cyber security Crossword Puzzles

3B macchina energia-3 2024-01-29

3B macchina energia-3 crossword puzzle
Across
  1. inventore della fotografia
  2. denominazione della 3 rivoluzione industriale
  3. principale innovazione 4 rivoluzione industriale
  4. inventore telegrafo
  5. anno creazione motore 2 tempi
Down
  1. undici anno dei maggiori cambiamenti 4 rivoluzione
  2. creatore martello a vapore
  3. energia 2 rivoluzione industriale
  4. anno creazione martello a vapore

9 Clues: inventore telegrafoinventore della fotografiacreatore martello a vaporeanno creazione motore 2 tempianno creazione martello a vaporeenergia 2 rivoluzione industrialedenominazione della 3 rivoluzione industrialeprincipale innovazione 4 rivoluzione industrialeundici anno dei maggiori cambiamenti 4 rivoluzione

3B macchine e energia-3 2024-01-29

3B macchine e energia-3 crossword puzzle
Across
  1. anno creazione motore 2 tempi
  2. energia 2 rivoluzione industriale
  3. denominazione della 3 rivoluzione industriale
  4. creatore martello a vapore
Down
  1. principale innovazione 4 rivoluzione industriale
  2. anno creazione martello a vapore
  3. inventore telegrafo
  4. inventore della macchina fotografica
  5. anno dei maggiori cambiamenti 4 rivoluzione

9 Clues: inventore telegrafocreatore martello a vaporeanno creazione motore 2 tempianno creazione martello a vaporeenergia 2 rivoluzione industrialeinventore della macchina fotograficaanno dei maggiori cambiamenti 4 rivoluzionedenominazione della 3 rivoluzione industrialeprincipale innovazione 4 rivoluzione industriale

SS13/14 Terminology 2025-11-02

SS13/14 Terminology crossword puzzle
Across
  1. Security Department
  2. The unofficial mascot
  3. What cargo does every shift
  4. What sec does every shift
  5. What security ignores
  6. A squad of 3-6 agents destroying the station. Slang.
  7. What science does every shift
  8. Evolutionary cousin of the Space Carp
  9. The helpful tip delivering clown!
Down
  1. When the singularity is loose
  2. A man-eating beast, taking inspiration from the movie "The Thing"
  3. Genetics Subdepartment
  4. An evil version of the clown
  5. Med Department
  6. Science Department
  7. What med does every shift
  8. Engineering Department
  9. Traitor, slang.

18 Clues: Med DepartmentTraitor, slang.Science DepartmentSecurity DepartmentThe unofficial mascotWhat security ignoresGenetics SubdepartmentEngineering DepartmentWhat sec does every shiftWhat med does every shiftWhat cargo does every shiftAn evil version of the clownWhen the singularity is looseWhat science does every shiftThe helpful tip delivering clown!...

Social Security Principles 2013-12-10

Social Security Principles crossword puzzle
Across
  1. A type of redistribution from rich to poor.
  2. Feeling safe and secure is known as social "what"?
  3. The principle of pooling collective resources.
  4. A type of redistribution from childless families to families with children.
  5. What is social security usually said to be relieving.
  6. This refers to provision against injury or illness.
  7. Social security is also used to alter how people act thus changing their "what"?
  8. Another term for social "bonds" which universal social security provision could foster.
Down
  1. Transferring money from one group to another.
  2. Spreading income over your own lifetime.
  3. Stopping someone from becoming poor is another key aspect of social security, what is it called?

11 Clues: Spreading income over your own lifetime.A type of redistribution from rich to poor.Transferring money from one group to another.The principle of pooling collective resources.Feeling safe and secure is known as social "what"?This refers to provision against injury or illness.What is social security usually said to be relieving....

CS UNIT-1 PUZZLE 2025-09-25

CS UNIT-1 PUZZLE crossword puzzle
Across
  1. A security barrier that controls network traffic.
  2. The act of guaranteeing information is protected.
  3. Information safe from accidental or intentional disclosure.
  4. Exploit a vulnerability intentionally or accidentally.
  5. The process of converting data into a secret code.
  6. An electronic document used to prove identity online.
  7. The process of verifying who you are.
  8. A type of encryption using only one shared key.
Down
  1. Gaps in a security program.
  2. Ensuring data has not been altered or tampered with.
  3. Information is available to authorized users when needed.
  4. An object representing a user's security context in Windows.
  5. Act that uses vulnerability to do damage to systems.
  6. The process of a computer running a program's instructions.
  7. The art and science of secret communication.

15 Clues: Gaps in a security program.The process of verifying who you are.The art and science of secret communication.A type of encryption using only one shared key.A security barrier that controls network traffic.The act of guaranteeing information is protected.The process of converting data into a secret code....

Life Skill 2023-07-20

Life Skill crossword puzzle
Across
  1. the way it is organised
  2. path in which a person going
  3. use time wisely
  4. involving computer networks
Down
  1. exchanging information between two people
  2. manners respecting each other
  3. bad for your health
  4. very useful

8 Clues: very usefuluse time wiselybad for your healththe way it is organisedinvolving computer networkspath in which a person goingmanners respecting each otherexchanging information between two people

Intro to the Mortgage Industry 2014-08-04

Intro to the Mortgage Industry crossword puzzle
Across
  1. The transfer of an interest in real property, given as security for the payment of a loan
  2. The repayment of a debt from the proceeds of a new loan using the same property as security
  3. The borrower in a mortgage transaction
  4. A legal process of taking possession of a mortgaged property as a result of the borrower’s failure make payments
  5. The legal document conveying title to a real property
  6. Payment of a debt in regular, periodic installments of combined principal and interest
  7. A legal claim or attachment against property as security for payment of an obligation
  8. The portion of a property's value over and above the liens against it
Down
  1. Principal, interest, taxes & insurance
  2. Money paid to make up the difference between the purchase price and the mortgage amount
  3. A mortgage that has rights that are subordinate to the rights of the first mortgage
  4. Cost of credit on a yearly basis, expressed as a percentage
  5. A mortgage in which the interest rate is adjusted periodically according to a pre-selected index
  6. A form of revolving credit secured by a borrower’s home
  7. Property pledged as security for a debt
  8. The lender on a mortgage transaction
  9. Document signed by a borrower that is an acknowledgment of a debt and an agreement to repay that debt

17 Clues: The lender on a mortgage transactionPrincipal, interest, taxes & insuranceThe borrower in a mortgage transactionProperty pledged as security for a debtThe legal document conveying title to a real propertyA form of revolving credit secured by a borrower’s homeCost of credit on a yearly basis, expressed as a percentage...

Once Upon a Time D 2021-09-30

Once Upon a Time D crossword puzzle
Across
  1. Residents ? their fears of criminals by installing sophisticated security devices.
  2. Due to neglect, some of the ? of the homes required some painting and repairs.
  3. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  4. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  5. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  6. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  7. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  8. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  9. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  10. As ? for the broken security alarm, the company offered them six months of service for no charge.
  11. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  12. The ? gardener was willing to travel to different places where there was work.
  13. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  14. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  15. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  16. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  17. After many false alarms, the family wondered about the ? of the security system.
Down
  1. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  2. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
  3. When slicing bread or tomato, it is easier using a knife with ?.
  4. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  5. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  6. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  7. As usual, the father was ? by the beeping of his phone at 6:00 am.
  8. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  9. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  10. cherished red wagon with the supplies for phys. Ed.
  11. Nervously, the resident noticed the ? of a figure below the street light.
  12. For their safety, they ? to the Neighbourhood Watch program.

29 Clues: cherished red wagon with the supplies for phys. Ed.For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light....

Once Upon a Time D 2021-10-01

Once Upon a Time D crossword puzzle
Across
  1. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  2. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  3. The ? gardener was willing to travel to different places where there was work.
  4. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  5. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  6. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  7. As ? for the broken security alarm, the company offered them six months of service for no charge.
  8. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  9. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  10. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  11. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  12. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
Down
  1. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  2. When slicing bread or tomato, it is easier using a knife with ?.
  3. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. cornwell’s cherished red wagon with the supplies for phys. Ed.
  4. For their safety, they ? to the Neighbourhood Watch program.
  5. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  6. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  7. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  8. As usual, the father was ? by the beeping of his phone at 6:00 am.
  9. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  10. Due to neglect, some of the ? of the homes required some painting and repairs.
  11. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  12. Nervously, the resident noticed the ? of a figure below the street light.
  13. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  14. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  15. After many false alarms, the family wondered about the ? of the security system.
  16. Residents ? their fears of criminals by installing sophisticated security devices.

28 Clues: For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.The ? gardener was willing to travel to different places where there was work....

digital citizenship lucas buskirk 2017-09-07

digital citizenship lucas buskirk crossword puzzle
Across
  1. safety on the internet
  2. copyright taking images from the internet
  3. Passwords to keep people out
Down
  1. Plagiarism taking stuff from the internet illegally
  2. search and research online research
  3. Danger people you don't know
  4. domain public information to the internet
  5. bullying hurting others on the internet
  6. media Instagram snap chat
  7. use using the internet fairly

10 Clues: safety on the internetmedia Instagram snap chatDanger people you don't knowPasswords to keep people outuse using the internet fairlysearch and research online researchbullying hurting others on the internetdomain public information to the internetcopyright taking images from the internetPlagiarism taking stuff from the internet illegally

Cybersecurity Hex Crossword 2023-11-03

Cybersecurity Hex Crossword crossword puzzle
Across
  1. 43 4C 41 53 53
  2. 43 52 4F 53 53 57 4F 52 44
  3. 50 48 4F 4E 45
  4. 4C 49 46 45
Down
  1. 4C 41 50 54 4F 50 0A
  2. 4D 41 54 48
  3. 54 45 53 54
  4. 43 59 42 45 52
  5. 53 43 48 4F 4F 4C
  6. 46 55 4E

10 Clues: 46 55 4E4D 41 54 4854 45 53 544C 49 46 4543 4C 41 53 5343 59 42 45 5250 48 4F 4E 4553 43 48 4F 4F 4C4C 41 50 54 4F 50 0A43 52 4F 53 53 57 4F 52 44

Bullying dan emosional 2024-01-16

Bullying dan emosional crossword puzzle
Across
  1. bullying dengan cacian dan umpatan kebencian merupakan bullying berupa...
  2. bullying adalah suatu tindakan...
  3. bagaimana cara mengendalikan emosi...
  4. pembullyan melalui teknologi, merupakan ..... Bullying
  5. pihak yang terlibat dalam bullying...
Down
  1. apa itu emosional...
  2. cara mengendalikan emosi pada diri sendiri...
  3. apa penyebab terjadinya emosional...
  4. tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
  5. apa dampak emosional..

10 Clues: apa itu emosional...apa dampak emosional..bullying adalah suatu tindakan...apa penyebab terjadinya emosional...bagaimana cara mengendalikan emosi...pihak yang terlibat dalam bullying...cara mengendalikan emosi pada diri sendiri...pembullyan melalui teknologi, merupakan ..... Bullying...

Muchlis budi utomo 2025-07-24

Muchlis budi utomo crossword puzzle
Across
  1. Contoh konten digital
  2. Nama lain komputasi awan
  3. Siapa yg mencetuskan istilah big data
  4. Rapid elasticity disebut juga dengan
  5. Cyber physical system sering disebut juga dengan
Down
  1. kepanjangan dari AI
  2. Pengetahuan dan kemampuan untuk menggunakan teknologi digital
  3. Teknik komputasional untuk mengelola dan menganalisis informasi biologis
  4. kepanjangan loT
  5. salah satu contoh kegiatan literasi digital

10 Clues: kepanjangan loTkepanjangan dari AIContoh konten digitalNama lain komputasi awanRapid elasticity disebut juga denganSiapa yg mencetuskan istilah big datasalah satu contoh kegiatan literasi digitalCyber physical system sering disebut juga denganPengetahuan dan kemampuan untuk menggunakan teknologi digital...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

CAB 2021-03-04

CAB crossword puzzle
Across
  1. saying mean thing online
  2. yo have been attacked
  3. spreading rumors
  4. abcds of bullying -c
  5. telling some one you are going to do somthing to them
  6. abcds of bullying -b
  7. abcds of bulling- a
Down
  1. getting people to say false information
  2. acting like a famous person even if you are not
  3. an isolated event
  4. punching hitting kicking
  5. abcds of bullying- d
  6. no one is having fun
  7. saying you are a certain age or a boy but you are a girl

14 Clues: spreading rumorsan isolated eventabcds of bulling- aabcds of bullying- dno one is having funabcds of bullying -cabcds of bullying -byo have been attackedpunching hitting kickingsaying mean thing onlinegetting people to say false informationacting like a famous person even if you are nottelling some one you are going to do somthing to them...

Fall 2024-09-21

Fall crossword puzzle
Across
  1. Black Friday and Cyber Monday are ...... days???
  2. Be cautious with sharp edges and candles around them
  3. Popular name for autumn celebrations
  4. Bill signed June of 1984
  5. The most and best sign in the world
  6. Children dread going back
  7. Length in months
  8. 2 week celebration in Germany
Down
  1. Fattest day of the year
  2. A staple poultry in November
  3. Most know for during this time
  4. Day before Saints day
  5. Important to do this before winter.
  6. Disney's movie of celebration

14 Clues: Length in monthsDay before Saints dayFattest day of the yearBill signed June of 1984Children dread going backA staple poultry in NovemberDisney's movie of celebration2 week celebration in GermanyMost know for during this timeThe most and best sign in the worldImportant to do this before winter.Popular name for autumn celebrations...

