cyber security Crossword Puzzles

Health crossword 2022-10-24

Health crossword crossword puzzle
Across
  1. someone who constantly hurts someone
  2. someone who stands and watches
  3. someone who stands up for victim
  4. hitting punching
  5. a process of hurting yourself
Down
  1. being sad for a small portion of time
  2. name calling and mean words
  3. being mean online
  4. being sad for 1 or more weeks
  5. of process of decisions

10 Clues: hitting punchingbeing mean onlineof process of decisionsname calling and mean wordsbeing sad for 1 or more weeksa process of hurting yourselfsomeone who stands and watchessomeone who stands up for victimsomeone who constantly hurts someonebeing sad for a small portion of time

Bullying dan emosional 2024-01-16

Bullying dan emosional crossword puzzle
Across
  1. cara mengendalikan emosi pada diri sendiri...
  2. apa itu emosional...
  3. bullying dengan cacian dan umpatan kebencian merupakan bullying berupa
  4. bagaimana cara mengendalikan emosi...
  5. apa penyebab terjadinya emosional...
Down
  1. apa dampak emosional..
  2. pembullyan melalui teknologi, merupakan ..... Bullying
  3. tindakan kekerasan dengan memukul merupakan salah satu bentuk bullying....
  4. pihak yang terlibat dalam bullying?
  5. bullying adalah suatu tindakan...

10 Clues: apa itu emosional...apa dampak emosional..bullying adalah suatu tindakan...pihak yang terlibat dalam bullying?apa penyebab terjadinya emosional...bagaimana cara mengendalikan emosi...cara mengendalikan emosi pada diri sendiri...pembullyan melalui teknologi, merupakan ..... Bullying...

Bullying, Conflict and Being Mean 2024-03-10

Bullying, Conflict and Being Mean crossword puzzle
Across
  1. A Maori representation of a person's life through their wellbeing
  2. Bullying through the digital world
  3. Every now and then
  4. Yin and Yang
  5. In the open
Down
  1. Bullying through the use of physical actions
  2. Two sides
  3. In secret
  4. Bullying through the use of words
  5. Synonym for repeated

10 Clues: Two sidesIn secretIn the openYin and YangEvery now and thenSynonym for repeatedBullying through the use of wordsBullying through the digital worldBullying through the use of physical actionsA Maori representation of a person's life through their wellbeing

QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen 2025-07-24

QR-Codes: Diese kleinen Quadrate, die dein Leben ruinieren wollen crossword puzzle
Across
  1. - Zweiter Faktor, der kompromittiert wurde
  2. - Die Art des Cyberangriffs
  3. - Wohin der QR-Code tatsächlich führt
  4. - Der visuelle Köder im Angriff
Down
  1. - Der Übertragungsweg des Angriffs
  2. - Die App zur Login-Verifizierung
  3. - Psychologischer Trick in der Nachricht
  4. - Das gestohlene Element zur Umgehung des Logins
  5. - Der gefälschte Login-Dienst
  6. - Rogers Rolle in diesem Cyber-Drama

10 Clues: - Die Art des Cyberangriffs- Der gefälschte Login-Dienst- Der visuelle Köder im Angriff- Die App zur Login-Verifizierung- Der Übertragungsweg des Angriffs- Rogers Rolle in diesem Cyber-Drama- Wohin der QR-Code tatsächlich führt- Psychologischer Trick in der Nachricht- Zweiter Faktor, der kompromittiert wurde...

CYBER SAFETY 2023-01-02

CYBER SAFETY crossword puzzle
Across
  1. LIKE CATFISHING BUT ONLINE
  2. BAD OR DANGEROUS
  3. CODE TO HARM COMPUTERS
  4. CODE TO STEAL COMPUTER DATA
  5. RELATING TO THE COMPUTER CULTURE
Down
  1. PROGRAMS USED BY COMPUTERS
  2. SHORT FOR MALICIOUS SOFWARE
  3. SHOULD BE STRONG AND LONG

8 Clues: BAD OR DANGEROUSCODE TO HARM COMPUTERSSHOULD BE STRONG AND LONGLIKE CATFISHING BUT ONLINEPROGRAMS USED BY COMPUTERSSHORT FOR MALICIOUS SOFWARECODE TO STEAL COMPUTER DATARELATING TO THE COMPUTER CULTURE

CIS178 Cybersecurity Crossword Puzzle 2023-04-19

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. authentication using physical characteristics
  2. people carrying out specific actions
  3. software that installs itself secretly
  4. highly targeted phishing attacks
  5. virus disguised as legitimate software
  6. protect personal data
  7. users directed towards fake websites
  8. updates to improve security
Down
  1. permission to be on hard-drive
  2. security feature to detect hacking
  3. users denied access to services
  4. mathematical fuction that protects information
  5. attempting to obtain sensitive information
  6. prevents unauthorized access
  7. program added for entertainment
  8. emails asking for sensitive information
  9. detect and remove viruses
  10. software that makes data unstable
  11. secret software installed on hard-drive
  12. shared storage accessed online

20 Clues: protect personal datadetect and remove virusesupdates to improve securityprevents unauthorized accesspermission to be on hard-driveshared storage accessed onlineusers denied access to servicesprogram added for entertainmenthighly targeted phishing attackssoftware that makes data unstablesecurity feature to detect hacking...

spanish travel words 2020-04-10

spanish travel words crossword puzzle
Across
  1. What you go through before you enter a country with costumes
  2. train checker
  3. sleeping car
  4. security screenings
  5. train car
  6. first class
  7. boarding pass
  8. flight
  9. suitcase
  10. bunk bed
  11. safety belt
  12. delayed
  13. airport
  14. platform
  15. ticket
  16. window
  17. passenger
  18. waiting room
  19. passport
  20. arrival
  21. train station
  22. visa
  23. seat
  24. on time
Down
  1. economy class
  2. a stop
  3. security agent
  4. flight assistant
  5. departure
  6. second class
  7. aisle
  8. carry on luggage
  9. luggage
  10. boarding gate
  11. international airport
  12. baggage claim
  13. window
  14. flight connection
  15. event ticket
  16. layover
  17. check in counter
  18. ticket
  19. trip/travel

43 Clues: visaseataislea stopflightwindowticketwindowticketluggagedelayedairportlayoverarrivalon timesuitcasebunk bedplatformpassportdeparturetrain carpassengerfirst classsafety belttrip/travelsecond classsleeping carevent ticketwaiting roomeconomy classtrain checkerboarding gatebaggage claimboarding passtrain stationsecurity agentflight assistant...

fnaf crossword 2023-05-19

fnaf crossword crossword puzzle
Across
  1. possess the puppet
  2. this is where your story ends
  3. was the first, saw everything
  4. main character
  5. most confusing character
  6. the most brutal thing in all of fnaf
  7. died in the bite of 83
  8. hello, hello?
  9. gave his creator nightmares
  10. leave the demon to his demons
  11. main villain
  12. everybody hates
Down
  1. but that's just a theory
  2. remember
  3. who we play as in security breach
  4. the dj in security breach
  5. most confusing minigame
  6. main mascot
  7. caused the bite of 87
  8. the king of fnaf
  9. the most popular character
  10. possess baby
  11. the vengeful spirit

23 Clues: remembermain mascotpossess babymain villainhello, hello?main charactereverybody hatesthe king of fnafpossess the puppetthe vengeful spiritcaused the bite of 87died in the bite of 83most confusing minigamebut that's just a theorymost confusing characterthe dj in security breachthe most popular charactergave his creator nightmares...

