cyber security Crossword Puzzles
FMA 2024-08-25
Across
- - A prolonged decline in the market
- - Long-term debt security issued by a corporation or government
- - When the market is on a prolonged rise
- - Where stocks are bought and sold
- - A contract that derives its value from an underlying asset
- - The profit made from selling a security above its purchase price
- - An agreement to buy or sell a specific commodity at a future date
- - An institution that facilitates the exchange of securities between buyers and sellers
Down
- - A share of ownership in a company
- - A market for buying and selling currencies
- - The income generated from an investment
- - A market where new securities are issued
- - A bond or share that can be traded
- - The difference between the highest and lowest prices in a trading day
- - The initial offering of a company's stock to the public
- - A percentage of a loan charged as interest
16 Clues: - Where stocks are bought and sold • - A prolonged decline in the market • - A share of ownership in a company • - A bond or share that can be traded • - When the market is on a prolonged rise • - The income generated from an investment • - A market where new securities are issued • - A market for buying and selling currencies • ...
history structure of law enforcement 2025-01-13
Across
- people who provide security services to those who don't have their own for $
- the model in which state police have powers such as local police but statewide
- the authority of an agency based on area subject matter
- the person in charge of early English towns
- the model in which state police focus on traffic accidents
- 12 principles invented by Robert Peel that helped London Police and still used today
Down
- people who provide security to those who employ them
- a system in which citizens were used to guard the city or pursue criminals
- police activity working with the community to prevent crime
- a group of people called by the sheriff or constable to help
- the chief law enforcement officer of an area
- 10 families band together to enforce laws
12 Clues: 10 families band together to enforce laws • the person in charge of early English towns • the chief law enforcement officer of an area • people who provide security to those who employ them • the authority of an agency based on area subject matter • the model in which state police focus on traffic accidents • ...
LSS- News letter 2014-06-09
Across
- Acquired it more?, then burn it.
- Codes for genetic make up
- Got fever? Have a .....
- Thrives in conditions where no other life forms could exist and where nutrients come only from inorganic matter.
- an_ _ _,cat_ _ _
- Exists in Biological and cyber world,mostly harmful.
- A Life begins
- Fundamenta unit of life
- Sounds similar to a casual outfit
Down
- The SI unit of energy
- cross
- Incharge of Involuntary actions,Part of brain.
- Biological classification,Hollywood movie
- causes Cancer
- Nature's camera,Apple has it too.
15 Clues: cross • causes Cancer • A Life begins • an_ _ _,cat_ _ _ • The SI unit of energy • Got fever? Have a ..... • Fundamenta unit of life • Codes for genetic make up • Acquired it more?, then burn it. • Nature's camera,Apple has it too. • Sounds similar to a casual outfit • Biological classification,Hollywood movie • Incharge of Involuntary actions,Part of brain. • ...
Touring Eco System 2024-01-22
Across
- department to hand all video
- artist party
- office set up and break down
- Oversee and guide every aspect of artist career
- oversees the touring entity
- department to hand all lighting
- crew party
- department to hand all special effects
Down
- handles all elements flown overhead
- band party
- handles all travel and logistic bookings for the tour
- techs all instruments on stage
- department to handle sound
- in charge of tour/artist logistics
- Responsible for booking performances
- oversees all security for the tour
- oversees all production to the tour
17 Clues: band party • crew party • artist party • department to handle sound • oversees the touring entity • department to hand all video • office set up and break down • techs all instruments on stage • department to hand all lighting • in charge of tour/artist logistics • oversees all security for the tour • handles all elements flown overhead • oversees all production to the tour • ...
Airport by: Madelyn Horner 2022-10-13
20 Clues: buy • call • train • board • flight • screen • arrive • ticket • airport • luggage • station • reclaim • customs • confirm • passport • suitcase • security • vacation • passenger • to travel
Ir De Vacaciones 2022-10-13
20 Clues: ID • gate • Line • call • agent • board • flight • travel • ticket • screen • luggage • airport • confirm • arrival • suitcase • passport • security • departure • passenger • itinerary
profesions 2019-10-30
20 Clues: ārsts • pilots • medmāsa • apsardze • vetārsts • agronoms • kinologs • taksists • policists • skolotāja • maiznieks • arborists • inženieris • kosmētiķis • analītiķis • mežcirtējs • grāmatvedis • mehatroniķis • ugunsdzēsējs • audiologopēds
crossword 2017-04-21
20 Clues: cry • beam • deep • brave • delay • anger • naval • storm • safety • misery • island • control • ordinary • peaceful • disorder • trembling • a_war_ship • anticipate • threatening • many_islands
Spanish Vocab 1.1 - Kyle McCormick 2018-09-13
20 Clues: trip • seat • sign • pilot • aisle • ticket • window • flight • counter • customs • airline • luggage • arrival • to board • security • passport • suitcase • passenger • departure • identification
NULL 2023-11-07
Sjdb 2025-10-01
20 Clues: gate • ticket • Flight • moniter • ToBoard • arrival • luggage • airport • suitcase • security • passport • departure • passenger • itinerary • ToGetInLine • boardingpass • TravelAgency • ToCallSomeone • ToGoOnVacasion • GoThroughCustoms
BIMBINGAN KONSELING 2023-10-27
Across
- : ORANG YANG MEMBULLY
- STANDER : ORANG YANG MELIHAT KEJADIAN BULLYING
- : BULLYING YANG TERJADI DI MASYARAKAT
- : BULLYING YANG TERJADI DI DUNIA MAYA
- : TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG
Down
- : BULLYING MEMUKUL ORANG LAIN
- : BULLYING DENGAN MENGOLOK NAMA ORANG TUA
- : ORANG YANG DIBULLY
- : MELAPORKAN KE SIAPA BULLYING DI SEKOLAH
9 Clues: : ORANG YANG DIBULLY • : ORANG YANG MEMBULLY • : BULLYING MEMUKUL ORANG LAIN • : BULLYING YANG TERJADI DI MASYARAKAT • : BULLYING YANG TERJADI DI DUNIA MAYA • : BULLYING DENGAN MENGOLOK NAMA ORANG TUA • : MELAPORKAN KE SIAPA BULLYING DI SEKOLAH • STANDER : ORANG YANG MELIHAT KEJADIAN BULLYING • : TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG
Security Awareness crossword puzzle 2018-05-07
Across
- _______ your data regularly and periodically check that you are able to restore them.
- Do not provide your _______ email account to social networks.
- _______ your computer when left unattended.
- This can slow down your computer and watch everywhere you go on the Internet.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Always use _______ factor authentication where available.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Use a _______ password different from the passwords you use to access other sites.
Down
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- You should always keep your software and anti-virus definitions up-to-_______.
- Cybersecurity is _______'s responsibility.
- Information Security is a _______ issue.
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- _______ before you click or forward.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Nina Nunez 2013-03-27
8 Clues: when you copy • personl stuff. • bully- a bully that • aout a particular topic • on line useing the internet. • websitets that contains data • is a person that gose into other • of the internet and thats ileagle.
Safety online 2023-04-20
8 Clues: stay .. online • ........bullying • always be .....online • always be safe on social .... • .... any bad or abusive person • do not share your ..... information • if you are being bullied, tell a ....adult • remember to always have your ....settings on
computing comunications 2025-10-10
8 Clues: a cyber crime. • a network has it • a message is split into... • fastest transmission medium. • a large network of networks. • is a slow transmission medium • a phishing email may contain... • every computer has its own unique one.
