cyber security Crossword Puzzles
Health crossword 2022-10-24
10 Clues: hitting punching • being mean online • of process of decisions • name calling and mean words • being sad for 1 or more weeks • a process of hurting yourself • someone who stands and watches • someone who stands up for victim • someone who constantly hurts someone • being sad for a small portion of time
Bullying dan emosional 2024-01-16
Across
- cara mengendalikan emosi pada diri sendiri...
- apa itu emosional...
- bullying dengan cacian dan umpatan kebencian merupakan bullying berupa
- bagaimana cara mengendalikan emosi...
- apa penyebab terjadinya emosional...
Down
- apa dampak emosional..
- pembullyan melalui teknologi, merupakan ..... Bullying
- tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
- pihak yang terlibat dalam bullying?
- bullying adalah suatu tindakan...
10 Clues: apa itu emosional... • apa dampak emosional.. • bullying adalah suatu tindakan... • pihak yang terlibat dalam bullying? • apa penyebab terjadinya emosional... • bagaimana cara mengendalikan emosi... • cara mengendalikan emosi pada diri sendiri... • pembullyan melalui teknologi, merupakan ..... Bullying • ...
Bullying, Conflict and Being Mean 2024-03-10
10 Clues: Two sides • In secret • In the open • Yin and Yang • Every now and then • Synonym for repeated • Bullying through the use of words • Bullying through the digital world • Bullying through the use of physical actions • A Maori representation of a person's life through their wellbeing
QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen 2025-07-24
Across
- - Zweiter Faktor, der kompromittiert wurde
- - Die Art des Cyberangriffs
- - Wohin der QR-Code tatsächlich führt
- - Der visuelle Köder im Angriff
Down
- - Der Übertragungsweg des Angriffs
- - Die App zur Login-Verifizierung
- - Psychologischer Trick in der Nachricht
- - Das gestohlene Element zur Umgehung des Logins
- - Der gefälschte Login-Dienst
- - Rogers Rolle in diesem Cyber-Drama
10 Clues: - Die Art des Cyberangriffs • - Der gefälschte Login-Dienst • - Der visuelle Köder im Angriff • - Die App zur Login-Verifizierung • - Der Übertragungsweg des Angriffs • - Rogers Rolle in diesem Cyber-Drama • - Wohin der QR-Code tatsächlich führt • - Psychologischer Trick in der Nachricht • - Zweiter Faktor, der kompromittiert wurde • ...
CYBER SAFETY 2023-01-02
8 Clues: BAD OR DANGEROUS • CODE TO HARM COMPUTERS • SHOULD BE STRONG AND LONG • LIKE CATFISHING BUT ONLINE • PROGRAMS USED BY COMPUTERS • SHORT FOR MALICIOUS SOFWARE • CODE TO STEAL COMPUTER DATA • RELATING TO THE COMPUTER CULTURE
CIS178 Cybersecurity Crossword Puzzle 2023-04-19
Across
- authentication using physical characteristics
- people carrying out specific actions
- software that installs itself secretly
- highly targeted phishing attacks
- virus disguised as legitimate software
- protect personal data
- users directed towards fake websites
- updates to improve security
Down
- permission to be on hard-drive
- security feature to detect hacking
- users denied access to services
- mathematical fuction that protects information
- attempting to obtain sensitive information
- prevents unauthorized access
- program added for entertainment
- emails asking for sensitive information
- detect and remove viruses
- software that makes data unstable
- secret software installed on hard-drive
- shared storage accessed online
20 Clues: protect personal data • detect and remove viruses • updates to improve security • prevents unauthorized access • permission to be on hard-drive • shared storage accessed online • users denied access to services • program added for entertainment • highly targeted phishing attacks • software that makes data unstable • security feature to detect hacking • ...
spanish travel words 2020-04-10
Across
- What you go through before you enter a country with costumes
- train checker
- sleeping car
- security screenings
- train car
- first class
- boarding pass
- flight
- suitcase
- bunk bed
- safety belt
- delayed
- airport
- platform
- ticket
- window
- passenger
- waiting room
- passport
- arrival
- train station
- visa
- seat
- on time
Down
- economy class
- a stop
- security agent
- flight assistant
- departure
- second class
- aisle
- carry on luggage
- luggage
- boarding gate
- international airport
- baggage claim
- window
- flight connection
- event ticket
- layover
- check in counter
- ticket
- trip/travel
43 Clues: visa • seat • aisle • a stop • flight • window • ticket • window • ticket • luggage • delayed • airport • layover • arrival • on time • suitcase • bunk bed • platform • passport • departure • train car • passenger • first class • safety belt • trip/travel • second class • sleeping car • event ticket • waiting room • economy class • train checker • boarding gate • baggage claim • boarding pass • train station • security agent • flight assistant • ...
fnaf crossword 2023-05-19
Across
- possess the puppet
- this is where your story ends
- was the first, saw everything
- main character
- most confusing character
- the most brutal thing in all of fnaf
- died in the bite of 83
- hello, hello?
- gave his creator nightmares
- leave the demon to his demons
- main villain
- everybody hates
Down
- but that's just a theory
- remember
- who we play as in security breach
- the dj in security breach
- most confusing minigame
- main mascot
- caused the bite of 87
- the king of fnaf
- the most popular character
- possess baby
- the vengeful spirit
23 Clues: remember • main mascot • possess baby • main villain • hello, hello? • main character • everybody hates • the king of fnaf • possess the puppet • the vengeful spirit • caused the bite of 87 • died in the bite of 83 • most confusing minigame • but that's just a theory • most confusing character • the dj in security breach • the most popular character • gave his creator nightmares • ...
Cyber security cross word 2023-04-28
Across
- A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
- A file or code that infects, explores, steals or conducts any behavior an attacker wants.
Down
- A wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- A security network that protects your network/devices from unwanted traffic.
4 Clues: A security network that protects your network/devices from unwanted traffic. • A file or code that infects, explores, steals or conducts any behavior an attacker wants. • A wireless networking technology that uses radio waves to provide wireless high-speed Internet access. • ...
Synopsys 12 Days of AppSec 2023-12-08
Across
- A method of AppSec testing in which testers examine an application while it’s running, but have no knowledge of the application’s internal interactions or designs at the system level, and no access or visibility into the source program.
- A trending practice in application security (AppSec) that involves introducing security earlier in the software development life cycle (SDLC).
- A descriptive model that provides a baseline of observed activities for software security initiatives.
- An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities.
- Software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
- A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users.
Down
- The processes, practices, and tools used to identify, repair, and protect against vulnerabilities in applications, throughout the software development life cycle (SDLC)
- The combination of practices and tools designed to increase an organization’s ability to deliver applications and services faster than traditional software development processes
- A structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
- An authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system.
- Flaw in a computer system that weaken the overall security of the device/system.
- An inventory of what makes up a software application
12 Clues: An inventory of what makes up a software application • Flaw in a computer system that weaken the overall security of the device/system. • A descriptive model that provides a baseline of observed activities for software security initiatives. • A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users. • ...
Malware 2022-10-21
Across
- can been installed on a users computer once an authorised user has initially gained access through another type of malware.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
- are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening.If lots of infected systems combine to form a network it is called a botnet
- are errors in someones code or program.They are usually created by mistake.if the bug/error relates to the security part of a program then it can lead to unauthorised access
- is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
- is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
- Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- is a standalone malware computer program that replicates itself in order to spread to other computers
9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • is a standalone malware computer program that replicates itself in order to spread to other computers • A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data • ...
Airport Crossword 2019-02-12
Across
- Centre provides comprehensive ... and booking service
- Located on top floor of the terminal. Provides a view of airfield
- Go there to eat/drink
- Located throughout international airport terminal to communicate. Have to pay to use
- Responsibility for aviation security should be shared between the NZ Police and the Military of transport
- Available throughout terminals to assist passengers
- Rooms with cots and changing tables are available.
- You can access this for computer or mobile usage
- Available for emergancy use
Down
- Where you can buy items cheaper and non-taxed
- Where you can buy small goods for yourself or as a gift
- Provided as a quiet place for contemplation to all travellers
- Will check you to ensure no transporting of any dangerous goods
- Available to help transfer luggage
- Changing currency types
- Secure baggage storage and luggage wrapping is available at SmartCarte
- Passengers first contact with airport to book a space. Can be long term or short term
- Available for transit passengers. Can buy supplies from vending machine
- Can access smoking lounge after security
- Getting cash out
20 Clues: Getting cash out • Go there to eat/drink • Changing currency types • Available for emergancy use • Available to help transfer luggage • Can access smoking lounge after security • Where you can buy items cheaper and non-taxed • You can access this for computer or mobile usage • Rooms with cots and changing tables are available. • ...
CROSSWORD 2023-03-18
Across
- Facilitated by ensuring
- Consequences of individual actions
- PATTERN, Theory explain crimes committed
- Theory minimize other factors
- Formal, human, and security
- Theory visible of crime
- Have four major components
- Engage in crime
- Theories classified three types
- 36,8 Volumes published
- Father of Sociology
- Act law makes punishable
- Grandfather of Charles Darwin
- Father of Criminal Justice
- Defensible space theory
- Human cells 22 pairs
- Classical school began
Down
- Act becomes morally right
- Greek word "physis" meaning
- Punishing who do offend
- Human behavior impact behavior
- Theory called " consequentialist"
- Laws enacted in 1926
- TRAITS, Theories determine person's character
- Theories external influences
- Mind and Logos meaning
- Heavy or obese
- Were antisocial and apathetic
- Link criminal behavior twins
- Somatotype thin and flat
- Deterrence from criminal act
- Were manic-depressive
- Personal location called
- Person's awareness space
- TOPINARD, French Anthropologist
- Incorporation of security hardware
- Theory relation criminal offending
- Basic security and behavioral
- "Structurally significant phenomenon"
- LANGE, Studied DZ,MZ twins
40 Clues: Heavy or obese • Engage in crime • Father of Sociology • Laws enacted in 1926 • Human cells 22 pairs • Were manic-depressive • Mind and Logos meaning • 36,8 Volumes published • Classical school began • Punishing who do offend • Theory visible of crime • Defensible space theory • Facilitated by ensuring • Somatotype thin and flat • Personal location called • Person's awareness space • ...
Chapter 15 2013-04-25
Across
- agreement between an organization and a vendor
- this act governs the disclosure and protection of health information
- individual well-known for social engineering
- scavenging for private data in trash
- more than one person is required to complete a task
- the safeguarding of personnel's rights
- a targeted social engineering attack
- documentation about evidence location and usage
- helps protect cable from EMI and RFI
Down
- a violation of physical security
- a formal process for managing changes to the IT environment
- this act helps protect the privacy of your social security number
- this type of fire extinguisher can be class A, B, C, D, or K
- an event that affects the security of an organization
- this system helps remove heat from a server room
- wiping or purging data
- this type of fire suppression system can be wet pipe or dry pipe
- a dry pipe fire suppression system with special features
- this act governs the disclosure of financial and accounting information
- assuring that risks are known and managed
20 Clues: wiping or purging data • a violation of physical security • scavenging for private data in trash • a targeted social engineering attack • helps protect cable from EMI and RFI • the safeguarding of personnel's rights • assuring that risks are known and managed • individual well-known for social engineering • agreement between an organization and a vendor • ...
Bonds and Mutual Funds 2014-11-20
Across
- A borrowed fund
- Fund that comes with sales charge
- A publicly traded investment
- Large urban area
- Income return on an investment
- Does not have restrictions on the amount of shares
- Debt obligation with coupon
- Security that tracks an index
- Doesn't pay interest but is traded
- Promissory note or corporate bond
- Value printed on a coin
- Bond whose owner is registered
- Completely used up
- Bond that can be converted
- Debit security issued by a business entity
- To make up for something
Down
- Distribution of dividends
- Mutual fund that comes with sales charge
- Municipal bond that has a low risk
- Debt security issued by a state
- Mutual fund's price per share
- Bond secured by mortgage
- Final payment date of a loan
- Bond that matures at regular intervals
- High risk of loss
- Stocks in somebody's possession
- Shares are sold without commissioner sales charge
- Difference between higher priced paid
- Ascertaining liabilities
29 Clues: A borrowed fund • Large urban area • High risk of loss • Completely used up • Value printed on a coin • Bond secured by mortgage • Ascertaining liabilities • To make up for something • Distribution of dividends • Bond that can be converted • Debt obligation with coupon • A publicly traded investment • Final payment date of a loan • Security that tracks an index • ...