Cyber security cross word 2023-04-28

Cyber security cross word crossword puzzle
Across
  1. A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
  2. A file or code that infects, explores, steals or conducts any behavior an attacker wants.
Down
  1. A wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  2. A security network that protects your network/devices from unwanted traffic.

4 Clues: A security network that protects your network/devices from unwanted traffic.A file or code that infects, explores, steals or conducts any behavior an attacker wants.A wireless networking technology that uses radio waves to provide wireless high-speed Internet access....

Synopsys 12 Days of AppSec 2023-12-08

Synopsys 12 Days of AppSec crossword puzzle
Across
  1. A method of AppSec testing in which testers examine an application while it’s running, but have no knowledge of the application’s internal interactions or designs at the system level, and no access or visibility into the source program.
  2. A trending practice in application security (AppSec) that involves introducing security earlier in the software development life cycle (SDLC).
  3. A descriptive model that provides a baseline of observed activities for software security initiatives.
  4. An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities.
  5. Software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
  6. A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users.
Down
  1. The processes, practices, and tools used to identify, repair, and protect against vulnerabilities in applications, throughout the software development life cycle (SDLC)
  2. The combination of practices and tools designed to increase an organization’s ability to deliver applications and services faster than traditional software development processes
  3. A structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
  4. An authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system.
  5. Flaw in a computer system that weaken the overall security of the device/system.
  6. An inventory of what makes up a software application

12 Clues: An inventory of what makes up a software applicationFlaw in a computer system that weaken the overall security of the device/system.A descriptive model that provides a baseline of observed activities for software security initiatives.A type of social engineering attack that aims to exploit the naivety and/or gullibility of legitimate system users....

Malware 2022-10-21

Malware crossword puzzle
Across
  1. can been installed on a users computer once an authorised user has initially gained access through another type of malware​.It is designed to give the creator a 'root' in to the computer. They are similar to backdoors/trapdoors but they allow access to the whole computer system
  2. are a type of malware that allows a cyber-security attacker to take control of an infected computer withouth the user knowing iy is happpening​.If lots of infected systems combine to form a network it is called a botnet
  3. are errors in someones code or program​.They are usually created by mistake​.if the bug/error relates to the security part of a program then it can lead to unauthorised access
  4. is malware that holds computer system captive. This may mean your computer system is locked down and you cannot access it​. Often the culprit will demand some kind of ransom, usually money, to release or restore the system
  5. is any technology such as tracking software, that aids in gathering information about a person or organization without their knowledge.​Its aim is usually to capture passwords, banking credentials and credit card details – and send them over the internet to fraudsters
Down
  1. Such programs steal user login credentials and stores them to send to malicious user who can later login to the computer and can access system resources
  2. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  3. that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. is a standalone malware computer program that replicates itself in order to spread to other computers

9 Clues: that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.is a standalone malware computer program that replicates itself in order to spread to other computersA piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data...

Airport Crossword 2019-02-12

Airport Crossword crossword puzzle
Across
  1. Centre provides comprehensive ... and booking service
  2. Located on top floor of the terminal. Provides a view of airfield
  3. Go there to eat/drink
  4. Located throughout international airport terminal to communicate. Have to pay to use
  5. Responsibility for aviation security should be shared between the NZ Police and the Military of transport
  6. Available throughout terminals to assist passengers
  7. Rooms with cots and changing tables are available.
  8. You can access this for computer or mobile usage
  9. Available for emergancy use
Down
  1. Where you can buy items cheaper and non-taxed
  2. Where you can buy small goods for yourself or as a gift
  3. Provided as a quiet place for contemplation to all travellers
  4. Will check you to ensure no transporting of any dangerous goods
  5. Available to help transfer luggage
  6. Changing currency types
  7. Secure baggage storage and luggage wrapping is available at SmartCarte
  8. Passengers first contact with airport to book a space. Can be long term or short term
  9. Available for transit passengers. Can buy supplies from vending machine
  10. Can access smoking lounge after security
  11. Getting cash out

20 Clues: Getting cash outGo there to eat/drinkChanging currency typesAvailable for emergancy useAvailable to help transfer luggageCan access smoking lounge after securityWhere you can buy items cheaper and non-taxedYou can access this for computer or mobile usageRooms with cots and changing tables are available....

CROSSWORD 2023-03-18

CROSSWORD crossword puzzle
Across
  1. Facilitated by ensuring
  2. Consequences of individual actions
  3. PATTERN, Theory explain crimes committed
  4. Theory minimize other factors
  5. Formal, human, and security
  6. Theory visible of crime
  7. Have four major components
  8. Engage in crime
  9. Theories classified three types
  10. 36,8 Volumes published
  11. Father of Sociology
  12. Act law makes punishable
  13. Grandfather of Charles Darwin
  14. Father of Criminal Justice
  15. Defensible space theory
  16. Human cells 22 pairs
  17. Classical school began
Down
  1. Act becomes morally right
  2. Greek word "physis" meaning
  3. Punishing who do offend
  4. Human behavior impact behavior
  5. Theory called " consequentialist"
  6. Laws enacted in 1926
  7. TRAITS, Theories determine person's character
  8. Theories external influences
  9. Mind and Logos meaning
  10. Heavy or obese
  11. Were antisocial and apathetic
  12. Link criminal behavior twins
  13. Somatotype thin and flat
  14. Deterrence from criminal act
  15. Were manic-depressive
  16. Personal location called
  17. Person's awareness space
  18. TOPINARD, French Anthropologist
  19. Incorporation of security hardware
  20. Theory relation criminal offending
  21. Basic security and behavioral
  22. "Structurally significant phenomenon"
  23. LANGE, Studied DZ,MZ twins

40 Clues: Heavy or obeseEngage in crimeFather of SociologyLaws enacted in 1926Human cells 22 pairsWere manic-depressiveMind and Logos meaning36,8 Volumes publishedClassical school beganPunishing who do offendTheory visible of crimeDefensible space theoryFacilitated by ensuringSomatotype thin and flatPersonal location calledPerson's awareness space...

Chapter 15 2013-04-25

Chapter 15 crossword puzzle
Across
  1. agreement between an organization and a vendor
  2. this act governs the disclosure and protection of health information
  3. individual well-known for social engineering
  4. scavenging for private data in trash
  5. more than one person is required to complete a task
  6. the safeguarding of personnel's rights
  7. a targeted social engineering attack
  8. documentation about evidence location and usage
  9. helps protect cable from EMI and RFI
Down
  1. a violation of physical security
  2. a formal process for managing changes to the IT environment
  3. this act helps protect the privacy of your social security number
  4. this type of fire extinguisher can be class A, B, C, D, or K
  5. an event that affects the security of an organization
  6. this system helps remove heat from a server room
  7. wiping or purging data
  8. this type of fire suppression system can be wet pipe or dry pipe
  9. a dry pipe fire suppression system with special features
  10. this act governs the disclosure of financial and accounting information
  11. assuring that risks are known and managed

20 Clues: wiping or purging dataa violation of physical securityscavenging for private data in trasha targeted social engineering attackhelps protect cable from EMI and RFIthe safeguarding of personnel's rightsassuring that risks are known and managedindividual well-known for social engineeringagreement between an organization and a vendor...