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. Bullying online, is called .....
  2. If you are bullied, tell an ......
  3. Cyberbullying is against the law.
  4. A wireless handheld device to communicate.
  5. Denial of access to internet.
  6. Repeated or deliberate harassment.
Down
  1. An example of cyberbullying.
  2. You can report bullying on websites.
  3. An effect of cyberbullying.
  4. When bullied, stay .....

10 Clues: When bullied, stay .....An effect of cyberbullying.An example of cyberbullying.Denial of access to internet.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell an ......Repeated or deliberate harassment.You can report bullying on websites.A wireless handheld device to communicate.

TYPHOON Patron Saints 2024-03-24

TYPHOON Patron Saints crossword puzzle
Across
  1. mysterious business card locale
  2. Jun acquired these adornments
  3. before today
  4. world where Jay's source originated
  5. possible prom date for Jay
Down
  1. Jay tells aunts he has to do this
  2. Jay starts reading this at Chato's
  3. Jay's jilting science pal
  4. "-for survival" poem title

9 Clues: before todayJay's jilting science palpossible prom date for Jay"-for survival" poem titleJun acquired these adornmentsmysterious business card localeJay tells aunts he has to do thisJay starts reading this at Chato'sworld where Jay's source originated

Information Security Crossword 2017-02-17

Information Security Crossword crossword puzzle
Across
  1. When you receive an email with a link to a bogus website it is called _________
  2. This should only be installed on Society systems by approved administrators ______
  3. It should be changed immediately if suspected of being compromised
  4. Completion of Information Security and DPA annual training is ____________
  5. When you received unsolicited email from unknown sources this is called ______
  6. Media Society customers should not be contacted via _______
  7. A tidy desk is also known as a _________ desk
  8. Skipton may ______________ your internet usage
Down
  1. Information Security policies are published on it ___________
  2. These should never be shared __________
  3. A type of use that should be limited when using Society systems ________
  4. Personal information is protected by this act _______
  5. Something that can infect a PC/Laptop is known as a ________
  6. You should not allow others to do this when accessing Society premises ______
  7. Minimize the amount of documents taken offsite ___________
  8. This should be worn at all times when on Society premises __________
  9. Always ensure your _________ is locked when you are away from your computer.

17 Clues: These should never be shared __________A tidy desk is also known as a _________ deskSkipton may ______________ your internet usagePersonal information is protected by this act _______Minimize the amount of documents taken offsite ___________Media Society customers should not be contacted via _______...

Information Security Puzzle 2017-04-11

Information Security Puzzle crossword puzzle
Across
  1. Never share your _________ with another person.
  2. The state of being free from danger or threat.
  3. Always ___________ your computer when you leave your desk
  4. Passwords should be _________ every month.
  5. __________ is a popular web search engine.
  6. Email scam or attempt to trick you into giving your password or personal information.
  7. Do not __________ your password or account with anyone.
  8. A password is stronger by using a combination of both upper and lower case ___________.
Down
  1. Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
  2. Use this tool to dispose of documents that contain personal or financial information.
  3. When someone sends an email with a link to a bogus website, it is called_________.
  4. Do not _______ your password down or attach it to your keyword or monitor.
  5. Choose a password that is easy for you to____________ but hard for someone to guess.
  6. Do not leave your laptop or computer ____________.
  7. A software that is designed to detect and destroy compute viruses.
  8. Also known as malicious software; any program or file that is harmful to a computer user.
  9. Passwords should always be at least this many characters long.

17 Clues: Passwords should be _________ every month.__________ is a popular web search engine.The state of being free from danger or threat.Never share your _________ with another person.Do not leave your laptop or computer ____________.Do not __________ your password or account with anyone.Always ___________ your computer when you leave your desk...

Unit 6 Security + 2022-04-07

Unit 6 Security + crossword puzzle
Across
  1. uses labels for both subjects (users who need access) and objects (resources with controlled access, such as data, applications, systems, networks, and physical space)
  2. a list that identifies users or groups who have specific security assignments to an object.
  3. process of copying changes to Active Directory on the domain controllers.
  4. the verification of the issued identification credentials. It is usually the second step in the identification process and establishes that you are who you say you are.
  5. type of access that is allowed or denied for an object.
  6. a way to organize such things as users, groups, computers, etc. It is also referred to as a container object.
  7. group of related domains that share the same contiguous DNS namespace.
  8. Account policies help you control the composition and use of passwords.
  9. set of configuration settings applied to users or computers.
  10. can be your role, position, or current project. This information can be used to determine policy and permission.
Down
  1. The initial process of confirming the identity of a user requesting credentials. This occurs when a user enters a user ID at logon.
  2. collection of related domain trees.
  3. have limited permission
  4. The point at which the number of false positives matches the number of false negatives in a biometric system.
  5. developed by Microsoft, is a centralized database that contains user accounts and security information.
  6. have complete control of the system
  7. device or a file used to authenticate

17 Clues: have limited permissioncollection of related domain trees.have complete control of the systemdevice or a file used to authenticatetype of access that is allowed or denied for an object.set of configuration settings applied to users or computers.group of related domains that share the same contiguous DNS namespace....

Compliance & Security Week 2023-11-16

Compliance & Security Week crossword puzzle
Across
  1. It's like your underwear; don't share it with anyone and change it at least every 90 days
  2. Nasty software that can have a bad impact on your device or network
  3. What is HIPAA's (and DDID's) minimum training requirement for employees
  4. Unwanted emails or messages that usually try to sell you something
  5. What department (or Shane) should you report a suspected HIPAA breach to
  6. Universal Serial Bus, or a flash drive that you should never stick in a work computer
  7. What HIPAA rule protects individual rights
  8. A type of malicious software designed to block access until a sum of money is paid
Down
  1. Digital, audio, and video files cyber criminals manipulate to make seem that someone is saying or doing something they didn't
  2. The Health Act passed to protect individual's medical/dental records and other PHI
  3. A type of spearphishing attack directed at the top-level executives (CEO/Senior Executive Assistant)
  4. Every aspect of protecting an organization and its employees/assets against cyber threats
  5. How should you send an email to outside recipients that contains PHI
  6. What is the acronym that identifies individual's information such as name, birthdate, and SSN
  7. The additional ways DDID uses to stop hackers getting into our system, even if they know your password
  8. An email that tricks you into clicking on a link or opening an attachment
  9. Using a device to gain unauthorized access to data in a system

17 Clues: What HIPAA rule protects individual rightsUsing a device to gain unauthorized access to data in a systemUnwanted emails or messages that usually try to sell you somethingNasty software that can have a bad impact on your device or networkHow should you send an email to outside recipients that contains PHI...

Everyday Security Challenge 2020-10-05

Everyday Security Challenge crossword puzzle
Across
  1. expert data destruction
  2. not your pet's name, if strong
  3. not in the open
  4. your best response
  5. sneaky followers
  6. how much data you should see?
  7. what secrets should be
  8. when hacks happen
  9. secure neckware, sometimes
  10. scams in your email
  11. required for access
Down
  1. the digital threat
  2. electronic infection
  3. vitamins for software
  4. for your eyes only
  5. do this to your computer when you walk away
  6. criminals payday

17 Clues: not in the opensneaky followerscriminals paydaywhen hacks happenthe digital threatyour best responsefor your eyes onlyscams in your emailrequired for accesselectronic infectionvitamins for softwarewhat secrets should beexpert data destructionsecure neckware, sometimeshow much data you should see?not your pet's name, if strong...

STOP BULLYING! 2021-10-06

STOP BULLYING! crossword puzzle
Across
  1. Relating to computers, info technology and social media
  2. Include or become a part of
  3. The opposite of go
  4. Being peaceful and patient
  5. A person who stands by you
Down
  1. The opposite of being negative
  2. A person who hurts others
  3. Telling someone about something you saw or witnessed
  4. Being assertive if you're being bullied
  5. The opposite of mean
  6. The opposite of yes

11 Clues: The opposite of goThe opposite of yesThe opposite of meanA person who hurts othersBeing peaceful and patientA person who stands by youInclude or become a part ofThe opposite of being negativeBeing assertive if you're being bulliedTelling someone about something you saw or witnessedRelating to computers, info technology and social media

Actividad Jornada Mujer 2025-03-19

Actividad Jornada Mujer crossword puzzle
Across
  1. Related to internet
  2. The feeling of being alone
  3. Something that connects one thing to another
  4. A type of discrimination that occurs online
  5. Related to society
  6. A violent act towards an individual
Down
  1. The ability of taking your own decisions
  2. The obstacles in order to achieve something
  3. Related to establish relationships
  4. Prejudicial treatment of different categories of people
  5. Human beings

11 Clues: Human beingsRelated to societyRelated to internetThe feeling of being aloneRelated to establish relationshipsA violent act towards an individualThe ability of taking your own decisionsThe obstacles in order to achieve somethingA type of discrimination that occurs onlineSomething that connects one thing to another...

Security crossword 2022-07-21

Security crossword crossword puzzle
Across
  1. Place to store high privilege passwords
  2. seamless integration of security testing and protection throughout the software development and deployment lifecycle
  3. Unplanned downtime of IT resources
  4. process sets out the stages of a possible cyberattack and allows organizations to identify and protect themselves against threats
Down
  1. Need to impart to everyone to protect the organization
  2. IT Governance framework from ISACA
  3. is a general purpose cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security
  4. is a quick-repair job for a piece of programming designed to resolve functionality issues, improve security or add new features.
  5. is a nonprofit foundation dedicated to improving software security
  6. Information security triad

10 Clues: Information security triadIT Governance framework from ISACAUnplanned downtime of IT resourcesPlace to store high privilege passwordsNeed to impart to everyone to protect the organizationis a nonprofit foundation dedicated to improving software security...

Unit 25 LO1 2026-03-11

Unit 25 LO1 crossword puzzle
Across
  1. A potential danger that could cause harm to people, property or information.
  2. another word for humans
  3. Documents or badges used to prove who someone is before they enter secure areas.
  4. items owned by people
  5. A physical or visual check of a person, bag, or vehicle to find prohibited or dangerous items.
  6. When security staff regularly move around an area to check for suspicious activity.
  7. A camera system used to monitor and record activity in a specific area for security purposes.
  8. The chance that something harmful or dangerous might happen.
  9. A security procedure where movement is restricted and people stay inside a secure location.
Down
  1. A law that sets out police powers and procedures when dealing with suspects and investigations. (Police and Criminal Evidence Act)
  2. A person who enters a building or area without permission.
  3. buildings and houses
  4. A mnemonic used in search procedures to remind officers what a search needs to be.
  5. The outer boundary of a secure location that must be protected or monitored. Also used in Maths related to shapes.
  6. The organised removal of people from a building due to danger.
  7. Security measures designed to discourage people from committing crime.
  8. A commonly used abbreviation in policing for search grounds.

17 Clues: buildings and housesitems owned by peopleanother word for humansA person who enters a building or area without permission.A commonly used abbreviation in policing for search grounds.The chance that something harmful or dangerous might happen.The organised removal of people from a building due to danger....

15.1 Understanding Money C.S. 2024-05-09

15.1 Understanding Money C.S. crossword puzzle
Across
  1. Security that pays interest over terms of 10 to thirty years
  2. Plastic card that allows holders to make credit purchases up to an authorized account
  3. Money is used in exchange for goods and services needed by individuals, businesses, and governments.
  4. Transfer of money from one bank account to another
  5. Type of a document guaranteeing the payment of a specific amount of money
  6. Money is a common measure of the worth or price of a good or services
  7. Mechanism a nation uses to provide and manage money for itself
Down
  1. Security that pays interest over terms ranging from two to ten years
  2. Process of transferring money from one individual or organization to another
  3. Anything of value that is accepted in return for good and services
  4. Security that matures in a year or less
  5. Allows customers to pay for purchases directly from their checking account
  6. Type of financial invested issues by a corporation, government, or other organizations
  7. It can be saved and used at a later date

14 Clues: Security that matures in a year or lessIt can be saved and used at a later dateTransfer of money from one bank account to anotherSecurity that pays interest over terms of 10 to thirty yearsMechanism a nation uses to provide and manage money for itselfAnything of value that is accepted in return for good and services...

Q1 Safety & Security 2021-03-04

Q1 Safety & Security crossword puzzle
Across
  1. A Shelter-in-Place will usually be announced by ____ communication.
  2. This will provide more traction across icy surfaces.
  3. If the fire alarm goes off during a lockdown, do not do this unless you have first hand knowledge of a fire or if told by emergency personnel.
  4. Make sure your cell phone is always this when leaving the house in case of emergency.
  5. To help maintain balance, walk like one of these – short steps and as flat-footed as possible.
  6. This many inches of water can become dangerous.
  7. When it comes to gloves vs mittens, these may save your life.
  8. When a lockdown is ordered, immediately stop all ______.
  9. This may happen because of hostile intruder or hazardous release outside.
  10. Make sure these are available when walking over potentially icy surfaces.
Down
  1. This is the best sort of clothing to wear during the winter.
  2. Have one of these in car in case you get stranded while traveling in cold weather.
  3. Increase your following distance to this many seconds when roads could be icy.
  4. Avoid having this before you start shoveling your driveway.
  5. Emergency kits should be stocked with flashlights, a first aid kit, water, extra medicine, and a few extra of these.
  6. Stay out of _____ when in a lockdown.
  7. Avoid carrying these while walking across potentially slippery surfaces.