Maria's favourite words. 2015-12-11
Across
- / Information.
- / Maria’s main concern in the thesis.
- / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
- / A set of connected things or parts forming a complex whole, in particular.
- / Security building blocks
- / Antonym: vague.
- / A person with a role to promote, display or advertise commercial products.
- / Judgement.
- / A person’s bodily shape.
- / Area or territory controlled by a ruler or government.
Down
- / A series of actions or steps taken in order to achieve a particular end.
- / A raised level surface on which people or things can stand.
- / A thing or things belonging to someone; possessions collectively.
- / Action against someone or something.
- / Existing or firmly attached within something or under a surface.
- / Formal request to an authority for something (e.g., job).
- / Put, lay, or stand (something) in a specified place or position.
- / Dealing with the nature of being.
- / A part of a whole.
- / Associated with, able to, or designed for performing one or more practical activities.
- / Security-Enhanced Embedded system Design.
- / Useful or valuable thing.
- / Synonym: sketch, blueprint, outline.
23 Clues: / Judgement. • / Information. • / Antonym: vague. • / A part of a whole. • / Security building blocks • / A person’s bodily shape. • / Useful or valuable thing. • / Dealing with the nature of being. • / Maria’s main concern in the thesis. • / Action against someone or something. • / Synonym: sketch, blueprint, outline. • / Security-Enhanced Embedded system Design. • ...
invest retire unit 2024-03-20
Across
- government retire account
- federal insurance contrabutions act
- how much you are willing to risk
- makes it difficult to change,hack or cheat the system
- Mike Washington jr's workplace
- union collected retirement
- age in which you can start investing
- government healthcare
- age in which you can collect social security
- place of investing and trading
- year that social security funds will run out
- s&p five hundred
- tax free individual retirement account
- guilty of 7 counts of fraud and conspiracy (last name)
- what makes Bitcoin have worth
- exaggerating worth and selling high
Down
- president that conseived social security
- bad day in stocks pessimisstic
- interest on interest
- good day in stocks optimist
- when a large number of bank customers withdrawl all of their money
- not like the movies
- how much does the FDIC insured up to
- year that medicare funds will run out
- when you stop working
- he lost 30 million with ftx
- a word for gambling with crypto
- not fiat money
28 Clues: not fiat money • s&p five hundred • not like the movies • interest on interest • when you stop working • government healthcare • government retire account • union collected retirement • good day in stocks optimist • he lost 30 million with ftx • what makes Bitcoin have worth • bad day in stocks pessimisstic • Mike Washington jr's workplace • place of investing and trading • ...
Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02
Across
- control of what users may do after accessing network
- technology that makes data unusuable and unreadable to all but authorized users
- A public certification authority organization
- The most widely used method for encrypting data
- A white hat's role
- unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
- EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
- Inherence refers to ... traits
- A black hat's role
- Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
- ethical hacker who probes networks or OSs and reports on vulnerabilities
- control of access to network
- A common security tool used by Linux administrators
- Three credential categories for multifactor authentication: knowledge, possession, and ...
- Windows domain associated mutual authentication protocol
- A built-in firewall included in many Linux distributions
- common client-server authentication protocol
- A good security option for servers that are not physically secure
- A Linux Files tool that offers a trash can for deleting files permanently
- Windows Server Update Services
20 Clues: A white hat's role • A black hat's role • control of access to network • Inherence refers to ... traits • Windows Server Update Services • common client-server authentication protocol • A public certification authority organization • The most widely used method for encrypting data • A common security tool used by Linux administrators • ...
Government 2024-07-08
Across
- The President's personal advisors
- to approve or confirm officially
- High ranking official in executive branch
- group of advisers to the president
- head of the Department of Justice
- department that oversees the federal budget
- Head of the U.S. armed forces
- department managing the nation's finances
- principal Advisor to the President on national security
- second in command in the executive branch
- formal agreement between countries
- authority or influence over an organization
- Federal law enforcement agency
- federal organization managing emergency response
- informal advisory group
- to make or enforce rules or policies
- A document issued by the President
Down
- Secretary heading the Treasury of Department
- Position in the Executive branch
- title for the leader of the Department of Defence
- government department of Foreign Affairs
- official statement or directive by the president
- meeting between heads and state
- Secretray heading the Treasury Department
- collection of all executive agencies and departments
- federal agency for national security
- president's official residence Bureaucracyace
- Set principles guiding the government's actions
- Government entity responsible for creating laws
- leader of the executive branch
30 Clues: informal advisory group • Head of the U.S. armed forces • Federal law enforcement agency • leader of the executive branch • meeting between heads and state • Position in the Executive branch • to approve or confirm officially • The President's personal advisors • head of the Department of Justice • group of advisers to the president • formal agreement between countries • ...
FITD Vocab.af 2013-05-15
Across
- the internet and online world
- Where you connect to a network using a wired connection (internet)
- searches all search engines and gets the top results
- SSID
- Alternatively to as high-speed Internet or wide band transmission
- a program that allows you to search the internet for information
- long term memory
- the way you behave online
- a readable file
- Homeland Security (NCSA)
- CPU
- examples: headphones, speakers
- the heart of the computer
- the software of a laptop
- hand free speaking device
- set of structured activies (safari, firefox)
- 8 bits make a ____
- is a sequence of instructions
- created with a copyright symbol on it
- location for CD in your laptop
- a device that displays signals on a computer screen
- a brief background of your history
Down
- is equal to 1,099,511,627,776 bytes
- ISP
- portable device
- where all information is stored
- when the computer isn't working you ____ it back up
- this is a program
- What do they want? who is asking? Why do they want it?
- a port used to connect a computer a mouse or a keyboard to an IBM compatible computer
- is an object on a computer that stores data
- rules and behavior to keep you and your computer safe
- short term memory
- USB (flash drive)
- examples: flashdrive, keyboard, mouse, etc
- LCD
- the purpose of this is to upgrade your computer
- LED
- a device that receives data and projected data
- a storage device or backup device that you can access
- A electronical and physical port
- to protect information and networks
- a program on your device that allows you to download and upload
- is a physical components of computer wiring (the inside of the computer)
- cloud based presentation on the internet. There is only one slide that can be edited. .
45 Clues: ISP • LCD • CPU • LED • SSID • portable device • a readable file • long term memory • this is a program • short term memory • USB (flash drive) • 8 bits make a ____ • Homeland Security (NCSA) • the software of a laptop • the way you behave online • the heart of the computer • hand free speaking device • the internet and online world • is a sequence of instructions • examples: headphones, speakers • ...
Online bullying 2024-06-11
Across
- online platform
- when someone is picking on you constantly
- going to the police to fill in a
- someone to talk to at school
Down
- connected to a group of things
- someone you can seek out
- protecting yourself online
- Another name for the internet
- a platform used with internet
- to stop people contacting you
- someone to talk to at home
11 Clues: online platform • someone you can seek out • protecting yourself online • someone to talk to at home • someone to talk to at school • Another name for the internet • a platform used with internet • to stop people contacting you • connected to a group of things • going to the police to fill in a • when someone is picking on you constantly
Matt 2016-06-07
Across
- showing the violence
- friends is when you play on the phone
- is an a electronic
- a site for exploring
- strangers that you can meet
- a bigger screen than an iPad
- is a thing that you are youse for my Computer
- taking a screen of when you can get back on again
- a small square showing your face
- somebody that cheats
Down
- that you play online with
- a site were you can post stuff.
- is a device
- a site for videos
- people that teach you
- reports that come out
- are people that help you
- to protect your device
- bully somebody that is mean online
- small activities
20 Clues: is a device • small activities • a site for videos • is an a electronic • showing the violence • a site for exploring • somebody that cheats • people that teach you • reports that come out • to protect your device • are people that help you • that you play online with • strangers that you can meet • a bigger screen than an iPad • a site were you can post stuff. • ...
Block 3, Unit 1 2017-09-06
Across
- Windows Event ____ lets you monitor system events.
- The ____ toner fault isolation tool has two parts: the toner & the probe
- Security management subsystems work by partitioning resources into ____ & unauthorized areas
- This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
- Per the NSA IATF there are ____ classes of attacks
- In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
- Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
- Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
- There are 2 types of fault management: passive & ____
Down
- Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
- There are ____ steps in the troubleshooting model
- This network management area ensures internetwork performance can be maintained at an acceptable level
- ____ Manager provides information about programs running on your computer
- The ____ event logs can only be accessed by administrators
- The goal of this network management is to measure network utilization parameters so it can be regulated
- Air Force security management is provided by the ____ systems suite of tools (acronym)
- The first step in accounting management is to ____ usage of all important network resources
- The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
- There are 3 types of event log: Application, Security & ____
19 Clues: There are ____ steps in the troubleshooting model • Windows Event ____ lets you monitor system events. • Per the NSA IATF there are ____ classes of attacks • There are 2 types of fault management: passive & ____ • The ____ event logs can only be accessed by administrators • There are 3 types of event log: Application, Security & ____ • ...
Fmm project 2024-07-21
Across
- which window displays security capital market segments
- expand sureon
- nse has a main computer which is connected through
- expand SQ
- cancelation expand OCXL
- Full form of SBRS
- which order is to enable the user to view the outstanding orders fir a security
- Which manager is a term assigned to a user placed at the highest level in a trading firm
- who are the users at the lowest level of the hierarchy
Down
- expand NEAT
- which displays trading system bar
- which market are initiated by the exchange on behalf of tm for settlement related seasons
- which wait indicates that price have increased
- order which order are orders to buy or sell shares at a stated quantity and price.
- expand MBP
- which feature allows a TM to get instanteous market information on any desired security
16 Clues: expand SQ • expand MBP • expand NEAT • expand sureon • Full form of SBRS • cancelation expand OCXL • which displays trading system bar • which wait indicates that price have increased • nse has a main computer which is connected through • which window displays security capital market segments • who are the users at the lowest level of the hierarchy • ...
Cyber Safety Crossword 2013-11-03
Across
- Free software that can be downloaded from the internet.
- Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
- The internet version of Junk mail
- Buying products on the Internet using credit cards or other electronic payments
- Short for Random Access Memory
- From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
- Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
- Small text files that websites save in your web browser to store information like your username and password.
- A name you use to identify yourself on a computer or website.
- A type of malware that spies on what you do on the internet and can steal information about you
- A computer that has been hacked into and is used to launch malicious attacks
- The last part of a URL eg;.gov .com
- Marking something or someone as suspicious or inappropriate.
- When a computer calls out to another computer to see if it is active.
- Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.
15 Clues: Short for Random Access Memory • The internet version of Junk mail • The last part of a URL eg;.gov .com • Free software that can be downloaded from the internet. • Marking something or someone as suspicious or inappropriate. • A name you use to identify yourself on a computer or website. • When a computer calls out to another computer to see if it is active. • ...
Cyber Cross-Word 2022-05-19
Across
- shortest-path-first routing protocol
- type of AV-based thats unusual for the user
- software that displays unwanted ad
- transmission media with cables
- secure communications techniques
- SIEM tool that enable to search, analyze...
- tool that uses multiple antivirus engines
Down
- firewall keeps track of com sessions
- 8e8c92b1c360cbe3cd2b40d6b29278d5
- packet analyzer
- software/hardware that creates/runs VM
- attract attackers
- secret - cb5ceb103977f1271d0763ac75fcd8e9
- an open-source EDR
- interaction between snmp agent manager
15 Clues: packet analyzer • attract attackers • an open-source EDR • transmission media with cables • 8e8c92b1c360cbe3cd2b40d6b29278d5 • secure communications techniques • software that displays unwanted ad • firewall keeps track of com sessions • shortest-path-first routing protocol • software/hardware that creates/runs VM • interaction between snmp agent manager • ...