Spanish Vacation Vocabulary 2024-07-16
20 Clues: viaje • vuelo • aduana • puerta • boleto • llamar • salida • maleta • llegada • turismo • abordar • equipaje • pantalla • seguridad • pasaporte • vacaciones • itinerario • aeropuerto • pasajero(a) • identificación
Laki ja yhteiskunta 2023-06-06
20 Clues: varas • tuomio • varkaus • tuomari • syyttää • pidättää • todistaa • syyttäjä • armahdus • todistaja • väärennös • taskuvaras • asianajaja • murtovarkaus • valamiehistö • ehdonalainen • turvallisuus • salakuljettaa • oikeudenkäynti • sakkorangaistus
Selfie Horror Story 2022-12-12
20 Clues: spår • anta • störa • konto • kränkt • anonym • direkt • radera • trösta • försök • orolig • nyligen • livlina • lösenord • säkerhet • formulär • ladda upp • allvarligt • förbryllad • omedelbart
Jonathan M crssword 2023-09-07
20 Clues: email • access • repair • router • securing • password • alerting • userleaked • protection • encryption • copieddata • databreach • techsupport • data breach • investigating • typeofmalware • systemlocation • strongpassword • infectswithmalware • virtualprivatenetwork
UN 2023-05-04
internet.01 2019-05-10
7 Clues: verbreitete Lügen • gemeine Kommentare • Belästigung im Internet • auch Abhängigkeit genannt • eine Art daten zu sichern • eine Art beweise zu sichern • man kann süchtig danach sein
Investing Cassie Marquis 2025-03-25
Across
- The increase in value of an asset (2 words)
- A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
- When a private company offers shares to the public in a new stock issuance
- A collection of stocks, bonds or other assets that trades on a stock exchange
- Age you must be to invest
- The availability of cash or the ease in which an asset can be converted into cash
- A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
- The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
- Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
- Age that you can delay collecting social security security benefits to get more benefits
- Digital money generated by computers. It’s value comes from its limited supply
- A system of recording information in a way that makes it difficult to change, hack or cheat the system
- A plan managed by your employer that you, the state (sometimes) and your employer put money into.
- A type of bond issued by the government (2 words)
Down
- How much you’re paying for each dollar of the company’s earnings (2 words)
- Federal payroll tax deducted from each paycheck to pay for social security and medicare
- Currencies backed by the government that aren’t tied to a commodity (2 words)
- Companies that have shares typically less than 5 dollars (2 words)
- A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
- The total value of a company’s stock (2 words)
- CEO of Berkshire Hathaway (2 words)
- 3-4 letters that represent a publicly traded company (2 words)
- Age where you can collect full social security benefits
- A type of bond issued by a company
- A security that represents ownership of a portion of a company
25 Clues: Age you must be to invest • A type of bond issued by a company • CEO of Berkshire Hathaway (2 words) • The increase in value of an asset (2 words) • The total value of a company’s stock (2 words) • A type of bond issued by the government (2 words) • Age where you can collect full social security benefits • 3-4 letters that represent a publicly traded company (2 words) • ...
Investing - Dylan Abellera 2025-03-24
Across
- A unique series of letters or a combination of letters and numbers.
- Nationally or Internationally recognized, Financially Sound Company.
- An individual who buys and sells with the intention of profiting from short-term price fluctuations.
- A portion of a company’s earnings distributed to shareholders as a return on their investment, usually in cash.
- The profit realized from the sale of a capital asset like stocks or real estate.
- Taxes that fund Social Security and Medicare.
- A regular guaranteed payment to a person when they retire.
- Investing all the money you have available at that given time, and putting it into the market.
- CEO of Berkshire Hathaway. One of the greatest investors of all time.
- A collection of stocks, bonds, or other assets that trades on a stock exchange.
- The ease with which an asset or security can be converted into cash.
- A financial marketplace where investors can buy and sell shares of companies.
- A type of mutual fund, or ETF that follows a benchmark index, portion of the market.
- A type of security representing ownership in a company.
- Putting funds into a new investment account after leaving a company.
Down
- A unit of ownership in a company, dividing its ownership into equal parts.
- Pools money from a large group of investors to purchase a portfolio of stocks.
- Can contribute up to seven-thousand dollars in these kinds of retirement accounts each year.
- Spreading investments across different assets to reduce risk exposure.
- A market in which prices are falling and a pessimistic outlook overall.
- An individual who allocates capital into various financial assets with the expectation of generating long-term returns.
- the process of offering shares of a private corporation to the public in a new stock issuance.
- Worked for a certain amount of time with a company, to own all of the matched money from your employer.
- The age you can receive full social security retirement benefits.
- Security Provides retirement, survivor, and disability benefits to millions of Americans.
25 Clues: Taxes that fund Social Security and Medicare. • A type of security representing ownership in a company. • A regular guaranteed payment to a person when they retire. • The age you can receive full social security retirement benefits. • A unique series of letters or a combination of letters and numbers. • ...
New Theme 2023-03-05
Across
- the application of scientific knowledge for practical purposes
- antonym of ineffective
- the exchange of information by speaking or writing or through another medium
- a condition that makes something better
Down
- antonym of advantages
- facts provided about something or someone
- the acquisition of knowledge
- an electronic device for storing and processing data
- relating to the present
- ready to give help
- relating to the culture of computers
- the means to enter a place
12 Clues: ready to give help • antonym of advantages • antonym of ineffective • relating to the present • the means to enter a place • the acquisition of knowledge • relating to the culture of computers • a condition that makes something better • facts provided about something or someone • an electronic device for storing and processing data • ...
Digital Citizenship 2024-05-07
9 Clues: ____ citizen • the K in THINK • ____before you type • ___ your time on and offline • ____ yourself and others online • type of bullying that happens online • always get this before posting online • if you see bullying online, you should ____ it • the digital ____ includes texts,social media, and video games
Billionaires 2025-01-10
9 Clues: Lip Kit queen • The Gulf of America • Other word for fence • Cyber truck inventor • In her billionaire era • NBAs shark in the tank" • Prime members get "it" quick • "Hes wired in" "My Prada's at the cleaners" • "Beyonce had one of the best videos of all time"
AVSEC QC Crossword #2 2025-04-09
Across
- The auditor should display __________ while conducting an interview
- _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
- Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
- The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________
- Any enforcement action taken by a State would require ________ Authority
- For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
Down
- the _____________ Authority determines the categories of compliance to be used during inspections
- The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
- Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
- __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
- Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
- Benchmark, _________ and auditor are the three components of the inspection concept
- The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting
13 Clues: The auditor should display __________ while conducting an interview • Any enforcement action taken by a State would require ________ Authority • Benchmark, _________ and auditor are the three components of the inspection concept • the _____________ Authority determines the categories of compliance to be used during inspections • ...
Industrial Security Trivia 2024-04-24
Across
- Access to classified information requires Eligibility, Access and ________________
- who must have a Scale-related purpose for entering workspaces
- what must be displayed at all times while inside Scale workspaces
- what does CUI stand for
Down
- who must you inform regarding a potential or actual security incident
- a person with authorized access to any organization or government resource who uses their access wittingly or unwittingly to do harm
- Never take __________ and save sensitive task imagery on your computers
- _______ is everyone's responsibility
- _______ emails must be forwarded/reported to security@scale.com
- Unauthorized disclosure of this information would cause SERIOUS DAMAGE to national security
10 Clues: what does CUI stand for • _______ is everyone's responsibility • who must have a Scale-related purpose for entering workspaces • _______ emails must be forwarded/reported to security@scale.com • what must be displayed at all times while inside Scale workspaces • who must you inform regarding a potential or actual security incident • ...
safer internet day 2023-02-06
Digital citizenship 2021-06-03
9 Clues: behaving • being safe • being on a device • someone witnessing a conflict • pretending to be someone you're not • being mean to someone repeatedly online • everything you do online is you're ..... • a place you can go if being cyber bullied • treat people the way you want to be treated
Cyber - safety Thomas 2016-06-06
Across
- - don't tell anyone your p.......
- - don't spend too much .... online (hint hours, and minutes)
- - to take care of your personal information
- - something mean people do to you online
- - bad language that you shouldn't use on the internet
- - types of bad emails that you get, that ask you to forward them on
- - don't play too many of these online
Down
- - types of sites that we are allowed to visit
- - sites on the Internet you visit
- - if you .... something is wrong, then tell mum or dad
- - to dob on someone to mum or dad if you think something isn't right
- - always ask your parents when it asks to spend money and ... Something
- - only talk to these people online, they are your .......
- - you go ...... To connect to the internet
14 Clues: - don't tell anyone your p....... • - sites on the Internet you visit • - don't play too many of these online • - something mean people do to you online • - to take care of your personal information • - you go ...... To connect to the internet • - types of sites that we are allowed to visit • - bad language that you shouldn't use on the internet • ...
Cyber-bullying vocabulary 2019-07-23
Across
- Publishing or making available personally-identifying information about another.
- The practice of forcing someone to do something, particularly to perform sexual acts, by threatening to publish naked pictures of them or sexual information about them
- When a person anonymously sends himself/herself instructions to self-harm or self-injure.
- Posting or publishing embarrassing or damaging photos or videos.
- A collection of behavioral suggestions and/or rules to make online interaction more pleasant for everyone
- Gossiping or spreading rumors about a person.
- Revealing private or embarrassing information about a person.
Down
- When a person sends electronic messages with angry and vulgar language.