17 Clues: Stay out of _____ when in a lockdown.This many inches of water can become dangerous.This will provide more traction across icy surfaces.When a lockdown is ordered, immediately stop all ______.Avoid having this before you start shoveling your driveway.This is the best sort of clothing to wear during the winter....

FPPS Security Crossword 2020-04-01

FPPS Security Crossword crossword puzzle
Across
  1. Type of route path that acts as a "catch all"
  2. What the 'S' in SPOC stands for
  3. User who has no signature authority in the Requesting Office
  4. User who can sign Part C of the SF-52 who is not in the SPO: ____ Official
  5. Decentralized Security Administrative ____
  6. Another name for FPPS ID: _____ ID
  7. Type of route path with specific data access criteria
Down
  1. Command you can use when someone gets locked out of FPPS
  2. Someone with SC2 signature authority has access to these two commands: LGAP and ____
  3. User who signs block A6 of the SF-52: _____ Official
  4. Where you can find the order in which route paths are built
  5. User who signs block A5 of the SF-52: _____ Official
  6. Determines what department, bureau, etc. a user can see
  7. Office where HR processes actions: Servicing _____ Office
  8. Command you can use to build centers where employees can request and process personnel actions
  9. Command you can use to build paths for personnel actions
  10. Command you can use to add employees to offices

17 Clues: What the 'S' in SPOC stands forAnother name for FPPS ID: _____ IDDecentralized Security Administrative ____Type of route path that acts as a "catch all"Command you can use to add employees to officesUser who signs block A6 of the SF-52: _____ OfficialUser who signs block A5 of the SF-52: _____ Official...

High Security Estate 2017-01-31

High Security Estate crossword puzzle
Across
  1. To come and go
  2. To pay for company
  3. Party after a wedding
  4. fixteen in a room
  5. Silver stripe
  6. Wireless
  7. Location to catch a plane from
Down
  1. More then a scan
  2. Hands on
  3. Above standard
  4. American word for phone
  5. Spikey steel
  6. Provide relevant information
  7. After a shampoo
  8. Part of me
  9. Stop drop roll
  10. Untidy place to eat

17 Clues: Hands onWirelessPart of meSpikey steelSilver stripeTo come and goAbove standardStop drop rollAfter a shampooMore then a scanfixteen in a roomTo pay for companyUntidy place to eatParty after a weddingAmerican word for phoneProvide relevant informationLocation to catch a plane from

Information security test 2025-03-14

Information security test crossword puzzle
Across
  1. Napad koji preplavljuje sistem ogromnim brojem zahtjeva kako bi ga onemogućio.
  2. Virtualna privatna mreža koja šifrira saobraćaj kako bi osigurala privatnost na internetu.
  3. KOPIJA Najbolja zaštita od ransomware napada – redovno čuvanje podataka.
  4. SOFTVER Zajednički naziv za zlonamjerne softvere poput virusa, trojanaca i crva.
  5. Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima.
  6. Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.
  7. Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.
  8. ZID Sigurnosni sistem koji filtrira mrežni saobraćaj kako bi spriječio neovlašteni pristup.
  9. Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.
  10. TESTIRANJE Simulirani napad na sistem s ciljem identifikacije ranjivosti.
Down
  1. KONJ Vrsta zlonamjernog softvera koji se prikazuje kao legitimni softver, ali sadrži zlonamjerne funkcije.
  2. NIVO POVJERENJA Sigurnosni model koji podrazumijeva nepovjerenje prema svim korisnicima dok se ne autentifikuju.
  3. RANJIVOSTI Iskorištavanje slabosti softvera ili sistema radi neovlaštenog pristupa.
  4. AUTENTIFIKACIJA Sigurnosna metoda koja zahtijeva više faktora autentifikacije.
  5. IDENTITETA Krađa ličnih podataka radi prevare ili financijske dobiti.
  6. Napad koji koristi lažne e-mailove kako bi prevario korisnike da otkriju svoje podatke.
  7. BRUTALNOM SILOM Napad u kojem napadač isprobava veliki broj kombinacija lozinki dok ne pronađe ispravnu.

17 Clues: Vrsta zlonamjernog softvera koji šifrira podatke i traži otkupninu.Mreža kompromitovanih računara koja se koristi za napade poput DDoS-a.Zlonamjerni softver koji omogućava napadačima prikriveni pristup sistemu.Proces kodiranja podataka kako bi bili nečitljivi neovlaštenim korisnicima....

Das Internet 2024-03-18

Das Internet crossword puzzle
Across
  1. Wie viele Personen passen in eine WhatsApp Gruppe
  2. Wie lange muss dich jemand Belästigen damit man von Cyber-Mobbing spricht
  3. Was soll man mit Kettenbriefen machen
Down
  1. Wo kriegt man anonyme Hilfe
  2. Media Wo ist Cyber-Mobbing am meisten verbreitet

5 Clues: Wo kriegt man anonyme HilfeWas soll man mit Kettenbriefen machenMedia Wo ist Cyber-Mobbing am meisten verbreitetWie viele Personen passen in eine WhatsApp GruppeWie lange muss dich jemand Belästigen damit man von Cyber-Mobbing spricht

Securities 2025-01-14

Securities crossword puzzle
Across
  1. form of bond issued by a government to support public spending.
  2. regulates the public offer and sale of securities.
  3. securities that are not registered with the SEC and cannot be sold publicly in the marketplace.
  4. where issuers can seek security listings and attract investors
  5. securities listed under a major financial exchange but are not actively traded.
  6. The entity that creates the securities for sale.
  7. a security that represents ownership in a corporation.
  8. a class of shares that give the holder a higher claim to dividends or asset distribution than common stockholders.
Down
  1. an unsecured promissory note with a fixed maturity.
  2. a certificate issued by a bank for depositing money for a specified length of time.
  3. a bond issued by a corporation in order to raise financing.
  4. a short-term U.S. government debt obligation backed by the U.S. Department of the Treasury.
  5. a fungible, negotiable financial instrument that represents some type of financial value.
  6. a security issued by or on behalf of a local authority.
  7. a bond issued by an international company in a country different from their own.

15 Clues: The entity that creates the securities for sale.regulates the public offer and sale of securities.an unsecured promissory note with a fixed maturity.a security that represents ownership in a corporation.a security issued by or on behalf of a local authority.a bond issued by a corporation in order to raise financing....

Eli-cyber safety 2016-06-07

Eli-cyber safety crossword puzzle
Across
  1. the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
  2. media stuff
  3. its hard to control what i see and others see.
  4. programs that display adverts on the screen.Often installed without people realising.
  5. to get help from if your online and people do mean stuff to yo
  6. app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
  7. users share their music playlists on Facebook,Twitter and Google+friends.
Down
  1. privacy that you need to keep safe.
  2. cameras that are often attached to a computer so that a video image can be sent to another while communication.
  3. to keep them private (except from your parents)
  4. you use the internet to bully somebody
  5. bulling
  6. Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
  7. like a password you need to keep it safe from hackers .a.
  8. when your with friends in a group of people on phones texting to people and putting pictures of you or something.

15 Clues: bullingmedia stuffprivacy that you need to keep safe.you use the internet to bully somebodyits hard to control what i see and others see.to keep them private (except from your parents)like a password you need to keep it safe from hackers .a.to get help from if your online and people do mean stuff to yo...

Cyber Ethics Crossword 2025-06-13

Cyber Ethics Crossword crossword puzzle
Across
  1. : Protection of data and devices from online harm
  2. : Harmful software meant to damage or steal data
  3. : A program that harms or slows down your computer
  4. : Software that blocks unauthorized access to your system
  5. : Online harassment or bullying
  6. : Illegally accessing someone else's computer
  7. : A trick to cheat someone online
  8. : A secret code used to log in safely
  9. : The process of securing data using codes
Down
  1. : Polite and responsible behavior on the internet
  2. : The right to control your personal information online
  3. : A program that protects your computer from threats
  4. : Moral rules about what is right and wrong
  5. : Fake emails trying to steal personal information
  6. : Who you are; must be protected online

15 Clues: : Online harassment or bullying: A trick to cheat someone online: A secret code used to log in safely: Who you are; must be protected online: The process of securing data using codes: Moral rules about what is right and wrong: Illegally accessing someone else's computer: Harmful software meant to damage or steal data...

"Cyber-Analyst" Crossword 2026-03-09

"Cyber-Analyst" Crossword crossword puzzle
Across
  1. When you go online without using your real name.
  2. A group of computers that are all connected together.
  3. The answer to a division problem.
  4. In the math problem 453 divided by 5, the number 3 is this.
  5. Doing the right thing even when no one is watching.
  6. Using a password PLUS a secret code for security.
  7. A trick link or scam meant to steal money or data.
  8. Because you can't truly erase it, the internet is this.
Down
  1. The set of rules a computer follows to solve a problem.
  2. Using a secret cipher to hide data from a hacker.
  3. A good digital one of these follows the T.H.I.N.K. rule.
  4. A virus or Trojan is known as this type of harmful software.
  5. A website that is true and can be trusted is called this.
  6. The number you are dividing by in a math problem.
  7. A source that has been proven to be official and true.

15 Clues: The answer to a division problem.When you go online without using your real name.Using a secret cipher to hide data from a hacker.The number you are dividing by in a math problem.Using a password PLUS a secret code for security.A trick link or scam meant to steal money or data.Doing the right thing even when no one is watching....

Cyber Laws & Ethics 2026-03-02

Cyber Laws & Ethics crossword puzzle
Across
  1. Protects online service providers
  2. moral principles which govern an individual’s behavior or conduct
  3. psychological techniques which cybercriminals employ to gain access to buildings, systems or information
  4. _ Act of 2001 was enacted in response to the attacks on September 11, 2001
  5. __ Millennium Copyright Act protects internet service providers
  6. __ official notification to a company search engine or web host informing them the material they are hosting or linking to infringes on a copyright
  7. system of rules established in a society by an authority which regulates and governs the actions of its members
Down
  1. Right to use copyrighted content without gaining permission from copyright owner
  2. seeking to exploit a computer system or a private network
  3. Improper____ is claiming someone else's writing as your own
  4. General ____ Protection Regulation intends to provide individual protection over their personal data
  5. deliberate damages or destruction which takes place in digital form
  6. Act of disguising a communication from an unknown source
  7. used to steal user data by the attacker disguising themselves as a trusted entity
  8. ____ Piracy is the practice of downloading and distributing copyrighted content without permission

15 Clues: Protects online service providersAct of disguising a communication from an unknown sourceseeking to exploit a computer system or a private networkImproper____ is claiming someone else's writing as your own__ Millennium Copyright Act protects internet service providersmoral principles which govern an individual’s behavior or conduct...

EUTS Crossword 2025-09-22

EUTS Crossword crossword puzzle
Across
  1. Captain America is a Super .....
  2. Famous 1930's Film - .....with the wind.
  3. Form or public transport typically seen in City Centres
  4. Macronutrient essential for life
  5. Lets you walk or run inside
  6. Moisturising soap, also the name of a bird
  7. Apple Computer
  8. 1000 Grams
  9. Red Fruit
Down
  1. To purposely fall out an aircraft
  2. Single Floor house
  3. Type of attack which includes malware, phishing etc.
  4. Protects you from the sun
  5. Four legged family friend
  6. Popular Video Doorbell
  7. Surname of US President
  8. Wrench used for tightening by Newton Metres
  9. Used for connecting monitors, peripherals etc.
  10. Equal Opportunities for all

19 Clues: Red Fruit1000 GramsApple ComputerSingle Floor housePopular Video DoorbellSurname of US PresidentProtects you from the sunFour legged family friendLets you walk or run insideEqual Opportunities for allCaptain America is a Super .....Macronutrient essential for lifeTo purposely fall out an aircraftFamous 1930's Film - .....with the wind....

TEJ2O1 - Security and Ethics - D. French 2024-07-26

TEJ2O1 - Security and Ethics - D. French crossword puzzle
Across
  1. You should regularly make a ____ of your data/photos.
  2. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  3. If you download software, ____ it before running it.
  4. Emails can spread malware, most often when you click links or open ____.
  5. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  6. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  7. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  8. Keep your operating system secure by running all the latest.
  9. Malware that damages files on your computer or stops your computer from running properly.
  10. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
Down
  1. Avoid making financial transactions on ____ networks or computers.
  2. Tries to open security holes in your computer so a hacker can gain access.
  3. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  4. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  5. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  6. Make sure you use a different ____ for different sites and keep them long and complex.
  7. Computer activities often leave a digital ____ that leads back to the offender.
  8. When you copy sections of someone else's work and claim it is your own.
  9. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  10. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

Environmental, Ethical, and Legal issues in Computer Science 2025-02-01

Environmental, Ethical, and Legal issues in Computer Science crossword puzzle
Across
  1. The process of substituting old devices with new ones.
  2. The process of planning and creating a system or product.
  3. A formal authorization to use software under certain conditions.
  4. A rule or directive made and maintained by an authority.
  5. Software that is owned and restricted by its creator.
  6. A type of intellectual property protection for original inventions.
  7. The improper or unethical use of technology.
  8. An abbreviation for the law that prevents unauthorized modification of computer material.
  9. A person or group with an interest in an issue or project.
  10. A collection of programs and data used to operate computers.
  11. A formal decision or law enacted by a government.
  12. A type of cyber threat that locks data and demands payment.
  13. The unauthorized access of computer systems.
  14. A term for materials and substances used in electronics.
  15. The process of converting data into a secure format.
Down
  1. Software that harms or disrupts systems.
  2. The power consumption required to run electronic devices.
  3. The ability to protect data from unauthorized access.
  4. The name of outdated electronics being discarded.
  5. The ethical concern of ensuring fair access to technology.
  6. A law that governs data protection in the UK and EU.
  7. The physical parts of a computer system.
  8. The practice of reusing materials to reduce waste.
  9. Harmful substances found in electronic waste that can damage the environment and human health.
  10. A law related to the protection of intellectual property.
  11. Measures taken to protect users and systems from harm.
  12. The process of creating software to perform tasks automatically.
  13. A type of software license that allows users to modify and share freely.
  14. Laws that protect personal information online.
  15. A material commonly used in electronic device casings.
  16. Information that is processed or stored by a computer.