Cyber Crossword Puzzle 2025-09-15
Across
- Something like a phone, laptop, or tablet
- A fix for a security problem in software
- Software that protects against malware
- Protects your network from threats
- Someone who breaks into systems
- Scrambles information to keep it safe
- A copy of your files kept safe
Down
- A secret code you use to log in
- A fake email that tries to trick you
- Keeps your software current and safe
- A secure way to connect on the internet
- Bad software that harms your computer
- A common way hackers send scams
- What you should do to your device when away
- Unwanted or junk emails
15 Clues: Unwanted or junk emails • A copy of your files kept safe • A secret code you use to log in • A common way hackers send scams • Someone who breaks into systems • Protects your network from threats • A fake email that tries to trick you • Keeps your software current and safe • Bad software that harms your computer • Scrambles information to keep it safe • ...
BackLash 2020-03-04
10 Clues: Brother of Bree • The sister of Lara • Lara makes this team • What does Bree to Lara • Lara’s former best friend • who is Lara’s best friend • Came to Lara to ask question • Took pills because of bullying • Where does Liam ad Sydney hang out • What is the boy name on the fake account
Forensic Midterm 2022-03-14
Across
- Online criminal activity
- plaster replica of an impression
- Dents left behind as evidence
- The study of a crime
Down
- The way humans write
- A device used to access the internet
- The investigation of fire
- Medicine for the teeth
- Rapid oxidization releasing light and heat
- A handheld device used to perform a function
10 Clues: The way humans write • The study of a crime • Medicine for the teeth • Online criminal activity • The investigation of fire • Dents left behind as evidence • plaster replica of an impression • A device used to access the internet • Rapid oxidization releasing light and heat • A handheld device used to perform a function
IT-Security 2016-01-29
Across
- illegale Personen die sich in Computersysteme einloggen?
- Information eines dritten?
- Engineering Manipulation ohne Technische Geräte?
- unerwünschte Werbenachrichten?
- Viren , die in einem Programm drinnen sind?
Down
- Ansprechen von Minderjährigen?
- Versteck in einem nützlichen Programm?
- Überbegriff für unerwünschte, Schädliche Software?
- Surfing Beobachtung bei der Eingabe von Daten?
- Hintertür zu einem anderen Computer?
10 Clues: Information eines dritten? • Ansprechen von Minderjährigen? • unerwünschte Werbenachrichten? • Hintertür zu einem anderen Computer? • Versteck in einem nützlichen Programm? • Viren , die in einem Programm drinnen sind? • Surfing Beobachtung bei der Eingabe von Daten? • Engineering Manipulation ohne Technische Geräte? • Überbegriff für unerwünschte, Schädliche Software? • ...
internet saftey 2024-02-27
10 Clues: are mean people • needs to be strong • to use there matrial • try to take your money • can show you bad stuff • steal your personal info • info needs to be private • has a lot of dangerous stuff • bullies are trying to hurt your feelings • email is trying to get you to spread your info
FNAF 2022-03-09
Across
- Animatronic that runs down the hall in FNAF1
- Animatronic who was taken apart in FNAF2
- Animatronic which is missing a face in FNAF2
- Animatronic controlled by the puppet
- Halloween Chica in FNAF4
- A very powerful freddy
- What the animatronics in FNAF4 are believed as
- The main 'animatronic' in FNAF3
- Gives you his life story when he jumpscares you in UCN
- Nerdylooking Freddy in FNAF6
- Upgraded Bonnie in FNAF2
- Animatronic in FNAF1 that LOVES pizza.
- Crocodile animatronic in Security Breach
- Chubby bear in FNAF2
Down
- Helps you in FNAF Security Breach
- Animatronic which requires music in FNAF2
- Elephant in FNAF6
- The animatronic in Help Wanted called a glitch
- The small bear in FNAF6
- Disables your cameras if you don't catch his fish in UCN
- Who we play as in FNAF1
- In your closet in FNAF4
- The main animatronic in FNAF1
- Probably the most scariest fanmade game
- He can see through your mask in FNAF2
- Merge of all the Funtime animatronics in Sister Location
- The wolf in Security Breach
- Big baby in Sister Location
28 Clues: Elephant in FNAF6 • Chubby bear in FNAF2 • A very powerful freddy • The small bear in FNAF6 • Who we play as in FNAF1 • In your closet in FNAF4 • Halloween Chica in FNAF4 • Upgraded Bonnie in FNAF2 • The wolf in Security Breach • Big baby in Sister Location • Nerdylooking Freddy in FNAF6 • The main animatronic in FNAF1 • The main 'animatronic' in FNAF3 • ...
Domestic & International Airports 2018-08-15
Across
- What is the abbreviation for Aviation Security Officer?
- The wall of an a/c.
- What can you use for free at most airports (excluding bathroom facilities)?
- What is the 'code'(hint)of an a/c called?
- What is the area where you go through security at the airport?
- What city airport is PPQ?
- What is'N' in phonetic alphabet?
- If I get on a plane what am I doing?
- A passenger who does not turn up to their flight.
- This is an area, usually adjacent to a terminal, where a/c park.
Down
- Where can passengers go if they are wanting to pray before a flight?
- What is the area before departing passengers through security at the airport?
- Where can you go to ask for help at an airport?
- Who play a vital role in customs work and are most referred to as "sniffer dogs"?
- Who flies the plane?
- What is 'S' in the phonetic alphabet?
- What is the airline code of MH?
- What is the airport code for Queenstown?
- What is 'B' in phonetic alphabet?
- Another word for passenger.
20 Clues: The wall of an a/c. • Who flies the plane? • What city airport is PPQ? • Another word for passenger. • What is the airline code of MH? • What is'N' in phonetic alphabet? • What is 'B' in phonetic alphabet? • If I get on a plane what am I doing? • What is 'S' in the phonetic alphabet? • What is the airport code for Queenstown? • What is the 'code'(hint)of an a/c called? • ...
Chapter 15 2013-11-26
Across
- helps protect cable from EMI and RFI
- this act governs the disclosure and protection of health information
- Due ________ is the sageguarding of personnel's rights
- this act helps protect the privacy of your social security number
- Chain of ___________ documentation about evidence location and usage
- a violation of physical security
- individual well-known for social engineering
- ______ phishing is a targeted social engineering attack
- ________ management is a formal process for managing changes to the IT environment
- ________ diving is scavenging for private data in trash
- this type of fire supression system can be wet pipe or dry pipe
Down
- an event that affects the security of an organization
- wiping or purging data
- this system helps remove heat from a server room
- a dry pipe fire supression system with special features
- Separation Of ______ means more than one person is required to complete a task
- Due __________ is assuring that risks are known and managed
- this type of fire extinguisher can be class A, B, C, D, or K
- this act governs the disclosure of financial and accounting information
- agreement between an organization and a vendor
20 Clues: wiping or purging data • a violation of physical security • helps protect cable from EMI and RFI • individual well-known for social engineering • agreement between an organization and a vendor • this system helps remove heat from a server room • an event that affects the security of an organization • Due ________ is the sageguarding of personnel's rights • ...
CYBER 2017-04-20
6 Clues: Man's best friend • MOBBING IM INTERNET NENNT SICH • OPFER BRAUCHEN UNTERSTÜTZUNG VON.. • WAS FINDET MAN OFT AUF STREAMING SEITEN • SOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMT • WIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?
6 grade vocabulary crossword puzzle 2025-01-30
Across
- bullying online bullying
- Place where the photo was taken
- To not be nown
- punching or fighting someone
- To hit someone
- To increase or widen participation or impact
- The person doing the harassing or bullying
- A winess to harassment
- an argument or disagreement that isn't nescessarily repepeated
Down
- Information about what's in the photo
- A form of harassment or bullying used
- Can't talk
- abuse To tell a police offshore of a abuse
- mesing around with someone
- A Target privately or publicly
- To go for one person
- a wepsite that no one can use
17 Clues: Can't talk • To not be nown • To hit someone • To go for one person • A winess to harassment • bullying online bullying • mesing around with someone • punching or fighting someone • a wepsite that no one can use • A Target privately or publicly • Place where the photo was taken • Information about what's in the photo • A form of harassment or bullying used • ...
Once Upon a Time Ada 2021-10-01
Across
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- The ? gardener was willing to travel to different places where there was work.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
Down
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- Nervously, the resident noticed the ? of a figure below the street light.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- For their safety, they ? to the Neighbourhood Watch program.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Residents ? their fears of criminals by putting in security devices for their homes.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
EMD Polices & Procedures 2024-04-12
Across
- All visitors must have a _____ completed in order to be allowed into the facility or do work on the grounds.
- Document needed when taking company property off site.
- Members of_____ assume control over all emergency situations.
- How many steps to disable or enable fire panel.
- Temporary badges can only be issued and returned to _____.
- Issued to employees and long term contractor to identify a vehicle in the parking lot.
- what document is to be completed every time a foreign national enter the shop for a tour.
- This report is a firsthand account of the activities the security officer performed while on duty.
- FN are permitted to have electronics in this area ONLY.
- _____ book is used by CW-EMD security to alert security officers of individuals who previously had access but have been temporarily or permanently rescinded.
- These passes are issued for a maximum of 5 days at at time.
- This form is used for all reports including an injury report or bomb threat.
- Badge worn by contractors who are sole US citizens who have a business relationship that requires daily or frequent visits but will not require access to classified information.
- Badge color reserved specifically for foreign nationals.
- Application used for alarms and event view.
- 2 Pop-up windows in security expert.
- _____ visitors wearing this badge must always have an EMD escort with them.
Down
- Only post that is manned from 0630-2230 Monday thru Friday.
- CW-EMD cleared employees have a _____ on their badge.
- Form generated and issued by the purchasing department authorizing equipment to be removed.
- Inspection performed by security officers to ensure that employees are using their assigned badge.
- Form used by employees to declare and drop off incoming business necessary computer storage/media at central guard.
- what type of alarm is High Water Bldg 12.
- Special arrangements have been made to allow _____ employees to bring company provided cell phones thru property.
- _____ are issued if a person's vehicle information is not in the system.
- Required any time work is being done inside the building that could potentially spark a fire.
- Sticker on a personally owned cell phone that has been approved by EMD security.
- This badge has a yellow background with red lettering.
- Post where you control and perform 100% vehicle inspections.
- Secured area located in Bldg 3A 2nd floor.
- Looking for on visitor ID.
- Document with information that must be reported to the next officer.
32 Clues: Looking for on visitor ID. • 2 Pop-up windows in security expert. • what type of alarm is High Water Bldg 12. • Secured area located in Bldg 3A 2nd floor. • Application used for alarms and event view. • How many steps to disable or enable fire panel. • CW-EMD cleared employees have a _____ on their badge. • Document needed when taking company property off site. • ...
Investing Unit 2024-03-20
Across
- At what age can you collect even more benefits from Social Security if you wait
- Ease with which an asset or security can be converted into cash without affecting the market price
- A sustained period of rising prices and optimistic sentiment in a financial market
- These funds are sold actively throughout the day and are Passively managed
- How can I buy a Mutual Fund
- An individual who buys and sells with the intention of profiting short term
- Bonds issued by company that have a fixed interest rate and face value
- At what age can you invest in Crypto
- Portion of the company's earnings distributed to shareholders as a return on investment
- Profit realized from sale of a capital asset like stock or real estate
- What indices comprises 30 blue chip companies?
- Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
- An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
- Buying different stocks from different companies
- Investing equal amounts of money at regular intervals
- At what age must you take a minimum from your retirement accounts each year (RMD)
- These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
- The age you can start collecting Social Security
- The process of offering shares f a private corporation to the public in a new stock issuance
- This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
- A unique combination of letters to represent a particular public ally traded company's stock or security
- A security that represents ownership of a fraction of a corporation
- Retirement account where money goes in after tax and is taken out penalty and tax free
- Bonds issued by the Government where you pay under face value and don't pay interest
- Retirement account where money is put in before taxes but is taken out taxed
- A market where prices are falling and a pessimistic outlook overall
- Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
- This is a federal payroll tax that is deducted from every paycheck
- Types of jobs that usually offer a pension
- Investing a big sum of money in one go
30 Clues: How can I buy a Mutual Fund • At what age can you invest in Crypto • Investing a big sum of money in one go • Types of jobs that usually offer a pension • What indices comprises 30 blue chip companies? • Buying different stocks from different companies • The age you can start collecting Social Security • Investing equal amounts of money at regular intervals • ...