- Or 'imping'. It means pretending to be someone else.
- Monitoring a person's activities or placing a person under surveillance to instill fear. Adult contact and attempt to meet with young people for sexual purposes.
- Repeatedly sending offensive messages to cause a person to fear for their safety.
- When somebody logs into your social networking account and impersonates you by posting inappropriate content in your name.
- Engaging in activities intentionally to exclude someone from a formal or informal group.
- Persuading a person to reveal secret or embarrassing information they would not otherwise reveal. The cyberbully then shares it publicly online.
14 Clues: Gossiping or spreading rumors about a person. • Or 'imping'. It means pretending to be someone else. • Revealing private or embarrassing information about a person. • Posting or publishing embarrassing or damaging photos or videos. • When a person sends electronic messages with angry and vulgar language. • ...
Cyber Week 2025 2025-12-03
Across
- A covering used for warmth on a bed
- Get your photos printed on this
- A day for online shopping
- A fried pastry filled with ingredients like egg and tuna
- A celebratory public march
- Falls in flakes and is white
- Customer Love Team
- Our favorite place to work
Down
- What you do when a customer wants a promo honored
- The fourth product under Photo Gifts on ECP
- Busiest day of the year for retail
- What Texas is known for, a popular NFL team
- The colors of the flag is black, green, and gold
- Originally the 10th month, this is now the modern 12th month
14 Clues: Customer Love Team • A day for online shopping • A celebratory public march • Our favorite place to work • Falls in flakes and is white • Get your photos printed on this • Busiest day of the year for retail • A covering used for warmth on a bed • The fourth product under Photo Gifts on ECP • What Texas is known for, a popular NFL team • ...
BIMBINGAN KONSELING 2023-03-08
Across
- Nama lain dari empati
- Gangguan kesehatan mental akibat tindakan bullying
- Gangguan kesehatan fisik akibat tindakan bullying
- Korban jebakan pemikiran orang yang berbeda
- Penindasan berupa julukan nama, celaan atau fitnah
- Penindasan dengan menggunakan kekerasan seperti memukul
Down
- Pelaku bullying
- Nama lain dari tindakan bullying
- Salah satu faktor penyebab terjadinya bullying
- Kemampuan memahami secara emosional perasaan orang lain
- Penindasan lewat jagat maya
- Reaksi fisik dalam menanggapi apa yang dialami orang lain
- Korban tindakan pembullian
13 Clues: Pelaku bullying • Nama lain dari empati • Korban tindakan pembullian • Penindasan lewat jagat maya • Nama lain dari tindakan bullying • Korban jebakan pemikiran orang yang berbeda • Salah satu faktor penyebab terjadinya bullying • Gangguan kesehatan fisik akibat tindakan bullying • Gangguan kesehatan mental akibat tindakan bullying • ...
IT Application and Emerging Technologies - crossword Puzzel 2025-09-15
Across
- Virtual environment for immersive experience
- A decentralized digital currency
- Machines simulating human intelligence
- Computers designed to mimic the human brain
- Smart devices connected via the internet (3)
- Technology enabling virtual meetings
- Protects against cyber threats
- Collection and analysis of huge data sets
- Ability of machines to learn from data
Down
- Tracking technology used in logistics and shopping
- Replacing paper-based systems with computers (11)
- Sharing resources over the internet
- 3D _________, used in manufacturing
13 Clues: Protects against cyber threats • A decentralized digital currency • Sharing resources over the internet • 3D _________, used in manufacturing • Technology enabling virtual meetings • Machines simulating human intelligence • Ability of machines to learn from data • Collection and analysis of huge data sets • Computers designed to mimic the human brain • ...
EATSS Crossword 2023-06-29
Across
- To request an ______ press F4 on the keyboard while on the TPQY screen.
- ______ of all accounts must be on file prior to completing a determination.
- Records that include all zeros on the screen.
- Supplemental Security Income (SSI) page.
- Used when making determination for coverage.
- 4 levels of an SSA ______.
- SSA Disability shows SSA payment status of "_____ payment".
Down
- Screen divided into SSA information and SSI information.
- A rep ______ is person/organization appointed to receive SS or SSI benefits for individuals.
- Error message: "Do not have _____ to access SSN."
- Screen listing information specific to SSA Benefits.
- Abbreviation for Electronic Access To Social Security.
- F12 is used to ______ the system.
- ______ began date. Date Social Security determined the consumer's _____ began.
14 Clues: 4 levels of an SSA ______. • F12 is used to ______ the system. • Supplemental Security Income (SSI) page. • Used when making determination for coverage. • Records that include all zeros on the screen. • Error message: "Do not have _____ to access SSN." • Screen listing information specific to SSA Benefits. • Abbreviation for Electronic Access To Social Security. • ...
Panther Cross Word 2022-04-29
Across
- The largest End Point Detection vendor on the market
- The fastest growing area to store company data
- A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
- The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
- The acronym used to describe a fully outsourced solution for threat detection
- A 3rd party vendor who acts as a middleman to distribute software
- Refers to data exiting a network
- Refers to data entering into a network
- A receipt of any action performed within a system
- A compliance-driven evaluation that reveals where you're susceptible to an attack
- The acronym used to describe a solution type that detections user behavior for anything malicious
Down
- This compliance is imposed on companies that do business in within the EMEA
- The most utilized cybersecurity framework in the world
- A phrase coined by Panther to describe one of our biggest differentiators
- This compliance is imposed on companies that collect health care data
- The practice of protecting systems, networks, and programs from cyber attacks
- The largest SIEM vendor in the world
- This compliance is imposed on companies that collect credit card data
- A solution that aggregates logs
- Acronym that describes Endpoint detection combined with Threat Detection
- This compliance is imposed on companies that collect other companies information
- Refers to different events being interconnected that paint a conclusion
- A 3rd party vendor who you can outsource your cybersecurity to
- This is typically the gatekeeper for your network and the first line of cyber defense
24 Clues: A solution that aggregates logs • Refers to data exiting a network • The largest SIEM vendor in the world • Refers to data entering into a network • The fastest growing area to store company data • A receipt of any action performed within a system • The largest End Point Detection vendor on the market • The most utilized cybersecurity framework in the world • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
Down
- peraturan yang melindungi data pribadi (16 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- pencurian hak cipta (11 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- pencurian hak cipta (11 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
Down
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
mass media 2022-10-26
20 Clues: СЕТЬ • СТЫД • КАНАЛ • ВМЕСТО • ГРУБЫЙ • НОВОСТИ • ПОРТИТЬ • УНИЖЕНИЕ • ОБЩАТЬСЯ • УГРОЖАТЬ • ГРАЖДАНИН • СОЗДАВАТЬ • СООБЩЕНИЕ • ИНФОРМАЦИЯ • ОБСУЖДЕНИЕ • АКТУАЛЬНЫЙ • ОБМЕНИВАТЬСЯ • БЕЗОПАСНОСТЬ • РЕКЛАМИРОВАТЬ • ПЕРЕДАЧА, ТРАНСЛЯЦИЯ
Ir De Vacaciones 2022-10-13
20 Clues: ID • gate • Line • call • agent • board • flight • travel • ticket • screen • luggage • airport • confirm • arrival • suitcase • passport • security • departure • passenger • itinerary
Selfie Horror Story 2024-11-25
20 Clues: spår • anta • konto • störa • trösta • orolig • anonym • direkt • kränkt • radera • försök • livlina • nyligen • formulär • lösenord • säkerhet • ladda upp • allvarligt • omedelbart • förbryllad
chapter 10 2020-09-05
Across
- The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank.2w
- A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments.2w
- The Fed’s activities in buying and selling government securities.3w
- The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece.3w
- A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
- A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults.2w
- Two interest rates controlled by the Fed that have an effect on market interest rates.
- The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders.2w
- The national finance market, where mortgages are bought and sold as investments.2w
- A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause.2w
- The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien.3w
Down
- A provision giving the borrower the right to regain title to the security property when the debt is repaid.2w
- A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults.3w
- A written promise to repay a debt.2w
- The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”.3w
- When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.
16 Clues: A written promise to repay a debt.2w • The Fed’s activities in buying and selling government securities.3w • The national finance market, where mortgages are bought and sold as investments.2w • Two interest rates controlled by the Fed that have an effect on market interest rates. • ...
Elle Severt- Types of bullying 2022-05-17
Across
- Cyber bullying can be someone texting or posting something __ photos of people.
- Jake threatened to beat up Marc after school, what is this?