Bonds and Mutual Funds 2014-11-20

Bonds and Mutual Funds crossword puzzle
Across
  1. A borrowed fund
  2. Fund that comes with sales charge
  3. A publicly traded investment
  4. Large urban area
  5. Income return on an investment
  6. Does not have restrictions on the amount of shares
  7. Debt obligation with coupon
  8. Security that tracks an index
  9. Doesn't pay interest but is traded
  10. Promissory note or corporate bond
  11. Value printed on a coin
  12. Bond whose owner is registered
  13. Completely used up
  14. Bond that can be converted
  15. Debit security issued by a business entity
  16. To make up for something
Down
  1. Distribution of dividends
  2. Mutual fund that comes with sales charge
  3. Municipal bond that has a low risk
  4. Debt security issued by a state
  5. Mutual fund's price per share
  6. Bond secured by mortgage
  7. Final payment date of a loan
  8. Bond that matures at regular intervals
  9. High risk of loss
  10. Stocks in somebody's possession
  11. Shares are sold without commissioner sales charge
  12. Difference between higher priced paid
  13. Ascertaining liabilities

29 Clues: A borrowed fundLarge urban areaHigh risk of lossCompletely used upValue printed on a coinBond secured by mortgageAscertaining liabilitiesTo make up for somethingDistribution of dividendsBond that can be convertedDebt obligation with couponA publicly traded investmentFinal payment date of a loanSecurity that tracks an index...

Maria's favourite words. 2015-12-11

Maria's favourite words. crossword puzzle
Across
  1. / Information.
  2. / Maria’s main concern in the thesis.
  3. / Detailed examination of the elements or structure of something, typically as a basis for discussion or interpretation.
  4. / A set of connected things or parts forming a complex whole, in particular.
  5. / Security building blocks
  6. / Antonym: vague.
  7. / A person with a role to promote, display or advertise commercial products.
  8. / Judgement.
  9. / A person’s bodily shape.
  10. / Area or territory controlled by a ruler or government.
Down
  1. / A series of actions or steps taken in order to achieve a particular end.
  2. / A raised level surface on which people or things can stand.
  3. / A thing or things belonging to someone; possessions collectively.
  4. / Action against someone or something.
  5. / Existing or firmly attached within something or under a surface.
  6. / Formal request to an authority for something (e.g., job).
  7. / Put, lay, or stand (something) in a specified place or position.
  8. / Dealing with the nature of being.
  9. / A part of a whole.
  10. / Associated with, able to, or designed for performing one or more practical activities.
  11. / Security-Enhanced Embedded system Design.
  12. / Useful or valuable thing.
  13. / Synonym: sketch, blueprint, outline.

23 Clues: / Judgement./ Information./ Antonym: vague./ A part of a whole./ Security building blocks/ A person’s bodily shape./ Useful or valuable thing./ Dealing with the nature of being./ Maria’s main concern in the thesis./ Action against someone or something./ Synonym: sketch, blueprint, outline./ Security-Enhanced Embedded system Design....

invest retire unit 2024-03-20

invest retire unit crossword puzzle
Across
  1. government retire account
  2. federal insurance contrabutions act
  3. how much you are willing to risk
  4. makes it difficult to change,hack or cheat the system
  5. Mike Washington jr's workplace
  6. union collected retirement
  7. age in which you can start investing
  8. government healthcare
  9. age in which you can collect social security
  10. place of investing and trading
  11. year that social security funds will run out
  12. s&p five hundred
  13. tax free individual retirement account
  14. guilty of 7 counts of fraud and conspiracy (last name)
  15. what makes Bitcoin have worth
  16. exaggerating worth and selling high
Down
  1. president that conseived social security
  2. bad day in stocks pessimisstic
  3. interest on interest
  4. good day in stocks optimist
  5. when a large number of bank customers withdrawl all of their money
  6. not like the movies
  7. how much does the FDIC insured up to
  8. year that medicare funds will run out
  9. when you stop working
  10. he lost 30 million with ftx
  11. a word for gambling with crypto
  12. not fiat money

28 Clues: not fiat moneys&p five hundrednot like the moviesinterest on interestwhen you stop workinggovernment healthcaregovernment retire accountunion collected retirementgood day in stocks optimisthe lost 30 million with ftxwhat makes Bitcoin have worthbad day in stocks pessimissticMike Washington jr's workplaceplace of investing and trading...

Hekking_JAS IT 2025_Net_Module 11 Crosswords 2024-12-02

Hekking_JAS IT 2025_Net_Module 11 Crosswords crossword puzzle
Across
  1. control of what users may do after accessing network
  2. technology that makes data unusuable and unreadable to all but authorized users
  3. A public certification authority organization
  4. The most widely used method for encrypting data
  5. A white hat's role
  6. unethical hacker who uses network or OS vulnerabilities to gain unauthorized access and permissions
  7. EFS works in one of three modes: ... mode, USB key mode, and user authentication mode
  8. Inherence refers to ... traits
  9. A black hat's role
  10. Three aspects of a security system for OS or networks: authentication, authorization, and ... (AAA)
Down
  1. ethical hacker who probes networks or OSs and reports on vulnerabilities
  2. control of access to network
  3. A common security tool used by Linux administrators
  4. Three credential categories for multifactor authentication: knowledge, possession, and ...
  5. Windows domain associated mutual authentication protocol
  6. A built-in firewall included in many Linux distributions
  7. common client-server authentication protocol
  8. A good security option for servers that are not physically secure
  9. A Linux Files tool that offers a trash can for deleting files permanently
  10. Windows Server Update Services

20 Clues: A white hat's roleA black hat's rolecontrol of access to networkInherence refers to ... traitsWindows Server Update Servicescommon client-server authentication protocolA public certification authority organizationThe most widely used method for encrypting dataA common security tool used by Linux administrators...

Government 2024-07-08

Government crossword puzzle
Across
  1. The President's personal advisors
  2. to approve or confirm officially
  3. High ranking official in executive branch
  4. group of advisers to the president
  5. head of the Department of Justice
  6. department that oversees the federal budget
  7. Head of the U.S. armed forces
  8. department managing the nation's finances
  9. principal Advisor to the President on national security
  10. second in command in the executive branch
  11. formal agreement between countries
  12. authority or influence over an organization
  13. Federal law enforcement agency
  14. federal organization managing emergency response
  15. informal advisory group
  16. to make or enforce rules or policies
  17. A document issued by the President
Down
  1. Secretary heading the Treasury of Department
  2. Position in the Executive branch
  3. title for the leader of the Department of Defence
  4. government department of Foreign Affairs
  5. official statement or directive by the president
  6. meeting between heads and state
  7. Secretray heading the Treasury Department
  8. collection of all executive agencies and departments
  9. federal agency for national security
  10. president's official residence Bureaucracyace
  11. Set principles guiding the government's actions
  12. Government entity responsible for creating laws
  13. leader of the executive branch

30 Clues: informal advisory groupHead of the U.S. armed forcesFederal law enforcement agencyleader of the executive branchmeeting between heads and statePosition in the Executive branchto approve or confirm officiallyThe President's personal advisorshead of the Department of Justicegroup of advisers to the presidentformal agreement between countries...