Standards Law & Ethics of Cybersecurity 2023-06-08
Across
- Link that is ______ often found on social media and SMS is one of the Phishing Scams.
- By sharing ______ date it potentially threatens personal safety.
- What should you do if you receive suspicious links on your mobile phone?
- Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
- Resending fake emails to everyone who knows you can be identified as _______.
- Do not ______ your password.
- _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
- Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.
8 Clues: Do not ______ your password. • By sharing ______ date it potentially threatens personal safety. • What should you do if you receive suspicious links on your mobile phone? • Resending fake emails to everyone who knows you can be identified as _______. • Link that is ______ often found on social media and SMS is one of the Phishing Scams. • ...
November Cross word 2023-11-24
8 Clues: It's giving. • We need more! • Community heroes. • The new Monday champion. • Student-written and delicious. • Highest ranked pre-season team. • I'm not a veggie; I'm a fall fruit. • Re-issued the Thanksgiving proclamation in 1863.
Word List 2020-04-28
Across
- a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
- evil which is commited by hackers every day
- is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- person who can intrude the system
- the process of encoding information
- characteristics or information
- a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
- two-dimensional barcode
- the utility that lets the hacker to trace the data of user's device
- to destroy the secret of the data
- the domain that lets the hacker trace the personal geolocation.
Down
- a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
- situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
- to kidnap the data
- any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
- a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
- the most popular remote access trojan
- the global system of interconnected computer networks
- case of programms for interacting with wireless networks
- to get the data in a dishonest way
- critical system error on Windows
23 Clues: to kidnap the data • two-dimensional barcode • characteristics or information • critical system error on Windows • person who can intrude the system • to destroy the secret of the data • to get the data in a dishonest way • the process of encoding information • the most popular remote access trojan • evil which is commited by hackers every day • ...
Chapter 36 2014-04-30
Across
- were the industries that include financial services?
- where did manufacturing jobs move out of?
- what were the names of the general people who left their country to move to safety in 2005?
- what is the creation of plants or animals that are genetically identical to an existing plant or animal?
- what was created in 2002 to coordinate national efforts against terrorism
- what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
- what is the abbreviation for European Economic community?
- what includes all financial interactions that cross international borders?
- what is the abbreviation for the North Atlantic Treaty Organization?
- since that late 1960s, more than 14,000 terrorist attacks have occurred where?
- in the late 1950s a new style of music emerged called what?
Down
- president Bush an anti-terrorism bill called what?
- access to TV, radio, and phones are known as
- what is a spread of nuclear weapons to other nations called?
- what is the working laboratory for experiments in space?
- who was one of the greatest champions of human rights that established the order of the missionaries of charity?
- what is the voluntary linkage of computer networks around the world?
- what is the 20th century attempt to increase food resources worldwide using economic processes?
- cultural elements that reflect groups of people with common backgrounds and interests?
- what is a major goal for globalization?
- the transferring of genes from one living thing to another in order to produce an organism with new traits?
- what is the use of violence, on people, or property
- the western mind set of placing a high value on acquiring material possessions is what?
- what is the greatest global health issue(disease) that was first discovered in the 1980s?
24 Clues: what is a major goal for globalization? • where did manufacturing jobs move out of? • access to TV, radio, and phones are known as • president Bush an anti-terrorism bill called what? • what is the use of violence, on people, or property • were the industries that include financial services? • what is the working laboratory for experiments in space? • ...
Brices Puzzle 2024-01-05
Across
- Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
- Vision Syndrome A technology-related health condition that affects eyesight.
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Compression Tool Tool that shrinks the size of a file(s).
- Web Design A website development approach that adapts the layout of a website to fit the screen
- System Number system that has just two unique digits, 0 and 1, called bits.
- An applied science devoted to incorporating comfort
- Device Any hardware component that conveys information from a computer or mobile device
- A computer that delivers requested webpages
- A small text file that a web server stores on your computer.
- The electronic component of a computer that interprets and carries
- The number of horizontal and vertical pixels in a display device.
- Aggregation A website or web app sometimes called a curation website
Down
- Device Any hardware component that allows you to enter data and instructions
- A business transaction that occurs over an electronic network
- The code of acceptable behaviors users should follow while on the Internet
- A program designed to make users more productive
- Firewall A security tool that detects and protects a personal computer and its data
- Device Convergence The trend of computers and devices with technologies
- A compromised computer or device whose owner is unaware
- Extortionist Someone who demands payment to stop an attack
- Someone who accesses a computer or network illegally.
- Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
- Protector A device that uses electrical components to provide a stable current flow and minimize
- Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
- A collection of computers and mobile devices connected
26 Clues: A computer that delivers requested webpages • A program designed to make users more productive • An applied science devoted to incorporating comfort • Someone who accesses a computer or network illegally. • A collection of computers and mobile devices connected • A compromised computer or device whose owner is unaware • ...
September Bootcamp 2022-08-03
Across
- How many hours does an admin have to respond to a ransomware event with Ransomware Rollback?
- A collection of bots. The term also refers to the malware executed on a connected device which transforms the device into a bot
- cloud platform used for partners and MSPs
- EDR provides three layers of protection: Network, Process and Desktop _?
- A content heavy resource where you can find internal and external facing information
- sales methodology that focuses on customer relationships
- recently released managed detection and response service
- Malwarebytes cofounder and CEO
- What is Malwarebytes best known for?
- the tool used to automate communication with your customers
- cloud console for customers
- Regional identifier for sales/support activity in Europe-Middle East- Africa
- the platform that hosts e-learning and video tutorials
- easy of use term to describe the nebula console
Down
- the V in VPM
- Technical Account Management
- How many layers of live protection does EP provide?
- sales enablement content guru who controls highspot and academy
- A type of malware which locks users out of their computer and/or encrypts their files, offering to unlock on the condition that the victim pays a ransom
- CSM stands for Customer _ Manager
- A module for the Nebula platform helps block access to malicious websites and limit threats introduced by suspicious content
- abbreviation for Malwarebytes
- our internal storage system for documents and files
- an open-source equivalent to the Unix operating system
- branch of the revops org that runs MWB tech stack
- is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
- sales enablement services guru who supports MDR
- tool for recording and reflecting on calls by reps
- form on contract used in Sandler methodology to establish clear intentions and agenda
- regional identifier for sales/support activity in Asia-Pacific
30 Clues: the V in VPM • cloud console for customers • Technical Account Management • abbreviation for Malwarebytes • Malwarebytes cofounder and CEO • CSM stands for Customer _ Manager • What is Malwarebytes best known for? • cloud platform used for partners and MSPs • sales enablement services guru who supports MDR • easy of use term to describe the nebula console • ...
AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE 2025-06-24
Across
- Auditors must _________ the results of the sample and their implications.
- Auditors need to address _______responsibilities related to data privacy, confidentiality, and the use of IT in the audit process.
- Auditors need to acquire and maintain ______ in using new IT tools and techniques.
- Performing Audit _________ on Selected Items
- Risk that conclusions based on a sample differ from those of the entire population.
- Auditors must ________ the nature and cause of deviations or misstatements.
- control IT can be used to implement and monitor ________ more effectively, improving the overall control environment.
- IT systems are vulnerable to _______ threats, data breaches, and other security risks that could compromise the integrity of audit evidence.
- Application of procedures to less than 100% of items in a population.
- Ensures each unit has an equal chance of selection.
Down
- IT auditors require specialized knowledge and skills to assess the effectiveness of IT controls and systems.
- Auditors must adapt to new technologies, manage increased _________ ___________, and address the associated risks to ensure the integrity and reliability of the audit process.
- Ongoing ___________ of IT systems and controls is necessary to ensure their effectiveness and identify potential issues.
- Electronic data processing and auditing can reduce the likelihood of _____ in audit work and increase the probability of identifying misstatements.
- IT enables auditors to analyze ________ datasets, identify anomalies, and detect potential errors or fraud more effectively.
- IT facilitates the shift towards ______ audits, reducing reliance on physical documents and streamlining the audit workflow.
- Entire set of data from which a sample is selected.
- Generally not recommended due to potential bias in contiguous items.
- Sample _____ should be sufficient to reduce sampling risk to an acceptably low level.
- ________ are projected for each stratum separately, combining results for overall assessment.Information technology (IT) has significantly transformed the audit process, enhancing efficiency and effectiveness while introducing new challenges.
20 Clues: Performing Audit _________ on Selected Items • Entire set of data from which a sample is selected. • Ensures each unit has an equal chance of selection. • Generally not recommended due to potential bias in contiguous items. • Application of procedures to less than 100% of items in a population. • ...
profesions 2021-04-23
Across
- someone who has a business
- driver a person that drive buss
- person who teach student
- a person who flies a plane
- the person who works on a farm
- a person that take photos
- a person that gives lectures usually in a university
- bank employee the person who serving the people in bank
- they make bread and cakes and work in bakery
- the person in charge of maintaining security
- the person checking the others
Down
- the person in charge of maintaining security of the country
- a person that can fix the problem you have with your teeth
- the person who serving the people in restorant
- a person who catch fish
- the man who lead the mass
- person who act in film
- a person trained to help a doctor look after the sick or injured
- a person who has the jobs of designing things
- a person that works in the science industry
- the person who work in kitchen
- a person that defends people in court and gives legal advice
22 Clues: person who act in film • a person who catch fish • person who teach student • the man who lead the mass • a person that take photos • someone who has a business • a person who flies a plane • the person who works on a farm • the person who work in kitchen • the person checking the others • driver a person that drive buss • a person that works in the science industry • ...
RU ITEC411 Crime and security 2026-03-09
Across
- Planting false URLs in Domain Name Servers to fish for information
- Security flaws in systems caused by factors like poorly written software
- Restriction of specific content which varies by country
- Tool used to monitor and filter out communication from untrusted sites
- Method to securely store data so it is useless if stolen
- Use of hacking to promote a political cause
- Personal data used by criminals to impersonate innocent people
- Malicious code that can be spread rapidly across the Web
- Personal and financial information requests disguised as legitimate business email
Down
- Act of reporting internal wrongdoings
- Intentional, unauthorized access to computer systems
- software that can spread rapidly over the Web
- Biological characteristics unique to an individual used for high-security
- Process of verifying identity to prevent use of stolen data
- Sophisticated worm that damaged equipment in a uranium enrichment plant
- Breaking into telephone systems Worm
- Identity theft or information gathering conducted via text messaging
- System security hole that can be exploited
- Illegal activities involving computers like credit card theft
- Form of phishing conducted via voice calls
20 Clues: Breaking into telephone systems Worm • Act of reporting internal wrongdoings • System security hole that can be exploited • Form of phishing conducted via voice calls • Use of hacking to promote a political cause • software that can spread rapidly over the Web • Intentional, unauthorized access to computer systems • ...
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Something used to protect Against Viruses
- Displays ads on your computer. May slow down your computer
- make sure to ____ your software when Needed.
- When someone gets your personal info and then does things pretending to be you.
- When you copy someone's work and claim it as your own.
- Emails that spread Malware often use _________.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- Everyone has a Digital _______ so be careful
- you should regularly make _______ to make sure that your things will be safe.
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
- Keeps track of every key you type and sends it to the hacker.
- To ensure your data is safe you could us ______ storage.
Down
- Spies on you, stealing information like passwords and credit card numbers
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- avoid using ______ Wi-fi.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- make sure to have strong an secure ________.
- Blocks you from accessing your files until you pay a ransom.
- __________ is when people steal intellectual property such as movies, music and software.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- A group of computers all being controlled by a remote hacker to perform illegal activity.
- if you are being cyber bullied Don't _____ the messages because they can be used as proof
- IF someone is completely _______ they cant be traced.
24 Clues: avoid using ______ Wi-fi. • Something used to protect Against Viruses • make sure to ____ your software when Needed. • make sure to have strong an secure ________. • Everyone has a Digital _______ so be careful • Emails that spread Malware often use _________. • IF someone is completely _______ they cant be traced. • ...