31 Clues: Software that harms or disrupts systems.The physical parts of a computer system.The improper or unethical use of technology.The unauthorized access of computer systems.Laws that protect personal information online.The name of outdated electronics being discarded.A formal decision or law enacted by a government....

NATO Crossword 2025-07-23

NATO Crossword crossword puzzle
Across
  1. This country is NATO’s newest member.
  2. This Italian city is home to NATO military command.
  3. Allies contribute money to fund NATO programs. This is known as ___ funding.
  4. NATO's largest partnership group is known as the Partnership for ___
  5. US General Alexus Grynkewich currently holds this position, the highest military position within NATO
  6. This year’s NATO Summit took place in this city.
  7. This kind of threat typically does not involve weapons but can include hostile information operations, political interference, and cyber operations
  8. The lengthy statement released at Summits is often called this.
  9. This Virginia city is home to Allied Command Transformation (ACT)
  10. PermReps sit on the NAC, or North Atlantic ___
  11. The overall guiding document for NATO, revised about once a decade, is known as the Strategic ___
  12. NATO is the North ___ Treaty Organization
  13. All 32 Allies must agree for NATO to do anything. This is known as ___ decision making.
  14. NATO's founding treaty is known as the North Atlantic Treaty or the ___ Treaty
Down
  1. NATO's maritime security operation in the Mediterranean is called Operation Sea___
  2. NATO Air Base Geilenkirchen, Germany, is home to 14 of these aircraft, known as NATO's eyes in the sky
  3. This was the first SACEUR, and was later the 34th President of the United States
  4. This ability enables Allied forces from different countries to operate together.
  5. This is one of NATO's closest partners, and its headquarters are right downtown
  6. NATO's current Secretary General is from this country
  7. NATO's military headquarters in Mons, Belgium
  8. This is the part of the founding treaty that explains how new members can join
  9. Countries that wish to join NATO usually, but not always, use a MAP, or Membership ___ Plan
  10. Allies pledged to devote this much of their GDP to defense spending
  11. The principle that if one Ally is attacked, all Allies are attacked, is also known as ___ defense
  12. NATO has been leading a peace-support operation in this country since June 1999

26 Clues: This country is NATO’s newest member.NATO is the North ___ Treaty OrganizationNATO's military headquarters in Mons, BelgiumPermReps sit on the NAC, or North Atlantic ___This year’s NATO Summit took place in this city.This Italian city is home to NATO military command.NATO's current Secretary General is from this country...

25230 2025-11-04

25230 crossword puzzle
Across
  1. Dividing a broader customer base into smaller groups based on similar traits.
  2. Implementing measures to safeguard data from breaches and cyber-attacks.
  3. Actionable, valuable information derived from data analysis.
  4. A type of data source like social media or third-party providers.
  5. Insight and understanding gained from information.
  6. One of the 5Vs, referring to the different types of data.
  7. Analytics used to assess performance and forecast outcomes in money matters.
  8. Proper handling of sensitive data, especially PII, to protect from unauthorized access.
  9. The type of analytics that examines causes of past outcomes.
  10. The type of analytics that provides recommendations for future actions.
  11. A type of data source like CRM or ERP systems.
  12. Predicted net profit a company expects from a customer over their relationship.
  13. Ethical consideration concerning openness about how data is used.
  14. One of the 5Vs, referring to the speed of data generation and processing.
  15. Using data and statistical methods to uncover insights and trends.
Down
  1. Processed, organized data that has meaning.
  2. Planning, executing, and monitoring marketing efforts across channels.
  3. Analysis to understand why customers are leaving and develop retention strategies.
  4. Major regulation governing data privacy in the EU.
  5. Selecting specific customer segments for tailored marketing efforts.
  6. The type of analytics that summarizes past data.
  7. One of the 5Vs, referring to the amount of data generated.
  8. Raw, unprocessed facts and figures.
  9. Analytics used to measure and optimize campaign performance.
  10. Crafting a unique value proposition in the mind of the target audience.
  11. Models that identify which marketing channels contributed to a conversion.
  12. Scoring model used to evaluate the trustworthiness of individuals or businesses for loans.
  13. The type of analytics that forecasts future events.
  14. One of the 5Vs, referring to the worth of data in deriving insights.
  15. One of the 5Vs, referring to the accuracy and trustworthiness of data.
  16. A characteristic of high-quality data; correctness.

31 Clues: Raw, unprocessed facts and figures.Processed, organized data that has meaning.A type of data source like CRM or ERP systems.The type of analytics that summarizes past data.Major regulation governing data privacy in the EU.Insight and understanding gained from information.The type of analytics that forecasts future events....

Ασφαλής χρήση διαδικτύου 2024-02-12

Ασφαλής χρήση διαδικτύου crossword puzzle
Across
  1. positive εικόνα σωματος και κοινωνικα δικτυα
  2. addiction εθισμός στο διαδίκτυο
  3. Gaming Παιχνίδια στο διαδίκτυο
  4. Κακόβουλο λογισμικό
  5. gaming παιχνίδια στο διαδ'ικτυο
Down
  1. Διαδικτυακός εκφοβισμός
  2. Scams Ηλεκτρονικές απάτες
  3. piracy πειρατεία λογισμικού
  4. passwords κωδικοί πρόσβασης
  5. News Ψευδείς ειδήσεις

10 Clues: Κακόβουλο λογισμικόNews Ψευδείς ειδήσειςΔιαδικτυακός εκφοβισμόςScams Ηλεκτρονικές απάτεςpiracy πειρατεία λογισμικούpasswords κωδικοί πρόσβασηςGaming Παιχνίδια στο διαδίκτυοaddiction εθισμός στο διαδίκτυοgaming παιχνίδια στο διαδ'ικτυοpositive εικόνα σωματος και κοινωνικα δικτυα

Once Upon a Time B 2021-09-30

Once Upon a Time B crossword puzzle
Across
  1. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  2. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  3. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  4. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  5. Residents ? their fears of criminals by installing sophisticated security devices.
  6. For their safety, they ? to the Neighbourhood Watch program.
  7. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  8. As usual, the father was ? by the beeping of his phone at 6:00 am.
  9. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  10. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  11. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  12. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  13. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  14. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
Down
  1. As ? for the broken security alarm, the company offered them six months of service for no charge.
  2. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  3. Nervously, the resident noticed the ? of a figure below the street light.
  4. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  5. The ? gardener was willing to travel to different places where there was work.
  6. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  7. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  8. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  9. Due to neglect, some of the ? of the homes required some painting and repairs.
  10. When slicing bread or tomato, it is easier using a knife with ?.
  11. After many false alarms, the family wondered about the ? of the security system.
  12. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  13. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  14. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.

28 Clues: For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.The ? gardener was willing to travel to different places where there was work....

Once Upon a Time C 2021-09-30

Once Upon a Time C crossword puzzle
Across
  1. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  2. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  3. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
  4. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  5. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  6. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  7. cherished red wagon with the supplies for phys. Ed.
  8. When slicing bread or tomato, it is easier using a knife with ?.
  9. Due to neglect, some of the ? of the homes required some painting and repairs.
  10. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  11. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  12. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  13. For their safety, they ? to the Neighbourhood Watch program.
Down
  1. The ? gardener was willing to travel to different places where there was work.
  2. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  3. Residents ? their fears of criminals by installing sophisticated security devices.
  4. As ? for the broken security alarm, the company offered them six months of service for no charge.
  5. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  6. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  7. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  8. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  9. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  10. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  12. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  13. After many false alarms, the family wondered about the ? of the security system.
  14. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  15. As usual, the father was ? by the beeping of his phone at 6:00 am.
  16. Nervously, the resident noticed the ? of a figure below the street light.

29 Clues: cherished red wagon with the supplies for phys. Ed.For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light....

Smart City Crossword Puzzle 2019-03-20

Smart City Crossword Puzzle crossword puzzle
Across
  1. effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
  2. the process of combining software components, hardware components, or both into an overall system
  3. act of periodically checking processes, equipment and environment in order to detect any changes
  4. big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
  5. ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
  6. an extended social group having a distinctive cultural and economic organization
Down
  1. collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
  2. process by which people become residents of cities
  3. ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
  4. a native or naturalized member of a state or other political community
  5. ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information
  6. the organized action of making of goods and services for sale
  7. ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information

13 Clues: process by which people become residents of citiesthe organized action of making of goods and services for salea native or naturalized member of a state or other political communityan extended social group having a distinctive cultural and economic organization...

Security Newsletter 2015-02-17

Security Newsletter crossword puzzle
Across
  1. $5 President
  2. Unusual Behavior
  3. $100 President
  4. $2 President
  5. $1 President
  6. Taking of items
Down
  1. $10 Treasurer
  2. $20 President
  3. Funny money
  4. Opens many doors
  5. $50 President

11 Clues: Funny money$5 President$2 President$1 President$10 Treasurer$20 President$50 President$100 PresidentTaking of itemsUnusual BehaviorOpens many doors

Data Security 2025-03-07

Data Security crossword puzzle
Across
  1. a massive network of webpages, programs, and files that are accessible via URLs
  2. with _______ encryption, the sender and receiver use different encryption keys
  3. an attempt to trick a user into divulging their private information
  4. a _____ horse is a harmful program that masquerades as a legitimate program
  5. a service that allows you to hide your browsing from your ISP
  6. a small amount of text that helps a website track information about a user across multiple pages of the website and personalize the user's experience on the website.
Down
  1. holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom
  2. technology or services that allow tracking of a users location
  3. cookies that allow tracking of user behavior across websites
  4. scrambling a message so it can't be read without a key
  5. includes things that can identify you directly, such as your social security number, to things that may help identify you indirectly, such as your phone number or birthday.

11 Clues: scrambling a message so it can't be read without a keycookies that allow tracking of user behavior across websitesa service that allows you to hide your browsing from your ISPtechnology or services that allow tracking of a users locationan attempt to trick a user into divulging their private information...

Security Measures 2025-05-14

Security Measures crossword puzzle
Across
  1. software that secretly watches what you do
  2. scrambling data so only the right person can read it
  3. a strong secret word that is hard to guess (2 words)
  4. allows or blocks devices based on their ID (2 words)
  5. checking who you are before letting you in
  6. blocks unwanted network traffic from getting in or out
Down
  1. program that finds and removes harmful software
  2. keeps your programs safe with the latest fixes (2 words)
  3. Someone trying to access a network without permission.
  4. protecting a network from hackers and threats (2 words)
  5. a trick to steal your login or personal details

11 Clues: software that secretly watches what you dochecking who you are before letting you inprogram that finds and removes harmful softwarea trick to steal your login or personal detailsscrambling data so only the right person can read ita strong secret word that is hard to guess (2 words)allows or blocks devices based on their ID (2 words)...

Cyber Cross-Word 2023-04-12

Cyber Cross-Word crossword puzzle
Across
  1. interaction between snmp agent manager
  2. packet analyzer
  3. memory that lose its data when device is off
  4. SIEM tool that enable to search, analyze...
  5. type of XSS (non-persistent)
  6. software/hardware that creates/runs VM
  7. attract attackers
  8. transmission media with cables
Down
  1. process in TCP/IP networks to establish a working connection between a server and a compute
  2. software that displays unwanted ad
  3. this hash cb5ceb103977f1271d0763ac75fcd8e9 = secret
  4. 8e8c92b1c360cbe3cd2b40d6b29278d5
  5. an open-source EDR
  6. type of attack that uses voice and telephony technologies to trick people
  7. secure communications techniques

15 Clues: packet analyzerattract attackersan open-source EDRtype of XSS (non-persistent)transmission media with cables8e8c92b1c360cbe3cd2b40d6b29278d5secure communications techniquessoftware that displays unwanted adinteraction between snmp agent managersoftware/hardware that creates/runs VMSIEM tool that enable to search, analyze......

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. Small text files that websites save in your web browser to store information like your username and password.
  2. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  3. The last part of a URL eg;.gov .com
  4. The internet version of Junk mail
  5. Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
  6. Short for Random Access Memory
  7. Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
  8. Free software that can be downloaded from the internet.
Down
  1. A computer that has been hacked into and is used to launch malicious attacks
  2. Buying products on the Internet using credit cards or other electronic payments
  3. When a computer calls out to another computer to see if it is active.
  4. From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
  5. A name you use to identify yourself on a computer or website.
  6. A type of malware that spies on what you do on the internet and can steal information about you
  7. Marking something or someone as suspicious or inappropriate.