FITD Vocab.af 2013-05-15

FITD Vocab.af crossword puzzle
Across
  1. the internet and online world
  2. Where you connect to a network using a wired connection (internet)
  3. searches all search engines and gets the top results
  4. SSID
  5. Alternatively to as high-speed Internet or wide band transmission
  6. a program that allows you to search the internet for information
  7. long term memory
  8. the way you behave online
  9. a readable file
  10. Homeland Security (NCSA)
  11. CPU
  12. examples: headphones, speakers
  13. the heart of the computer
  14. the software of a laptop
  15. hand free speaking device
  16. set of structured activies (safari, firefox)
  17. 8 bits make a ____
  18. is a sequence of instructions
  19. created with a copyright symbol on it
  20. location for CD in your laptop
  21. a device that displays signals on a computer screen
  22. a brief background of your history
Down
  1. is equal to 1,099,511,627,776 bytes
  2. ISP
  3. portable device
  4. where all information is stored
  5. when the computer isn't working you ____ it back up
  6. this is a program
  7. What do they want? who is asking? Why do they want it?
  8. a port used to connect a computer a mouse or a keyboard to an IBM compatible computer
  9. is an object on a computer that stores data
  10. rules and behavior to keep you and your computer safe
  11. short term memory
  12. USB (flash drive)
  13. examples: flashdrive, keyboard, mouse, etc
  14. LCD
  15. the purpose of this is to upgrade your computer
  16. LED
  17. a device that receives data and projected data
  18. a storage device or backup device that you can access
  19. A electronical and physical port
  20. to protect information and networks
  21. a program on your device that allows you to download and upload
  22. is a physical components of computer wiring (the inside of the computer)
  23. cloud based presentation on the internet. There is only one slide that can be edited. .

45 Clues: ISPLCDCPULEDSSIDportable devicea readable filelong term memorythis is a programshort term memoryUSB (flash drive)8 bits make a ____Homeland Security (NCSA)the software of a laptopthe way you behave onlinethe heart of the computerhand free speaking devicethe internet and online worldis a sequence of instructionsexamples: headphones, speakers...

Online bullying 2024-06-11

Online bullying crossword puzzle
Across
  1. online platform
  2. when someone is picking on you constantly
  3. going to the police to fill in a
  4. someone to talk to at school
Down
  1. connected to a group of things
  2. someone you can seek out
  3. protecting yourself online
  4. Another name for the internet
  5. a platform used with internet
  6. to stop people contacting you
  7. someone to talk to at home

11 Clues: online platformsomeone you can seek outprotecting yourself onlinesomeone to talk to at homesomeone to talk to at schoolAnother name for the interneta platform used with internetto stop people contacting youconnected to a group of thingsgoing to the police to fill in awhen someone is picking on you constantly

Matt 2016-06-07

Matt crossword puzzle
Across
  1. showing the violence
  2. friends is when you play on the phone
  3. is an a electronic
  4. a site for exploring
  5. strangers that you can meet
  6. a bigger screen than an iPad
  7. is a thing that you are youse for my Computer
  8. taking a screen of when you can get back on again
  9. a small square showing your face
  10. somebody that cheats
Down
  1. that you play online with
  2. a site were you can post stuff.
  3. is a device
  4. a site for videos
  5. people that teach you
  6. reports that come out
  7. are people that help you
  8. to protect your device
  9. bully somebody that is mean online
  10. small activities

20 Clues: is a devicesmall activitiesa site for videosis an a electronicshowing the violencea site for exploringsomebody that cheatspeople that teach youreports that come outto protect your deviceare people that help youthat you play online withstrangers that you can meeta bigger screen than an iPada site were you can post stuff....

Block 3, Unit 1 2017-09-06

Block 3, Unit 1 crossword puzzle
Across
  1. Windows Event ____ lets you monitor system events.
  2. The ____ toner fault isolation tool has two parts: the toner & the probe
  3. Security management subsystems work by partitioning resources into ____ & unauthorized areas
  4. This network management's subsystems may provide the ability to initialize, reconfigure, operate & shut down managed devices
  5. Per the NSA IATF there are ____ classes of attacks
  6. In performance management, these are determined for each important variable so exceeding them indicates a network problem worthy of attention
  7. Administrators determine this by gathering statistics over time. Also known as: normal network traffic/activity
  8. Among other things, network management systems incorporating accounting management functions may: collect customer ____ statistics
  9. There are 2 types of fault management: passive & ____
Down
  1. Real time CPU, Disk, Network & Memory performance can be viewed in the ____ Monitor window
  2. There are ____ steps in the troubleshooting model
  3. This network management area ensures internetwork performance can be maintained at an acceptable level
  4. ____ Manager provides information about programs running on your computer
  5. The ____ event logs can only be accessed by administrators
  6. The goal of this network management is to measure network utilization parameters so it can be regulated
  7. Air Force security management is provided by the ____ systems suite of tools (acronym)
  8. The first step in accounting management is to ____ usage of all important network resources
  9. The ____ of configuration management is to monitor network and system configuration information so the affected hardware can be managed and tracked
  10. There are 3 types of event log: Application, Security & ____

19 Clues: There are ____ steps in the troubleshooting modelWindows Event ____ lets you monitor system events.Per the NSA IATF there are ____ classes of attacksThere are 2 types of fault management: passive & ____The ____ event logs can only be accessed by administratorsThere are 3 types of event log: Application, Security & ____...

Fmm project 2024-07-21

Fmm project crossword puzzle
Across
  1. which window displays security capital market segments
  2. expand sureon
  3. nse has a main computer which is connected through
  4. expand SQ
  5. cancelation expand OCXL
  6. Full form of SBRS
  7. which order is to enable the user to view the outstanding orders fir a security
  8. Which manager is a term assigned to a user placed at the highest level in a trading firm
  9. who are the users at the lowest level of the hierarchy
Down
  1. expand NEAT
  2. which displays trading system bar
  3. which market are initiated by the exchange on behalf of tm for settlement related seasons
  4. which wait indicates that price have increased
  5. order which order are orders to buy or sell shares at a stated quantity and price.
  6. expand MBP
  7. which feature allows a TM to get instanteous market information on any desired security

16 Clues: expand SQexpand MBPexpand NEATexpand sureonFull form of SBRScancelation expand OCXLwhich displays trading system barwhich wait indicates that price have increasednse has a main computer which is connected throughwhich window displays security capital market segmentswho are the users at the lowest level of the hierarchy...

Cyber Safety Crossword 2013-11-03

Cyber Safety Crossword crossword puzzle
Across
  1. Free software that can be downloaded from the internet.
  2. Changing the limitations of a device so you can do something that the manufacturer didn’t want you to do.
  3. The internet version of Junk mail
  4. Buying products on the Internet using credit cards or other electronic payments
  5. Short for Random Access Memory
  6. From the word "plagiarius," meaning "to plunder," copying someone else's written or creative work without their permission and pretending that it is your own.
  7. Rules for acting respectful and polite in cyberspace. These rules help keep the Internet safe and friendly.
Down
  1. Small text files that websites save in your web browser to store information like your username and password.
  2. A name you use to identify yourself on a computer or website.
  3. A type of malware that spies on what you do on the internet and can steal information about you
  4. A computer that has been hacked into and is used to launch malicious attacks
  5. The last part of a URL eg;.gov .com
  6. Marking something or someone as suspicious or inappropriate.
  7. When a computer calls out to another computer to see if it is active.
  8. Without a name. If someone is being anonymous in cyberspace, they never use their real name and might not even use an Alias.

15 Clues: Short for Random Access MemoryThe internet version of Junk mailThe last part of a URL eg;.gov .comFree software that can be downloaded from the internet.Marking something or someone as suspicious or inappropriate.A name you use to identify yourself on a computer or website.When a computer calls out to another computer to see if it is active....