Year 7 Coding and Networking 2025-09-08
Across
- A device that requests services from a server
- A temporary IP address that can change, assigned by a DHCP server
- An action that causes something to happen in a program
- Internet protocol address that is 128 bits long
- Internet protocol address that is 32 binary digits long
- A seven-layer architecture for communication systems
- Text-based language that provides deep understanding of programming techniques
- A computer in a network that provides services like websites or emails
- The high-capacity network that carries internet traffic across the world
- System that translates easy-to-remember domain names into IP addresses
- Uses radio waves for transporting data without physical cables
- Fast, easy-to-learn and beginner-friendly text-based programming language
- An error in a program that prevents it from running as expected
- A list of steps to finish a task
- Protocol for dynamically assigning IP addresses to network devices
Down
- The most common form of cable used for wired networking
- A set of rules that defines how two entities communicate across a network
- A unique identifier assigned to internet-connected devices
- Small units of data into which messages are split for transmission across a network
- Text-based programming language for basic coding skills just like a programmer
- Device that guides data to its correct destination, preventing traffic jams
- A permanent address for a device, usually set up manually
- Free programming language from MIT that uses block-based technology
- Free programming language developed by Google which uses visual blocks
- Finding and fixing errors in programs that prevent them from running correctly
- Requires a physical medium for transporting information between nodes
- Programming language often used for creating modifications in Minecraft
- Programming language developed by Microsoft for creating 3D games
- The action of doing something over and over again in programming
- A cyber security threat that tricks victims into sharing sensitive data
30 Clues: A list of steps to finish a task • A device that requests services from a server • Internet protocol address that is 128 bits long • A seven-layer architecture for communication systems • An action that causes something to happen in a program • The most common form of cable used for wired networking • Internet protocol address that is 32 binary digits long • ...
11.5 Testout Crossword 2023-03-28
Across
- uses radio waves to transmit data from small circuit boards
- the standard mechanism to dynamically assign IP addresses within a network
- a triple-A protocol
- an encrypted security protocol that protects internet traffic on wireless networks.
- electromagnetic radiation with wavelengths longer than those of visible light and shorter than radio waves
- developed at MIT and is a key component of Windows Active Directory
- a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
- a file-level storage architecture that makes stored data more accessible to networked devices
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- Internet Protocol Address
- is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs
- a symmetric block cipher chosen by the U.S. government to protect classified information.
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
- a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
- a new WFA security standard for personal and enterprise networks
- network that uses wireless data connections between network nodes.
- Characters that give wifi a unique name
- allows the antennae to divide streams between multiple devices.
18 Clues: a triple-A protocol • Internet Protocol Address • Characters that give wifi a unique name • uses radio waves to transmit data from small circuit boards • allows the antennae to divide streams between multiple devices. • a new WFA security standard for personal and enterprise networks • network that uses wireless data connections between network nodes. • ...
Chapter 2 Vocabulary 2022-11-21
Across
- A type of ETF transaction; money is deposited directly into the customer's checking account.
- someone who assists you with purchasing stocks and bonds
- Any organization that provides services related to money
- A security that pays interest over terms of ten or thirty years.
- owners are personally liable for their company’s losses
- A security that matures in a year or loss.
Down
- A financial institution that does not accept deposits
- Action taken to manage supply of money and interest rate.
- A financial institution that accepts money from customers and deposits it into the customer's account.
- A document guaranteeing payment of a specific amount.
- A security that pays interest over terms ranging from two to ten years.
- A financial investment issued by a corporation, government, or other organization.
12 Clues: A security that matures in a year or loss. • A financial institution that does not accept deposits • A document guaranteeing payment of a specific amount. • owners are personally liable for their company’s losses • someone who assists you with purchasing stocks and bonds • Any organization that provides services related to money • ...
teka teki keamanan jaringan 2025-11-29
Across
- SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
- Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
- (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
- Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
- SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
- IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.
- DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
- MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
- Metodekeamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
- Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
- SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
- Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
- Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
Down
- Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
- Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
- Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
- Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
- Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
- SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
- Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
- Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.
21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah. • Memastikan hanya pengguna yang berwenang yang dapat mengakses data. • SECURITY Menjaga keamanan saat mengakses dan menjelajahi web. • Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah. • MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak. • ...
Bullying 2022-10-24
9 Clues: words • over a computer • wants to hurt you • a person that watches • bully that threats you • the person that stops it • punching hitting and kicking • the person that is being bullied • the person that touch’s you in spots you don’t want to be touch
Security Crossword Puzzle 2022-10-17
Across
- All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected
- Improper Security Practices, Classified data spills, Improper marking of classified information, Introduction, or use of unauthorized electronics
- An ongoing screening process to review the background of an individual who is already assigned to a sensitive position or has access to classified information.
- You must notify your FSO/CPSO of this at least 30 days before
- Giovanni Fiorella
- Controlled Unclassified Information
- Information or material the unauthorized disclosure of which reasonably could be expected to cause SERIOUS damage to national security
Down
- 800-424-9098
- Jay Triplett, Jason Hughes, and Bradley Beatty
- Non-Disclosure agreement
- Joey Barone
- Information or material the unauthorized disclosure of which reasonably could be expected to cause EXCEPTIONALLY GRAVE damage to national security
12 Clues: Joey Barone • 800-424-9098 • Giovanni Fiorella • Non-Disclosure agreement • Controlled Unclassified Information • Jay Triplett, Jason Hughes, and Bradley Beatty • You must notify your FSO/CPSO of this at least 30 days before • All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected • ...
Descriptions Of Tax Category 2026-03-05
Across
- National defense, nuclear weapons activities, war costs, and international security assistance.
- Income security programs, federal employee retirement and disability, and job training.
- Payments to retired and disabled individuals and managing the program
- Health care, housing, education and income security for veterans.
- Natural resources and environment, conservation
- Annual interest paid on the national debt, net of interest income received by assets the federal government owns.
- Legislative functions, federal employee salaries, tax refunds, maintaining federal properties and records
- Various departments responsible for trade, record keeping, and banking
- Homeland security, IRS Enforcement, border patrol and immigration, DEA
Down
- and support of air, water, ground, and other transportation.
- Elementary, secondary, higher and vocational education, employment training and social services for children and families
- Health care programs and serves, and occupation and consumer health & Safety.
12 Clues: Natural resources and environment, conservation • and support of air, water, ground, and other transportation. • Health care, housing, education and income security for veterans. • Payments to retired and disabled individuals and managing the program • Various departments responsible for trade, record keeping, and banking • ...
Shoulder surfing 2020-06-03
7 Clues: ponsel pintar • surat elektronik • bahasa inggris siber • akun punya id dan .... • orang yang melakukan hacking • yang dilakukan wanita di komik • facebook, whatsapp, instagram disebut
safe internet 2022-02-11
7 Clues: Διαδίκτυο • παιχνίδια (online gaming) • Hygiene υγιεινή των συσκευών • ερωτική επικοινωνία μέσω διαδικτύο • Κανόνες ορθής διαδικτυακής συμπεριφοράς • διαδικτυακός εκφοβισμός (cyberbullying) • Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα
FITDVocab.jg 2013-05-15
Across
- A port for a PlayStation2
- Where is something processed
- A written set of instructions
- Host A host that is on the internet, or a site hoster
- Manners Online
- When a new president gets assigned and uses a bible
- Random.........
- A server in the "sky"
- What is that tower thingy called?
- "Fidelity"
- Protecting Passwords online
- The made layout by a company or software
- A device that you use for the computer using a mechanical ball
- To restart your computer
- A HUGE search engine
- What "things" are installed on your computer?
- The way things are arranged
- Light emitting diodes, Light crystal display
- A website that is like an "engine"
- Where documents and Power-points are stored in
- A catchy phrase a company uses
- Online safety
- You need 8 of these to make a byte
- What is your screen called
Down
- Feeding something "out" of your computer
- Things you plug into your computer
- What does "©" stand for?
- What do you plug your flash-drive in?
- Those square things on your homepage on an iPhone
- A drive that is very, very important
- OSX,MAC,PC,WINDOWS7
- Online
- where do you plug in your headphones?
- the stuff inside your computer
- .docs .xcxl .pp
- Someone who provides their internet service
- think of a "disc Drive"
- Something that you type in, like "word"
- 1,000 of these equals a terabyte
- Something that feeds info "into" your computer
- Extra slots
- Something that you can call off of
- do you have 4G or 3G?
- A host that connects you to the internet
- When you "cite" a source, what is that called?
- A picture for a business
- Social security i_
47 Clues: Online • "Fidelity" • Extra slots • Online safety • Manners Online • .docs .xcxl .pp • Random......... • Social security i_ • OSX,MAC,PC,WINDOWS7 • A HUGE search engine • A server in the "sky" • do you have 4G or 3G? • think of a "disc Drive" • What does "©" stand for? • To restart your computer • A picture for a business • A port for a PlayStation2 • What is your screen called • ...
Semester 2 Religion Crossword 2022-05-15
Across
- church law enforced by force/violence
- no supernatural
- Islamic word for "God"
- western European philosophical movement
- monk inspired by Antony of Syria (wanted structure)
- a false teaching
- the killing of an unborn child
- what language was mass used to be said in?
- national internal order
- Islamic follower
- absolute Muslim law
- most depicted figure besides Jesus
- battles for the holy land
- anyone who didn't speak Latin or Greek
- monk who gave all Christians the Bible
- someone who dies for the faith
- warriors for God
- first book printed by Gutenberg's press
- became Paul after Jesus appeared to him on the road to Damascus
- international law and order to avoid war
- fired for massacring Samaritans, sent Jesus to his crucifixion
- God's plan of salvation in Jesus Christ
- Putin's experience with computers and cyber attacks
Down
- sister of Benedict
- "for the people," everyone can read it
- no belief in any god
- What country is under Putin's attack?
- place of the pope
- life should be centered around this gospel's chapter 28
- the supernatural is accepted
- a person who isn't Jewish
- What's one thing that depicts Christianity?
- war crimes, "just war"
- ninth month of the Islamic calendar
- biggest and strongest barbarian tribe
- "most holy"
- How was around 1,000,000 Muslims converted?
- english priest that was sentenced but never executed
- founder of Islam
- states rights vs omnipotent Federal gov.
- "God's true religion"
- freedom of speech, religion, etc (replaced European bias)
- equal maximum rights for all citizens under primary "law"
- patriarch for Putin
- Roman emperor who killed 400,000 Christians
- wealth, power, glory, and pleasure at the center of your life
- right wing extreme begun by Mussolini
- Roman officials (wear a collar)
- essential absolute truths of God
- corrupt priest who sold salvation
- who was Gabriel really to the Protestants?
51 Clues: "most holy" • no supernatural • a false teaching • Islamic follower • founder of Islam • warriors for God • place of the pope • sister of Benedict • absolute Muslim law • patriarch for Putin • no belief in any god • "God's true religion" • Islamic word for "God" • war crimes, "just war" • national internal order • a person who isn't Jewish • battles for the holy land • the supernatural is accepted • ...
Brices Puzzle 2024-01-05
Across
- The code of acceptable behaviors users should follow while on the Internet
- Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
- Device Any hardware component that allows you to enter data and instructions
- An applied science devoted to incorporating comfort
- Extortionist Someone who demands payment to stop an attack
- A small text file that a web server stores on your computer.
- A business transaction that occurs over an electronic network
- A collection of computers and mobile devices connected
- Device Any hardware component that conveys information from a computer or mobile device
- The number of horizontal and vertical pixels in a display device.
- The electronic component of a computer that interprets and carries
- Firewall A security tool that detects and protects a personal computer and its data
Down
- Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
- Device Convergence The trend of computers and devices with technologies
- Web Design A website development approach that adapts the layout of a website to fit the screen
- A program designed to make users more productive
- A collection of data organized in a manner that allows access, retrieval, and use of that data.
- Compression Tool Tool that shrinks the size of a file(s).
- A computer that delivers requested webpages
- Protector A device that uses electrical components to provide a stable current flow and minimize
- Someone who accesses a computer or network illegally.