15 Clues: Short for Random Access MemoryThe internet version of Junk mailThe last part of a URL eg;.gov .comFree software that can be downloaded from the internet.Marking something or someone as suspicious or inappropriate.A name you use to identify yourself on a computer or website.When a computer calls out to another computer to see if it is active....

Eli-cyber safety 2016-06-07

Eli-cyber safety crossword puzzle
Across
  1. the internet in living space at home. And also my parent have my passwords so they can look at my tablet when they want.
  2. media stuff
  3. its hard to control what i see and others see.
  4. programs that display adverts on the screen.Often installed without people realising.
  5. to get help from if your online and people do mean stuff to yo
  6. app online were you take funny pictures of your self and send it to a group of people and they look at it and look write back what they thought about it sometimes they write mean stuff.
  7. users share their music playlists on Facebook,Twitter and Google+friends.
Down
  1. privacy that you need to keep safe.
  2. cameras that are often attached to a computer so that a video image can be sent to another while communication.
  3. to keep them private (except from your parents)
  4. you use the internet to bully somebody
  5. bulling
  6. Stops people from hacking into your iPod,phone,iPad,and other stuff like thatched.Online
  7. like a password you need to keep it safe from hackers .a.
  8. when your with friends in a group of people on phones texting to people and putting pictures of you or something.

15 Clues: bullingmedia stuffprivacy that you need to keep safe.you use the internet to bully somebodyits hard to control what i see and others see.to keep them private (except from your parents)like a password you need to keep it safe from hackers .a.to get help from if your online and people do mean stuff to yo...

cyber tut-4 2018-09-12

cyber tut-4 crossword puzzle
Across
  1. Control signals to be activated at any time
  2. Finite sequential machine
  3. A sequence of micro instructions
  4. A type of hazard in pipeline
  5. Enables the host system to run software
  6. Provides a separate signal line for each step or time slot
  7. a network of functional and storage unit
  8. Next address generator
Down
  1. When performance level reaches greater than instruction per cycle
  2. A program used to translate microprogram into executable program
  3. Control signal embedded in a kind of low level software
  4. Many type of instructions are executed in a single clock cycle
  5. Permits a single microinstruction to specify a short sequence
  6. Control memory address system
  7. Task initiation diagram

15 Clues: Next address generatorTask initiation diagramFinite sequential machineA type of hazard in pipelineControl memory address systemA sequence of micro instructionsEnables the host system to run softwarea network of functional and storage unitControl signals to be activated at any timeControl signal embedded in a kind of low level software...

Cyber Laws & Ethics 2025-05-31

Cyber Laws & Ethics crossword puzzle
Across
  1. protect brands, logos, and symbols that distinguish goods or services
  2. private browsing mode
  3. the act of using someone else’s work or ideas without proper acknowledgment
  4. Sending bulk emails
  5. someone gains unauthorized access to a computer system or network
  6. refers to safe and responsible use of ICT
  7. protect new inventions or discoveries
  8. scammers send fake emails or messages pretending to be someone trustworthy
Down
  1. Internet etiquette
  2. involves secretly listening to or intercepting private communications
  3. remember our visits on website
  4. a type of malicious software that locks or encrypts a victim’s data, demanding payment
  5. data that is left behind when users have been online
  6. illegal activities conducted through computers or the internet
  7. people who deliberately post inflammatory or offensive comments online to provoke others

15 Clues: Internet etiquetteSending bulk emailsprivate browsing moderemember our visits on websiteprotect new inventions or discoveriesrefers to safe and responsible use of ICTdata that is left behind when users have been onlineillegal activities conducted through computers or the internetsomeone gains unauthorized access to a computer system or network...

Cyber Sleuth Crossword 2026-03-25

Cyber Sleuth Crossword crossword puzzle
Across
  1. A trick used to steal money or personal information.
  2. A secret word or phrase used to access an account.
  3. Software designed to harm or gain unauthorised access to a system.
  4. The name used to identify an account when logging in.
  5. A scam that tricks people into giving personal information by pretending to be trusted.
  6. The process of verifying a user’s identity.
  7. Identity verification using physical features like fingerprints or face.
Down
  1. Turning data into coded form so only authorised users can read it.
  2. Unauthorised access to confidential data.
  3. A person who gains unauthorised access to systems.
  4. A system that blocks unauthorised network access.
  5. Software that detects and removes harmful programs.
  6. A software update that fixes bugs or security issues.
  7. A secure connection used to protect data, especially on public Wi-Fi.
  8. A saved copy of data used for recovery if the original is lost.

15 Clues: Unauthorised access to confidential data.The process of verifying a user’s identity.A system that blocks unauthorised network access.A person who gains unauthorised access to systems.A secret word or phrase used to access an account.Software that detects and removes harmful programs.A trick used to steal money or personal information....

Chapter 15 2013-04-25

Chapter 15 crossword puzzle
Across
  1. this type of fire extinguisher can be class A, B, C, D, or K
  2. the safeguarding of personnel's rights
  3. this act helps protect the privacy of your social security number
  4. helps protect cable from EMI and RFI
  5. agreement between an organization and a vendor
  6. a dry pipe fire suppression system with special features
  7. individual well-known for social engineering
  8. assuring that risks are known and managed
Down
  1. documentation about evidence location and usage
  2. this system helps remove heat from a server room
  3. this act governs the disclosure of financial and accounting information
  4. an event that affects the security of an organization
  5. a targeted social engineering attack
  6. scavenging for private data in trash
  7. more than one person is required to complete a task
  8. a violation of physical security
  9. wiping or purging data
  10. a formal process for managing changes to the IT environment
  11. this act governs the disclosure and protection of health information
  12. this type of fire suppression system can be wet pipe or dry pipe

20 Clues: wiping or purging dataa violation of physical securitya targeted social engineering attackscavenging for private data in trashhelps protect cable from EMI and RFIthe safeguarding of personnel's rightsassuring that risks are known and managedindividual well-known for social engineeringagreement between an organization and a vendor...

Maria's favourite words. 2015-12-11

Maria's favourite words. crossword puzzle
Across
  1. / A person with a role to promote, display or advertise commercial products.
  2. / Antonym: vague.
  3. / Formal request to an authority for something (e.g., job).
  4. / Security building blocks
  5. / Associated with, able to, or designed for performing one or more practical activities.
  6. / Synonym: sketch, blueprint, outline.
  7. / Useful or valuable thing.
  8. / Dealing with the nature of being.
  9. / Existing or firmly attached within something or under a surface.
  10. / A series of actions or steps taken in order to achieve a particular end.
  11. / Put, lay, or stand (something) in a specified place or position.
  12. / Area or territory controlled by a ruler or government.
Down
  1. / A person’s bodily shape.
  2. / Security-Enhanced Embedded system Design.
  3. / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
  4. / Judgement.
  5. / Action against someone or something.
  6. / Maria’s main concern in the thesis.
  7. / A thing or things belonging to someone; possessions collectively.
  8. / A raised level surface on which people or things can stand.
  9. / A set of connected things or parts forming a complex whole, in particular.
  10. / A part of a whole.
  11. / Information.

23 Clues: / Judgement./ Information./ Antonym: vague./ A part of a whole./ A person’s bodily shape./ Security building blocks/ Useful or valuable thing./ Dealing with the nature of being./ Maria’s main concern in the thesis./ Action against someone or something./ Synonym: sketch, blueprint, outline./ Security-Enhanced Embedded system Design....

Deterring home break-ins and vehicle theft 2023-02-17

Deterring home break-ins and vehicle theft crossword puzzle
Across
  1. Man's best friend
  2. Used to lock your steering wheel
  3. Available with wireless video recording to monitor the entry to your home
  4. Make sure these are closed and locked
  5. Don't leave your running vehicle _____.
  6. Store your keyless entry fob in this type of bag to prevent a thief from cloning your key
  7. Don't allow this to overflow while you are away on vacation
  8. A GPS device that can be used to locate your vehicle
  9. Posted to advertise your home security company
Down
  1. Mount this on the exterior of your home for added security
  2. Can be stuck on a windshield as a security warning
  3. If you see ______, say ______!
  4. Type of lighting used to deter break-ins
  5. Secondary and more secure locking mechanism to deter home entry
  6. Thieves may attach this magnetic Apple product to your vehicle to track it
  7. Keep these locked to deter unwanted entry
  8. In-vehicle video recorder
  9. An audible anti-theft deterrent
  10. Never leave these in your vehicle
  11. Etch this onto your vehicle windows or catalytic converter to deter theft

20 Clues: Man's best friendIn-vehicle video recorderIf you see ______, say ______!An audible anti-theft deterrentUsed to lock your steering wheelNever leave these in your vehicleMake sure these are closed and lockedDon't leave your running vehicle _____.Type of lighting used to deter break-insKeep these locked to deter unwanted entry...

Volunteers 2023-05-01

Volunteers crossword puzzle
Across
  1. 2nd grade assist
  2. Preschool helper
  3. Crafts
  4. Registrar
  5. Missions
  6. Snacks
  7. Crafts three
  8. Music assist
  9. Adults
  10. 4th grade lead
  11. first grade assist
  12. 5/6 Girls too
  13. Security lead
  14. Security helper/floater
  15. Adult assist
  16. Anderson Army
  17. Co leader
  18. Audio
  19. Crafts also
  20. 5th and 6th boys assist
  21. Rec lead
  22. 5th and 6th boys lead
  23. Rec second
  24. 4th grade also
  25. KDG assist
  26. Tech
  27. Preschool
  28. 5/6 assist
  29. Greet
  30. Music Lead
Down
  1. 5/6 girls
  2. Registration
  3. 2nd grade too
  4. H. Helper
  5. childcare MW
  6. prek missions
  7. 1st grade
  8. Rec Follower
  9. Leader
  10. Preschool Assist
  11. Visual
  12. 1st grade too
  13. Home
  14. Rec shadow
  15. 3rd grade lead
  16. Greeter
  17. Rec assist
  18. Worship help
  19. 2nd grade
  20. childcare T,R,F
  21. 3rd grade
  22. kdg
  23. 3rd grade also
  24. childcare MW too
  25. Crafts lead
  26. Security
  27. Kdg lead
  28. 5th and 6th boys
  29. Childcare
  30. Secretary

60 Clues: kdgHomeTechAudioGreetCraftsSnacksLeaderVisualAdultsGreeterMissionsRec leadSecurityKdg lead5/6 girlsH. HelperRegistrar1st gradeCo leader2nd grade3rd gradePreschoolChildcareSecretaryRec shadowRec assistRec secondKDG assist5/6 assistMusic LeadCrafts alsoCrafts leadRegistrationchildcare MWRec FollowerCrafts threeMusic assistAdult assistWorship help...

WIGLEY WORK 2021-09-16

WIGLEY WORK crossword puzzle
Across
  1. working a specific number of hours per week
  2. the lowest hourly rate
  3. where social security was established
  4. a rate that pieceworkers are paid
  5. what you pay when your job is covered by social security
  6. workers paid according to the amount of items they produce
  7. HOURS working more hours than their regular hours
  8. whats paid for by FICA taxes
  9. insured program available through the US government
  10. a percentage of each workers salary is taken out of each paycheck up to a certain amount
  11. sum of your hourly and overtime pay
  12. getting paid every other week
  13. 1 1/2 the hourly rate
Down
  1. 2x the hourly rate
  2. unique for each individual, used to track Social Security benefits and for other identification purposes
  3. set amount for each hour the work
  4. 3x the hourly rate
  5. getting paid twice a month
  6. paycheck amount are automatically deposited electronically into their bank account
  7. a percentage of sales paid to an author,musician or artist
  8. whats paid for by FICA taxes
  9. percentage of total sales
  10. 1.5 times your hourly rate

23 Clues: 2x the hourly rate3x the hourly rate1 1/2 the hourly ratethe lowest hourly ratepercentage of total salesgetting paid twice a month1.5 times your hourly ratewhats paid for by FICA taxeswhats paid for by FICA taxesgetting paid every other weekset amount for each hour the worka rate that pieceworkers are paidsum of your hourly and overtime pay...

021-1 2024-07-12

021-1 crossword puzzle
Across
  1. Term for when security is breached
  2. Malicious code used in the attack
  3. Joint groups formed to improve cybersecurity
  4. Efforts to reduce the impact of the attack
  5. Tech giant also affected by the attack
  6. Public and private sectors working together
  7. Russian state-sponsored group behind the attack
  8. U.S. Department of Homeland Security's response
  9. Type of actor behind the attack
  10. Another name for the attackers
  11. Key focus in the aftermath of the attack
  12. Type of analysis conducted to investigate the attack
  13. Weaknesses exploited by the attackers
Down
  1. Techniques used by attackers to avoid detection
  2. Another term for the security incident
  3. Process of uncovering the details of the attack
  4. U.S. response to the attack
  5. IT company at the center of the attack
  6. The effect of the attack on organizations
  7. Cybersecurity firm that discovered the breach
  8. Software updates released by SolarWinds
  9. Actions pursued against the attackers
  10. U.S. department that was compromised
  11. U.S. body that held hearings on the attack
  12. SolarWinds product that was compromised

25 Clues: U.S. response to the attackAnother name for the attackersType of actor behind the attackMalicious code used in the attackTerm for when security is breachedU.S. department that was compromisedActions pursued against the attackersWeaknesses exploited by the attackersAnother term for the security incidentIT company at the center of the attack...