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Social bullying is spreading rumors,__ people from games and groups
Down
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Layla spits on Jenny and laughs at her outfit, what is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
7 Clues: Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • Social bullying is spreading rumors,__ people from games and groups • Verbal bullying contains someone ___ someone to do some kind of harm to them. • Cyber bullying can be someone texting or posting something __ photos of people. • ...
Investing Cassie Marquis 2025-03-25
Across
- The increase in value of an asset (2 words)
- A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
- When a private company offers shares to the public in a new stock issuance
- A collection of stocks, bonds or other assets that trades on a stock exchange
- Age you must be to invest
- The availability of cash or the ease in which an asset can be converted into cash
- A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
- The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
- Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
- Age that you can delay collecting social security security benefits to get more benefits
- Digital money generated by computers. It’s value comes from its limited supply
- A system of recording information in a way that makes it difficult to change, hack or cheat the system
- A plan managed by your employer that you, the state (sometimes) and your employer put money into.
- A type of bond issued by the government (2 words)
Down
- How much you’re paying for each dollar of a company’s earnings (2 words)
- Federal payroll tax deducted from each paycheck to pay for social security and medicare
- Currencies backed by the government that aren’t tied to a commodity (2 words)
- Companies that have shares typically less than 5 dollars (2 words)
- A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
- The total value of a company’s stock (2 words)
- CEO of Berkshire Hathaway (2 words)
- 3-4 letters that represent a publicly traded company
- Age where you can collect full social security benefits
- A type of bond issued by a company
- A security that represents ownership of a portion of a company
25 Clues: Age you must be to invest • A type of bond issued by a company • CEO of Berkshire Hathaway (2 words) • The increase in value of an asset (2 words) • The total value of a company’s stock (2 words) • A type of bond issued by the government (2 words) • 3-4 letters that represent a publicly traded company • Age where you can collect full social security benefits • ...
9 krossvord 2025-02-20
Across
- Ma’lumotlarning nusxasini yaratish
- Ma’lumotlarni saqlovchi markaziy qurilma
- Internet bilan bog‘liq texnologiyalar
Down
- Dastur yoki tizimni yangilash jarayoni
- Klaviatura bosishlarini kuzatuvchi dastur
- Foydalanuvchini aldash orqali ma’lumot olish usuli
- Tizimga zarar yetkazadigan dasturiy tahdid
- Axborot xavfsizligiga tahdid soluvchi omil
8 Clues: Ma’lumotlarning nusxasini yaratish • Internet bilan bog‘liq texnologiyalar • Dastur yoki tizimni yangilash jarayoni • Ma’lumotlarni saqlovchi markaziy qurilma • Klaviatura bosishlarini kuzatuvchi dastur • Tizimga zarar yetkazadigan dasturiy tahdid • Axborot xavfsizligiga tahdid soluvchi omil • Foydalanuvchini aldash orqali ma’lumot olish usuli
Cyber Safety-Archie webb 2016-05-24
Across
- to protect your computer from viruses
- way to check if your computer has a virus
- instruction
- this person about cyber safety
- to connect
- virus
- who breaks into your computer
- machine that allows you to use the Internet
- group of computers that are connected
Down
- search engine
- for device
- you securely connect to a network or program
- Apple tablet
- a hacker tries to steal
- small device
- program you can stall on your device
- thing that protects your device
- you a virus
- large device
19 Clues: virus • for device • to connect • instruction • you a virus • Apple tablet • small device • large device • search engine • a hacker tries to steal • who breaks into your computer • this person about cyber safety • thing that protects your device • program you can stall on your device • to protect your computer from viruses • group of computers that are connected • ...
It's a quiz!!! 2024-04-25
Across
- A client needs to renew their ADAP coverage, who do you connect them to?
- What is the extension for the testing room?
- True or False, clients are welcome to use our phones
- The password for the cyber center
- How long may a client use the cyber center each day?
- Our outgoing mail is kept in the drawer with these small, commonly requested items?
- How many minutes does a client need to wait to for their HIV test results?
- You answered a call, where do you log that call?
- Which day of the week does Senior Drop in happen?
- What we do for every client who enters the building?
Down
- A client has been a victim of a hate crime, which staff do we connect them with?
- Which room do most Senior Services events happen in?
- How do we identify clients here for testing appointments?
- The only department with a paper calendar
- What is the code to the testing bathroom?
- How many snack packs may a client have per day?
- The Crisis Team can be reached at this extension
- Are we currently accepting book donations?
- A client asks if we have bus passes, which department do you contact?
- What is the code to the dumpster?
- A client walks in and you don't know why they are here, what do you do?
- A package has arrived, who do you email?
- The keys are kept in the large drawer with what common office item?
- On the 2nd and 4th day of this month we have a food in the parking lot
- Who is the Manager of Youth Housing Services?
25 Clues: The password for the cyber center • What is the code to the dumpster? • A package has arrived, who do you email? • The only department with a paper calendar • What is the code to the testing bathroom? • Are we currently accepting book donations? • What is the extension for the testing room? • Who is the Manager of Youth Housing Services? • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- pencurian hak cipta (11 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
Computer Vocabularies 2022-11-15
Across
- faster, quieter, and more expensive than HDD
- copy others’ work
- it makes sure that no information will be lost
- a network that interconnects with other computers in a large area
- go into other’s personal data
- rules for the internet
- allows information when you search it
- Drive it contains memory for data storage
Down
- large, slow, and expensive
- intellectual property
- unwanted communication
- parts of a large item
- computer memory
- a security system
- powerhouse of a computer
- a network that interconnects with other computers in a certain area
- surface
- Security protection for networks
- used to connect computers
19 Clues: surface • computer memory • a security system • copy others’ work • intellectual property • parts of a large item • unwanted communication • rules for the internet • powerhouse of a computer • used to connect computers • large, slow, and expensive • go into other’s personal data • Security protection for networks • allows information when you search it • ...
What are Friends For? 2023-10-06
Across
- something that is the same for people or things
- a brave and strong person who saves people
- someone you don't like
- thinking about other people's feelings and being kind
- related to the internet and computers
- feels cozy or nice
- someone you don't know
- something that can hurt you
Down
- things you do often
- apps and websites used to share information
- ask someone to join
- someone who listens will
- being comfortable, healthy and happy
- feeling sad because you're all by myself
- things you don't tell
- being truthful in what you say and do
- to disagree with someone
- people in one place together
18 Clues: feels cozy or nice • things you do often • ask someone to join • things you don't tell • someone you don't like • someone you don't know • someone who listens will • to disagree with someone • something that can hurt you • people in one place together • being comfortable, healthy and happy • being truthful in what you say and do • related to the internet and computers • ...
AI and Cybersecurity 2025-03-02
Across
- A technique that identifies anomalies by learning normal system behavior.
- A strategy that uses decoy systems to mislead potential attackers.
- A method that detects patterns without pre‐labelled data.
- A general term for software designed to damage or exploit systems.
- The process of converting unstructured text into structured threat intelligence.
- An algorithm that groups similar data points without prior labels.
- A process of embedding hidden messages within non-secret data.
- A generative model used in adversarial defense strategies.
- A decentralized ledger technology that records transactions securely.
- A deceptive email tactic aiming to steal sensitive information.
- A vulnerability exploited before any patch becomes available.
- A method used to scramble data so only authorised parties can read it.
- A process that identifies deviations from normal system behavior.
- A simulated attack conducted to assess a system’s security.
- An attack strategy that manipulates inputs to avoid detection.
- A computing paradigm with the potential to break current cryptographic systems.
- A short-lived digital key that grants temporary access to a system.
- The process of integrating security measures early in the development cycle.
- An autoencoder variant adept at detecting long-term attack patterns.
- A security barrier that filters incoming and outgoing network traffic.
- A security model that denies trust by default.
- A learning technique that uses labelled training data.
- Short abbreviation for a cyberattack that persists undetected.
- A technique that examines user actions to detect irregular behavior.
- A systematic method for testing systems to uncover vulnerabilities.
Down
- The standard established for normal system behavior to flag outliers.
- A type of malware that locks files until a ransom is paid.
- A learning approach where systems adapt through trial and error.
- A GAN-based framework that sanitizes adversarial inputs.
- A decoy system designed to lure attackers away from real assets.
- Coordinated automation of multi-step incident response workflows.
- Neural networks that automatically extract complex features from data.
- An approach combining CNN and RNN for enhanced threat detection.
- A neural network variant particularly effective at visual data analysis.