- Vision Syndrome A technology-related health condition that affects eyesight.
- A compromised computer or device whose owner is unaware
- Aggregation A website or web app sometimes called a curation website
- Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
- System Number system that has just two unique digits, 0 and 1, called bits.
26 Clues: A computer that delivers requested webpages • A program designed to make users more productive • An applied science devoted to incorporating comfort • Someone who accesses a computer or network illegally. • A collection of computers and mobile devices connected • A compromised computer or device whose owner is unaware • ...
Computer Security and Ethics 2024-08-23
Across
- Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
- Make sure you use a different ____ for different sites and keep them long and complex.
- Computer activities often leave a digital ____ that leads back to the offender.
- You should regularly make a ____ of your data/photos.
- Blocks your access to your computer and files, asking you to pay a ransom to get it back.
- When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
- A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
- If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
- To protect your device from malware, you should install reputable ____ software and run frequent scans.
- If you download software, ____ it before running it.
Down
- Malware that damages files on your computer or stops your computer from running properly.
- Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
- When you copy sections of someone else's work and claim it is your own.
- Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
- Emails can spread malware, most often when you click links or open ____.
- People might feel more comfortable committing crimes on a computer because they feel like they are ____.
- When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
- Keep your operating system secure by running all the latest.
- Avoid making financial transactions on ____ networks or computers.
- Tries to open security holes in your computer so a hacker can gain access.
20 Clues: If you download software, ____ it before running it. • You should regularly make a ____ of your data/photos. • Keep your operating system secure by running all the latest. • Avoid making financial transactions on ____ networks or computers. • When you copy sections of someone else's work and claim it is your own. • ...
TETATEKI 2025-05-07
Across
- Kumpulan data atau dokumen yang disimpan di komputer
- Satuan terkecil dalam data digital
- Alat elektronik untuk mengolah data
- Alat input yang digunakan untuk menggerakkan pointer di layar
- Aplikasi untuk membuka halaman web
- Amanat atau wilayah dunia maya
- Fakta mentah yang bisa diolah menjadi informasi
- Surat elektronik
Down
- Perangkat lunak yang membantu komputer menjalankan tugas
- Hasil dari pengolahan data
- Perangkat output yang menampilkan gambar atau teks
- Jaringan komunikasi global yang menghubungkan komputer di seluruh dunia
- Tempat penyimpanan data secara online
- Perangkat keras dalam sistem komputer
- Alat input berupa papan ketik
15 Clues: Surat elektronik • Hasil dari pengolahan data • Alat input berupa papan ketik • Amanat atau wilayah dunia maya • Satuan terkecil dalam data digital • Aplikasi untuk membuka halaman web • Alat elektronik untuk mengolah data • Tempat penyimpanan data secara online • Perangkat keras dalam sistem komputer • Fakta mentah yang bisa diolah menjadi informasi • ...
Unit 3 + 4 2026-01-09
Across
- an important thing
- to get an advantage from something
- normally/ most of the time
- completely
- forever/can't be removed
- someone you want to be like or admire
- permanent mark on the skin caused by a cut or injury
Down
- to talk to each other or work together
- to give someone a particular job
- a man who is admired for doing something
- relating to computers
- a picture that is permanently marked onto your skin
- to give something a different colour using a dye
- needed or required
- what actually happens
15 Clues: completely • an important thing • needed or required • relating to computers • what actually happens • forever/can't be removed • normally/ most of the time • to give someone a particular job • to get an advantage from something • someone you want to be like or admire • to talk to each other or work together • a man who is admired for doing something • ...
Jace Keenhold 2017-09-07
Across
- Copyright / Taking something that's not yours
- Danger / Someone you don't know
- Media / Snapchat , Instagram
- Passwords / Good passwords
Down
- / The right way to communicate over the internet
- research / Finding things over the internet
- Domain / Public Information
- Plagiarism / Taking someone else's work
- bullying / Bullying over the internet
- Safety / Be safe on the internet
10 Clues: Passwords / Good passwords • Domain / Public Information • Media / Snapchat , Instagram • Danger / Someone you don't know • Safety / Be safe on the internet • bullying / Bullying over the internet • Plagiarism / Taking someone else's work • research / Finding things over the internet • Copyright / Taking something that's not yours • ...
STOP BULLYING !! 2024-02-19
Across
- memberi komentar negatif, menyebar gosip orang lain di medsos
- memukul, menendang, mendorong
- tempat untuk menuntut ilmu
- nama lain dari bullying
- pihak yang melihat terjadinya bullying
Down
- pihak yang melakukan tindakan bullying
- perilaku yang tidak menyenangkan secara verbal dan fisik
- pihak yang menerima tindakan bullying
- dengan sengaja mengabaikan, menyebarkan gosip
- menghina, menyindir, memanggil dengan julukan
10 Clues: nama lain dari bullying • tempat untuk menuntut ilmu • memukul, menendang, mendorong • pihak yang menerima tindakan bullying • pihak yang melakukan tindakan bullying • pihak yang melihat terjadinya bullying • dengan sengaja mengabaikan, menyebarkan gosip • menghina, menyindir, memanggil dengan julukan • perilaku yang tidak menyenangkan secara verbal dan fisik • ...
Crossword 2025-11-18
Across
- Watching somebody get picked on
- Who you should tell when somethings wrong
- media A way to communicate to others
- something that is yours
- bullying Picking on somebody online
Down
- a mean thing to say
- How to get into a account
- standing up for somebody
- Picking on somebody repeatedly
- How bullying can make someone feel
10 Clues: a mean thing to say • something that is yours • standing up for somebody • How to get into a account • Picking on somebody repeatedly • Watching somebody get picked on • How bullying can make someone feel • bullying Picking on somebody online • media A way to communicate to others • Who you should tell when somethings wrong
Cyber Security Crossword Puzzle 2022-01-30
Across
- The act of creating a fake identity online to exploit individuals they connect with on dating sites
- Malicious software which can be obtained after downloading suspicious files
- Ensure it is ''strong'' to reduce chances of getting hacked
Down
- Beware of these online thieves who uses computers to gain unauthorized access to data
4 Clues: Ensure it is ''strong'' to reduce chances of getting hacked • Malicious software which can be obtained after downloading suspicious files • Beware of these online thieves who uses computers to gain unauthorized access to data • The act of creating a fake identity online to exploit individuals they connect with on dating sites
Information Security Crossword 2017-02-15
Across
- Completion of Information Security and DPA annual training is ____________
- When you receive an email with a link to a bogus website it is called _________
- A type of use that should be limited when using Society systems ________
- This should only be installed on Society systems by approved administrators ______
- Something that can infect a PC/Laptop is known as a ________
- Personal information is protected by this act _______
- All colleagues must comply with these information security documents _______
- This should be worn at all times when on Society premises __________
- You should not allow others to do this when accessing Society premises ______
Down
- Always ensure your _________ is locked when you are away from your computer.
- A tidy desk is also known as a _________ desk
- When you received unsolicited email from unknown sources this is called ______
- These should never be shared __________
- It should be changed immediately if suspected of being compromised
- Information Security policies are published on it ___________
- Skipton may ______________ your internet usage
- Personal journal published on the World Wide Web ________
17 Clues: These should never be shared __________ • A tidy desk is also known as a _________ desk • Skipton may ______________ your internet usage • Personal information is protected by this act _______ • Personal journal published on the World Wide Web ________ • Something that can infect a PC/Laptop is known as a ________ • ...
High Security Estate 2017-01-31
17 Clues: Hands on • Wireless • Part of me • Spikey steel • Silver stripe • To come and go • Stop drop roll • Above standard • After a shampoo • More then a scan • fixteen in a room • To pay for company • Untidy place to eat • Party after a wedding • American word for phone • Provide relevant information • Location to catch a plane from
IFG Security Knowledge 2025-11-24
Across
- Primary source for finding SAP CPI
- Accredited area to work SAP
- F-22 ISSM
- F-22 CSSO
- Report travel to CSSO __ days prior to travel
- Willful or negligent action
- Days to complete PSQ Template 3 after travel
- Used to Nominate an individual for SAP Access
Down
- Provides guidance on security baseline policies
- Utilized to indicate the SAP accesses of LM Aero Employees
- Secure Voice/fax capable
- Dedicated unclassified F-22 program area
- F-16 CSSO
- Required form to request network access
- F-16 ISSM
- Individual whose program access is not maintained by LM Aero
- Risk Management Methodology
17 Clues: F-22 ISSM • F-16 CSSO • F-22 CSSO • F-16 ISSM • Secure Voice/fax capable • Accredited area to work SAP • Willful or negligent action • Risk Management Methodology • Primary source for finding SAP CPI • Required form to request network access • Dedicated unclassified F-22 program area • Days to complete PSQ Template 3 after travel • Report travel to CSSO __ days prior to travel • ...
Aidan's personality 2021-11-01
Across
- who I live with at the momment
- my fave yellowish colour
- being socially happy
- what I do when i'm sick and can't do anything else
- education
- what life is filled with! (words and all)
- what has me actively boogy
Down
- what I dance to!
- What the best cyber activity is
- what people love and deserve!
- my best friend (name starts with ge and ends with ge)
- my fave coding game
- fun with____
- what occupies me
14 Clues: education • fun with____ • what I dance to! • what occupies me • my fave coding game • being socially happy • my fave yellowish colour • what has me actively boogy • what people love and deserve! • who I live with at the momment • What the best cyber activity is • what life is filled with! (words and all) • what I do when i'm sick and can't do anything else • ...
INFORMATIKA 2024-08-13
Across
- Penghitungan dengan menggunakan komputer
- ilmu yang mempelajari tentang penggunaan komputer
- Salah satu aplikasi media sosial
- Pembelajaran secara online
- Dunia Maya
- Situs web berbagi video
- Media sosial yang didirikan oleh Mark Zuckerberg
Down
- Salah satu aplikasi penyedia layanan transportasi
- Salah satu aplikasi jual beli online
- Salah satu game online popular
- Pembelajaran secara offline
- Salah satu karakter dalam profil pelajar pancasila
- Seseorang yang tidak begitu mahir dalam bermain
- Metode pembayaran yang dilakukan secara langsung di tempat Pembeli setelah pesanan dari kurir diterima
14 Clues: Dunia Maya • Situs web berbagi video • Pembelajaran secara online • Pembelajaran secara offline • Salah satu game online popular • Salah satu aplikasi media sosial • Salah satu aplikasi jual beli online • Penghitungan dengan menggunakan komputer • Seseorang yang tidak begitu mahir dalam bermain • Media sosial yang didirikan oleh Mark Zuckerberg • ...
cyber threats and security 2026-01-19
Across
- use to conduct terrorism though computer
Down
- Hover over links to check for fake URLs.
- refers to illegal entry to the computer
- a criminal act involving the unauthorized creation, modification, or imitation of an object—most commonly a document or signature—with the specific intent to deceive or defraud others.
4 Clues: refers to illegal entry to the computer • Hover over links to check for fake URLs. • use to conduct terrorism though computer • a criminal act involving the unauthorized creation, modification, or imitation of an object—most commonly a document or signature—with the specific intent to deceive or defraud others.
Bullying 2023-10-23
Across
- The use of technology to harass, threaten, embarrass, or target another person
- A tool to verbally bully
- Spread behind peoples back
- A Bird that cyberbullies
- Saying or writing mean things
- Involves hurting someone’s reputation or relationships
Down
- Person who is nearby or a witness to a bullying situation
- A tool to cyberbully
- Hurting a person’s body or possessions
- Person who steps in to stop a bullying situation
- A tool to physically bully
- Target
- Aggressor
13 Clues: Target • Aggressor • A tool to cyberbully • A tool to verbally bully • A Bird that cyberbullies • A tool to physically bully • Spread behind peoples back • Saying or writing mean things • Hurting a person’s body or possessions • Person who steps in to stop a bullying situation • Involves hurting someone’s reputation or relationships • ...
Once Upon a Time Ada 2021-10-01
Across
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- The ? gardener was willing to travel to different places where there was work.
