life.
- When a lockdown is ordered, immediately stop all ______.
- This may happen because of hostile intruder or hazardous release outside.
- Make sure these are available when walking over potentially icy surfaces.
Down
- This is the best sort of clothing to wear during the winter.
- Have one of these in car in case you get stranded while traveling in cold weather.
- Increase your following distance to this many seconds when roads could be icy.
- Avoid having this before you start shoveling your driveway.
- Emergency kits should be stocked with flashlights, a first aid kit, water, extra medicine, and a few extra of these.
- Stay out of _____ when in a lockdown.
- Avoid carrying these while walking across potentially slippery surfaces.
17 Clues: Stay out of _____ when in a lockdown. • This many inches of water can become dangerous. • This will provide more traction across icy surfaces. • When a lockdown is ordered, immediately stop all ______. • Avoid having this before you start shoveling your driveway. • This is the best sort of clothing to wear during the winter. • ...
FPPS Security Crossword 2020-04-01
Across
- Type of route path that acts as a "catch all"
- What the 'S' in SPOC stands for
- User who has no signature authority in the Requesting Office
- User who can sign Part C of the SF-52 who is not in the SPO: ____ Official
- Decentralized Security Administrative ____
- Another name for FPPS ID: _____ ID
- Type of route path with specific data access criteria
Down
- Command you can use when someone gets locked out of FPPS
- Someone with SC2 signature authority has access to these two commands: LGAP and ____
- User who signs block A6 of the SF-52: _____ Official
- Where you can find the order in which route paths are built
- User who signs block A5 of the SF-52: _____ Official
- Determines what department, bureau, etc. a user can see
- Office where HR processes actions: Servicing _____ Office
- Command you can use to build centers where employees can request and process personnel actions
- Command you can use to build paths for personnel actions
- Command you can use to add employees to offices
17 Clues: What the 'S' in SPOC stands for • Another name for FPPS ID: _____ ID • Decentralized Security Administrative ____ • Type of route path that acts as a "catch all" • Command you can use to add employees to offices • User who signs block A6 of the SF-52: _____ Official • User who signs block A5 of the SF-52: _____ Official • ...
High Security Estate 2017-01-31
17 Clues: Hands on • Wireless • Part of me • Spikey steel • Silver stripe • To come and go • Above standard • Stop drop roll • After a shampoo • More then a scan • fixteen in a room • To pay for company • Untidy place to eat • Party after a wedding • American word for phone • Provide relevant information • Location to catch a plane from
Information security test 2025-03-14
Across
- Napad koji preplavljuje sistem ogromnim brojem zahtjeva kako bi ga onemogućio.
- Virtualna privatna mreža koja šifrira saobraćaj kako bi osigurala privatnost na internetu.
- KOPIJA Najbolja zaštita od ransomware napada – redovno čuvanje podataka.
- SOFTVER Zajednički naziv za zlonamjerne softvere poput virusa, trojanaca i crva.
- Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima.
- Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.
- Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.
- ZID Sigurnosni sistem koji filtrira mrežni saobraćaj kako bi spriječio neovlašteni pristup.
- Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.
- TESTIRANJE Simulirani napad na sistem s ciljem identifikacije ranjivosti.
Down
- KONJ Vrsta zlonamjernog softvera koji se prikazuje kao legitimni softver, ali sadrži zlonamjerne funkcije.
- NIVO POVJERENJA Sigurnosni model koji podrazumijeva nepovjerenje prema svim korisnicima dok se ne autentifikuju.
- RANJIVOSTI Iskorištavanje slabosti softvera ili sistema radi neovlaštenog pristupa.
- AUTENTIFIKACIJA Sigurnosna metoda koja zahtijeva više faktora autentifikacije.
- IDENTITETA Krađa ličnih podataka radi prevare ili financijske dobiti.
- Napad koji koristi lažne e-mailove kako bi prevario korisnike da otkriju svoje podatke.
- BRUTALNOM SILOM Napad u kojem napadač isprobava veliki broj kombinacija lozinki dok ne pronađe ispravnu.
17 Clues: Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu. • Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a. • Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu. • Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima. • ...
Das Internet 2024-03-18
5 Clues: Wo kriegt man anonyme Hilfe • Was soll man mit Kettenbriefen machen • Media Wo ist Cyber-Mobbing am meisten verbreitet • Wie viele Personen passen in eine WhatsApp Gruppe • Wie lange muss dich jemand Belästigen damit man von Cyber-Mobbing spricht
Securities 2025-01-14
Across
- form of bond issued by a government to support public spending.
- regulates the public offer and sale of securities.
- securities that are not registered with the SEC and cannot be sold publicly in the marketplace.
- where issuers can seek security listings and attract investors
- securities listed under a major financial exchange but are not actively traded.
- The entity that creates the securities for sale.
- a security that represents ownership in a corporation.
- a class of shares that give the holder a higher claim to dividends or asset distribution than common stockholders.
Down
- an unsecured promissory note with a fixed maturity.
- a certificate issued by a bank for depositing money for a specified length of time.
- a bond issued by a corporation in order to raise financing.
- a short-term U.S. government debt obligation backed by the U.S. Department of the Treasury.
- a fungible, negotiable financial instrument that represents some type of financial value.
- a security issued by or on behalf of a local authority.
- a bond issued by an international company in a country different from their own.
15 Clues: The entity that creates the securities for sale. • regulates the public offer and sale of securities. • an unsecured promissory note with a fixed maturity. • a security that represents ownership in a corporation. • a security issued by or on behalf of a local authority. • a bond issued by a corporation in order to raise financing. • ...
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
Cyber Ethics Crossword 2025-06-13
Across
- : Protection of data and devices from online harm
- : Harmful software meant to damage or steal data
- : A program that harms or slows down your computer
- : Software that blocks unauthorized access to your system
- : Online harassment or bullying
- : Illegally accessing someone else's computer
- : A trick to cheat someone online
- : A secret code used to log in safely
- : The process of securing data using codes
Down
- : Polite and responsible behavior on the internet
- : The right to control your personal information online
- : A program that protects your computer from threats
- : Moral rules about what is right and wrong
- : Fake emails trying to steal personal information
- : Who you are; must be protected online
15 Clues: : Online harassment or bullying • : A trick to cheat someone online • : A secret code used to log in safely • : Who you are; must be protected online • : The process of securing data using codes • : Moral rules about what is right and wrong • : Illegally accessing someone else's computer • : Harmful software meant to damage or steal data • ...
"Cyber-Analyst" Crossword 2026-03-09
Across
- When you go online without using your real name.
- A group of computers that are all connected together.
- The answer to a division problem.
- In the math problem 453 divided by 5, the number 3 is this.
- Doing the right thing even when no one is watching.
- Using a password PLUS a secret code for security.
- A trick link or scam meant to steal money or data.
- Because you can't truly erase it, the internet is this.
Down
- The set of rules a computer follows to solve a problem.
- Using a secret cipher to hide data from a hacker.
- A good digital one of these follows the T.H.I.N.K. rule.
- A virus or Trojan is known as this type of harmful software.
- A website that is true and can be trusted is called this.
- The number you are dividing by in a math problem.
- A source that has been proven to be official and true.
15 Clues: The answer to a division problem. • When you go online without using your real name. • Using a secret cipher to hide data from a hacker. • The number you are dividing by in a math problem. • Using a password PLUS a secret code for security. • A trick link or scam meant to steal money or data. • Doing the right thing even when no one is watching. • ...
Cyber Laws & Ethics 2026-03-02
Across
- Protects online service providers
- moral principles which govern an individual’s behavior or conduct
- psychological techniques which cybercriminals employ to gain access to buildings, systems or information
- _ Act of 2001 was enacted in response to the attacks on September 11, 2001
- __ Millennium Copyright Act protects internet service providers
- __ official notification to a company search engine or web host informing them the material they are hosting or linking to infringes on a copyright
- system of rules established in a society by an authority which regulates and governs the actions of its members
Down
- Right to use copyrighted content without gaining permission from copyright owner
- seeking to exploit a computer system or a private network
- Improper____ is claiming someone else's writing as your own
- General ____ Protection Regulation intends to provide individual protection over their personal data
- deliberate damages or destruction which takes place in digital form
- Act of disguising a communication from an unknown source
- used to steal user data by the attacker disguising themselves as a trusted entity
- ____ Piracy is the practice of downloading and distributing copyrighted content without permission
15 Clues: Protects online service providers • Act of disguising a communication from an unknown source • seeking to exploit a computer system or a private network • Improper____ is claiming someone else's writing as your own • __ Millennium Copyright Act protects internet service providers • moral principles which govern an individual’s behavior or conduct • ...