Cyber Cross-Word 2022-05-19

Cyber Cross-Word crossword puzzle
Across
  1. shortest-path-first routing protocol
  2. type of AV-based thats unusual for the user
  3. software that displays unwanted ad
  4. transmission media with cables
  5. secure communications techniques
  6. SIEM tool that enable to search, analyze...
  7. tool that uses multiple antivirus engines
Down
  1. firewall keeps track of com sessions
  2. 8e8c92b1c360cbe3cd2b40d6b29278d5
  3. packet analyzer
  4. software/hardware that creates/runs VM
  5. attract attackers
  6. secret - cb5ceb103977f1271d0763ac75fcd8e9
  7. an open-source EDR
  8. interaction between snmp agent manager

15 Clues: packet analyzerattract attackersan open-source EDRtransmission media with cables8e8c92b1c360cbe3cd2b40d6b29278d5secure communications techniquessoftware that displays unwanted adfirewall keeps track of com sessionsshortest-path-first routing protocolsoftware/hardware that creates/runs VMinteraction between snmp agent manager...

Cyber Crossword Puzzle 2025-09-15

Cyber Crossword Puzzle crossword puzzle
Across
  1. Something like a phone, laptop, or tablet
  2. A fix for a security problem in software
  3. Software that protects against malware
  4. Protects your network from threats
  5. Someone who breaks into systems
  6. Scrambles information to keep it safe
  7. A copy of your files kept safe
Down
  1. A secret code you use to log in
  2. A fake email that tries to trick you
  3. Keeps your software current and safe
  4. A secure way to connect on the internet
  5. Bad software that harms your computer
  6. A common way hackers send scams
  7. What you should do to your device when away
  8. Unwanted or junk emails

15 Clues: Unwanted or junk emailsA copy of your files kept safeA secret code you use to log inA common way hackers send scamsSomeone who breaks into systemsProtects your network from threatsA fake email that tries to trick youKeeps your software current and safeBad software that harms your computerScrambles information to keep it safe...

BackLash 2020-03-04

BackLash crossword puzzle
Across
  1. Brother of Bree
  2. What is the boy name on the fake account
  3. Lara’s former best friend
  4. Came to Lara to ask question
  5. Lara makes this team
  6. who is Lara’s best friend
  7. The sister of Lara
Down
  1. Took pills because of bullying
  2. Where does Liam ad Sydney hang out
  3. What does Bree to Lara

10 Clues: Brother of BreeThe sister of LaraLara makes this teamWhat does Bree to LaraLara’s former best friendwho is Lara’s best friendCame to Lara to ask questionTook pills because of bullyingWhere does Liam ad Sydney hang outWhat is the boy name on the fake account

Forensic Midterm 2022-03-14

Forensic Midterm crossword puzzle
Across
  1. Online criminal activity
  2. plaster replica of an impression
  3. Dents left behind as evidence
  4. The study of a crime
Down
  1. The way humans write
  2. A device used to access the internet
  3. The investigation of fire
  4. Medicine for the teeth
  5. Rapid oxidization releasing light and heat
  6. A handheld device used to perform a function

10 Clues: The way humans writeThe study of a crimeMedicine for the teethOnline criminal activityThe investigation of fireDents left behind as evidenceplaster replica of an impressionA device used to access the internetRapid oxidization releasing light and heatA handheld device used to perform a function

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. illegale Personen die sich in Computersysteme einloggen?
  2. Information eines dritten?
  3. Engineering Manipulation ohne Technische Geräte?
  4. unerwünschte Werbenachrichten?
  5. Viren , die in einem Programm drinnen sind?
Down
  1. Ansprechen von Minderjährigen?
  2. Versteck in einem nützlichen Programm?
  3. Überbegriff für unerwünschte, Schädliche Software?
  4. Surfing Beobachtung bei der Eingabe von Daten?
  5. Hintertür zu einem anderen Computer?

10 Clues: Information eines dritten?Ansprechen von Minderjährigen?unerwünschte Werbenachrichten?Hintertür zu einem anderen Computer?Versteck in einem nützlichen Programm?Viren , die in einem Programm drinnen sind?Surfing Beobachtung bei der Eingabe von Daten?Engineering Manipulation ohne Technische Geräte?Überbegriff für unerwünschte, Schädliche Software?...

internet saftey 2024-02-27

internet saftey crossword puzzle
Across
  1. steal your personal info
  2. can show you bad stuff
  3. to use there matrial
  4. has a lot of dangerous stuff
Down
  1. bullies are trying to hurt your feelings
  2. email is trying to get you to spread your info
  3. needs to be strong
  4. try to take your money
  5. info needs to be private
  6. are mean people

10 Clues: are mean peopleneeds to be strongto use there matrialtry to take your moneycan show you bad stuffsteal your personal infoinfo needs to be privatehas a lot of dangerous stuffbullies are trying to hurt your feelingsemail is trying to get you to spread your info

FNAF 2022-03-09

FNAF crossword puzzle
Across
  1. Animatronic that runs down the hall in FNAF1
  2. Animatronic who was taken apart in FNAF2
  3. Animatronic which is missing a face in FNAF2
  4. Animatronic controlled by the puppet
  5. Halloween Chica in FNAF4
  6. A very powerful freddy
  7. What the animatronics in FNAF4 are believed as
  8. The main 'animatronic' in FNAF3
  9. Gives you his life story when he jumpscares you in UCN
  10. Nerdylooking Freddy in FNAF6
  11. Upgraded Bonnie in FNAF2
  12. Animatronic in FNAF1 that LOVES pizza.
  13. Crocodile animatronic in Security Breach
  14. Chubby bear in FNAF2
Down
  1. Helps you in FNAF Security Breach
  2. Animatronic which requires music in FNAF2
  3. Elephant in FNAF6
  4. The animatronic in Help Wanted called a glitch
  5. The small bear in FNAF6
  6. Disables your cameras if you don't catch his fish in UCN
  7. Who we play as in FNAF1
  8. In your closet in FNAF4
  9. The main animatronic in FNAF1
  10. Probably the most scariest fanmade game
  11. He can see through your mask in FNAF2
  12. Merge of all the Funtime animatronics in Sister Location
  13. The wolf in Security Breach
  14. Big baby in Sister Location

28 Clues: Elephant in FNAF6Chubby bear in FNAF2A very powerful freddyThe small bear in FNAF6Who we play as in FNAF1In your closet in FNAF4Halloween Chica in FNAF4Upgraded Bonnie in FNAF2The wolf in Security BreachBig baby in Sister LocationNerdylooking Freddy in FNAF6The main animatronic in FNAF1The main 'animatronic' in FNAF3...

Domestic & International Airports 2018-08-15

Domestic & International Airports crossword puzzle
Across
  1. What is the abbreviation for Aviation Security Officer?
  2. The wall of an a/c.
  3. What can you use for free at most airports (excluding bathroom facilities)?
  4. What is the 'code'(hint)of an a/c called?
  5. What is the area where you go through security at the airport?
  6. What city airport is PPQ?
  7. What is'N' in phonetic alphabet?
  8. If I get on a plane what am I doing?
  9. A passenger who does not turn up to their flight.
  10. This is an area, usually adjacent to a terminal, where a/c park.
Down
  1. Where can passengers go if they are wanting to pray before a flight?
  2. What is the area before departing passengers through security at the airport?
  3. Where can you go to ask for help at an airport?
  4. Who play a vital role in customs work and are most referred to as "sniffer dogs"?
  5. Who flies the plane?
  6. What is 'S' in the phonetic alphabet?
  7. What is the airline code of MH?
  8. What is the airport code for Queenstown?
  9. What is 'B' in phonetic alphabet?
  10. Another word for passenger.

20 Clues: The wall of an a/c.Who flies the plane?What city airport is PPQ?Another word for passenger.What is the airline code of MH?What is'N' in phonetic alphabet?What is 'B' in phonetic alphabet?If I get on a plane what am I doing?What is 'S' in the phonetic alphabet?What is the airport code for Queenstown?What is the 'code'(hint)of an a/c called?...