Safety Week 2024 2024-10-01

Safety Week 2024 crossword puzzle
Across
  1. See something ___ something
  2. Emergency coordinators wear these brightly colored items
  3. DMU encourages annual vaccines to prevent this common infection
  4. A kit of supplies and equipment for use in giving medical treatment
  5. A practice exercise to prepare for a potential emergency situation
  6. type of ppe for eyes
  7. Action to take for a rapid, orderly process to exit building
  8. A symbol indicating dangerous biological substances
  9. A portable device used to treat sudden cardiac arrest
  10. DMUs emergency notification system
  11. a safe, indoor location in an emergency
Down
  1. Practice of following others through security checkpoint without access badge
  2. Animal to emulate when walking on icy ground
  3. One should always be _____ of their surroundings
  4. DMU's avatar for emergency messaging
  5. Being ready and able to deal with emergencies
  6. Campus department to contact if you witness suspicious activity
  7. Tornado _______ indicates a tornado has been sighted or identified by National Weather Service radar
  8. A service providing emergency medical care and transportation
  9. Homeland Security model for active threat response: run, hide, _____
  10. DMU's Chief Compliance Officer is highly ____ averse

21 Clues: type of ppe for eyesSee something ___ somethingDMUs emergency notification systemDMU's avatar for emergency messaginga safe, indoor location in an emergencyAnimal to emulate when walking on icy groundBeing ready and able to deal with emergenciesOne should always be _____ of their surroundingsA symbol indicating dangerous biological substances...

Investing Crossword Puzzle 2025-03-25

Investing Crossword Puzzle crossword puzzle
Across
  1. how the government ensures you'll eventually be taxed
  2. Government Medical Health Plan
  3. When the market is up
  4. The biggest financial fraud in US history.
  5. A system of recording info that’s impossible to override
  6. Worked a certain amount of time to match your retirement account
  7. holding company that owns subsidiaries in many different business sectors
  8. Contributions made before tax
  9. Contributions made after tax
  10. Transfer retirement account from old employer to another
  11. Social Security and Medicare tax
  12. Money Currencies that are created and backed by the Government
  13. When the market is down
Down
  1. Fund to have before investing in crypto
  2. A company that is owned by a larger company
  3. Strategy for nervous investors that are low risk
  4. No longer working
  5. How much did Tom Brady lose with FTX
  6. Aggressive risk tolerance investors use this strategy
  7. Security Conceived by President Roosevelt in 1935
  8. How old you have to be to collect full social security benefit
  9. Retirement benefit offered by some employers
  10. High risk investment
  11. Berkshire Hathaway
  12. The more popular it is, the more valuable

25 Clues: No longer workingBerkshire HathawayHigh risk investmentWhen the market is upWhen the market is downContributions made after taxContributions made before taxGovernment Medical Health PlanSocial Security and Medicare taxHow much did Tom Brady lose with FTXFund to have before investing in cryptoThe more popular it is, the more valuable...

Airport 2025-06-04

Airport crossword puzzle
Across
  1. A delay in a flight`s departure or arrival
  2. The area where luggage is collected after a flight
  3. A person traveling on a plane
  4. The process of getting off a plane
  5. A machine that carries passengers and cargo through the air
  6. A persone who helps passengers on a flight
  7. the process of registering for a flight and getting a boarding pass
  8. A bag used to pack clothes for a trip
  9. A place where planes take off and land
Down
  1. A ticket that allows you to board a plane
  2. A device that detects metal objects during security checks
  3. A document needed to travel to another country
  4. The act of getting on a plane
  5. A vehicle that transport passengers between the terminal and the aircraft
  6. The persone who flies the plane
  7. A security check where passengers walk through a scanner
  8. Place where passengers wait to board their flight
  9. The area where passengers go after leaving the plane
  10. A place where planes are kept and repaired
  11. A small bag used to carry personal items on a flight

20 Clues: The act of getting on a planeA person traveling on a planeThe persone who flies the planeThe process of getting off a planeA bag used to pack clothes for a tripA place where planes take off and landA ticket that allows you to board a planeA delay in a flight`s departure or arrivalA place where planes are kept and repaired...

Cybersecurity 2025-06-04

Cybersecurity crossword puzzle
Across
  1. Software that secretly collects user information
  2. Verifying the identity of a user or device
  3. A small file stored on your device by websites you visit
  4. A type of malware that replicates and spreads to other programs
  5. A secret string of characters used to access a system
  6. A person who gains unauthorized access to systems
  7. A type of scam where attackers trick users into revealing information
  8. A type of malware disguised as legitimate software
  9. Software designed to detect and remove malicious programs
  10. A program that records keystrokes to steal data
Down
  1. A security process requiring two different authentication methods
  2. A software update that fixes security vulnerabilities
  3. ENGINEERING Manipulating people into revealing confidential information
  4. Software designed to harm or exploit any device or network
  5. The process of converting data into a coded form
  6. An incident where data is accessed without authorization
  7. A network security system that monitors and controls traffic
  8. A copy of data stored to prevent loss
  9. A network of infected computers under a hacker’s control
  10. A secure connection over the internet to protect data

20 Clues: A copy of data stored to prevent lossVerifying the identity of a user or deviceA program that records keystrokes to steal dataSoftware that secretly collects user informationThe process of converting data into a coded formA person who gains unauthorized access to systemsA type of malware disguised as legitimate software...

Digital Footprint-CCC 2018-09-21

Digital Footprint-CCC crossword puzzle
Across
  1. WiFi connected item
  2. related to online
  3. a trace of where we were.
  4. hosted device
Down
  1. thing marked with the print
  2. Native- grew up with the internet
  3. world of online
  4. citizenship-Learning about communication
  5. trail-What the footprints leave behind

9 Clues: hosted deviceworld of onlinerelated to onlineWiFi connected itema trace of where we were.thing marked with the printNative- grew up with the internettrail-What the footprints leave behindcitizenship-Learning about communication

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. Bullying online, is called .....
  2. If you are bullied, tell an ......
  3. Cyberbullying is against the law (true/false)
  4. A wireless handheld device to communicate.
  5. Denial of access to internet.
  6. Repeated or deliberate harassment.
Down
  1. An example of cyberbullying.
  2. To report bullying on websites(true/false)
  3. An effect of cyberbullying.
  4. When bullied, stay .....

10 Clues: When bullied, stay .....An effect of cyberbullying.An example of cyberbullying.Denial of access to internet.Bullying online, is called .....If you are bullied, tell an ......Repeated or deliberate harassment.To report bullying on websites(true/false)A wireless handheld device to communicate.Cyberbullying is against the law (true/false)

Four Purposes of Government 2021-01-13

Four Purposes of Government crossword puzzle
Across
  1. In a _______, the creation and enforcement of laws is closely tied to the wants and needs of citizens.
  2. ________threats include physical attacks, such as the terrorist attacks of September 11, 2001, and invisible attacks, such as cyber espionage.
  3. In this sense of the word, ______means a state of happiness and well-being within a society.
  4. Freedom of speech and the press, as well as _______liberties, are constitutionally protected by the Bill of Rights.
  5. The government also institutes the ____ justice system as a mechanism citizens can use to settle disputes.
  6. A democracy embraces the principle of the rule of law, which ensures that no person in the state is above the law.
  7. All ________ have the purposes of establishing laws, providing order and security, protecting their people from external threats, and providing for the general welfare.
  8. In a monarchy or ______the focus is more on maintaining the regime
  9. The US has a strong emphasis on individualism, liberty, and ____markets.
Down
  1. In a democracy, laws are made by the _____ or their representatives.
  2. In a __________, laws may be administered in a method that benefits the leader or the central government more than those being governed.
  3. Governments provide a range of services from public education, financial support to the _____ and aged, bridges and water.
  4. Governments are responsible for preventing attacks on their people from persons or groups outside its _____
  5. In a ___________ or dictatorship, laws are promulgated by the ruler.
  6. The U.S. _____________ declared that the government was to establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare ...
  7. Laws must be publicly recorded, enforced equally, and interpreted by an independent ______ branch.
  8. Social welfare states, such as those found in much of _______, provide extensive government services, including free public education, income support, and government-supplied health care.

17 Clues: In a monarchy or ______the focus is more on maintaining the regimeIn a democracy, laws are made by the _____ or their representatives.In a ___________ or dictatorship, laws are promulgated by the ruler.The US has a strong emphasis on individualism, liberty, and ____markets....

Smart City Crossword Puzzle 2019-03-20

Smart City Crossword Puzzle crossword puzzle
Across
  1. big___ = high volume, high velocity, and or high variety of information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization.
  2. a native or naturalized member of a state or other political community
  3. ___ chain - linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser
  4. the process of combining software components, hardware components, or both into an overall system
  5. effective integration of physical, digital and human systems in the built environment to deliver a sustainable, prosperous and inclusive future for its citizens
  6. an extended social group having a distinctive cultural and economic organization
Down
  1. ___ infrastructure - live network equipment for receiving, transmitting or distributing digital data and information
  2. the organized action of making of goods and services for sale
  3. ___ security mechanisms and processes put in place to ensure the integrity of operation of computer systems, protecting their operations against malicious or unintentional intervention
  4. process by which people become residents of cities
  5. act of periodically checking processes, equipment and environment in order to detect any changes
  6. collection of computers and devices interconnected by communications channels that facilitate communications among users and allow users to share resources and services
  7. ___ infrastructure - integrated software and hardware required for digital communications allowing reception of data and information services delivered externally, and for the transmission of digital data and information

13 Clues: process by which people become residents of citiesthe organized action of making of goods and services for salea native or naturalized member of a state or other political communityan extended social group having a distinctive cultural and economic organization...

Once Upon a Time C 2021-09-30

Once Upon a Time C crossword puzzle
Across
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  3. Majestically, the eagle liked to perch itself on the house’s ? as if it was the lord of the manor.
  4. The ? gardener was willing to travel to different places where there was work.
  5. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  6. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  7. The bulkiness of the cameras around the house ruined the building’s ?, creating quite the eyesore.
  8. Due to neglect, some of the ? of the homes required some painting and repairs.
  9. As ? for the broken security alarm, the company offered them six months of service for no charge.
  10. As usual, the father was ? by the beeping of his phone at 6:00 am.
  11. For their safety, they ? to the Neighbourhood Watch program.
  12. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
Down
  1. After many false alarms, the family wondered about the ? of the security system.
  2. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  3. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  4. When Mr. Cornwell went to Greece, he embraced the ? features of some of the churches.
  5. Every summer, Ms Williamson planted flowers in ornate ? and placed them in the front yard by the main entrance.
  6. Nervously, the resident noticed the ? of a figure below the street light.
  7. When slicing bread or tomato, it is easier using a knife with ?.
  8. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to immobilize the sound.
  9. Residents ? their fears of criminals by installing sophisticated security devices.
  10. cherished red wagon with the supplies for phys. Ed.
  11. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  12. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr.
  13. Protectively, the ? tried to overcome their fears by installing more elaborate security systems.
  14. Obviously, the family was suspicious as to the ? of strangers wandering in the neighbourhood.
  15. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  16. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  17. Warily, residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.

29 Clues: cherished red wagon with the supplies for phys. Ed.For their safety, they ? to the Neighbourhood Watch program.When slicing bread or tomato, it is easier using a knife with ?.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light....

crossword about Cybersecurity 2025-06-07

crossword about Cybersecurity crossword puzzle
Across
  1. Malware that encrypts files for ransom
  2. Network of infected devices
  3. Small data file stored by websites
  4. Software that secretly monitors activity
  5. Scrambling data for security
  6. Person who exploits system vulnerabilities
  7. Remote data storage and computing
Down
  1. Fraudulent attempts to steal info
  2. Harmful software like viruses
  3. Authentication using fingerprints
  4. Directs internet traffic
  5. Decentralized ledger technology
  6. Malware disguised as legitimate software
  7. Secures internet connections
  8. Network security barrier

15 Clues: Directs internet trafficNetwork security barrierNetwork of infected devicesSecures internet connectionsScrambling data for securityHarmful software like virusesDecentralized ledger technologyFraudulent attempts to steal infoAuthentication using fingerprintsRemote data storage and computingSmall data file stored by websites...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Chapter 15 2013-04-25

Chapter 15 crossword puzzle
Across
  1. Chain of ___________ documentation about evidence location and usage
  2. this act governs the disclosure of financial and accounting information
  3. Due __________ is assuring that risks are known and managed
  4. an event that affects the security of an organization
  5. a violation of physical security
  6. this act governs the disclosure and protection of health information
  7. this system helps remove heat from a server room
  8. Due ________ is the safeguarding of personnel's rights
  9. ______ phishing is a targeted social engineering attack
  10. wiping or purging data
  11. this type of fire extinguisher can be class A, B, C, D, or K
Down
  1. ________ diving is scavenging for private data in trash
  2. individual well-known for social engineering
  3. helps protect cable from EMI and RFI
  4. Separation Of ______ means more than one person is required to complete a task
  5. a dry pipe fire suppression system with special features
  6. ________ management is a formal process for managing changes to the IT environment
  7. this type of fire suppression system can be wet pipe or dry pipe
  8. this act helps protect the privacy of your social security number
  9. agreement between an organization and a vendor

20 Clues: wiping or purging dataa violation of physical securityhelps protect cable from EMI and RFIindividual well-known for social engineeringagreement between an organization and a vendorthis system helps remove heat from a server rooman event that affects the security of an organizationDue ________ is the safeguarding of personnel's rights...