EUTS Crossword 2025-09-22
Across
- Captain America is a Super .....
- Famous 1930's Film - .....with the wind.
- Form or public transport typically seen in City Centres
- Macronutrient essential for life
- Lets you walk or run inside
- Moisturising soap, also the name of a bird
- Apple Computer
- 1000 Grams
- Red Fruit
Down
- To purposely fall out an aircraft
- Single Floor house
- Type of attack which includes malware, phishing etc.
- Protects you from the sun
- Four legged family friend
- Popular Video Doorbell
- Surname of US President
- Wrench used for tightening by Newton Metres
- Used for connecting monitors, peripherals etc.
- Equal Opportunities for all
19 Clues: Red Fruit • 1000 Grams • Apple Computer • Single Floor house • Popular Video Doorbell • Surname of US President • Protects you from the sun • Four legged family friend • Lets you walk or run inside • Equal Opportunities for all • Captain America is a Super ..... • Macronutrient essential for life • To purposely fall out an aircraft • Famous 1930's Film - .....with the wind. • ...
TEJ2O1 - Security and Ethics - D. French 2024-07-26
Across
- You should regularly make a ____ of your data/photos.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- If you download software, ____ it before running it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Keep your operating system secure by running all the latest.
- Malware that damages files on your computer or stops your computer from running properly.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- When you copy sections of someone else's work and claim it is your own.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
Environmental, Ethical, and Legal issues in Computer Science 2025-02-01
Across
- The process of substituting old devices with new ones.
- The process of planning and creating a system or product.
- A formal authorization to use software under certain conditions.
- A rule or directive made and maintained by an authority.
- Software that is owned and restricted by its creator.
- A type of intellectual property protection for original inventions.
- The improper or unethical use of technology.
- An abbreviation for the law that prevents unauthorized modification of computer material.
- A person or group with an interest in an issue or project.
- A collection of programs and data used to operate computers.
- A formal decision or law enacted by a government.
- A type of cyber threat that locks data and demands payment.
- The unauthorized access of computer systems.
- A term for materials and substances used in electronics.
- The process of converting data into a secure format.
Down
- Software that harms or disrupts systems.
- The power consumption required to run electronic devices.
- The ability to protect data from unauthorized access.
- The name of outdated electronics being discarded.
- The ethical concern of ensuring fair access to technology.
- A law that governs data protection in the UK and EU.
- The physical parts of a computer system.
- The practice of reusing materials to reduce waste.
- Harmful substances found in electronic waste that can damage the environment and human health.
- A law related to the protection of intellectual property.
- Measures taken to protect users and systems from harm.
- The process of creating software to perform tasks automatically.
- A type of software license that allows users to modify and share freely.
- Laws that protect personal information online.
- A material commonly used in electronic device casings.
- Information that is processed or stored by a computer.
31 Clues: Software that harms or disrupts systems. • The physical parts of a computer system. • The improper or unethical use of technology. • The unauthorized access of computer systems. • Laws that protect personal information online. • The name of outdated electronics being discarded. • A formal decision or law enacted by a government. • ...
NATO Crossword 2025-07-23
Across
- This country is NATO’s newest member.
- This Italian city is home to NATO military command.
- Allies contribute money to fund NATO programs. This is known as ___ funding.
- NATO's largest partnership group is known as the Partnership for ___
- US General Alexus Grynkewich currently holds this position, the highest military position within NATO
- This year’s NATO Summit took place in this city.
- This kind of threat typically does not involve weapons but can include hostile information operations, political interference, and cyber operations
- The lengthy statement released at Summits is often called this.
- This Virginia city is home to Allied Command Transformation (ACT)
- PermReps sit on the NAC, or North Atlantic ___
- The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
- NATO is the North ___ Treaty Organization
- All 32 Allies must agree for NATO to do anything. This is known as ___ decision making.
- NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
Down
- NATO's maritime security operation in the Mediterranean is called Operation Sea___
- NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
- This was the first SACEUR, and was later the 34th President of the United States
- This ability enables Allied forces from different countries to operate together.
- This is one of NATO's closest partners, and its headquarters are right downtown
- NATO's current Secretary General is from this country
- NATO's military headquarters in Mons, Belgium
- This is the part of the founding treaty that explains how new members can join
- Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
- Allies pledged to devote this much of their GDP to defense spending
- The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
- NATO has been leading a peace-support operation in this country since June 1999
26 Clues: This country is NATO’s newest member. • NATO is the North ___ Treaty Organization • NATO's military headquarters in Mons, Belgium • PermReps sit on the NAC, or North Atlantic ___ • This year’s NATO Summit took place in this city. • This Italian city is home to NATO military command. • NATO's current Secretary General is from this country • ...
25230 2025-11-04
Across
- Dividing a broader customer base into smaller groups based on similar traits.
- Implementing measures to safeguard data from breaches and cyber-attacks.
- Actionable, valuable information derived from data analysis.
- A type of data source like social media or third-party providers.
- Insight and understanding gained from information.
- One of the 5Vs, referring to the different types of data.
- Analytics used to assess performance and forecast outcomes in money matters.
- Proper handling of sensitive data, especially PII, to protect from unauthorized access.
- The type of analytics that examines causes of past outcomes.
- The type of analytics that provides recommendations for future actions.
- A type of data source like CRM or ERP systems.
- Predicted net profit a company expects from a customer over their relationship.
- Ethical consideration concerning openness about how data is used.
- One of the 5Vs, referring to the speed of data generation and processing.
- Using data and statistical methods to uncover insights and trends.
Down
- Processed, organized data that has meaning.
- Planning, executing, and monitoring marketing efforts across channels.
- Analysis to understand why customers are leaving and develop retention strategies.
- Major regulation governing data privacy in the EU.
- Selecting specific customer segments for tailored marketing efforts.
- The type of analytics that summarizes past data.
- One of the 5Vs, referring to the amount of data generated.
- Raw, unprocessed facts and figures.
- Analytics used to measure and optimize campaign performance.
- Crafting a unique value proposition in the mind of the target audience.
- Models that identify which marketing channels contributed to a conversion.
- Scoring model used to evaluate the trustworthiness of individuals or businesses for loans.
- The type of analytics that forecasts future events.
- One of the 5Vs, referring to the worth of data in deriving insights.
- One of the 5Vs, referring to the accuracy and trustworthiness of data.
- A characteristic of high-quality data; correctness.
31 Clues: Raw, unprocessed facts and figures. • Processed, organized data that has meaning. • A type of data source like CRM or ERP systems. • The type of analytics that summarizes past data. • Major regulation governing data privacy in the EU. • Insight and understanding gained from information. • The type of analytics that forecasts future events. • ...
Ασφαλής χρήση διαδικτύου 2024-02-12
10 Clues: Κακόβουλο λογισμικό • News Ψευδείς ειδήσεις • Διαδικτυακός εκφοβισμός • Scams Ηλεκτρονικές απάτες • piracy πειρατεία λογισμικού • passwords κωδικοί πρόσβασης • Gaming Παιχνίδια στο διαδίκτυο • addiction εθισμός στο διαδίκτυο • gaming παιχνίδια στο διαδ'ικτυο • positive εικόνα σωματος και κοινωνικα δικτυα
Once Upon a Time B 2021-09-30
Across
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- Residents ? their fears of criminals by installing sophisticated security devices.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
Down
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- Nervously, the resident noticed the ? of a figure below the street light.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- The ? gardener was willing to travel to different places where there was work.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- When slicing bread or tomato, it is easier using a knife with ?.
- After many false alarms, the family wondered about the ? of the security system.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
28 Clues: For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • The ? gardener was willing to travel to different places where there was work. • ...
Once Upon a Time C 2021-09-30
Across
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- cherished red wagon with the supplies for phys. Ed.
- When slicing bread or tomato, it is easier using a knife with ?.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- For their safety, they ? to the Neighbourhood Watch program.