Chapter 15 2013-11-26

Chapter 15 crossword puzzle
Across
  1. helps protect cable from EMI and RFI
  2. this act governs the disclosure and protection of health information
  3. Due ________ is the sageguarding of personnel's rights
  4. this act helps protect the privacy of your social security number
  5. Chain of ___________ documentation about evidence location and usage
  6. a violation of physical security
  7. individual well-known for social engineering
  8. ______ phishing is a targeted social engineering attack
  9. ________ management is a formal process for managing changes to the IT environment
  10. ________ diving is scavenging for private data in trash
  11. this type of fire supression system can be wet pipe or dry pipe
Down
  1. an event that affects the security of an organization
  2. wiping or purging data
  3. this system helps remove heat from a server room
  4. a dry pipe fire supression system with special features
  5. Separation Of ______ means more than one person is required to complete a task
  6. Due __________ is assuring that risks are known and managed
  7. this type of fire extinguisher can be class A, B, C, D, or K
  8. this act governs the disclosure of financial and accounting information
  9. agreement between an organization and a vendor

20 Clues: wiping or purging dataa violation of physical securityhelps protect cable from EMI and RFIindividual well-known for social engineeringagreement between an organization and a vendorthis system helps remove heat from a server rooman event that affects the security of an organizationDue ________ is the sageguarding of personnel's rights...

CYBER 2017-04-20

CYBER crossword puzzle
Across
  1. WIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?
  2. WAS FINDET MAN OFT AUF STREAMING SEITEN
  3. SOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMT
  4. Man's best friend
Down
  1. MOBBING IM INTERNET NENNT SICH
  2. OPFER BRAUCHEN UNTERSTÜTZUNG VON..

6 Clues: Man's best friendMOBBING IM INTERNET NENNT SICHOPFER BRAUCHEN UNTERSTÜTZUNG VON..WAS FINDET MAN OFT AUF STREAMING SEITENSOCIAL NETWORK WO ES HÄUFIG ZU MOBBING KOMMTWIE NENNT MAN ES WENN EINE GRUPPE SICH GEGEN EINE PERSON WENDET?

6 grade vocabulary crossword puzzle 2025-01-30

6 grade vocabulary crossword puzzle crossword puzzle
Across
  1. bullying online bullying
  2. Place where the photo was taken
  3. To not be nown
  4. punching or fighting someone
  5. To hit someone
  6. To increase or widen participation or impact
  7. The person doing the harassing or bullying
  8. A winess to harassment
  9. an argument or disagreement that isn't nescessarily repepeated
Down
  1. Information about what's in the photo
  2. A form of harassment or bullying used
  3. Can't talk
  4. abuse To tell a police offshore of a abuse
  5. mesing around with someone
  6. A Target privately or publicly
  7. To go for one person
  8. a wepsite that no one can use

17 Clues: Can't talkTo not be nownTo hit someoneTo go for one personA winess to harassmentbullying online bullyingmesing around with someonepunching or fighting someonea wepsite that no one can useA Target privately or publiclyPlace where the photo was takenInformation about what's in the photoA form of harassment or bullying used...

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
  2. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  3. The ? gardener was willing to travel to different places where there was work.
  4. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  5. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  6. As ? for the broken security alarm, the company offered them six months of service for no charge.
  7. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  8. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  9. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  10. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  12. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
Down
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  3. Due to neglect, some of the ? of the homes required some painting and repairs.
  4. Nervously, the resident noticed the ? of a figure below the street light.
  5. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  6. As usual, the father was ? by the beeping of his phone at 6:00 am.
  7. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  8. For their safety, they ? to the Neighbourhood Watch program.
  9. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  10. Residents ? their fears of criminals by putting in security devices for their homes.
  11. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  12. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

EMD Polices & Procedures 2024-04-12

EMD Polices & Procedures crossword puzzle
Across
  1. All visitors must have a _____ completed in order to be allowed into the facility or do work on the grounds.
  2. Document needed when taking company property off site.
  3. Members of_____ assume control over all emergency situations.
  4. How many steps to disable or enable fire panel.
  5. Temporary badges can only be issued and returned to _____.
  6. Issued to employees and long term contractor to identify a vehicle in the parking lot.
  7. what document is to be completed every time a foreign national enter the shop for a tour.
  8. This report is a firsthand account of the activities the security officer performed while on duty.
  9. FN are permitted to have electronics in this area ONLY.
  10. _____ book is used by CW-EMD security to alert security officers of individuals who previously had access but have been temporarily or permanently rescinded.
  11. These passes are issued for a maximum of 5 days at at time.
  12. This form is used for all reports including an injury report or bomb threat.
  13. Badge worn by contractors who are sole US citizens who have a business relationship that requires daily or frequent visits but will not require access to classified information.
  14. Badge color reserved specifically for foreign nationals.
  15. Application used for alarms and event view.
  16. 2 Pop-up windows in security expert.
  17. _____ visitors wearing this badge must always have an EMD escort with them.
Down
  1. Only post that is manned from 0630-2230 Monday thru Friday.
  2. CW-EMD cleared employees have a _____ on their badge.
  3. Form generated and issued by the purchasing department authorizing equipment to be removed.
  4. Inspection performed by security officers to ensure that employees are using their assigned badge.
  5. Form used by employees to declare and drop off incoming business necessary computer storage/media at central guard.
  6. what type of alarm is High Water Bldg 12.
  7. Special arrangements have been made to allow _____ employees to bring company provided cell phones thru property.
  8. _____ are issued if a person's vehicle information is not in the system.
  9. Required any time work is being done inside the building that could potentially spark a fire.
  10. Sticker on a personally owned cell phone that has been approved by EMD security.
  11. This badge has a yellow background with red lettering.
  12. Post where you control and perform 100% vehicle inspections.
  13. Secured area located in Bldg 3A 2nd floor.
  14. Looking for on visitor ID.
  15. Document with information that must be reported to the next officer.

32 Clues: Looking for on visitor ID.2 Pop-up windows in security expert.what type of alarm is High Water Bldg 12.Secured area located in Bldg 3A 2nd floor.Application used for alarms and event view.How many steps to disable or enable fire panel.CW-EMD cleared employees have a _____ on their badge.Document needed when taking company property off site....

Investing Unit 2024-03-20

Investing Unit crossword puzzle
Across
  1. At what age can you collect even more benefits from Social Security if you wait
  2. Ease with which an asset or security can be converted into cash without affecting the market price
  3. A sustained period of rising prices and optimistic sentiment in a financial market
  4. These funds are sold actively throughout the day and are Passively managed
  5. How can I buy a Mutual Fund
  6. An individual who buys and sells with the intention of profiting short term
  7. Bonds issued by company that have a fixed interest rate and face value
  8. At what age can you invest in Crypto
  9. Portion of the company's earnings distributed to shareholders as a return on investment
  10. Profit realized from sale of a capital asset like stock or real estate
  11. What indices comprises 30 blue chip companies?
  12. Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
  1. An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
  2. Buying different stocks from different companies
  3. Investing equal amounts of money at regular intervals
  4. At what age must you take a minimum from your retirement accounts each year (RMD)
  5. These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
  6. The age you can start collecting Social Security
  7. The process of offering shares f a private corporation to the public in a new stock issuance
  8. This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
  9. A unique combination of letters to represent a particular public ally traded company's stock or security
  10. A security that represents ownership of a fraction of a corporation
  11. Retirement account where money goes in after tax and is taken out penalty and tax free
  12. Bonds issued by the Government where you pay under face value and don't pay interest
  13. Retirement account where money is put in before taxes but is taken out taxed
  14. A market where prices are falling and a pessimistic outlook overall
  15. Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
  16. This is a federal payroll tax that is deducted from every paycheck
  17. Types of jobs that usually offer a pension
  18. Investing a big sum of money in one go

30 Clues: How can I buy a Mutual FundAt what age can you invest in CryptoInvesting a big sum of money in one goTypes of jobs that usually offer a pensionWhat indices comprises 30 blue chip companies?Buying different stocks from different companiesThe age you can start collecting Social SecurityInvesting equal amounts of money at regular intervals...