Maria's favourite words 2015-12-11

Maria's favourite words crossword puzzle
Across
  1. Put, lay, or stand (something) in a specified place or position.
  2. Synonym: sketch, blueprint, outline.
  3. existing or firmly attached within something or under a surface:
  4. A set of connected things or parts forming a complex whole, in particular.
  5. Dealing with the nature of being.
  6. detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
  7. a thing or things belonging to someone; possessions collectively.
  8. formal request to an authority for something (e.g., job).
  9. Useful or valuable thing.
  10. Antonym of vague.
  11. Information.
Down
  1. Security-Enhanced Embedded system Design.
  2. A person’s bodily shape.
  3. a series of actions or steps taken in order to achieve a particular end.
  4. Action against someone or something.
  5. associated with, able to, or designed for performing one or more practical activities.
  6. Judgement.
  7. A person with a role to promote, display or advertise commercial products.
  8. A part of a whole.
  9. Maria’s main concern in the thesis.
  10. a raised level surface on which people or things can stand.
  11. Security building blocks
  12. Area or territory controlled by a ruler or government.

23 Clues: Judgement.Information.Antonym of vague.A part of a whole.A person’s bodily shape.Security building blocksUseful or valuable thing.Dealing with the nature of being.Maria’s main concern in the thesis.Synonym: sketch, blueprint, outline.Action against someone or something.Security-Enhanced Embedded system Design....

Airport Crossword 2019-02-12

Airport Crossword crossword puzzle
Across
  1. Secure baggage storage and luggage wrapping is available at SmartCarte
  2. Available for emergancy use
  3. Go there to eat/drink
  4. Responsibility for aviation security should be shared between the NZ Police and the Military of transport
  5. Provided as a quiet place for contemplation to all travellers
  6. Available for transit passengers. Can buy supplies from vending machine
  7. Located on top floor of the terminal. Provides a view of airfield
  8. Changing currency types
  9. Can access smoking lounge after security
  10. Available throughout terminals to assist passengers
Down
  1. Where you can buy items cheaper and non-taxed
  2. Located throughout international airport terminal to communicate. Have to pay to use
  3. Available to help transfer luggage
  4. Centre provides comprehensive ... and booking service
  5. Passengers first contact with airport to book a space. Can be long term or short term
  6. Where you can buy small goods for yourself or as a gift
  7. Rooms with cots and changing tables are available.
  8. You can access this for computer or mobile usage
  9. Will check you to ensure no transporting of any dangerous goods
  10. Getting cash out

20 Clues: Getting cash outGo there to eat/drinkChanging currency typesAvailable for emergancy useAvailable to help transfer luggageCan access smoking lounge after securityWhere you can buy items cheaper and non-taxedYou can access this for computer or mobile usageRooms with cots and changing tables are available....

Homefront 2021-06-15

Homefront crossword puzzle
Across
  1. roles, Women were invited to join the war effort their roles were limited.
  2. National Act introduced in 1939 to restrict freedom.
  3. American men brought these for the Australian women.
  4. All information wasn't always given for security purposes.
  5. Clothes were never wasted.
  6. Voted against in WW1 but was legalised in WW2.
  7. People placed here for concern over national security.
  8. Needed to buy everyday necessities like clothes, food, and petrol.
  9. Common to hinder accurate bombings.
  10. A large role in the war but weren't considered personnel.
  11. The government wanted to keep this high.
  12. Major players in both wars - central and axis powers.
Down
  1. Women were now allowed to work in this male-dominated place.
  2. Aboriginal and Torres Strait Islanders were not conscripted.
  3. Weren't allowed to be drawn to save resources.
  4. There was jealousy in Australia over the American visitors.
  5. Placed on Australians to ensure there were enough resources.
  6. Trenches and shelters were made out of fear of air raids.
  7. Women were encouraged to take up work that was more physical.
  8. Bombed many times by the Japanese.

20 Clues: Clothes were never wasted.Bombed many times by the Japanese.Common to hinder accurate bombings.The government wanted to keep this high.Weren't allowed to be drawn to save resources.Voted against in WW1 but was legalised in WW2.National Act introduced in 1939 to restrict freedom.American men brought these for the Australian women....

WWII--Academic Vocabulary 2024-02-20

WWII--Academic Vocabulary crossword puzzle
Across
  1. Setting someone free from oppression.
  2. security: Measures for country protection.
  3. fronts: Engaging in combat in multiple areas.
  4. Official ban on trade with a country.
  5. Converting information into code for security.
  6. genocide: Government-led extermination of a group.
  7. shortages: Insufficient goods for purchase.
  8. state: Government with complete control over public and private life.
  9. Controlling resource distribution in scarcity.
  10. raid: Aerial attack with bombs.
  11. Preparing troops and supplies for war.
  12. Offering time for charitable activities.
  13. Purchasers of goods and services.
Down
  1. enlistment: Joining armed forces voluntarily or through draft.
  2. effort: Mobilization to support armed forces.
  3. supply: Availability of food, especially in tough times.
  4. weapons: Non-mass destruction military arms.
  5. base: Military installation for navy operations.
  6. opportunities: Available work chances.
  7. front: Civilian population during war.
  8. goods: Limited supply products.
  9. levels: Amount of goods or services made.
  10. treaties: Formal agreements between countries.
  11. shortage: Scarcity of agricultural workers.
  12. Love for one's country.
  13. Confinement, especially during wartime.
  14. units: Organized military groups.
  15. effects: Impact on regional economy.
  16. transmission: Ensuring information security.
  17. involvement: Participation of the United States in a conflict.

30 Clues: Love for one's country.goods: Limited supply products.raid: Aerial attack with bombs.units: Organized military groups.Purchasers of goods and services.effects: Impact on regional economy.Setting someone free from oppression.Official ban on trade with a country.opportunities: Available work chances.front: Civilian population during war....

United Nations 2024-09-19

United Nations crossword puzzle
Across
  1. Number of members of Security Council and judges in International Court of Justice
  2. Number of countries represented on the Economic and Social Council.
  3. Location of International Court of Justice
  4. City where Charter was signed San __________.
  5. ______________ Development or actions that can be maintained over time without damaging the environment.
  6. Most powerful organ of the UN
  7. UN agency that care for education and children.
  8. First goal of the UN: maintain __________ and security.
  9. The UN was created after the scourge of _________ ________ ____.
  10. Current Secretary General of the UN: Antonio __________ of Portugal.
  11. Name for a gathering of people to talk about issues.
  12. Founding document of the United Nations
Down
  1. American who led effort to create Universal Declaration of Human Rights
  2. Group of all member states General __________.
  3. The number of principal organs of the UN
  4. Location of the UN Headquarters
  5. The number of official languages of the UN
  6. Initials for the World Health Organization
  7. Permanent members of the Security Council are United Kingdom, China, France, US and _________.
  8. Proposals or recommendations of the UN
  9. Office of the Secretary General or leader of the UN

21 Clues: Most powerful organ of the UNLocation of the UN HeadquartersProposals or recommendations of the UNFounding document of the United NationsThe number of principal organs of the UNThe number of official languages of the UNInitials for the World Health OrganizationLocation of International Court of JusticeCity where Charter was signed San __________....

Investing Crossword Puzzle 2025-03-25

Investing Crossword Puzzle crossword puzzle
Across
  1. Contributions made before tax
  2. Transfer retirement account from old employer to another
  3. Berkshire Hathaway
  4. Security Conceived by President Roosevelt in 1935
  5. The more popular it is, the more valuable
  6. Worked a certain amount of time to match your retirement account
  7. No longer working
  8. Currencies that are created and backed by the Government
  9. A system of recording info that’s impossible to override
  10. Retirement benefit offered by some employers
Down
  1. holding company that owns subsidiaries in many different business sectors
  2. Social Security and Medicare tax
  3. how the government ensures you'll eventually be taxed
  4. How much did Tom Brady lose with FTX
  5. High risk investment
  6. Strategy for nervous investors that are low risk
  7. When the market is up
  8. How old you have to be to collect full social security benefit
  9. Contributions made after tax
  10. Fund to have before investing in crypto
  11. When the market is down
  12. A company that is owned by a larger company
  13. Government Medical Health Plan
  14. The biggest financial fraud in US history.
  15. Aggressive risk tolerance investors use this strategy

25 Clues: No longer workingBerkshire HathawayHigh risk investmentWhen the market is upWhen the market is downContributions made after taxContributions made before taxGovernment Medical Health PlanSocial Security and Medicare taxHow much did Tom Brady lose with FTXFund to have before investing in cryptoThe more popular it is, the more valuable...

System Administration Secuirty 2026-02-14

System Administration Secuirty crossword puzzle
Across
  1. Restoring data after a disaster
  2. Software accessed online
  3. Determining what a user can access
  4. Proves a website is secure
  5. Using multiple layers of security
  6. Company-owned software
  7. Malicious program that spreads between files
  8. Software with editable public code
  9. Allocating RAM to programs
  10. Prevents unwanted browser windows
  11. Programs used to complete everyday tasks
  12. Manages hardware and software on a computer
  13. Running multiple programs at once
  14. Software that runs in the background
  15. Standard security rules
  16. Legal agreement for using software
  17. Pay regularly to use software
  18. Reducing system vulnerabilities
Down
  1. Verifying a user’s identity
  2. Reviewing systems for security issues
  3. Monitoring system activity
  4. Software that removes malware
  5. Keeping systems updated
  6. Proof that an action occurred
  7. Giving users minimal necessary access
  8. Update that fixes bugs or vulnerabilities
  9. Allows the OS to communicate with hardware
  10. Organizing files and folders
  11. Controls read, write, or delete access
  12. Temporary browser storage
  13. How users interact with a computer
  14. Blocks suspicious network traffic
  15. Scrambling data for protection

33 Clues: Company-owned softwareKeeping systems updatedStandard security rulesSoftware accessed onlineTemporary browser storageMonitoring system activityProves a website is secureAllocating RAM to programsVerifying a user’s identityOrganizing files and foldersSoftware that removes malwareProof that an action occurredPay regularly to use software...

Learning Unit 9: Security Risk Reviews 2023-05-05

Learning Unit 9: Security Risk Reviews crossword puzzle
Across
  1. refer to the specialized knowledge and expertise needed to accomplish complex actions, tasks, and processes relating to computational and physical technology as well as a diverse group of other enterprises.
  2. Through _____________, our goal is to understand how well the current security program operates within the technical architecture.
  3. As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis.
  4. These controls are used to manage the organization’s information security and compliance efforts and to address the people part of security. These types of controls include things like policies, standards, procedures, and training. These are not exciting, but are absolutely critical to good information security and compliance management.
  5. Typically the controls that you can touch. These controls are designed to manage physical access to information and include things like door locks, alarm systems, and camera surveillance. It really doesn’t matter how good your antivirus software is if someone can easily steal your server.
  6. is a collaborative process used to identify security-related issues, determine the level of risk associated with those issues, and make informed decisions about risk mitigation or acceptance.
Down
  1. This is the IT part of security. Notice how the IT part of security is only one part of security and not all parts of security? Technical controls are what most people think of when they think of information security. These controls include things like firewalls, antivirus software, passwords, and permissions.
  2. is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.
  3. should be a planned part of the risk management process and involve regular checking or surveillance. The results should be recorded and reported externally and internally, as appropriate. The results should also be an input to the review and continuous improvement of the firm's risk management framework.
  4. was founded in 1901 and is now part of the U.S. Department of Commerce. _____________ is one of the nation's oldest physical science laboratories. Congress established the agency to remove a major challenge to U.S. industrial competitiveness at the time — a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany and other economic rivals.
  5. is ensuring that information is accurate. Accurate information is critical to us in making sound decisions. The opposite of integrity is (unauthorized) alteration.

11 Clues: is keeping information secret—only allowing authorized disclosure. The opposite of confidentiality is disclosure.As an ________________ consultant, one of the most important jobs I do is to conduct an information security gap analysis....

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – What cybersecurity teams do.
  2. – What deepfakes can break online.
  3. – Helps detect or block fake content.
  4. – Something that looks real but isn’t.
  5. – A short video that can be altered.
Down
  1. – What happens when AI misidentifies something.
  2. – A warning about possible threats.
  3. – What cybersecurity helps us stay.
  4. – A harmful cyber action.
  5. – Used by AI to learn patterns.
  6. – The technology behind deepfakes.
  7. – Deepfakes can also be made from this.

12 Clues: – A harmful cyber action.– What cybersecurity teams do.– Used by AI to learn patterns.– What deepfakes can break online.– The technology behind deepfakes.– A warning about possible threats.– What cybersecurity helps us stay.– A short video that can be altered.– Helps detect or block fake content.– Something that looks real but isn’t....