Down
- The ? gardener was willing to travel to different places where there was work.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Residents ? their fears of criminals by installing sophisticated security devices.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- After many false alarms, the family wondered about the ? of the security system.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Nervously, the resident noticed the ? of a figure below the street light.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
Smart City Crossword Puzzle 2019-03-20
Across
- effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
- the process of combining software components, hardware components, or both into an overall system
- act of periodically checking processes, equipment and environment in order to detect any changes
- big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
- ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
- an extended social group having a distinctive cultural and economic organization
Down
- collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
- process by which people become residents of cities
- ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
- a native or naturalized member of a state or other political community
- ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
- the organized action of making of goods and services for sale
- ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
13 Clues: process by which people become residents of cities • the organized action of making of goods and services for sale • a native or naturalized member of a state or other political community • an extended social group having a distinctive cultural and economic organization • ...
Security Newsletter 2015-02-17
11 Clues: Funny money • $5 President • $2 President • $1 President • $10 Treasurer • $20 President • $50 President • $100 President • Taking of items • Unusual Behavior • Opens many doors
Data Security 2025-03-07
Across
- a massive network of webpages, programs, and files that are accessible via URLs
- with _______ encryption, the sender and receiver use different encryption keys
- an attempt to trick a user into divulging their private information
- a _____ horse is a harmful program that masquerades as a legitimate program
- a service that allows you to hide your browsing from your ISP
- a small amount of text that helps a website track information about a user across multiple pages of the website and personalize the user's experience on the website.
Down
- holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom
- technology or services that allow tracking of a users location
- cookies that allow tracking of user behavior across websites
- scrambling a message so it can't be read without a key
- includes things that can identify you directly, such as your social security number, to things that may help identify you indirectly, such as your phone number or birthday.
11 Clues: scrambling a message so it can't be read without a key • cookies that allow tracking of user behavior across websites • a service that allows you to hide your browsing from your ISP • technology or services that allow tracking of a users location • an attempt to trick a user into divulging their private information • ...
Security Measures 2025-05-14
Across
- software that secretly watches what you do
- scrambling data so only the right person can read it
- a strong secret word that is hard to guess (2 words)
- allows or blocks devices based on their ID (2 words)
- checking who you are before letting you in
- blocks unwanted network traffic from getting in or out
Down
- program that finds and removes harmful software
- keeps your programs safe with the latest fixes (2 words)
- Someone trying to access a network without permission.
- protecting a network from hackers and threats (2 words)
- a trick to steal your login or personal details
11 Clues: software that secretly watches what you do • checking who you are before letting you in • program that finds and removes harmful software • a trick to steal your login or personal details • scrambling data so only the right person can read it • a strong secret word that is hard to guess (2 words) • allows or blocks devices based on their ID (2 words) • ...
Cyber Cross-Word 2023-04-12
Across
- interaction between snmp agent manager
- packet analyzer
- memory that lose its data when device is off
- SIEM tool that enable to search, analyze...
- type of XSS (non-persistent)
- software/hardware that creates/runs VM
- attract attackers
- transmission media with cables
Down
- process in TCP/IP networks to establish a working connection between a server and a compute
- software that displays unwanted ad
- this hash cb5ceb103977f1271d0763ac75fcd8e9 = secret
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- an open-source EDR
- type of attack that uses voice and telephony technologies to trick people
- secure communications techniques
15 Clues: packet analyzer • attract attackers • an open-source EDR • type of XSS (non-persistent) • transmission media with cables • 8e8c92b1c360cbe3cd2b40d6b29278d5 • secure communications techniques • software that displays unwanted ad • interaction between snmp agent manager • software/hardware that creates/runs VM • SIEM tool that enable to search, analyze... • ...
Cyber Safety Crossword 2013-11-03
Across
- Small text files that websites save in your web browser to store information like your username and password.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The last part of a URL eg;.gov .com
- The internet version of Junk mail
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
- Short for Random Access Memory
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
- Free software that can be downloaded from the internet.
Down
- A computer that has been hacked into and is used to launch malicious attacks
- Buying products on the Internet using credit cards or other electronic payments
- When a computer calls out to another computer to see if it is active.
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- A name you use to identify yourself on a computer or website.
- A type of malware that spies on what you do on the internet and can steal information about you
- Marking something or someone as suspicious or inappropriate.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Eli-cyber safety 2016-06-07
Across
- the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
- media stuff
- its hard to control what i see and others see.
- programs that display adverts on the screen.Often installed without people realising.
- to get help from if your online and people do mean stuff to yo
- app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
- users share their music playlists on Facebook,Twitter and Google+friends.
Down
- privacy that you need to keep safe.
- cameras that are often attached to a computer so that a video image can be sent to another while communication.
- to keep them private (except from your parents)
- you use the internet to bully somebody
- bulling
- Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
- like a password you need to keep it safe from hackers .a.
- when your with friends in a group of people on phones texting to people and putting pictures of you or something.
15 Clues: bulling • media stuff • privacy that you need to keep safe. • you use the internet to bully somebody • its hard to control what i see and others see. • to keep them private (except from your parents) • like a password you need to keep it safe from hackers .a. • to get help from if your online and people do mean stuff to yo • ...
cyber tut-4 2018-09-12
Across
- Control signals to be activated at any time
- Finite sequential machine
- A sequence of micro instructions
- A type of hazard in pipeline
- Enables the host system to run software
- Provides a separate signal line for each step or time slot
- a network of functional and storage unit
- Next address generator
Down
- When performance level reaches greater than instruction per cycle
- A program used to translate microprogram into executable program
- Control signal embedded in a kind of low level software
- Many type of instructions are executed in a single clock cycle
- Permits a single microinstruction to specify a short sequence
- Control memory address system
- Task initiation diagram
15 Clues: Next address generator • Task initiation diagram • Finite sequential machine • A type of hazard in pipeline • Control memory address system • A sequence of micro instructions • Enables the host system to run software • a network of functional and storage unit • Control signals to be activated at any time • Control signal embedded in a kind of low level software • ...
Cyber Laws & Ethics 2025-05-31
Across
- protect brands, logos, and symbols that distinguish goods or services
- private browsing mode
- the act of using someone else’s work or ideas without proper acknowledgment
- Sending bulk emails
- someone gains unauthorized access to a computer system or network
- refers to safe and responsible use of ICT
- protect new inventions or discoveries
- scammers send fake emails or messages pretending to be someone trustworthy
Down
- Internet etiquette
- involves secretly listening to or intercepting private communications
- remember our visits on website
- a type of malicious software that locks or encrypts a victim’s data, demanding payment
- data that is left behind when users have been online
- illegal activities conducted through computers or the internet
- people who deliberately post inflammatory or offensive comments online to provoke others
15 Clues: Internet etiquette • Sending bulk emails • private browsing mode • remember our visits on website • protect new inventions or discoveries • refers to safe and responsible use of ICT • data that is left behind when users have been online • illegal activities conducted through computers or the internet • someone gains unauthorized access to a computer system or network • ...
Cyber Sleuth Crossword 2026-03-25
Across
- A trick used to steal money or personal information.
- A secret word or phrase used to access an account.
- Software designed to harm or gain unauthorised access to a system.
- The name used to identify an account when logging in.
- A scam that tricks people into giving personal information by pretending to be trusted.
- The process of verifying a user’s identity.
- Identity verification using physical features like fingerprints or face.
Down
- Turning data into coded form so only authorised users can read it.
- Unauthorised access to confidential data.
- A person who gains unauthorised access to systems.
- A system that blocks unauthorised network access.
- Software that detects and removes harmful programs.
- A software update that fixes bugs or security issues.
- A secure connection used to protect data, especially on public Wi-Fi.
- A saved copy of data used for recovery if the original is lost.
15 Clues: Unauthorised access to confidential data. • The process of verifying a user’s identity. • A system that blocks unauthorised network access. • A person who gains unauthorised access to systems. • A secret word or phrase used to access an account. • Software that detects and removes harmful programs. • A trick used to steal money or personal information. • ...