- The process of confirming a user’s or device’s identity.
- A practice that limits user rights to only what is necessary.
- A technique for extracting actionable intelligence from text.
- The practice of quantifying and managing potential security risks.
- A technique that maps adversarial inputs to a learned data manifold.
- The security centre challenged by overwhelming daily alerts.
- A sequence of operations used to process or secure data.
- A model that integrates spatial and temporal data for threat detection.
- A framework that maps tactics and techniques in cyberattacks.
- A tool that suggests security-focused improvements during code writing.
- The process of cleansing inputs by projecting them onto benign data.
- A software solution that detects and removes malicious programs.
- A network model that captures sequential dependencies in data.
- A device that directs data between networks while managing traffic.
- Abbreviation for analytics that monitor user behavior for anomalies.
- A system designed to monitor network traffic for suspicious activities.
50 Clues: A security model that denies trust by default. • A learning technique that uses labelled training data. • A GAN-based framework that sanitizes adversarial inputs. • The process of confirming a user’s or device’s identity. • A sequence of operations used to process or secure data. • A method that detects patterns without pre‐labelled data. • ...
Disaster Preparedness 2022-02-07
Across
- Security Device Review
- Where AED is Located
- What to do in Even of Power Outage
- What to do in Event of Live Shooter
- Secondary Evacuation Point
- Give to Members During Internet Outage
- Call Question for All Clear
- Head of Security
Down
- Who to Inform When There's a Threat
- Shelter in Place
- How to Prevent Spread of Disease/Chemicals
- Report Unethical Behavior
- Used for Heart Attacks
- Form for Suspicious Incidents
- February Distress Signal
- What to Do During Robbery/Hostage
- First Evacuation Point
- What to do During Bomb Threat
18 Clues: Shelter in Place • Head of Security • Where AED is Located • Security Device Review • Used for Heart Attacks • First Evacuation Point • February Distress Signal • Report Unethical Behavior • Secondary Evacuation Point • Call Question for All Clear • Form for Suspicious Incidents • What to do During Bomb Threat • What to Do During Robbery/Hostage • What to do in Even of Power Outage • ...
RU ITEC11 Chapter 5 2023-12-01
Across
- to ask questions, research questions and to know about security measures
- using someone else identity without being authorized and using it for criminal activities
- obtain sensitive information as in text messages
- creating a fake website to get into personal information by creating a fake url into a domain Name servers
- use security tools and monitor networks to avoid attacks
- open access was first implemented to share study materials.
- obtain sensitive information as in e-mail
- is an extremely sophisticated worm
- monitor and block communication from unreliable websites.
- prohibited use of a computer unless authorized
- obtain sensitive information as in voice phishing
- techniques on how to steal personal and financial data
Down
- prioritize security in their advancements
- involves hacking for political purposes
- publishers must prevent access towards other nations when it is prohibited
- The cost of defending an attack is included in the definition of loss under the Act
- traits that are specific to an individual biologically
- using someone else identity without being authorized and using it for criminal activities
- Programming's excitement
- is the expansion of online and mobile technologies
20 Clues: Programming's excitement • is an extremely sophisticated worm • involves hacking for political purposes • prioritize security in their advancements • obtain sensitive information as in e-mail • prohibited use of a computer unless authorized • obtain sensitive information as in text messages • obtain sensitive information as in voice phishing • ...
Fam 2021-07-11
AI Crossword 2023-12-11
20 Clues: uhu • hhih • uhuhu • uhiuh • uihiuh • uhuhui • uhuhuh • iuhuih • iuhuih • uuhuoh • uiiuhui • uhiuhuih • iuhuhuoh • uihiuhui • iohoihoi • huuhuhuh • uihuihuih • uihhiuhui • giuguigiug • huhuhuhuhuhuh
SWQuality 2024-01-17
Biometrics 2025-04-03
Across
- basic rights
- safety measures taken for protection
- to take full advantage of and benefit from
- something so easy that you cant mess it up
Down
- software programs that protect you while online
- following a trend just because everyone else is
- weaknesses in a security system
- to illegally enter into someone's computer
- to avoid or get around
- a gap in security
10 Clues: basic rights • a gap in security • to avoid or get around • weaknesses in a security system • safety measures taken for protection • to illegally enter into someone's computer • to take full advantage of and benefit from • something so easy that you cant mess it up • software programs that protect you while online • following a trend just because everyone else is
Algo trading 2019-09-21
Across
- One of the measures of central tendency
- a profit or loss on an investment
- ability and ease with which assets can be converted into cash
- simultaneous transactions in multiple financial markets to make profit
- a fixed-income security
- a measure of the sensitivity of the value (price) of an option
- a measure of minimum upward or downward movement in the price of a security
Down
- Difference between the value of assets and the cost of liabilities
- an investment strategy designed to offset a potential loss
- Can be American or exotic
- complete set of all possible observations
- a financial instrument
- measure of an investment's performance compared to a certain benchmark
- An instruction by an investor to the broker
14 Clues: a financial instrument • a fixed-income security • Can be American or exotic • a profit or loss on an investment • One of the measures of central tendency • complete set of all possible observations • An instruction by an investor to the broker • an investment strategy designed to offset a potential loss • ability and ease with which assets can be converted into cash • ...
Cybersecurity Awareness month 2025-09-30
Across
- The process of converting information into a code for security
- A saved copy of data for recovery after loss or attack
- A software update that fixes security vulnerabilities
- Manipulating people into revealing confidential information
- Software that secretly monitors your computer activities
Down
- Malicious software that locks files until a payment is made
- A login method requiring two forms of verification
- A scam email or message tricking you into giving personal information
- A network of infected devices controlled remotely
- A program that detects and removes malicious software
- A secret string used to secure accounts
- Malicious software designed to damage or gain access to a system
- A network security system that blocks unauthorized access
- A service that creates a secure tunnel for internet traffic
14 Clues: A secret string used to secure accounts • A network of infected devices controlled remotely • A login method requiring two forms of verification • A program that detects and removes malicious software • A software update that fixes security vulnerabilities • A saved copy of data for recovery after loss or attack • ...
Banking 15.1 JC 2024-05-09
Across
- is a security that pays interest over terms ranging from 2-10 years
- is a security that pays interest over terms of ten to thirty years
- is a type of financial investment issued by a corparation
- is a security that matures in a year or less
- is the process of transferring money from one individual or organization to another
Down
- money is used in exchange for goods and services
- is anything of value that is accepted in return for goods or services
- can be saved and used at a later date
- is the mechanism a nation uses to provide and manage money for itself
- allows customers to pay for purchases directly from their checking account
- is a plastic card that allows the holder to make credit purchases up to an authorized amount
- means that money is a common measure of the worth or price of a good service
- is a transfer of moneyfrom one bank account to another
13 Clues: can be saved and used at a later date • is a security that matures in a year or less • money is used in exchange for goods and services • is a transfer of moneyfrom one bank account to another • is a type of financial investment issued by a corparation • is a security that pays interest over terms of ten to thirty years • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
Down
- penyebaran informasi palsu yang luas (4 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- pencurian hak cipta (11 huruf)
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- pencurian hak cipta (11 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
Down
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- pencurian hak cipta (11 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
Cyber-bullying -Support 2014-11-05
14 Clues: Therapy • Honesty • Defender • Avoidance • Supervise • Avoid doing • Make Improvements • Lend a help in hand • Pay no attention to • Governed by a country • Bring to a standstill • keep track of something • Give a statement of something • Provide assistance to someone to help them feel better
E safety 2019-03-04
7 Clues: Stay safe • Sending rude pictures • Talking weird to people • bullying online bullying • When you send rude pictures • Block people if send rude stuff • Going on your phone with people
Internet Safety, Cyber Security and Encryption: Digital Footprint 2024-01-16
Across
- is when you tricking someone into giving their password.
- is when a hacker uses a program that tries every possible combination to identify your password.
- the email if you are not sure whether the email is genuine.
- is the term use for unauthorize access
Down
- is the common method to login to your account
- greeting is one of the common features of phishing email
- is an example of social media
- is used to navigate user to another page.
- is a term call for a profile picture
- surfing is when someone look over your shoulder as you enter password.
10 Clues: is an example of social media • is a term call for a profile picture • is the term use for unauthorize access • is used to navigate user to another page. • is the common method to login to your account • is when you tricking someone into giving their password. • greeting is one of the common features of phishing email • ...