Standards Law & Ethics of Cybersecurity 2023-06-08

Standards Law & Ethics of Cybersecurity crossword puzzle
Across
  1. Link that is ______ often found on social media and SMS is one of the Phishing Scams.
  2. By sharing ______ date it potentially threatens personal safety.
  3. What should you do if you receive suspicious links on your mobile phone?
  4. Always update your ________ at least once in 6 months to make sure it is not easy to be hacked by irresponsible parties.
Down
  1. Resending fake emails to everyone who knows you can be identified as _______.
  2. Do not ______ your password.
  3. _____ crime is one of the crimes committed through computers on the internet. This action will cause the victim to suffer and exprience loss.
  4. Avoiding sharing ______ information on social media and the internet could protect yourself from becoming a cyber victim.

8 Clues: Do not ______ your password.By sharing ______ date it potentially threatens personal safety.What should you do if you receive suspicious links on your mobile phone?Resending fake emails to everyone who knows you can be identified as _______.Link that is ______ often found on social media and SMS is one of the Phishing Scams....

November Cross word 2023-11-24

November Cross word crossword puzzle
Across
  1. We need more!
  2. Highest ranked pre-season team.
  3. I'm not a veggie; I'm a fall fruit.
  4. Student-written and delicious.
Down
  1. Community heroes.
  2. The new Monday champion.
  3. It's giving.
  4. Re-issued the Thanksgiving proclamation in 1863.

8 Clues: It's giving.We need more!Community heroes.The new Monday champion.Student-written and delicious.Highest ranked pre-season team.I'm not a veggie; I'm a fall fruit.Re-issued the Thanksgiving proclamation in 1863.

Word List 2020-04-28

Word List crossword puzzle
Across
  1. a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
  2. evil which is commited by hackers every day
  3. is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  4. person who can intrude the system
  5. the process of encoding information
  6. characteristics or information
  7. a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
  8. two-dimensional barcode
  9. the utility that lets the hacker to trace the data of user's device
  10. to destroy the secret of the data
  11. the domain that lets the hacker trace the personal geolocation.
Down
  1. a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
  2. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  3. computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
  4. situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
  5. to kidnap the data
  6. any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
  7. a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
  8. the most popular remote access trojan
  9. the global system of interconnected computer networks
  10. case of programms for interacting with wireless networks
  11. to get the data in a dishonest way
  12. critical system error on Windows

23 Clues: to kidnap the datatwo-dimensional barcodecharacteristics or informationcritical system error on Windowsperson who can intrude the systemto destroy the secret of the datato get the data in a dishonest waythe process of encoding informationthe most popular remote access trojanevil which is commited by hackers every day...

Chapter 36 2014-04-30

Chapter 36 crossword puzzle
Across
  1. were the industries that include financial services?
  2. where did manufacturing jobs move out of?
  3. what were the names of the general people who left their country to move to safety in 2005?
  4. what is the creation of plants or animals that are genetically identical to an existing plant or animal?
  5. what was created in 2002 to coordinate national efforts against terrorism
  6. what is the type of terrorism that involves politically motivated attacksion informatic systems such as hacking into computer networks?
  7. what is the abbreviation for European Economic community?
  8. what includes all financial interactions that cross international borders?
  9. what is the abbreviation for the North Atlantic Treaty Organization?
  10. since that late 1960s, more than 14,000 terrorist attacks have occurred where?
  11. in the late 1950s a new style of music emerged called what?
Down
  1. president Bush an anti-terrorism bill called what?
  2. access to TV, radio, and phones are known as
  3. what is a spread of nuclear weapons to other nations called?
  4. what is the working laboratory for experiments in space?
  5. who was one of the greatest champions of human rights that established the order of the missionaries of charity?
  6. what is the voluntary linkage of computer networks around the world?
  7. what is the 20th century attempt to increase food resources worldwide using economic processes?
  8. cultural elements that reflect groups of people with common backgrounds and interests?
  9. what is a major goal for globalization?
  10. the transferring of genes from one living thing to another in order to produce an organism with new traits?
  11. what is the use of violence, on people, or property
  12. the western mind set of placing a high value on acquiring material possessions is what?
  13. what is the greatest global health issue(disease) that was first discovered in the 1980s?

24 Clues: what is a major goal for globalization?where did manufacturing jobs move out of?access to TV, radio, and phones are known aspresident Bush an anti-terrorism bill called what?what is the use of violence, on people, or propertywere the industries that include financial services?what is the working laboratory for experiments in space?...

Brices Puzzle 2024-01-05

Brices Puzzle crossword puzzle
Across
  1. Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
  2. Vision Syndrome A technology-related health condition that affects eyesight.
  3. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  4. Compression Tool Tool that shrinks the size of a file(s).
  5. Web Design A website development approach that adapts the layout of a website to fit the screen
  6. System Number system that has just two unique digits, 0 and 1, called bits.
  7. An applied science devoted to incorporating comfort
  8. Device Any hardware component that conveys information from a computer or mobile device
  9. A computer that delivers requested webpages
  10. A small text file that a web server stores on your computer.
  11. The electronic component of a computer that interprets and carries
  12. The number of horizontal and vertical pixels in a display device.
  13. Aggregation A website or web app sometimes called a curation website
Down
  1. Device Any hardware component that allows you to enter data and instructions
  2. A business transaction that occurs over an electronic network
  3. The code of acceptable behaviors users should follow while on the Internet
  4. A program designed to make users more productive
  5. Firewall A security tool that detects and protects a personal computer and its data
  6. Device Convergence The trend of computers and devices with technologies
  7. A compromised computer or device whose owner is unaware
  8. Extortionist Someone who demands payment to stop an attack
  9. Someone who accesses a computer or network illegally.
  10. Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
  11. Protector A device that uses electrical components to provide a stable current flow and minimize
  12. Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
  13. A collection of computers and mobile devices connected

26 Clues: A computer that delivers requested webpagesA program designed to make users more productiveAn applied science devoted to incorporating comfortSomeone who accesses a computer or network illegally.A collection of computers and mobile devices connectedA compromised computer or device whose owner is unaware...