Chapter 15 2013-04-25
Across
- this type of fire extinguisher can be class A, B, C, D, or K
- the safeguarding of personnel's rights
- this act helps protect the privacy of your social security number
- helps protect cable from EMI and RFI
- agreement between an organization and a vendor
- a dry pipe fire suppression system with special features
- individual well-known for social engineering
- assuring that risks are known and managed
Down
- documentation about evidence location and usage
- this system helps remove heat from a server room
- this act governs the disclosure of financial and accounting information
- an event that affects the security of an organization
- a targeted social engineering attack
- scavenging for private data in trash
- more than one person is required to complete a task
- a violation of physical security
- wiping or purging data
- a formal process for managing changes to the IT environment
- this act governs the disclosure and protection of health information
- this type of fire suppression system can be wet pipe or dry pipe
20 Clues: wiping or purging data • a violation of physical security • a targeted social engineering attack • scavenging for private data in trash • helps protect cable from EMI and RFI • the safeguarding of personnel's rights • assuring that risks are known and managed • individual well-known for social engineering • agreement between an organization and a vendor • ...
Maria's favourite words. 2015-12-11
Across
- / A person with a role to promote, display or advertise commercial products.
- / Antonym: vague.
- / Formal request to an authority for something (e.g., job).
- / Security building blocks
- / Associated with, able to, or designed for performing one or more practical activities.
- / Synonym: sketch, blueprint, outline.
- / Useful or valuable thing.
- / Dealing with the nature of being.
- / Existing or firmly attached within something or under a surface.
- / A series of actions or steps taken in order to achieve a particular end.
- / Put, lay, or stand (something) in a specified place or position.
- / Area or territory controlled by a ruler or government.
Down
- / A person’s bodily shape.
- / Security-Enhanced Embedded system Design.
- / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- / Judgement.
- / Action against someone or something.
- / Maria’s main concern in the thesis.
- / A thing or things belonging to someone; possessions collectively.
- / A raised level surface on which people or things can stand.
- / A set of connected things or parts forming a complex whole, in particular.
- / A part of a whole.
- / Information.
23 Clues: / Judgement. • / Information. • / Antonym: vague. • / A part of a whole. • / A person’s bodily shape. • / Security building blocks • / Useful or valuable thing. • / Dealing with the nature of being. • / Maria’s main concern in the thesis. • / Action against someone or something. • / Synonym: sketch, blueprint, outline. • / Security-Enhanced Embedded system Design. • ...
Deterring home break-ins and vehicle theft 2023-02-17
Across
- Man's best friend
- Used to lock your steering wheel
- Available with wireless video recording to monitor the entry to your home
- Make sure these are closed and locked
- Don't leave your running vehicle _____.
- Store your keyless entry fob in this type of bag to prevent a thief from cloning your key
- Don't allow this to overflow while you are away on vacation
- A GPS device that can be used to locate your vehicle
- Posted to advertise your home security company
Down
- Mount this on the exterior of your home for added security
- Can be stuck on a windshield as a security warning
- If you see ______, say ______!
- Type of lighting used to deter break-ins
- Secondary and more secure locking mechanism to deter home entry
- Thieves may attach this magnetic Apple product to your vehicle to track it
- Keep these locked to deter unwanted entry
- In-vehicle video recorder
- An audible anti-theft deterrent
- Never leave these in your vehicle
- Etch this onto your vehicle windows or catalytic converter to deter theft
20 Clues: Man's best friend • In-vehicle video recorder • If you see ______, say ______! • An audible anti-theft deterrent • Used to lock your steering wheel • Never leave these in your vehicle • Make sure these are closed and locked • Don't leave your running vehicle _____. • Type of lighting used to deter break-ins • Keep these locked to deter unwanted entry • ...
Volunteers 2023-05-01
Across
- 2nd grade assist
- Preschool helper
- Crafts
- Registrar
- Missions
- Snacks
- Crafts three
- Music assist
- Adults
- 4th grade lead
- first grade assist
- 5/6 Girls too
- Security lead
- Security helper/floater
- Adult assist
- Anderson Army
- Co leader
- Audio
- Crafts also
- 5th and 6th boys assist
- Rec lead
- 5th and 6th boys lead
- Rec second
- 4th grade also
- KDG assist
- Tech
- Preschool
- 5/6 assist
- Greet
- Music Lead
Down
- 5/6 girls
- Registration
- 2nd grade too
- H. Helper
- childcare MW
- prek missions
- 1st grade
- Rec Follower
- Leader
- Preschool Assist
- Visual
- 1st grade too
- Home
- Rec shadow
- 3rd grade lead
- Greeter
- Rec assist
- Worship help
- 2nd grade
- childcare T,R,F
- 3rd grade
- kdg
- 3rd grade also
- childcare MW too
- Crafts lead
- Security
- Kdg lead
- 5th and 6th boys
- Childcare
- Secretary
60 Clues: kdg • Home • Tech • Audio • Greet • Crafts • Snacks • Leader • Visual • Adults • Greeter • Missions • Rec lead • Security • Kdg lead • 5/6 girls • H. Helper • Registrar • 1st grade • Co leader • 2nd grade • 3rd grade • Preschool • Childcare • Secretary • Rec shadow • Rec assist • Rec second • KDG assist • 5/6 assist • Music Lead • Crafts also • Crafts lead • Registration • childcare MW • Rec Follower • Crafts three • Music assist • Adult assist • Worship help • ...
WIGLEY WORK 2021-09-16
Across
- working a specific number of hours per week
- the lowest hourly rate
- where social security was established
- a rate that pieceworkers are paid
- what you pay when your job is covered by social security
- workers paid according to the amount of items they produce
- HOURS working more hours than their regular hours
- whats paid for by FICA taxes
- insured program available through the US government
- a percentage of each workers salary is taken out of each paycheck up to a certain amount
- sum of your hourly and overtime pay
- getting paid every other week
- 1 1/2 the hourly rate
Down
- 2x the hourly rate
- unique for each individual, used to track Social Security benefits and for other identification purposes
- set amount for each hour the work
- 3x the hourly rate
- getting paid twice a month
- paycheck amount are automatically deposited electronically into their bank account
- a percentage of sales paid to an author,musician or artist
- whats paid for by FICA taxes
- percentage of total sales
- 1.5 times your hourly rate
23 Clues: 2x the hourly rate • 3x the hourly rate • 1 1/2 the hourly rate • the lowest hourly rate • percentage of total sales • getting paid twice a month • 1.5 times your hourly rate • whats paid for by FICA taxes • whats paid for by FICA taxes • getting paid every other week • set amount for each hour the work • a rate that pieceworkers are paid • sum of your hourly and overtime pay • ...
021-1 2024-07-12
Across
- Term for when security is breached
- Malicious code used in the attack
- Joint groups formed to improve cybersecurity
- Efforts to reduce the impact of the attack
- Tech giant also affected by the attack
- Public and private sectors working together
- Russian state-sponsored group behind the attack
- U.S. Department of Homeland Security's response
- Type of actor behind the attack
- Another name for the attackers
- Key focus in the aftermath of the attack
- Type of analysis conducted to investigate the attack
- Weaknesses exploited by the attackers
Down
- Techniques used by attackers to avoid detection
- Another term for the security incident
- Process of uncovering the details of the attack
- U.S. response to the attack
- IT company at the center of the attack
- The effect of the attack on organizations
- Cybersecurity firm that discovered the breach
- Software updates released by SolarWinds
- Actions pursued against the attackers
- U.S. department that was compromised
- U.S. body that held hearings on the attack
- SolarWinds product that was compromised
25 Clues: U.S. response to the attack • Another name for the attackers • Type of actor behind the attack • Malicious code used in the attack • Term for when security is breached • U.S. department that was compromised • Actions pursued against the attackers • Weaknesses exploited by the attackers • Another term for the security incident • IT company at the center of the attack • ...
Safety Week 2024 2024-10-01
Across
- See something ___ something
- Emergency coordinators wear these brightly colored items
- DMU encourages annual vaccines to prevent this common infection
- A kit of supplies and equipment for use in giving medical treatment
- A practice exercise to prepare for a potential emergency situation
- type of ppe for eyes
- Action to take for a rapid, orderly process to exit building
- A symbol indicating dangerous biological substances
- A portable device used to treat sudden cardiac arrest
- DMUs emergency notification system
- a safe, indoor location in an emergency
Down
- Practice of following others through security checkpoint without access badge
- Animal to emulate when walking on icy ground
- One should always be _____ of their surroundings
- DMU's avatar for emergency messaging
- Being ready and able to deal with emergencies
- Campus department to contact if you witness suspicious activity
- Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
- A service providing emergency medical care and transportation
- Homeland Security model for active threat response: run, hide, _____
- DMU's Chief Compliance Officer is highly ____ averse
21 Clues: type of ppe for eyes • See something ___ something • DMUs emergency notification system • DMU's avatar for emergency messaging • a safe, indoor location in an emergency • Animal to emulate when walking on icy ground • Being ready and able to deal with emergencies • One should always be _____ of their surroundings • A symbol indicating dangerous biological substances • ...