LA NETIQUETTE 2021-11-11
7 Clues: riservate • o per acquisire • diritto alla riservatezza delle • bullismo bullismo online • codice segreto per accedere ad un • violare un sistema informatico per • news informazioni false sul web
Cybersecurity Terminology Puzzle (participation 3) 2023-01-27
Across
- software that is harmful
- software that checks for malware
- internet access at starbucks
- scrambling data in unreadable
- attacks seeking out personal info
- software that tracks you
- shield for data
- tech savy criminals stealing private information
- improving security tools for cloud infrastructure
- multiple attackers preventing legitimate users
Down
- tricking users to click an image
- altered image creating false reality
- malware that makes you pay
- malware pretending to be useful
- designs, builds, and tests security systems
- malware that displays adverts
- network pro learning hacking techniques
- online harassment that intimidates victims
18 Clues: shield for data • software that is harmful • software that tracks you • malware that makes you pay • internet access at starbucks • scrambling data in unreadable • malware that displays adverts • malware pretending to be useful • tricking users to click an image • software that checks for malware • attacks seeking out personal info • altered image creating false reality • ...
Unit 4 2022-03-02
Across
- A quick fix for a specific software problem.
- A fix that is more thoroughly tested than a hotfix and designed for a wider deployment.
- A collection of patches, hotfixes, and system enhancements that have been tested by the manufacturer for wide deployment.
- a standalone storage device or appliance that acts as a file server.
- this chain is used for packets leaving the system.
- a firewall command line utility for Linux operation systems that uses three policy chains to allow or block network traffic.
- provides no authentication, encryption, or error detection.
Down
- this chain controls the behavior for incoming connections.
- an operating system that comes hardened and validated to a specific security level as defined in the Common Criteria for Information Technology Security Evaluation (CC).
- The process of securing devices and software by reducing the security exposure and tightening security controls.
- can provide information about which operating system a computer uses.
- A component of a manageable network plan that indicates an action or event.
- A special network composed of high-speed storage that is shared by multiple servers.
- this chain is used for outgoing connections.
14 Clues: A quick fix for a specific software problem. • this chain is used for outgoing connections. • this chain is used for packets leaving the system. • this chain controls the behavior for incoming connections. • provides no authentication, encryption, or error detection. • a standalone storage device or appliance that acts as a file server. • ...
IC3 Lesson 30 Vocab 2015-05-18
Across
- a security system.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that
- security feature used for larger networks that controls computers from one point.
- A program that hackers use to capture IDs and passwords on a network.
- A malicious program that records keystrokes.
- Using a script or program to log on to an account using hundreds of words or
- Encrypts the information in an SSL Certificate.
- privacy and security requirements.
Down
- information.
- number, and one special character.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that
- Deciphers the information in an SSL Certificate.
- Chronic physical malady that can result when a person makes too many of the
- Hackers using spyware to control your browser.
- Complex and secure, containing at least eight characters and at least one letter,
- information about the user, the user's browsing habits, and other
- motions over a long period of time.
- privacy and security requirements.
- Invading someone else's computer, usually for personal gain or the satisfaction of
- Software installed surreptitiously on a personal computer with the goal of
- stored in a dictionary file.
21 Clues: information. • a security system. • stored in a dictionary file. • number, and one special character. • privacy and security requirements. • privacy and security requirements. • motions over a long period of time. • A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • ...
Security Awareness crossword puzzle 2018-05-07
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- _______ your data regularly and periodically check that you are able to restore them.
- _______ before you click or forward.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- Cybersecurity is _______'s responsibility.
- Always use _______ factor authentication where available.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
Down
- You should always keep your software and anti-virus definitions up-to-_______.
- Use a _______ password different from the passwords you use to access other sites.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Information Security is a _______ issue.
- Do not provide your _______ email account to social networks.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Understanding Money 2024-05-09
Across
- A transfer of money from one bank account to another
- Money is a common measure of the worth or price of a good or service
- A security that matures in a year or less
- A security that pays interest over terms of ten to thirty years
- A security that pays interest over terms ranging from two to ten years
- Anything of value that is accepted in return for goods and services
- Money used in exchange for goods and services needed by individuals, businesses, and governments
- A type of a document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payers name
- Money is worth more now, Money received now can be invested or deposited in the bank to earn interest
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- A type of financial investment issued by a corporation, government, or other organization
Down
- The process of transferring money from one individual or organization to another
- It can be saved and used at a later date
- Banks that are part of the Federal Reserve System
- Must be accepted "for all debts, public and private."
- The mechanism a nation uses to provide and manage money for itself
- Allows customers to pay for purchases directly from their checking account
- An action taken to manage the supply of money and interest rates in an economy
18 Clues: It can be saved and used at a later date • A security that matures in a year or less • Banks that are part of the Federal Reserve System • A transfer of money from one bank account to another • Must be accepted "for all debts, public and private." • A security that pays interest over terms of ten to thirty years • ...
1 2023-03-01
Across
- A security measure used to protect IoT devices from malicious software
- SENSOR A device that can measure the concentration of gases or pollutants in the environment
- SENSOR A device that can measure the amount of light in the environment
- A device that can measure the temperature and humidity of the environment
- A device that can control the flow of electricity to other devices
- A security measure used to protect IoT devices from unauthorized access
- SECURITY A security measure used to protect IoT devices from physical tampering
- A technology that allows IoT devices to operate with minimal human intervention
- MONITOR A device that can measure the amount of electricity being used by other devices
- SENSOR A device that can detect the presence of objects or people
- ENERGY BLUETOOTH A typical wireless transmission protocol for low-power Internet of Things devices
Down
- SENSOR A device that can measure the pressure of gases or liquids
- LEVEL SENSOR A device that can measure the level of water in a tank or container
- SWITCH A device that can control the lighting in a room or building
- A device that can control the temperature of a room or building
- SENSOR A device that can detect motion and trigger other devices or actions
- SENSOR A device that can detect the location of other devices or objects]
- NETWORK A technology that uses sensors to collect data about the environment and sends it to a central system for analysis
- MONITOR A device that can monitor the quality of air or water in a specific area
19 Clues: A device that can control the temperature of a room or building • SENSOR A device that can measure the pressure of gases or liquids • SENSOR A device that can detect the presence of objects or people • A device that can control the flow of electricity to other devices • SWITCH A device that can control the lighting in a room or building • ...
Software Development Security 2021-02-03
Across
- A communication to or input of an object
- A life cycle model that allows for multiple iterations of a waterfall-style process
- In this type of networks the chains of computational units are used in an attempt to imitate the biological reasoning process of the human mind.
- Internal code that defines the actions an object performs in response to a message
- A level of interaction between objects.
- A state that allows users to bypass failed security controls, erring on the side of permissiveness.
- A characteristics of a database transactions that follows an “all-or-nothing” affair.
- Describes the strength of the relationship between the purposes of the methods within the same class.
Down
- The formalized processes by which trust is built into the life cycle of a system.
- A phase of IDEAL model, in which engineers analyze the current state of the organization and make general recommendations for change.
- A characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions.
- A preventive security mechanism that endeavors to make certain that the information stored in the database is always correct or at least has its integrity and availability protected.
- The ...-based methods analyze the behavior of software, looking for the telltale signs of virus activity, such as attempts to elevate privilege level, cover their electronic tracks, and alter unrelated or operating system fi les.
- A highly sophisticated worm widely spread in mid-2010 which uses a variety of advanced techniques to spread, including multiple previously undocumented vulnerabilities
- A database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type.
- A tool that converts the higher-level language into an executable file designed for use on a specific operating system
16 Clues: A level of interaction between objects. • A communication to or input of an object • The formalized processes by which trust is built into the life cycle of a system. • Internal code that defines the actions an object performs in response to a message • A life cycle model that allows for multiple iterations of a waterfall-style process • ...
Information Security crossword 2021-07-05
Across
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
- ______ of any organizational security policy can result in disciplinary actions
- ISMS is a set of policies and procedures for managing an organization’s _______ data
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- A formal process for training and educating employees about IT protection
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
- An asset that is essential to an organization and must be suitably protected
- A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
- A set of rules that limits access to information
- Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Guarantee of reliable access to the information by authorized people
- Protecting the accuracy and completeness of information and processing methods
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Effect of Uncertainty on objectives
16 Clues: Effect of Uncertainty on objectives • A set of rules that limits access to information • Guarantee of reliable access to the information by authorized people • A formal process for training and educating employees about IT protection • An asset that is essential to an organization and must be suitably protected • ...