Private Security Chapter 1-3 Terminology 2019-09-27

Private Security Chapter 1-3 Terminology crossword puzzle
Across
  1. the aim of punishment is to prevent or deter persons from engaging in future crime
  2. when security organizations work to prevent crime
  3. official data on crime that are reported to law enforcement agencies across the United States
  4. a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
  5. when security officers respond for security purposes after a crime has been attempted or committed
  6. the eight major crimes included in Part 1 of the Uniform Crime Report
Down
  1. any action taken to reduce crime risks and build individual and community safety
  2. the first regular police force in London
  3. when security organizations police the community all work together to solve crime
  4. who formed Chicago's first private detective agency in 1850
  5. Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
  6. Scanning Analysis Response Assess
  7. a call to citizens to assist in an emergency situation

13 Clues: Scanning Analysis Response Assessthe first regular police force in Londonwhen security organizations work to prevent crimea call to citizens to assist in an emergency situationwho formed Chicago's first private detective agency in 1850the eight major crimes included in Part 1 of the Uniform Crime Report...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Information Security crossword 2021-07-06

Information Security crossword crossword puzzle
Across
  1. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  2. ISO 27001 is the international standard for _____________
  3. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  4. Guarantee of reliable access to the information by authorized people
  5. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  6. An asset that is essential to an organization and must be suitably protected
  7. Prevents the unauthorized use or disclosure of information
  8. You should never share this with anyone
  9. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
Down
  1. You should report Phishing emails in the ___________ console
  2. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  3. Protecting the accuracy and completeness of information and processing methods
  4. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  5. Encodes the data in such a way that it is unintelligible without a key
  6. A software program that is designed to prevent malware
  7. Where to report a security incident? - __________@tavant.com
  8. Effect of uncertainty on objectives
  9. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details

18 Clues: Effect of uncertainty on objectivesYou should never share this with anyoneA software program that is designed to prevent malwareISO 27001 is the international standard for _____________Prevents the unauthorized use or disclosure of informationYou should report Phishing emails in the ___________ console...

AI Security Awareness 2025-04-25

AI Security Awareness crossword puzzle
Across
  1. A type of machine learning where the model finds patterns and relationships in unstructured data without labeled responses.
  2. Data that requires protection due to its confidential nature.
  3. A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
  4. The simulation of human intelligence processes by machines, especially computer systems.
  5. Most AI chatbots are this type of LLM. Stands for generative pre-trained transformer.
  6. A type of neural network architecture used for natural language processing tasks.
  7. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
  1. A type of machine learning where the model is trained on labeled or structured data.
  2. A type of AI that enables computers to learn from data and improve their performance over time without being explicitly programmed.
  3. The ability of AI to interact and converse with humans in a natural way through human language.
  4. Refers to AI models that can create new content, such as text, images, or music.
  5. AI-generated media that mimics real people, often used to create misleading or false content.
  6. A method of trying to gather personal information using deceptive e-mails and websites.
  7. The right of individuals to keep their personal information secure and free from unauthorized access.
  8. Systematic error introduced into data or algorithms that can lead to unfair outcomes.
  9. An AI program designed to simulate conversation with human users.
  10. Large Language Model; an AI model trained on vast amounts of text data to understand and generate human language.

17 Clues: Data that requires protection due to its confidential nature.An AI program designed to simulate conversation with human users.Refers to AI models that can create new content, such as text, images, or music.A type of neural network architecture used for natural language processing tasks....

Digital security fundamentals 2022-12-17

Digital security fundamentals crossword puzzle
Across
  1. The strongest password is: Crrrrrrrr@!!!, Gi0rg10, Mino012106, It@l1@, C@neSalutoFrutta
  2. Attack attempting to discover a password by systematically trying every possible combination
  3. 2 factors is a kind of strong …….
  4. Program used to detect unsolicited, unwanted and virus-infected emails is a …… filter
  5. When criminals use scam email they are trying to …. you
  6. A piece of code capable of copying itself
  7. Using this tool you can find out who an IP address belongs to
  8. Using a social handle or username of a person or business in your post or photo
Down
  1. Hostile online interaction that involves insulting messages between users
  2. Your computer will have many popups….
  3. Bronze medal again in 2022 as a password: an evergreen!
  4. Searching for and publishing private or identifying information about a particular individual on the internet
  5. Do not open if you don’t trust the sender
  6. A person who takes or use your computer information
  7. When criminals use scam sms they are trying to …. you
  8. A sequence of words or other text used to control access to a computer
  9. Fraudulent calls or voicemails

17 Clues: Fraudulent calls or voicemails2 factors is a kind of strong …….Your computer will have many popups….Do not open if you don’t trust the senderA piece of code capable of copying itselfA person who takes or use your computer informationWhen criminals use scam sms they are trying to …. youBronze medal again in 2022 as a password: an evergreen!...

Safety/Security Meeting 2025-09-24

Safety/Security Meeting crossword puzzle
Across
  1. Vernon & Fortino are the branch
  2. Put away all _____ information before helping a new client
  3. Always file a ______ incident within 72 hours
  4. We report media concerns to media
  5. Try to _______ disruptive behavior
  6. Fire, Gas & Bomb threats warrant immediate
  7. The yellow emergency Binder contains _______ procedures
  8. Who we call in the event of an emergency
  9. If you're approached in the lobby by the robber, get the money from the _____ line
Down
  1. Go to the ____ when the opening signal is not set or set incorrectly
  2. We use this checklist at the end of the day
  3. During a robbery, pay close attention to the person's
  4. Lock your ____ when leaving your computer
  5. Comply with the robber's
  6. Use the alarm keypad if the _____ button isn't available
  7. Know the procedure to allow _____ for unknown vendors
  8. A normal opening of the branch requires ____ employees

17 Clues: Comply with the robber'sVernon & Fortino are the branchWe report media concerns to mediaTry to _______ disruptive behaviorWho we call in the event of an emergencyLock your ____ when leaving your computerFire, Gas & Bomb threats warrant immediateWe use this checklist at the end of the dayAlways file a ______ incident within 72 hours...

Puzzle on Security 2020-06-02

Puzzle on Security crossword puzzle
Across
  1. When an information is protected from disclosure or exposure to unauthorized individuals or systems
  2. When an information is whole, complete, and uncorrupted
  3. Defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
  4. Software programs that hide their true nature and reveal their designed behavior only when activated
  5. These software components or programs are designed to damage, destroy, or deny service to the target
  6. the act of sending an e-mail message with a modified field
  7. The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol suite
  8. When an information is free from mistakes or errors and it has the value that the end user expect
Down
  1. A weaknesses or fault in a system or protection mechanism that opens it to attack or damage
  2. Computer Security centered on a system
  3. A computer consists of segments of code that perform malicious actions
  4. A well-known and broad category of electronic and human activities that can breach the confidentiality of information
  5. A malicious program that replicates itself constantly, without requiring another program environment
  6. This German code machine _______ were first broken by the Poles in the year 1930
  7. A category of objects, persons, or other entities that presents a danger to an asset
  8. The probability that something unwanted will happen
  9. An intentional or unintentional act that can cause damage to information and/or the systems that support it

17 Clues: Computer Security centered on a systemThe probability that something unwanted will happenWhen an information is whole, complete, and uncorruptedthe act of sending an e-mail message with a modified fieldA computer consists of segments of code that perform malicious actions...

Information Security crossword 2021-07-06

Information Security crossword crossword puzzle
Across
  1. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  2. An asset that is essential to an organization and must be suitably protected
  3. You should report Phishing emails in the ___________ console
  4. Guarantee of reliable access to the information by authorized people
  5. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system
  6. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
  7. Prevents the unauthorized use or disclosure of information
  8. Effect of uncertainty on objectives
  9. 4 phases of Business Continuity are: Planning, Testing, ____________, and Restoration
  10. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
Down
  1. You should never share this with anyone
  2. A software program that is designed to prevent malware
  3. Where to report a security incident? - __________@tavant.com
  4. Protecting the accuracy and completeness of information and processing methods
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. ISO 27001 is the international standard for _____________
  7. Encodes the data in such a way that it is unintelligible without a key
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______

18 Clues: Effect of uncertainty on objectivesYou should never share this with anyoneA software program that is designed to prevent malwareISO 27001 is the international standard for _____________Prevents the unauthorized use or disclosure of informationWhere to report a security incident? - __________@tavant.com...

Network Security Terminology 2026-01-06

Network Security Terminology crossword puzzle
Across
  1. خوادم أو أنظمة وهمية (خداعية) يتم إعدادها لجمع المعلومات عن التهديدات البشرية.
  2. تقليل المخاطر إلى مستوى مقبول عبر وسائل فنية أو إدارية
  3. الخط الأول للدفاع
  4. ضعف يمكن أن يُستغل من قبل جهة تهديد
  5. استخدام ضوابط متعددة ومتكررة (متراكبة)
  6. تصرف فعلي يستغل نقطة ضعف لتنفيذ ضرر
  7. طريقة تحقق تتطلب وسيلتين أو أكثر لإثبات الهوية.
  8. التأكد من أن البيانات والخدمات متاحة عند الحاجة
  9. عملية تحويل البيانات إلى صيغة غير مقروءة لحمايتها
  10. قياس احتمال وتأثير وقوع حدث تهديدي.
Down
  1. كل شيء له قيمة معلوماتية للمؤسسة
  2. سياسات، برامج، تقنيات أمنية
  3. استخدام الخداع لإقناع الناس بالإفصاح عن معلومات حساسة
  4. سبب محتمل لحادث غير مرغوب فيه
  5. الخاصية التي تضمن أن البيانات لم يتم تعديلها أو التلاعب بها
  6. مبدأ يضمن حصر الوصول إلى المعلومات على الأطراف المصرح لها
  7. وثيقة توجيهية عامة تُحدد كيفية التعامل مع الأصول والتهديدات

17 Clues: الخط الأول للدفاعسياسات، برامج، تقنيات أمنيةسبب محتمل لحادث غير مرغوب فيهكل شيء له قيمة معلوماتية للمؤسسةضعف يمكن أن يُستغل من قبل جهة تهديدتصرف فعلي يستغل نقطة ضعف لتنفيذ ضررقياس احتمال وتأثير وقوع حدث تهديدي.استخدام ضوابط متعددة ومتكررة (متراكبة)طريقة تحقق تتطلب وسيلتين أو أكثر لإثبات الهوية.التأكد من أن البيانات والخدمات متاحة عند الحاجة...

Chapter 2 Vocabulary 2022-11-21

Chapter 2 Vocabulary crossword puzzle
Across
  1. A type of ETF transaction; money is deposited directly into the customer's checking account.
  2. someone who assists you with purchasing stocks and bonds
  3. Any organization that provides services related to money
  4. A security that pays interest over terms of ten or thirty years.
  5. owners are personally liable for their company’s losses
  6. A security that matures in a year or loss.
Down
  1. A financial institution that does not accept deposits
  2. Action taken to manage supply of money and interest rate.
  3. A financial institution that accepts money from customers and deposits it into the customer's account.
  4. A document guaranteeing payment of a specific amount.
  5. A security that pays interest over terms ranging from two to ten years.
  6. A financial investment issued by a corporation, government, or other organization.

12 Clues: A security that matures in a year or loss.A financial institution that does not accept depositsA document guaranteeing payment of a specific amount.owners are personally liable for their company’s lossessomeone who assists you with purchasing stocks and bondsAny organization that provides services related to money...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

cybersecurity 2022-05-24

cybersecurity crossword puzzle
Across
  1. A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
  2. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  3. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  5. Designed to detect and destroy computer virus
  6. An individual who gains unauthorized access to a computer system/network for social or political purposes.
  7. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  8. internet Is the global system of interconnected computer networks that use the Internet protocol suite
  9. A network point that acts as an entrance to another network
  10. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  11. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  12. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  13. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
  1. Gaining access into a computer system/network illegally.
  2. an automated program that runs over the Internet
  3. Self-replicating virus that does not alter files but resides in active memory and duplicates itself
  4. Data confidentiality is a measure of the ability of a system to protect its data
  5. A person who uses computers to gain unauthorized access to data
  6. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  7. Software that is intended to damage or disable computers and computer systems
  8. Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
  9. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  10. A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
  11. management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
  12. Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
  13. Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.

26 Clues: Designed to detect and destroy computer virusan automated program that runs over the InternetGaining access into a computer system/network illegally.A network point that acts as an entrance to another networkA person who uses computers to gain unauthorized access to dataSoftware that is intended to damage or disable computers and computer systems...

Cybersecurity Terms 2023-03-17

Cybersecurity Terms crossword puzzle
Across
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. is a method of connecting a series of computers and devices in a private encrypted network
  9. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. is used to protect your information from hackers.
  5. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. A form of malware used by hackers to spy on you and your computer activities
  7. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. Any technology, be it software or hardware, used to keep intruders out.
  9. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

20 Clues: is used to protect your information from hackers.Any technology, be it software or hardware, used to keep intruders out.A form of malware used by hackers to spy on you and your computer activitiesis a method of connecting a series of computers and devices in a private encrypted network...

Orientation 2023-01-06

Orientation crossword puzzle
Across
  1. email
  2. compliance training
  3. customer data
  4. peer to peer ackowledgment
  5. bnh intranet page
Down
  1. information security training
  2. expenses
  3. volunteer and charitable giving
  4. employee assistance program
  5. bank security
  6. Clock in/Clock out

11 Clues: emailexpensescustomer databank securitybnh intranet pageClock in/Clock outcompliance trainingpeer to peer ackowledgmentemployee assistance programinformation security trainingvolunteer and charitable giving

Health class 2022-10-24

Health class crossword puzzle
Across
  1. hands and feet/touch
  2. helps 3
  3. a person who supports 1
  4. bystander a person who see someone bullying but does nothing
  5. a person who is the target of 1
Down
  1. internet/tech
  2. to choose to something
  3. words
  4. a person who targets someone for a long time
  5. feeling down for a long time

10 Clues: wordshelps 3internet/techhands and feet/touchto choose to somethinga person who supports 1feeling down for a long timea person who is the target of 1a person who targets someone for a long timebystander a person who see someone bullying but does nothing