Investing Crossword Puzzle 2025-03-25
Across
- how the government ensures you'll eventually be taxed
- Government Medical Health Plan
- When the market is up
- The biggest financial fraud in US history.
- A system of recording info that’s impossible to override
- Worked a certain amount of time to match your retirement account
- holding company that owns subsidiaries in many different business sectors
- Contributions made before tax
- Contributions made after tax
- Transfer retirement account from old employer to another
- Social Security and Medicare tax
- Money Currencies that are created and backed by the Government
- When the market is down
Down
- Fund to have before investing in crypto
- A company that is owned by a larger company
- Strategy for nervous investors that are low risk
- No longer working
- How much did Tom Brady lose with FTX
- Aggressive risk tolerance investors use this strategy
- Security Conceived by President Roosevelt in 1935
- How old you have to be to collect full social security benefit
- Retirement benefit offered by some employers
- High risk investment
- Berkshire Hathaway
- The more popular it is, the more valuable
25 Clues: No longer working • Berkshire Hathaway • High risk investment • When the market is up • When the market is down • Contributions made after tax • Contributions made before tax • Government Medical Health Plan • Social Security and Medicare tax • How much did Tom Brady lose with FTX • Fund to have before investing in crypto • The more popular it is, the more valuable • ...
Airport 2025-06-04
Across
- A delay in a flight`s departure or arrival
- The area where luggage is collected after a flight
- A person traveling on a plane
- The process of getting off a plane
- A machine that carries passengers and cargo through the air
- A persone who helps passengers on a flight
- the process of registering for a flight and getting a boarding pass
- A bag used to pack clothes for a trip
- A place where planes take off and land
Down
- A ticket that allows you to board a plane
- A device that detects metal objects during security checks
- A document needed to travel to another country
- The act of getting on a plane
- A vehicle that transport passengers between the terminal and the aircraft
- The persone who flies the plane
- A security check where passengers walk through a scanner
- Place where passengers wait to board their flight
- The area where passengers go after leaving the plane
- A place where planes are kept and repaired
- A small bag used to carry personal items on a flight
20 Clues: The act of getting on a plane • A person traveling on a plane • The persone who flies the plane • The process of getting off a plane • A bag used to pack clothes for a trip • A place where planes take off and land • A ticket that allows you to board a plane • A delay in a flight`s departure or arrival • A place where planes are kept and repaired • ...
Cybersecurity 2025-06-04
Across
- Software that secretly collects user information
- Verifying the identity of a user or device
- A small file stored on your device by websites you visit
- A type of malware that replicates and spreads to other programs
- A secret string of characters used to access a system
- A person who gains unauthorized access to systems
- A type of scam where attackers trick users into revealing information
- A type of malware disguised as legitimate software
- Software designed to detect and remove malicious programs
- A program that records keystrokes to steal data
Down
- A security process requiring two different authentication methods
- A software update that fixes security vulnerabilities
- ENGINEERING Manipulating people into revealing confidential information
- Software designed to harm or exploit any device or network
- The process of converting data into a coded form
- An incident where data is accessed without authorization
- A network security system that monitors and controls traffic
- A copy of data stored to prevent loss
- A network of infected computers under a hacker’s control
- A secure connection over the internet to protect data
20 Clues: A copy of data stored to prevent loss • Verifying the identity of a user or device • A program that records keystrokes to steal data • Software that secretly collects user information • The process of converting data into a coded form • A person who gains unauthorized access to systems • A type of malware disguised as legitimate software • ...
Digital Footprint-CCC 2018-09-21
9 Clues: hosted device • world of online • related to online • WiFi connected item • a trace of where we were. • thing marked with the print • Native- grew up with the internet • trail-What the footprints leave behind • citizenship-Learning about communication
Cyberbullying 2021-10-29
Across
- Bullying online, is called .....
- If you are bullied, tell an ......
- Cyberbullying is against the law (true/false)
- A wireless handheld device to communicate.
- Denial of access to internet.
- Repeated or deliberate harassment.
Down
- An example of cyberbullying.
- To report bullying on websites(true/false)
- An effect of cyberbullying.
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An effect of cyberbullying. • An example of cyberbullying. • Denial of access to internet. • Bullying online, is called ..... • If you are bullied, tell an ...... • Repeated or deliberate harassment. • To report bullying on websites(true/false) • A wireless handheld device to communicate. • Cyberbullying is against the law (true/false)
Four Purposes of Government 2021-01-13
Across
- In a _______, the creation and enforcement of laws is closely tied to the wants and needs of citizens.
- ________threats include physical attacks, such as the terrorist attacks of September 11, 2001, and invisible attacks, such as cyber espionage.
- In this sense of the word, ______means a state of happiness and well-being within a society.
- Freedom of speech and the press, as well as _______liberties, are constitutionally protected by the Bill of Rights.
- The government also institutes the ____ justice system as a mechanism citizens can use to settle disputes.
- A democracy embraces the principle of the rule of law, which ensures that no person in the state is above the law.
- All ________ have the purposes of establishing laws, providing order and security, protecting their people from external threats, and providing for the general welfare.
- In a monarchy or ______the focus is more on maintaining the regime
- The US has a strong emphasis on individualism, liberty, and ____markets.
Down
- In a democracy, laws are made by the _____ or their representatives.
- In a __________, laws may be administered in a method that benefits the leader or the central government more than those being governed.
- Governments provide a range of services from public education, financial support to the _____ and aged, bridges and water.
- Governments are responsible for preventing attacks on their people from persons or groups outside its _____
- In a ___________ or dictatorship, laws are promulgated by the ruler.
- The U.S. _____________ declared that the government was to establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare ...
- Laws must be publicly recorded, enforced equally, and interpreted by an independent ______ branch.
- Social welfare states, such as those found in much of _______, provide extensive government services, including free public education, income support, and government-supplied health care.
17 Clues: In a monarchy or ______the focus is more on maintaining the regime • In a democracy, laws are made by the _____ or their representatives. • In a ___________ or dictatorship, laws are promulgated by the ruler. • The US has a strong emphasis on individualism, liberty, and ____markets. • ...
Smart City Crossword Puzzle 2019-03-20
Across
- big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
- a native or naturalized member of a state or other political community
- ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
- the process of combining software components, hardware components, or both into an overall system
- effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
- an extended social group having a distinctive cultural and economic organization
Down
- ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
- the organized action of making of goods and services for sale
- ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
- process by which people become residents of cities
- act of periodically checking processes, equipment and environment in order to detect any changes
- collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
- ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
13 Clues: process by which people become residents of cities • the organized action of making of goods and services for sale • a native or naturalized member of a state or other political community • an extended social group having a distinctive cultural and economic organization • ...
Once Upon a Time C 2021-09-30
Across
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
- The ? gardener was willing to travel to different places where there was work.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- For their safety, they ? to the Neighbourhood Watch program.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
- After many false alarms, the family wondered about the ? of the security system.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
- Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
- Nervously, the resident noticed the ? of a figure below the street light.
- When slicing bread or tomato, it is easier using a knife with ?.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
- Residents ? their fears of criminals by installing sophisticated security devices.