2021 Q4 Security 2021-12-15
Across
- The company that monitors our alarms
- ___ with all demands of the robber
- Number of people that are emailed when we call 911
- Never write down or share _____
- Packet in vault room with specific instructions
- Great ___ is our best robbery deterrent
Down
- Remain _____ during a robbery
- To call 911 dial _-911
- When safe to do so press your ____ buttons
- ____ have more than $5k in your cash drawer
- Use the ____ button when you receive a 'sus'email
- Always leave the building in ____
- ___ parking lot is our Secondary Meeting Spot
- ____, hide, neutralize in an active shooter situation
- In the event of a fire, ____ mbr sensitive info
- Packet under the phone
16 Clues: To call 911 dial _-911 • Packet under the phone • Remain _____ during a robbery • Never write down or share _____ • Always leave the building in ____ • ___ with all demands of the robber • The company that monitors our alarms • Great ___ is our best robbery deterrent • When safe to do so press your ____ buttons • ____ have more than $5k in your cash drawer • ...
Cybersecurity Best Practices 2024-11-08
Across
- A security practice of regularly backing up important data.
- A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
- A security measure that protects against unauthorized access to a network.
- A security practice of regularly updating software and systems.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
- A malicious software.
- A technique used to trick someone into revealing sensitive information.
- A security measure that prevents unauthorized access to data & systems.
- A security measure that hides data to make it unreadable.
9 Clues: A malicious software. • A security measure that hides data to make it unreadable. • A security practice of regularly backing up important data. • A security practice of regularly updating software and systems. • A technique used to trick someone into revealing sensitive information. • A security measure that prevents unauthorized access to data & systems. • ...
test 2019-09-21
Across
- use of section 26
- filled out at site
- section 25 of criminal code
- Section 35 of security and related activities(control) act 1996
- you must wear this
- you need to complete this is you have an incident
- You cannot use this in Western Australia
Down
- if you are posted outside a store
- If you use a car for your duties
- Section 12 of security and related activities(control) act 1996
- you need one of these to work in the security industry
11 Clues: use of section 26 • filled out at site • you must wear this • section 25 of criminal code • If you use a car for your duties • if you are posted outside a store • You cannot use this in Western Australia • you need to complete this is you have an incident • you need one of these to work in the security industry • ...
brainriddle 2025-02-09
Across
- A cyberattack where fake QR codes trick users into visiting malicious sites.
- A cyberattack that tricks users into clicking hidden elements.
- A tool that protects a network by blocking suspicious traffic.
- A method used to avoid security restrictions.
- When private data is exposed to unauthorized people.
- An attack where a hacker takes control of an active user session.
- A weakness in software that hackers can exploit.
Down
- A method of guessing passwords by trying many combinations.
- A small software update that fixes security flaws.
- A cybersecurity event that may cause harm to systems.
- A physical or digital device used for secure authentication.
- Files that store records of activity on a system.
- A username and password used for authentication.
- A type of malware that bombards users with unwanted ads.
- A security method that requires two types of authentication.
15 Clues: A method used to avoid security restrictions. • A username and password used for authentication. • A weakness in software that hackers can exploit. • Files that store records of activity on a system. • A small software update that fixes security flaws. • When private data is exposed to unauthorized people. • A cybersecurity event that may cause harm to systems. • ...
Beware of Cyber Attacks 2025-03-13
Across
- software that secretly monitors users
- malicious software designed to harm
- malicious code attached to programs
- fakes identity to deceive targets
- fraudulent emails to steal information
- network of compromised devices remotely controlled
- gains unauthorized access to systems
- takes advantage of system vulnerabilities
- malware that tricks users into running
- testing system defenses for weaknesses
- secret way to bypass security
- converts data into secret code
Down
- records keystrokes for stealing data
- displays unwanted advertisements to users
- hides malicious software from detection
- network protection from unauthorized access
- self-replicating malware spreading automatically
- malware disguised as legitimate software
- demands payment to restore access
- fixes security vulnerabilities in software
20 Clues: secret way to bypass security • converts data into secret code • fakes identity to deceive targets • demands payment to restore access • malicious software designed to harm • malicious code attached to programs • records keystrokes for stealing data • gains unauthorized access to systems • software that secretly monitors users • fraudulent emails to steal information • ...
CNSSINST 4009 (2005) 2022-11-30
Across
- Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
- A hostile action to spread malicious code via multiple methods.
- A contraction of the term Binary Digit. The smallest unit of information in a binary system of notation
- The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.
- Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
- The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.
- Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy.
- Office of a federal department or agency that keeps records of accountable COMSEC material held by elements subject to its oversight. (COR)
- Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
- What is the PUB CNSSINT 4009 (2015)?
Down
- Notification that a specific attack has been directed at an organization’s information systems.
- The process of the system invalidating a user ID based on the user’s inappropriate actions. A blacklisted user ID cannot be used to log on to the system, even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of internet resources.
- Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
- A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems.
- A category within a given security classification limiting entry or system connectivity to only authorized persons.
- Typically unauthorized hidden software or hardware mechanism used to circumvent security controls.
- The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation),organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
- The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
- The property of being accessible and useable upon demand by an authorized entity
- Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
20 Clues: What is the PUB CNSSINT 4009 (2015)? • A hostile action to spread malicious code via multiple methods. • The property of being accessible and useable upon demand by an authorized entity • Notification that a specific attack has been directed at an organization’s information systems. • ...
Cyber Crossword 2021-04-26
Across
- media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
- Electronic device most students own at home and is square and mostly portable.
- the use of technology to harass, threaten, embarrass, or target another person.
Down
- A result or effect, typically one that is unwelcome or unpleasant.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- A repetitive action toward another human purposely causing harm or intimidation.
- safety, The act of protecting ones self or others from harm or intimidation online.
- An individual who causes harm or stress to another human intentionally and repetitively.
- Having firm belief or reliability in someone.
9 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • A repetitive action toward another human purposely causing harm or intimidation. • ...
cyber bullying 2024-02-06
Across
- /making someone feel embarrassed infront of others
- /communicate online
- / when you are left out of activities on purpose
- / when somebody enters into personal things online
- /constantly being sad
- / when your location gets leaked
Down
- /treating people bad
- / talk bad about you
- / when someone stops talking to you without reason
9 Clues: /communicate online • /treating people bad • / talk bad about you • /constantly being sad • / when your location gets leaked • / when you are left out of activities on purpose • /making someone feel embarrassed infront of others • / when somebody enters into personal things online • / when someone stops talking to you without reason
CYBER BULLYING 2019-11-19
9 Clues: MEAN TO DO • HAS A KEYBORD • HAVE THIS APP • CAN SNAP PITHURES • A MOTHER BOARD OF APPS • KIDS HAS THIS ELETRONIC • TO PUT SOMETHING ON THE INTERNET • A ELECTRONIC THAT TENNAGERS HAVE • DONALD TRUMP HAS A ACCOUNT ON THIS APP
Cyber Quiz17 2024-08-29
Across
- Attack involving the use of malicious software
- Process of verifying identity
- Secure connection protocol
- communicating device in a network is known as
Down
- Software that protects against malware
- Method used to protect/hide information
- A method to confirm the integrity of data
- A network security device
- Threat that involves fraudulent emails
9 Clues: A network security device • Secure connection protocol • Process of verifying identity • Software that protects against malware • Threat that involves fraudulent emails • Method used to protect/hide information • A method to confirm the integrity of data • communicating device in a network is known as • Attack involving the use of malicious software
Cyber wellness 2023-02-01
Across
- We need to respect other people's _______
- We should _______ our teachers and classmates
- We can get __________ from the Internet
- If we post something negative online, it
Down
- Something you do to let someone personal and private details to the public
- _______ other people's feelings
- Our ________ information includes our username and password
- We should use the _______ for the right purposes
- We should not ____ other people's personal information
9 Clues: _______ other people's feelings • We can get __________ from the Internet • If we post something negative online, it • We need to respect other people's _______ • We should _______ our teachers and classmates • We should use the _______ for the right purposes • We should not ____ other people's personal information • ...
Cyber Safety 2023-05-02
Across
- If a stranger tries to find you on social media, you should _______ them.
- To keep my personal information safe, I must not share my _______.
- You should tell an _______ if something happens online that makes you uncomfortable.
- Hiding behind a fake profile to be unkind is called _______.
- Only accept _______ requests from people that you know.
Down
- Bullying online is called _______.
- I must _______ others when communicating online.