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
Down
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Nervously, the resident noticed the ? of a figure below the street light.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- Residents ? their fears of criminals by putting in security devices for their homes.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
Investing Unit 2024-03-20
Across
- At what age can you collect even more benefits from Social Security if you wait
- Ease with which an asset or security can be converted into cash without affecting the market price
- A sustained period of rising prices and optimistic sentiment in a financial market
- These funds are sold actively throughout the day and are Passively managed
- How can I buy a Mutual Fund
- An individual who buys and sells with the intention of profiting short term
- Bonds issued by company that have a fixed interest rate and face value
- At what age can you invest in Crypto
- Portion of the company's earnings distributed to shareholders as a return on investment
- Profit realized from sale of a capital asset like stock or real estate
- What indices comprises 30 blue chip companies?
- Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
- An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
- Buying different stocks from different companies
- Investing equal amounts of money at regular intervals
- At what age must you take a minimum from your retirement accounts each year (RMD)
- These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
- The age you can start collecting Social Security
- The process of offering shares of a private corporation to the public in a new stock issuance
- This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
- A unique combination of letters to represent a particular publically traded company's stock or security
- A security that represents ownership of a fraction of a corporation
- Retirement account where money goes in after tax and is taken out penalty and tax free
- Bonds issued by the Government where you pay under face value and don't pay interest
- Retirement account where money is put in before taxes but is taken out taxed
- A market where prices are falling and a pessimistic outlook overall
- Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
- This is a federal payroll tax that is deducted from every paycheck
- Types of jobs that usually offer a pension
- Investing a big sum of money in one go
30 Clues: How can I buy a Mutual Fund • At what age can you invest in Crypto • Investing a big sum of money in one go • Types of jobs that usually offer a pension • What indices comprises 30 blue chip companies? • Buying different stocks from different companies • The age you can start collecting Social Security • Investing equal amounts of money at regular intervals • ...
EMD Polices & Procedures 2024-04-09
Across
- _______ is to be completed every time a foreign national enters the shop for a tour
- Badge worn by visitors who are sole US citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
- Looking for on visitor ID
- Application used for alarms and event view
- This badge has a yellow background with red lettering
- Required any time work is being done inside the building that could potentially spark a fire
- Post where you control and perform 100% vehicle inspections
- Sticker on a personal owned cell phone that have been approved by EMD security
- Members of _______ assume control over all emergency situations
- Temporary badges can only be issued and returned to _______
- Only post that is manned from 0630-2230 Monday thru Friday
- Issued to employees and long term contractors to identify a vehicle in the parking lot
- These passes are issued for a maximum of 5 days at a time
- This form is used for all reports beside that of an injury report bomb threat or the DAR
- Inspection performed by security officers to ensure that employees are using their assigned badge
- _______are issued if a person's vehicle information is not in the system
Down
- Form generated by and issued by the purchasing department authorizing equipment to be removed
- Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
- CW-EMD cleared employee has a _______on their badge
- 2 pop-up windows in security expert
- _______ book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
- All visitors must have a _______completed in order to allowed into the facility or do work on the grounds
- Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard
- _______visitors wearing this must always have a EMD escort with them
- Document needed when taking company property off site
- FN are permitted to have electronics in this area ONLY
- How many steps to disable or enable fire panel
- Document with information that must be reported to the next officer
- Badge color reserved specifically for Foreign Nationals
- Secured area located in Bldg 3A 2nd floor
- This report is a firsthad account of the activities the security officer performed while on duty
- What type of alarm is High Water bldg 12
32 Clues: Looking for on visitor ID • 2 pop-up windows in security expert • What type of alarm is High Water bldg 12 • Secured area located in Bldg 3A 2nd floor • Application used for alarms and event view • How many steps to disable or enable fire panel • CW-EMD cleared employee has a _______on their badge • This badge has a yellow background with red lettering • ...
EMD Polices & Procedures 2024-04-08
Across
- All visitors must have a _______ completed in order to be allowed into the facility or do work on the grounds
- _______visitors wearing this must always have a EMD escort with them
- These passes are issued for a maximum of 5 days at a time
- Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
- Document with information that must be reported to the next officer
- Form generated by and issued by the purchasing department authorizing equipment to be removed from the site
- Badge worn by visitors who are sole US Citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
- Only post that is manned from 0630-2230 Monday thru Friday
- _______book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
- Issued to employees and long term contractors to identify a vehicle in the parking lot
- Application used for alarms and event view
- _________is to be completed every time a foreign national enters the shop for a tour
- What type of alarm is High Water bldg 12
- Looking for on visitor ID
- Stickers on a personal owned cell phone that have been approved by EMD Security
- Badge color reserved specifically for Foreign Nationals
- Inspection performed by security officers to ensure that employees are using their assigned badge
Down
- This badge has a yellow background with red lettering
- Post where you control and perform 100% vehicle inspections
- Form used by employee to declare and drop off incoming business necessary computer storage/media at Central guard
- 2 pop-up windows in security expert
- Document needed when taking company property off site
- CW-EMD cleared employee has a __________ on their badge
- Members of _______ assume control over all emergency situations
- Reuqired any time work is being done inside the building that could potentially spark a fire
- ________are issued if a person's vehicle information is not in the system
- Temporary badge can on be issued and returned to _______
- How many steps to disable or enable fire panel
- Secure area located in Bldg 3A 2nd floor
- This report is a firsthand account of the activities the security officer performed while on duty
- FN are permitted to have electronics in this area only
- This form is used for all reports besides that of an injury report bomb threat or the DAR
32 Clues: Looking for on visitor ID • 2 pop-up windows in security expert • Secure area located in Bldg 3A 2nd floor • What type of alarm is High Water bldg 12 • Application used for alarms and event view • How many steps to disable or enable fire panel • This badge has a yellow background with red lettering • Document needed when taking company property off site • ...
balduini paolo 2021-11-21
Across
- indirizzo web o ....
- bullismo in rete
- netiquette ti insegna il ...... del web
- "mi piace navigare sul ....."
- sul web ce ne sono tantissimi
Down
- non puoi postare tutto ciò che vuoi...
- chi fa bullismo in rete
- non usarle a caso!
- strumento di ricerca più usato al mondo
- una lettera scritta dal computer
- prima di navigare sul web chiedi il .... ai tuoi genitori
- abbreviazione di "applicazione"
12 Clues: bullismo in rete • non usarle a caso! • indirizzo web o .... • chi fa bullismo in rete • "mi piace navigare sul ....." • sul web ce ne sono tantissimi • abbreviazione di "applicazione" • una lettera scritta dal computer • non puoi postare tutto ciò che vuoi... • strumento di ricerca più usato al mondo • netiquette ti insegna il ...... del web • ...
Online Safety 2023-01-29
Across
- security updates for software
- An unsecure Wi-Fi network
- Norton, McAfee, AVAST, or AVG
- weak-point in a network or system
- broad term for viruses
- like adware but sent to hackers
- confirming a user's identity
- using your click against you
- records info for advertising purposes
Down
- records keystrokes
- scan an IP address for open ports
- username and password
- common in forums and social media
- Login now www.amazon1.com
- Encrypts data, demands payment
- rule-based network security
- unsolicited or malicious emails
- Browse securely, or work remotely
- scrambled text meant to confuse bots
- overwhelms a servers resources
20 Clues: records keystrokes • username and password • broad term for viruses • An unsecure Wi-Fi network • Login now www.amazon1.com • rule-based network security • confirming a user's identity • using your click against you • security updates for software • Norton, McAfee, AVAST, or AVG • Encrypts data, demands payment • overwhelms a servers resources • unsolicited or malicious emails • ...
Volunteer 2013-03-04
Across
- Alcohol-based hand rub
- Body system supporting the spine
- Who is responsible for security?
- The most single effective way of removing bacteria from hands
- Security office location
- Bacteria in or on the body not causing illness
- Fibrous tissue that links together two bones
- Remove Alert Contain Evacuate
- Potential to harm health & safety of a person
Down
- Posture position with least stress
- Work Health & Safety
- Used to wash hands
- 33 (2 words)
- Micro-organisms
- A spinal structure
- Relates to work evironment
- Bacteria in or on the body causing illness
- Attach muscles to bone
- Code Red
- Report incidents to
20 Clues: Code Red • 33 (2 words) • Micro-organisms • Used to wash hands • A spinal structure • Report incidents to • Work Health & Safety • Alcohol-based hand rub • Attach muscles to bone • Security office location • Relates to work evironment • Remove Alert Contain Evacuate • Body system supporting the spine • Who is responsible for security? • Posture position with least stress • ...
La Snoer crosswords 2014-09-10
Across
- Spreker
- Toegangscontrole tot beschermd gebied
- Renaissancestad in Italie
- Afkorting van Nuclear Security Summit
- Vliegbelasting
- Moment waarop aandelen van een NV voor de eerste keer naar de effectenbeurs worden gebracht
- zoutjes gemaakt van flinterdunne aardappelschijfjes
- Getallen in kalenderjaar
- Ruggenraat (Engelse vertaling)
- Hoofdstad van Flevoland
- Film met Tom Hanks
- Engelse lowcost carrier
- Zuid Afrikaanse antilope
Down
- Onderricht
- voormalig bezoekerscentrum van Schiphol
- Vulkaan in IJsland
- Spaanse lowcost carrier
- Iranier
- Start- en landingsbaan ten westen van de Zwanenburgbaan
- Neerleggen van werk
- Watervogel
- Veiligheid
- Rechterhand van Sinterklaas
- Vloeistoffen (Engelse vertaling)
- Haarspul
- Miscalculatie
26 Clues: Spreker • Iranier • Haarspul • Onderricht • Watervogel • Veiligheid • Miscalculatie • Vliegbelasting • Vulkaan in IJsland • Film met Tom Hanks • Neerleggen van werk • Spaanse lowcost carrier • Hoofdstad van Flevoland • Engelse lowcost carrier • Getallen in kalenderjaar • Zuid Afrikaanse antilope • Renaissancestad in Italie • Rechterhand van Sinterklaas • Ruggenraat (Engelse vertaling) • ...
Hanshaft Crossword 2015-06-18
Across
- opposite of DK'ed
- cash or stock _
- attorney letter
- not today but tomorrow
- buyout
- identifying number
- broker
- money due you
- reregistration company
- paper form
- into two or more
- holdings
- to vote
- bid price
- trading happens
- another word for money
- __exchange
Down
- Intelligent _
- Acquire shares
- cash or _
- transferrable
- trade shares
- It is a debt security
- 1 ½ by 1 ¾
- shares in a basket
- payout
- Another word for shares
- assets held here
- money earned
- stocks traded
- taxes
- buy 100_
- A preliminary prospectus
- expiring contract
34 Clues: taxes • payout • buyout • broker • to vote • holdings • buy 100_ • cash or _ • bid price • 1 ½ by 1 ¾ • paper form • __exchange • trade shares • money earned • Intelligent _ • transferrable • stocks traded • money due you • Acquire shares • cash or stock _ • attorney letter • trading happens • assets held here • into two or more • opposite of DK'ed • expiring contract • shares in a basket • identifying number • ...
Good luck , MT77 !!! 2026-02-27
Across
- Rising price levels
- Business cost
- Money movement
- Asset value decrease
- Loan security asset
- Risk protection coverage
- Property purchase loan
- Valuable resource owned
- Financial obligation owed
- Spending plan
- Borrowing ability
- Shareholder payment
- Cash conversion ease
Down
- Legal debt inability
- Financial deficit
- Collection of investments
- Money used to earn returns
- Money set aside
- Total business income
- Ownership value
- Borrowed money
- Funds for business use
- Account amount remaining
- Financial gain
- Falling price levels
- Company ownership share
- Government charge
- Cost of borrowing
- Debt investment security
- Account withdrawal entry
30 Clues: Business cost • Spending plan • Money movement • Borrowed money • Financial gain • Money set aside • Ownership value • Financial deficit • Government charge • Cost of borrowing • Borrowing ability • Rising price levels • Loan security asset • Shareholder payment • Legal debt inability • Asset value decrease • Falling price levels • Cash conversion ease • Total business income • Funds for business use • ...
informatika keresztrejtvény 2023-06-07
Across
- valami kiadása megosztása
- valótlan fotók,hirek terjesztése másról
- lábnyom az interneten rólunk tárolt adatok,keresési előzmények
- véletlenszerű számot generál
- lopás valaki másnak
Down
- a számítógép kézzrl fogható részei
- funkcionalitás rendszerek amiket telepítve újabb és ujabb funkciok erhetők el
- személyes titkok,információk megosztása másról
- visszatérő sértő/bántó üzenetek
- bullying egy személy online térben való zaklatása
- betűk gyakoritsága magyar nyelvben
11 Clues: lopás valaki másnak • valami kiadása megosztása • véletlenszerű számot generál • visszatérő sértő/bántó üzenetek • a számítógép kézzrl fogható részei • betűk gyakoritsága magyar nyelvben • valótlan fotók,hirek terjesztése másról • személyes titkok,információk megosztása másról • bullying egy személy online térben való zaklatása • ...