- cherished red wagon with the supplies for phys. Ed.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
- Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
- Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
29 Clues: cherished red wagon with the supplies for phys. Ed. • For their safety, they ? to the Neighbourhood Watch program. • When slicing bread or tomato, it is easier using a knife with ?. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • ...
crossword about Cybersecurity 2025-06-07
Across
- Malware that encrypts files for ransom
- Network of infected devices
- Small data file stored by websites
- Software that secretly monitors activity
- Scrambling data for security
- Person who exploits system vulnerabilities
- Remote data storage and computing
Down
- Fraudulent attempts to steal info
- Harmful software like viruses
- Authentication using fingerprints
- Directs internet traffic
- Decentralized ledger technology
- Malware disguised as legitimate software
- Secures internet connections
- Network security barrier
15 Clues: Directs internet traffic • Network security barrier • Network of infected devices • Secures internet connections • Scrambling data for security • Harmful software like viruses • Decentralized ledger technology • Fraudulent attempts to steal info • Authentication using fingerprints • Remote data storage and computing • Small data file stored by websites • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Chapter 15 2013-04-25
Across
- Chain of ___________ documentation about evidence location and usage
- this act governs the disclosure of financial and accounting information
- Due __________ is assuring that risks are known and managed
- an event that affects the security of an organization
- a violation of physical security
- this act governs the disclosure and protection of health information
- this system helps remove heat from a server room
- Due ________ is the safeguarding of personnel's rights
- ______ phishing is a targeted social engineering attack
- wiping or purging data
- this type of fire extinguisher can be class A, B, C, D, or K
Down
- ________ diving is scavenging for private data in trash
- individual well-known for social engineering
- helps protect cable from EMI and RFI
- Separation Of ______ means more than one person is required to complete a task
- a dry pipe fire suppression system with special features
- ________ management is a formal process for managing changes to the IT environment
- this type of fire suppression system can be wet pipe or dry pipe
- this act helps protect the privacy of your social security number
- agreement between an organization and a vendor
20 Clues: wiping or purging data • a violation of physical security • helps protect cable from EMI and RFI • individual well-known for social engineering • agreement between an organization and a vendor • this system helps remove heat from a server room • an event that affects the security of an organization • Due ________ is the safeguarding of personnel's rights • ...
Maria's favourite words 2015-12-11
Across
- Put, lay, or stand (something) in a specified place or position.
- Synonym: sketch, blueprint, outline.
- existing or firmly attached within something or under a surface:
- A set of connected things or parts forming a complex whole, in particular.
- Dealing with the nature of being.
- detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- a thing or things belonging to someone; possessions collectively.
- formal request to an authority for something (e.g., job).
- Useful or valuable thing.
- Antonym of vague.
- Information.
Down
- Security-Enhanced Embedded system Design.
- A person’s bodily shape.
- a series of actions or steps taken in order to achieve a particular end.
- Action against someone or something.
- associated with, able to, or designed for performing one or more practical activities.
- Judgement.
- A person with a role to promote, display or advertise commercial products.
- A part of a whole.
- Maria’s main concern in the thesis.
- a raised level surface on which people or things can stand.
- Security building blocks
- Area or territory controlled by a ruler or government.
23 Clues: Judgement. • Information. • Antonym of vague. • A part of a whole. • A person’s bodily shape. • Security building blocks • Useful or valuable thing. • Dealing with the nature of being. • Maria’s main concern in the thesis. • Synonym: sketch, blueprint, outline. • Action against someone or something. • Security-Enhanced Embedded system Design. • ...
Airport Crossword 2019-02-12
Across
- Secure baggage storage and luggage wrapping is available at SmartCarte
- Available for emergancy use
- Go there to eat/drink
- Responsibility for aviation security should be shared between the NZ Police and the Military of transport
- Provided as a quiet place for contemplation to all travellers
- Available for transit passengers. Can buy supplies from vending machine
- Located on top floor of the terminal. Provides a view of airfield
- Changing currency types
- Can access smoking lounge after security
- Available throughout terminals to assist passengers
Down
- Where you can buy items cheaper and non-taxed
- Located throughout international airport terminal to communicate. Have to pay to use
- Available to help transfer luggage
- Centre provides comprehensive ... and booking service
- Passengers first contact with airport to book a space. Can be long term or short term
- Where you can buy small goods for yourself or as a gift
- Rooms with cots and changing tables are available.
- You can access this for computer or mobile usage
- Will check you to ensure no transporting of any dangerous goods
- Getting cash out
20 Clues: Getting cash out • Go there to eat/drink • Changing currency types • Available for emergancy use • Available to help transfer luggage • Can access smoking lounge after security • Where you can buy items cheaper and non-taxed • You can access this for computer or mobile usage • Rooms with cots and changing tables are available. • ...
Homefront 2021-06-15
Across
- roles, Women were invited to join the war effort their roles were limited.
- National Act introduced in 1939 to restrict freedom.
- American men brought these for the Australian women.
- All information wasn't always given for security purposes.
- Clothes were never wasted.
- Voted against in WW1 but was legalised in WW2.
- People placed here for concern over national security.
- Needed to buy everyday necessities like clothes, food, and petrol.
- Common to hinder accurate bombings.
- A large role in the war but weren't considered personnel.
- The government wanted to keep this high.
- Major players in both wars - central and axis powers.
Down
- Women were now allowed to work in this male-dominated place.
- Aboriginal and Torres Strait Islanders were not conscripted.
- Weren't allowed to be drawn to save resources.
- There was jealousy in Australia over the American visitors.
- Placed on Australians to ensure there were enough resources.
- Trenches and shelters were made out of fear of air raids.
- Women were encouraged to take up work that was more physical.
- Bombed many times by the Japanese.
20 Clues: Clothes were never wasted. • Bombed many times by the Japanese. • Common to hinder accurate bombings. • The government wanted to keep this high. • Weren't allowed to be drawn to save resources. • Voted against in WW1 but was legalised in WW2. • National Act introduced in 1939 to restrict freedom. • American men brought these for the Australian women. • ...
WWII--Academic Vocabulary 2024-02-20
Across
- Setting someone free from oppression.
- security: Measures for country protection.
- fronts: Engaging in combat in multiple areas.
- Official ban on trade with a country.
- Converting information into code for security.
- genocide: Government-led extermination of a group.
- shortages: Insufficient goods for purchase.
- state: Government with complete control over public and private life.
- Controlling resource distribution in scarcity.
- raid: Aerial attack with bombs.
- Preparing troops and supplies for war.
- Offering time for charitable activities.
- Purchasers of goods and services.
Down
- enlistment: Joining armed forces voluntarily or through draft.
- effort: Mobilization to support armed forces.
- supply: Availability of food, especially in tough times.
- weapons: Non-mass destruction military arms.
- base: Military installation for navy operations.
- opportunities: Available work chances.
- front: Civilian population during war.
- goods: Limited supply products.
- levels: Amount of goods or services made.
- treaties: Formal agreements between countries.
- shortage: Scarcity of agricultural workers.
- Love for one's country.
- Confinement, especially during wartime.
- units: Organized military groups.
- effects: Impact on regional economy.
- transmission: Ensuring information security.
- involvement: Participation of the United States in a conflict.
30 Clues: Love for one's country. • goods: Limited supply products. • raid: Aerial attack with bombs. • units: Organized military groups. • Purchasers of goods and services. • effects: Impact on regional economy. • Setting someone free from oppression. • Official ban on trade with a country. • opportunities: Available work chances. • front: Civilian population during war. • ...
United Nations 2024-09-19
Across
- Number of members of Security Council and judges in International Court of Justice
- Number of countries represented on the Economic and Social Council.
- Location of International Court of Justice
- City where Charter was signed San __________.
- ______________ Development or actions that can be maintained over time without damaging the environment.
- Most powerful organ of the UN
- UN agency that care for education and children.
- First goal of the UN: maintain __________ and security.
- The UN was created after the scourge of _________ ________ ____.
- Current Secretary General of the UN: Antonio __________ of Portugal.
- Name for a gathering of people to talk about issues.
- Founding document of the United Nations
Down
- American who led effort to create Universal Declaration of Human Rights
- Group of all member states General __________.
- The number of principal organs of the UN
- Location of the UN Headquarters
- The number of official languages of the UN
- Initials for the World Health Organization
- Permanent members of the Security Council are United Kingdom, China, France, US and _________.
- Proposals or recommendations of the UN
- Office of the Secretary General or leader of the UN
21 Clues: Most powerful organ of the UN • Location of the UN Headquarters • Proposals or recommendations of the UN • Founding document of the United Nations • The number of principal organs of the UN • The number of official languages of the UN • Initials for the World Health Organization • Location of International Court of Justice • City where Charter was signed San __________. • ...
Investing Crossword Puzzle 2025-03-25
Across
- Contributions made before tax
- Transfer retirement account from old employer to another
- Berkshire Hathaway
- Security Conceived by President Roosevelt in 1935
- The more popular it is, the more valuable
- Worked a certain amount of time to match your retirement account
- No longer working
- Currencies that are created and backed by the Government
- A system of recording info that’s impossible to override
- Retirement benefit offered by some employers
Down
- holding company that owns subsidiaries in many different business sectors
- Social Security and Medicare tax
- how the government ensures you'll eventually be taxed
- How much did Tom Brady lose with FTX
- High risk investment
- Strategy for nervous investors that are low risk
- When the market is up
- How old you have to be to collect full social security benefit
- Contributions made after tax
- Fund to have before investing in crypto
- When the market is down
- A company that is owned by a larger company
- Government Medical Health Plan
- The biggest financial fraud in US history.