- Online _______ can be good fun with friends.
- Do not open unknown emails, as they may contain a _______.
9 Clues: Bullying online is called _______. • Online _______ can be good fun with friends. • I must _______ others when communicating online. • Only accept _______ requests from people that you know. • Do not open unknown emails, as they may contain a _______. • Hiding behind a fake profile to be unkind is called _______. • ...
Cyber monday 2024-11-28
9 Clues: THE COST OF AN ITEM • TO BUY SOMETHING ONLINE • ITEMS AVAILABLE FOR SALE • WHAT YOU BUY FOR SOMEONE ELSE • A COLLECTION OF THINGS TO BUY • WHAT YOU DO TO LOOK FOR ITEMS • WHAT YOU DO WITH MONEY ONLINE • WHERE YOU RECEIVE PROMO CODES • A SHORTENED TERM FOR PROMOTION
cyber threats 2025-04-05
Across
- abusive or threatening speech or writing that expresses prejudice on the basis of ethnicity, religion, sexual orientation, or similar grounds.
- false or misleading information (misinformation, disinformation, propaganda, and hoaxes) claiming the aesthetics and legitimacy of news.
- the distribution of sexually explicit images or videos of individuals without their consent,[1] with the punitive intention to create public humiliation out of revenge against the victim.
- a term that comes from the English words ‘vampire’ and ‘texting’ and refers to the practice, carried out mostly by teenagers, which consists in making excessive use of electronic devices such as cell phones, laptops, tablets, consoles just before going to sleep.
Down
- when group violence or maltreatment is recorded and then published on the Internet.
- sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones.
- severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement.
- the act of playing videogames or betting money on games.
- the action or behavior used to establish an emotional connection with a vulnerable person generally a minor.
9 Clues: the act of playing videogames or betting money on games. • when group violence or maltreatment is recorded and then published on the Internet. • severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement. • ...
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Cyber Ethics 2025-06-02
Across
- Practices this means accessing the internet in an illegal manner
- this refers to the act of using or imitating the language and thoughts of other person at one's original work
- dossier what is digital footprint also known as
- this refers to an illegal intrusion into a computer system or network
- ethics while using the internet, we need to follow certain moral rules which includes honesty, respecting the privacy of others, and property rights. These rules are called
- this refers to criminal activities that involves the use of computer, networks, and the internet connection with the intend to cause harm to individual or their digital devices
Down
- this refer to unwanted bulk emails that come from unknown sources
- it refers to being aware of the ethical practices and behaving Responsibly and appropriately while using the internet
- footprint this is an impression or information about a person that exist on the internet because of his online activity
- they are highly technical people who secretly break into computer to steal important data or sometimes to destroy it
10 Clues: dossier what is digital footprint also known as • Practices this means accessing the internet in an illegal manner • this refer to unwanted bulk emails that come from unknown sources • this refers to an illegal intrusion into a computer system or network • ...
Cyber Ethics 2025-06-12
Across
- is the act of accessing someone’s computer system without permission
- is the unauthorized use of someone’s personal data
- Software that damages or disables a computer system
- is a protection method that filters incoming and outgoing traffic.
Down
- protects the creator’s exclusive rights over their original work
- is any illegal activity intended to harm people using computers or the internet
- refers to sending unwanted or harmful messages to harass someone online
- The act of watching someone’s online activity without their knowledge
- it is a software that protects your computer from viruses
9 Clues: is the unauthorized use of someone’s personal data • Software that damages or disables a computer system • it is a software that protects your computer from viruses • protects the creator’s exclusive rights over their original work • is a protection method that filters incoming and outgoing traffic. • ...
. 2014-05-30
Across
- takes the 3rd place in cybercrime world ranking
- device used for criminal activities
- top target of cyber attacks
- to bypass internet users to fake websites for frauding their idendity
- protects your computer from unauthorised access
- computer operating system
Down
- malware whivh distribute itself
- person who want to damage or steal information
- manipulation
- successful people collect it
10 Clues: manipulation • computer operating system • top target of cyber attacks • successful people collect it • malware whivh distribute itself • device used for criminal activities • person who want to damage or steal information • takes the 3rd place in cybercrime world ranking • protects your computer from unauthorised access • ...
Topic 7 - Development of Computer Industry and Law 2024-05-02
Across
- In Malaysia, a core legislation in governing the communications and multimedia industry is called
- What vendor is ranked first for the semiconductor industry in 2018
- Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
- Computer system resources and services that can be accessed over the cloud
- Cyber law exists to handle cybersecurity and…
- Digital form of value that can be used as a token for transaction electronically
- The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
- Devices of information-age products are called
- Law that cover all internet-related technologies and provide a legal system for controlling it is called
- Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
- Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
- In telecommunication industry, who manufacture and sell telecommunications equipment
- Design/infrastructure of information resource that can be navigated efficiently
- The process of protecting systems, data, and networks from cyber attacks is called
- In telecommunication industry, who operate and provide access to deliver services via internet
- Major segments of telecommunication industry besides equipment vendors and service providers
- The most important legislation that applies to telecoms (including internet)
- What is the leading computer manufacturing company that based in Taiwan
- What institution that serve as the telecommunications regulator in Malaysia
- Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…
20 Clues: Cyber law exists to handle cybersecurity and… • Devices of information-age products are called • What vendor is ranked first for the semiconductor industry in 2018 • What is the leading computer manufacturing company that based in Taiwan • Computer system resources and services that can be accessed over the cloud • ...
TEKA-TEKI SILANG INFORMATIKA 2025-06-03
Across
- pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
- berbuat menyebar informasi yang merugikan orang lain (14 huruf)
- informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
- pencurian hak cipta (11 huruf)
- penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
- serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
- perlindungan hukum terhadap pencemaran nama baik (10 huruf)
- perbuatan melanggar hukum didunia maya (10 huruf)
- Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
- aturan dan normal berperilaku baik di media sosial (11 huruf)
- jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
- tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
- ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
- penyebaran informasi palsu yang luas (4 huruf)
- pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
- praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
- informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
Down
- jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
- program kecil yang dapat merusak sistem komputer (5 huruf)
- informasi yang mengidentifikasi seseorang secara unik (12 huruf)
- tindakan kriminal yang dilakukan melalui internet (17 huruf)
- kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
- perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
- ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
- jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
- undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
- peraturan yang melindungi data pribadi (16 huruf)
- serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
- perilaku tidak atau kasar di dunia maya (10 huruf)
29 Clues: pencurian hak cipta (11 huruf) • penyebaran informasi palsu yang luas (4 huruf) • perbuatan melanggar hukum didunia maya (10 huruf) • peraturan yang melindungi data pribadi (16 huruf) • perilaku tidak atau kasar di dunia maya (10 huruf) • program kecil yang dapat merusak sistem komputer (5 huruf) • perlindungan hukum terhadap pencemaran nama baik (10 huruf) • ...
Elle Severt- Types of bullying 2022-05-17
Across
- Cyber bullying can be someone texting or posting something __ photos of people.
- Jake threatened to beat up Marc after school, what is this?
- Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
- Social bullying is spreading rumors,__ people from games and groups
Down
- Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
- Layla spits on Jenny and laughs at her outfit, what is this?
- Verbal bullying contains someone ___ someone to do some kind of harm to them.
7 Clues: Jake threatened to beat up Marc after school, what is this? • Layla spits on Jenny and laughs at her outfit, what is this? • Social bullying is spreading rumors,__ people from games and groups • Verbal bullying contains someone ___ someone to do some kind of harm to them. • Cyber bullying can be someone texting or posting something __ photos of people. • ...
DP-3 Crossword Puzzle 2024-07-23
Across
- DP-3 policies with minimum 3-day/2-night short-term rental must be managed through a site like ______ or VRBO
- 4-Point ___________are required for DP-3 risks age 20 and over
- These are allowed as long as the load bearing wall is not impacted and the footprint of the dwelling is not changed
Down
- Binding ___________ can be added to provide an average savings of 20%
- This optional endorsement protects against computers, home systems, cyber extortion, and online fraud
- This endorsement offers more robust coverage and a lower rate compared to the NFIP
- Tenant and _____-occupied properties are eligible for DP-3 coverage
7 Clues: 4-Point ___________are required for DP-3 risks age 20 and over • Tenant and _____-occupied properties are eligible for DP-3 coverage • Binding ___________ can be added to provide an average savings of 20% • This endorsement offers more robust coverage and a lower rate compared to the NFIP • ...