Chapter 11 Crossword Puzzle 2023-10-19
Across
- A highly secure correctional facility which houses the worst criminal
- jail designed to encourage interactions between inmates and jail officials
- inmates separated at all times with activities in their individual cells
- The prison official in charge
- prison prison designed giving inmates a great deal of freedom
- the time spent in jail prior to being sentenced
- disciplinary action ordering inmates to their cells
- The security designation given to new inmates
Down
- Correctional facilities not operated by the government
- early form of correctional facility
- holds inmates awaiting trial or sentences of year or less
- inmates incarcerated in jail awaiting trial
- screening of inmates determining their security level
- Inmates kept in separate cells but worked together in silence
- reimbursement for costs of housing inmates
15 Clues: The prison official in charge • early form of correctional facility • reimbursement for costs of housing inmates • inmates incarcerated in jail awaiting trial • The security designation given to new inmates • the time spent in jail prior to being sentenced • disciplinary action ordering inmates to their cells • screening of inmates determining their security level • ...
Rule of Thoughts Crossword Puzzle 2023-02-27
Across
- computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist
- VirtNet Security
- a computer generated life-form created by Kaine in the VirtNet which is transferred to the real world placed in the body of a human being and essentially removing that person's identity and replacing it with their manufactured ones
Down
- a program designed by Kaine in order to resurrect Tangents from the VirtNet and insert them into the real world and using human bodies as the hosts taking over the planet
- an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience.
5 Clues: VirtNet Security • computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist • an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience. • ...
Cyberbullying 2022-09-29
Across
- to be protected from risks and danger
- a false story about someone else
- extremely offensive or insulting
- controlled or connected to a computer
- computer, information, technology
- someone's individual online account
Down
- someone who feels hurt and upset
- online communication via typing
- share videos and photos with friends
- a person who purposely intimidates people
10 Clues: online communication via typing • someone who feels hurt and upset • a false story about someone else • extremely offensive or insulting • computer, information, technology • someone's individual online account • share videos and photos with friends • to be protected from risks and danger • controlled or connected to a computer • a person who purposely intimidates people
internet saftey 2024-02-27
10 Clues: are mean people • needs to be strong • to use there matrial • try to take your money • can show you bad stuff • steal your personal info • info needs to be private • has a lot of dangerous stuff • bullies are trying to hurt your feelings • email is trying to get you to spread your info
Stop Bullying 2024-09-13
Across
- penyebab anak melakukan bullying
- Karakteristik perilaku pelaku bullying
- mengintimidasi, mengucilkan, mengabaikan
- memaki, memfitnah, mengejek, mengancam
Down
- Perilaku agresif dan negatip seseorang atau sekelompok orang secara berulang kali
- Dampak korban bullying
- cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang
- Ketika melihat kejadian bullying di sekolah
- memukul, menampar, memalak, mendorong
- Upaya mencegah bullying
10 Clues: Dampak korban bullying • Upaya mencegah bullying • penyebab anak melakukan bullying • memukul, menampar, memalak, mendorong • Karakteristik perilaku pelaku bullying • memaki, memfitnah, mengejek, mengancam • mengintimidasi, mengucilkan, mengabaikan • Ketika melihat kejadian bullying di sekolah • cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang • ...
Zajedno za bolji internet 2023-03-01
Across
- (eng.)za elektroničko nasilje
- kod koji netko koristi za privatnost
- na njima se treba biti oprezan
- komuniciranje s drugima preko interneta
- namjenjeno za povećanje znajna onome kome je namijenjeno
- nasilje preko elektronike
- tragovi tragovi koje ne namjerno stavljamo na internet
Down
- ogromno i opasno mijesto
- neispravna informacija
- naša sigurnost na svakoj stranici
- (eng.) za kolačići
- tragovi tragovi koje namjerno stavljamo na internet
- tragovi koje ostavljaš na internetu
- neželjna pošta
14 Clues: neželjna pošta • (eng.) za kolačići • neispravna informacija • ogromno i opasno mijesto • nasilje preko elektronike • (eng.)za elektroničko nasilje • na njima se treba biti oprezan • naša sigurnost na svakoj stranici • tragovi koje ostavljaš na internetu • kod koji netko koristi za privatnost • komuniciranje s drugima preko interneta • ...
Bullying 2023-02-14
Across
- You're a loser no one likes you
- causing harm or injury to another
- posting or sending mean info
- The NH state ______ is for people under 18
- you shouldn't share ________ info online
- leaving someone out to humiliate them
- to spread embarrassing information about someone
Down
- what you should do if you see bullying happening
- Watches ignores or laughs
- Bullying creates an imbalance of power
- The person making someone feel unsafe
- making someone feel alone
- feels unsafe or is harmed
- someone who helps
14 Clues: someone who helps • Watches ignores or laughs • making someone feel alone • feels unsafe or is harmed • posting or sending mean info • You're a loser no one likes you • causing harm or injury to another • The person making someone feel unsafe • leaving someone out to humiliate them • Bullying creates an imbalance of power • you shouldn't share ________ info online • ...
Fall 2024-09-21
Across
- Disney's movie of celebration
- Be cautious with sharp edges and candles around them
- Day before Saints day
- Popular name for autumn celebrations
- Children dread going back
- Fattest day of the year
Down
- A staple poultry in November
- The most and best sign in the world
- 2 week celebration in Germany
- Important to do this before winter.
- Length in months
- Black Friday and Cyber Monday are ...... days???
- Bill signed June of 1984
- Most know for during this time
14 Clues: Length in months • Day before Saints day • Fattest day of the year • Bill signed June of 1984 • Children dread going back • A staple poultry in November • Disney's movie of celebration • 2 week celebration in Germany • Most know for during this time • The most and best sign in the world • Important to do this before winter. • Popular name for autumn celebrations • ...
Once Upon a Time Ada 2021-10-01
Across
- Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
- During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
- Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
- For their safety, they ? to the Neighbourhood Watch program.
- ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
- Nervously, the resident noticed the ? of a figure below the street light.
- Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
- The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
- They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
- The ? gardener was willing to travel to different places where there was work.
- Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
Down
- Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
- Residents ? their fears of criminals by putting in security devices for their homes.
- ?, the stranger approached the woman and her child for some help, frightening them in the process.
- Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
- Due to neglect, some of the ? of the homes required some painting and repairs.
- As ? for the broken security alarm, the company offered them six months of service for no charge.
- The large security company offered a(an) ? of security systems meeting most people’s income and needs.
- When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
- As usual, the father was ? by the beeping of his phone at 6:00 am.
- Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
- Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
- The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
- Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
24 Clues: For their safety, they ? to the Neighbourhood Watch program. • As usual, the father was ? by the beeping of his phone at 6:00 am. • Nervously, the resident noticed the ? of a figure below the street light. • Due to neglect, some of the ? of the homes required some painting and repairs. • ...
Positive Peer Influence 2021-01-22
8 Clues: Use _____________ for good. • __________ before you post. • Be _________ of what you post. • Do not spread ____________ news. • Respect for self and _____________. • Be a ___________ peer influence online. • Do not post ____________ messages online. • Be an _____________ and don't ignore cyber bullying.
Hanshaft Crossword 2015-06-18
Across
- trade shares
- opposite of DK'ed
- broker
- reregistration company
- to vote
- trading happens
- money due you
- paper form
- buyout
- attorney letter
- transferrable
- 1 ½ by 1 ¾
- buy 100_
- payout
- Another word for shares
- cash or stock _
- holdings
Down
- into two or more
- expiring contract
- assets held here
- stocks traded
- bid price
- not today but tomorrow
- taxes
- identifying number
- shares in a basket
- A preliminary prospectus
- Intelligent _
- It is a debt security
- money earned
- Acquire shares
- cash or _
- __exchange
- another word for money
34 Clues: taxes • broker • buyout • payout • to vote • buy 100_ • holdings • bid price • cash or _ • paper form • 1 ½ by 1 ¾ • __exchange • trade shares • money earned • stocks traded • money due you • Intelligent _ • transferrable • Acquire shares • trading happens • attorney letter • cash or stock _ • into two or more • assets held here • expiring contract • opposite of DK'ed • identifying number • shares in a basket • ...
AKS Crossword Puzzle 2024-07-22
Across
- Industry leader key machine
- Plug that hole
- Fill
- Keys or shavings
- .003 or .005, that is the question
- Picking & decoding in one
- High security key
- Favorite distributor of locksmith
- Metal tail
- Black mess lube
- Head
Down
- Slippery magic in a bottle
- High security angle cuts
- 10B
- Core quick-swap
- Recombinate
- Chicago ace
- Lock or nose
- Opposite of Kwikset
- The original ic core
- Push buttons and pull levers
- Pop a latch or pass a pin
- Favorite tool of the scammer
- Inner cylinder part
- Org loved and hated by auto locksmiths
25 Clues: 10B • Fill • Head • Metal tail • Recombinate • Chicago ace • Lock or nose • Plug that hole • Core quick-swap • Black mess lube • Keys or shavings • High security key • Opposite of Kwikset • Inner cylinder part • The original ic core • High security angle cuts • Picking & decoding in one • Pop a latch or pass a pin • Slippery magic in a bottle • Industry leader key machine • Push buttons and pull levers • ...
Cybersecurity crossword 2023-04-22
Across
- unaware software vulnerability attacked
- computer damaging, harmful software
- website shutdown using multiple devices
- security during initial production stages
- seemingly harmless but malicious malware
- locks computer until random paid
- scrambling data method
- slows computer with unwanted ads
- required identification changing system settings
- Online repeated harassment
Down
- implements security for computer system
- access blocked for unauthorized users
- click hidden element, opening malware
- work policy for personal device
- misleading edited picture or video
- program designed to remove malware
- compromised system infecting other systems
- service for remotely connected wifi
- the guarding against unauthorized access
- personal information stealing tactic
20 Clues: scrambling data method • Online repeated harassment • work policy for personal device • locks computer until random paid • slows computer with unwanted ads • misleading edited picture or video • program designed to remove malware • computer damaging, harmful software • service for remotely connected wifi • personal information stealing tactic • ...
Security Terminology Puzzle (Participation 3) - Emily Pedrazzi 2023-01-25
Across
- Many devices attack a target.
- Creates an encrypted tunnel.
- Many compromised computers sending cyberattacks.
- Detects and protects against malware.
- Pay to regain access to systems.
- Malicious software.
- Tricks users into providing information.
- Attack that exploits new vulnerabilities.
- Cisco's entry-level network certification.
- Someone who exploits vulnerabilities.
- Someone who penetration tests organizations.
Down
- Scrambles sensitive data; must decrypt.
- Saves hardware costs; increases risk.
- Legitimate app containing harmful malware.
- Free Internet access.
- Falsified media used for harm.
- Blocks unusual traffic and users.
- CompTIA's entry-level security certification.
- Sensitive information exposed to attackers.
- Requires users to confirm identity.
20 Clues: Malicious software. • Free Internet access. • Creates an encrypted tunnel. • Many devices attack a target. • Falsified media used for harm. • Pay to regain access to systems. • Blocks unusual traffic and users. • Requires users to confirm identity. • Saves hardware costs; increases risk. • Detects and protects against malware. • Someone who exploits vulnerabilities. • ...