- Aggressive risk tolerance investors use this strategy
25 Clues: No longer working • Berkshire Hathaway • High risk investment • When the market is up • When the market is down • Contributions made after tax • Contributions made before tax • Government Medical Health Plan • Social Security and Medicare tax • How much did Tom Brady lose with FTX • Fund to have before investing in crypto • The more popular it is, the more valuable • ...
System Administration Secuirty 2026-02-14
Across
- Restoring data after a disaster
- Software accessed online
- Determining what a user can access
- Proves a website is secure
- Using multiple layers of security
- Company-owned software
- Malicious program that spreads between files
- Software with editable public code
- Allocating RAM to programs
- Prevents unwanted browser windows
- Programs used to complete everyday tasks
- Manages hardware and software on a computer
- Running multiple programs at once
- Software that runs in the background
- Standard security rules
- Legal agreement for using software
- Pay regularly to use software
- Reducing system vulnerabilities
Down
- Verifying a user’s identity
- Reviewing systems for security issues
- Monitoring system activity
- Software that removes malware
- Keeping systems updated
- Proof that an action occurred
- Giving users minimal necessary access
- Update that fixes bugs or vulnerabilities
- Allows the OS to communicate with hardware
- Organizing files and folders
- Controls read, write, or delete access
- Temporary browser storage
- How users interact with a computer
- Blocks suspicious network traffic
- Scrambling data for protection
33 Clues: Company-owned software • Keeping systems updated • Standard security rules • Software accessed online • Temporary browser storage • Monitoring system activity • Proves a website is secure • Allocating RAM to programs • Verifying a user’s identity • Organizing files and folders • Software that removes malware • Proof that an action occurred • Pay regularly to use software • ...
Learning Unit 9: Security Risk Reviews 2023-05-05
Across
- refer to the specialized knowledge and expertise needed to accomplish complex actions, tasks, and processes relating to computational and physical technology as well as a diverse group of other enterprises.
- Through _____________, our goal is to understand how well the current security program operates within the technical architecture.
- As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis.
- These controls are used to manage the organization’s information security and compliance efforts and to address the people part of security. These types of controls include things like policies, standards, procedures, and training. These are not exciting, but are absolutely critical to good information security and compliance management.
- Typically the controls that you can touch. These controls are designed to manage physical access to information and include things like door locks, alarm systems, and camera surveillance. It really doesn’t matter how good your antivirus software is if someone can easily steal your server.
- is a collaborative process used to identify security-related issues, determine the level of risk associated with those issues, and make informed decisions about risk mitigation or acceptance.
Down
- This is the IT part of security. Notice how the IT part of security is only one part of security and not all parts of security? Technical controls are what most people think of when they think of information security. These controls include things like firewalls, antivirus software, passwords, and permissions.
- is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.
- should be a planned part of the risk management process and involve regular checking or surveillance. The results should be recorded and reported externally and internally, as appropriate. The results should also be an input to the review and continuous improvement of the firm's risk management framework.
- was founded in 1901 and is now part of the U.S. Department of Commerce. _____________ is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time — a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany and other economic rivals.
- is ensuring that information is accurate. Accurate information is critical to us in making sound decisions. The opposite of integrity is (unauthorized) alteration.
11 Clues: is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure. • As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis. • ...
AI in Cybersecurity 2025-10-20
Across
- – What cybersecurity teams do.
- – What deepfakes can break online.
- – Helps detect or block fake content.
- – Something that looks real but isn’t.
- – A short video that can be altered.
Down
- – What happens when AI misidentifies something.
- – A warning about possible threats.
- – What cybersecurity helps us stay.
- – A harmful cyber action.
- – Used by AI to learn patterns.
- – The technology behind deepfakes.
- – Deepfakes can also be made from this.
12 Clues: – A harmful cyber action. • – What cybersecurity teams do. • – Used by AI to learn patterns. • – What deepfakes can break online. • – The technology behind deepfakes. • – A warning about possible threats. • – What cybersecurity helps us stay. • – A short video that can be altered. • – Helps detect or block fake content. • – Something that looks real but isn’t. • ...
Private Security Chapter 1-3 Terminology 2019-09-27
Across
- the aim of punishment is to prevent or deter persons from engaging in future crime
- when security organizations work to prevent crime
- official data on crime that are reported to law enforcement agencies across the United States
- a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
- when security officers respond for security purposes after a crime has been attempted or committed
- the eight major crimes included in Part 1 of the Uniform Crime Report
Down
- any action taken to reduce crime risks and build individual and community safety
- the first regular police force in London
- when security organizations police the community all work together to solve crime
- who formed Chicago's first private detective agency in 1850
- Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
- Scanning Analysis Response Assess
- a call to citizens to assist in an emergency situation
13 Clues: Scanning Analysis Response Assess • the first regular police force in London • when security organizations work to prevent crime • a call to citizens to assist in an emergency situation • who formed Chicago's first private detective agency in 1850 • the eight major crimes included in Part 1 of the Uniform Crime Report • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Information Security crossword 2021-07-06
Across
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
- ISO 27001 is the international standard for _____________
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Guarantee of reliable access to the information by authorized people
- 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
- An asset that is essential to an organization and must be suitably protected
- Prevents the unauthorized use or disclosure of information
- You should never share this with anyone
- In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
- You should report Phishing emails in the ___________ console
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Protecting the accuracy and completeness of information and processing methods
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- Encodes the data in such a way that it is unintelligible without a key
- A software program that is designed to prevent malware
- Where to report a security incident? - __________@tavant.com
- Effect of uncertainty on objectives
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
18 Clues: Effect of uncertainty on objectives • You should never share this with anyone • A software program that is designed to prevent malware • ISO 27001 is the international standard for _____________ • Prevents the unauthorized use or disclosure of information • You should report Phishing emails in the ___________ console • ...
AI Security Awareness 2025-04-25
Across
- A type of machine learning where the model finds patterns and relationships in unstructured data without labeled responses.
- Data that requires protection due to its confidential nature.
- A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
- The simulation of human intelligence processes by machines, especially computer systems.
- Most AI chatbots are this type of LLM. Stands for generative pre-trained transformer.
- A type of neural network architecture used for natural language processing tasks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- A type of machine learning where the model is trained on labeled or structured data.
- A type of AI that enables computers to learn from data and improve their performance over time without being explicitly programmed.
- The ability of AI to interact and converse with humans in a natural way through human language.
- Refers to AI models that can create new content, such as text, images, or music.
- AI-generated media that mimics real people, often used to create misleading or false content.
- A method of trying to gather personal information using deceptive e-mails and websites.
- The right of individuals to keep their personal information secure and free from unauthorized access.
- Systematic error introduced into data or algorithms that can lead to unfair outcomes.
- An AI program designed to simulate conversation with human users.
- Large Language Model; an AI model trained on vast amounts of text data to understand and generate human language.
17 Clues: Data that requires protection due to its confidential nature. • An AI program designed to simulate conversation with human users. • Refers to AI models that can create new content, such as text, images, or music. • A type of neural network architecture used for natural language processing tasks. • ...
Digital security fundamentals 2022-12-17
Across
- The strongest password is: Crrrrrrrr@!!!, Gi0rg10, Mino012106, It@l1@, C@neSalutoFrutta
- Attack attempting to discover a password by systematically trying every possible combination
- 2 factors is a kind of strong …….
- Program used to detect unsolicited, unwanted and virus-infected emails is a …… filter
- When criminals use scam email they are trying to …. you
- A piece of code capable of copying itself
- Using this tool you can find out who an IP address belongs to
- Using a social handle or username of a person or business in your post or photo
Down
- Hostile online interaction that involves insulting messages between users
- Your computer will have many popups….
- Bronze medal again in 2022 as a password: an evergreen!
- Searching for and publishing private or identifying information about a particular individual on the internet
- Do not open if you don’t trust the sender
- A person who takes or use your computer information
- When criminals use scam sms they are trying to …. you
- A sequence of words or other text used to control access to a computer
- Fraudulent calls or voicemails
17 Clues: Fraudulent calls or voicemails • 2 factors is a kind of strong ……. • Your computer will have many popups…. • Do not open if you don’t trust the sender • A piece of code capable of copying itself • A person who takes or use your computer information • When criminals use scam sms they are trying to …. you • Bronze medal again in 2022 as a password: an evergreen! • ...
Safety/Security Meeting 2025-09-24
Across
- Vernon & Fortino are the branch
- Put away all _____ information before helping a new client
- Always file a ______ incident within 72 hours
- We report media concerns to media
- Try to _______ disruptive behavior
- Fire, Gas & Bomb threats warrant immediate
- The yellow emergency Binder contains _______ procedures
- Who we call in the event of an emergency
- If you're approached in the lobby by the robber, get the money from the _____ line
Down
- Go to the ____ when the opening signal is not set or set incorrectly
- We use this checklist at the end of the day
- During a robbery, pay close attention to the person's
- Lock your ____ when leaving your computer
- Comply with the robber's
- Use the alarm keypad if the _____ button isn't available
- Know the procedure to allow _____ for unknown vendors
- A normal opening of the branch requires ____ employees
17 Clues: Comply with the robber's • Vernon & Fortino are the branch • We report media concerns to media • Try to _______ disruptive behavior • Who we call in the event of an emergency • Lock your ____ when leaving your computer • Fire, Gas & Bomb threats warrant immediate • We use this checklist at the end of the day • Always file a ______ incident within 72 hours • ...
Puzzle on Security 2020-06-02
Across
- When an information is protected from disclosure or exposure to unauthorized individuals or systems
- When an information is whole, complete, and uncorrupted
- Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
- Software programs that hide their true nature and reveal their designed behavior only when activated
- These software components or programs are designed to damage, destroy, or deny service to the target
- the act of sending an e-mail message with a modified field
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
- When an information is free from mistakes or errors and it has the value that the end user expect
Down
- A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
- Computer Security centered on a system
- A computer consists of segments of code that perform malicious actions
- A well-known and broad category of electronic and human activities that can breach the confidentiality of information
- A malicious program that replicates itself constantly, without requiring another program environment
- This German code machine _______ were first broken by the Poles in the year 1930
- A category of objects, persons, or other entities that presents a danger to an asset
- The probability that something unwanted will happen
- An intentional or unintentional act that can cause damage to information and/or the systems that support it
17 Clues: Computer Security centered on a system • The probability that something unwanted will happen • When an information is whole, complete, and uncorrupted • the act of sending an e-mail message with a modified field • A computer consists of segments of code that perform malicious actions • ...
Information Security crossword 2021-07-06
Across
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- An asset that is essential to an organization and must be suitably protected
- You should report Phishing emails in the ___________ console
- Guarantee of reliable access to the information by authorized people
- In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
- Prevents the unauthorized use or disclosure of information
- Effect of uncertainty on objectives
- 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
Down
- You should never share this with anyone
- A software program that is designed to prevent malware
- Where to report a security incident? - __________@tavant.com
- Protecting the accuracy and completeness of information and processing methods
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- ISO 27001 is the international standard for _____________
- Encodes the data in such a way that it is unintelligible without a key
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
18 Clues: Effect of uncertainty on objectives • You should never share this with anyone • A software program that is designed to prevent malware • ISO 27001 is the international standard for _____________ • Prevents the unauthorized use or disclosure of information • Where to report a security incident? - __________@tavant.com • ...
Network Security Terminology 2026-01-06
Across
- خوادم أو أنظمة وهمية (خداعية) يتم إعدادها لجمع المعلومات عن التهديدات البشرية.
- تقليل المخاطر إلى مستوى مقبول عبر وسائل فنية أو إدارية
- الخط الأول للدفاع
- ضعف يمكن أن يُستغل من قبل جهة تهديد
- استخدام ضوابط متعددة ومتكررة (متراكبة)
- تصرف فعلي يستغل نقطة ضعف لتنفيذ ضرر
- طريقة تحقق تتطلب وسيلتين أو أكثر لإثبات الهوية.
- التأكد من أن البيانات والخدمات متاحة عند الحاجة
- عملية تحويل البيانات إلى صيغة غير مقروءة لحمايتها
- قياس احتمال وتأثير وقوع حدث تهديدي.
Down
- كل شيء له قيمة معلوماتية للمؤسسة
- سياسات، برامج، تقنيات أمنية
- استخدام الخداع لإقناع الناس بالإفصاح عن معلومات حساسة
- سبب محتمل لحادث غير مرغوب فيه
- الخاصية التي تضمن أن البيانات لم يتم تعديلها أو التلاعب بها
- مبدأ يضمن حصر الوصول إلى المعلومات على الأطراف المصرح لها
- وثيقة توجيهية عامة تُحدد كيفية التعامل مع الأصول والتهديدات
17 Clues: الخط الأول للدفاع • سياسات، برامج، تقنيات أمنية • سبب محتمل لحادث غير مرغوب فيه • كل شيء له قيمة معلوماتية للمؤسسة • ضعف يمكن أن يُستغل من قبل جهة تهديد • تصرف فعلي يستغل نقطة ضعف لتنفيذ ضرر • قياس احتمال وتأثير وقوع حدث تهديدي. • استخدام ضوابط متعددة ومتكررة (متراكبة) • طريقة تحقق تتطلب وسيلتين أو أكثر لإثبات الهوية. • التأكد من أن البيانات والخدمات متاحة عند الحاجة • ...
Chapter 2 Vocabulary 2022-11-21
Across
- A type of ETF transaction; money is deposited directly into the customer's checking account.
- someone who assists you with purchasing stocks and bonds
- Any organization that provides services related to money
- A security that pays interest over terms of ten or thirty years.
- owners are personally liable for their company’s losses
- A security that matures in a year or loss.
Down
- A financial institution that does not accept deposits
- Action taken to manage supply of money and interest rate.
- A financial institution that accepts money from customers and deposits it into the customer's account.
- A document guaranteeing payment of a specific amount.
- A security that pays interest over terms ranging from two to ten years.
- A financial investment issued by a corporation, government, or other organization.
12 Clues: A security that matures in a year or loss. • A financial institution that does not accept deposits • A document guaranteeing payment of a specific amount. • owners are personally liable for their company’s losses • someone who assists you with purchasing stocks and bonds • Any organization that provides services related to money • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
cybersecurity 2022-05-24
Across
- A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company
- Designed to detect and destroy computer virus
- An individual who gains unauthorized access to a computer system/network for social or political purposes.
- An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
- internet Is the global system of interconnected computer networks that use the Internet protocol suite
- A network point that acts as an entrance to another network
- A feature or defect of a computer system that allows surreptitious unauthorized access to data
- A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
- Gaining access into a computer system/network illegally.
- an automated program that runs over the Internet
- Self-replicating virus that does not alter files but resides in active memory and duplicates itself
- Data confidentiality is a measure of the ability of a system to protect its data
- A person who uses computers to gain unauthorized access to data
- It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- Software that is intended to damage or disable computers and computer systems
- Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
- A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
- A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
- management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
- Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
- Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.
26 Clues: Designed to detect and destroy computer virus • an automated program that runs over the Internet • Gaining access into a computer system/network illegally. • A network point that acts as an entrance to another network • A person who uses computers to gain unauthorized access to data • Software that is intended to damage or disable computers and computer systems • ...
Cybersecurity Terms 2023-03-17
Across
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
- Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
- The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
- You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
- A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
- A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
- is a method of connecting a series of computers and devices in a private encrypted network
- Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
- Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
- Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
- it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
- A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
- The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
- is used to protect your information from hackers.
- is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
- A form of malware used by hackers to spy on you and your computer activities
- also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
- Any technology, be it software or hardware, used to keep intruders out.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
20 Clues: is used to protect your information from hackers. • Any technology, be it software or hardware, used to keep intruders out. • A form of malware used by hackers to spy on you and your computer activities • is a method of connecting a series of computers and devices in a private encrypted network • ...
Orientation 2023-01-06
11 Clues: email • expenses • customer data • bank security • bnh intranet page • Clock in/Clock out • compliance training • peer to peer ackowledgment • employee assistance program • information security training • volunteer and charitable giving
Health class 2022-10-24
10 Clues: words • helps 3 • internet/tech • hands and feet/touch • to choose to something • a person who supports 1 • feeling down for a long time • a person who is the target of 1 • a person who targets someone for a long time • bystander a person who see someone bullying but does nothing