September Bootcamp 2022-08-03

September Bootcamp crossword puzzle
Across
  1. How many hours does an admin have to respond to a ransomware event with Ransomware Rollback?
  2. A collection of bots. The term also refers to the malware executed on a connected device which transforms the device into a bot
  3. cloud platform used for partners and MSPs
  4. EDR provides three layers of protection: Network, Process and Desktop _?
  5. A content heavy resource where you can find internal and external facing information
  6. sales methodology that focuses on customer relationships
  7. recently released managed detection and response service
  8. Malwarebytes cofounder and CEO
  9. What is Malwarebytes best known for?
  10. the tool used to automate communication with your customers
  11. cloud console for customers
  12. Regional identifier for sales/support activity in Europe-Middle East- Africa
  13. the platform that hosts e-learning and video tutorials
  14. easy of use term to describe the nebula console
Down
  1. the V in VPM
  2. Technical Account Management
  3. How many layers of live protection does EP provide?
  4. sales enablement content guru who controls highspot and academy
  5. A type of malware which locks users out of their computer and/or encrypts their files, offering to unlock on the condition that the victim pays a ransom
  6. CSM stands for Customer _ Manager
  7. A module for the Nebula platform helps block access to malicious websites and limit threats introduced by suspicious content
  8. abbreviation for Malwarebytes
  9. our internal storage system for documents and files
  10. an open-source equivalent to the Unix operating system
  11. branch of the revops org that runs MWB tech stack
  12. is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
  13. sales enablement services guru who supports MDR
  14. tool for recording and reflecting on calls by reps
  15. form on contract used in Sandler methodology to establish clear intentions and agenda
  16. regional identifier for sales/support activity in Asia-Pacific

30 Clues: the V in VPMcloud console for customersTechnical Account Managementabbreviation for MalwarebytesMalwarebytes cofounder and CEOCSM stands for Customer _ ManagerWhat is Malwarebytes best known for?cloud platform used for partners and MSPssales enablement services guru who supports MDReasy of use term to describe the nebula console...

AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE 2025-06-24

AUDIT SAMPLING, IT IN AUDIT & CORPORATE GOVERNANCE crossword puzzle
Across
  1. Auditors must _________ the results of the sample and their implications.
  2. Auditors need to address _______responsibilities related to data privacy, confidentiality, and the use of IT in the audit process.
  3. Auditors need to acquire and maintain ______ in using new IT tools and techniques.
  4. Performing Audit _________ on Selected Items
  5. Risk that conclusions based on a sample differ from those of the entire population.
  6. Auditors must ________ the nature and cause of deviations or misstatements.
  7. control IT can be used to implement and monitor ________ more effectively, improving the overall control environment.
  8. IT systems are vulnerable to _______ threats, data breaches, and other security risks that could compromise the integrity of audit evidence.
  9. Application of procedures to less than 100% of items in a population.
  10. Ensures each unit has an equal chance of selection.
Down
  1. IT auditors require specialized knowledge and skills to assess the effectiveness of IT controls and systems.
  2. Auditors must adapt to new technologies, manage increased _________ ___________, and address the associated risks to ensure the integrity and reliability of the audit process.
  3. Ongoing ___________ of IT systems and controls is necessary to ensure their effectiveness and identify potential issues.
  4. Electronic data processing and auditing can reduce the likelihood of _____ in audit work and increase the probability of identifying misstatements.
  5. IT enables auditors to analyze ________ datasets, identify anomalies, and detect potential errors or fraud more effectively.
  6. IT facilitates the shift towards ______ audits, reducing reliance on physical documents and streamlining the audit workflow.
  7. Entire set of data from which a sample is selected.
  8. Generally not recommended due to potential bias in contiguous items.
  9. Sample _____ should be sufficient to reduce sampling risk to an acceptably low level.
  10. ________ are projected for each stratum separately, combining results for overall assessment.Information technology (IT) has significantly transformed the audit process, enhancing efficiency and effectiveness while introducing new challenges.

20 Clues: Performing Audit _________ on Selected ItemsEntire set of data from which a sample is selected.Ensures each unit has an equal chance of selection.Generally not recommended due to potential bias in contiguous items.Application of procedures to less than 100% of items in a population....

profesions 2021-04-23

profesions crossword puzzle
Across
  1. someone who has a business
  2. driver a person that drive buss
  3. person who teach student
  4. a person who flies a plane
  5. the person who works on a farm
  6. a person that take photos
  7. a person that gives lectures usually in a university
  8. bank employee the person who serving the people in bank
  9. they make bread and cakes and work in bakery
  10. the person in charge of maintaining security
  11. the person checking the others
Down
  1. the person in charge of maintaining security of the country
  2. a person that can fix the problem you have with your teeth
  3. the person who serving the people in restorant
  4. a person who catch fish
  5. the man who lead the mass
  6. person who act in film
  7. a person trained to help a doctor look after the sick or injured
  8. a person who has the jobs of designing things
  9. a person that works in the science industry
  10. the person who work in kitchen
  11. a person that defends people in court and gives legal advice

22 Clues: person who act in filma person who catch fishperson who teach studentthe man who lead the massa person that take photossomeone who has a businessa person who flies a planethe person who works on a farmthe person who work in kitchenthe person checking the othersdriver a person that drive bussa person that works in the science industry...

RU ITEC411 Crime and security 2026-03-09

RU ITEC411 Crime and security crossword puzzle
Across
  1. Planting false URLs in Domain Name Servers to fish for information
  2. Security flaws in systems caused by factors like poorly written software
  3. Restriction of specific content which varies by country
  4. Tool used to monitor and filter out communication from untrusted sites
  5. Method to securely store data so it is useless if stolen
  6. Use of hacking to promote a political cause
  7. Personal data used by criminals to impersonate innocent people
  8. Malicious code that can be spread rapidly across the Web
  9. Personal and financial information requests disguised as legitimate business email
Down
  1. Act of reporting internal wrongdoings
  2. Intentional, unauthorized access to computer systems
  3. software that can spread rapidly over the Web
  4. Biological characteristics unique to an individual used for high-security
  5. Process of verifying identity to prevent use of stolen data
  6. Sophisticated worm that damaged equipment in a uranium enrichment plant
  7. Breaking into telephone systems Worm
  8. Identity theft or information gathering conducted via text messaging
  9. System security hole that can be exploited
  10. Illegal activities involving computers like credit card theft
  11. Form of phishing conducted via voice calls

20 Clues: Breaking into telephone systems WormAct of reporting internal wrongdoingsSystem security hole that can be exploitedForm of phishing conducted via voice callsUse of hacking to promote a political causesoftware that can spread rapidly over the WebIntentional, unauthorized access to computer systems...

Digital-Literacy-Kavon Stewart 2024-06-14

Digital-Literacy-Kavon Stewart crossword puzzle
Across
  1. Something used to protect Against Viruses
  2. Displays ads on your computer. May slow down your computer
  3. make sure to ____ your software when Needed.
  4. When someone gets your personal info and then does things pretending to be you.
  5. When you copy someone's work and claim it as your own.
  6. Emails that spread Malware often use _________.
  7. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  8. Everyone has a Digital _______ so be careful
  9. you should regularly make _______ to make sure that your things will be safe.
  10. Reads everyone’s data that is passing through a network. Usually on public WiFi.
  11. Keeps track of every key you type and sends it to the hacker.
  12. To ensure your data is safe you could us ______ storage.
Down
  1. Spies on you, stealing information like passwords and credit card numbers
  2. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  3. avoid using ______ Wi-fi.
  4. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. make sure to have strong an secure ________.
  7. Blocks you from accessing your files until you pay a ransom.
  8. __________ is when people steal intellectual property such as movies, music and software.
  9. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  10. A group of computers all being controlled by a remote hacker to perform illegal activity.
  11. if you are being cyber bullied Don't _____ the messages because they can be used as proof
  12. IF someone is completely _______ they cant be traced.

24 Clues: avoid using ______ Wi-fi.Something used to protect Against Virusesmake sure to ____ your software when Needed.make sure to have strong an secure ________.Everyone has a Digital _______ so be carefulEmails that spread Malware often use _________.IF someone is completely _______ they cant be traced....

Year 7 Coding and Networking 2025-09-08

Year 7 Coding and Networking crossword puzzle
Across
  1. A device that requests services from a server
  2. A temporary IP address that can change, assigned by a DHCP server
  3. An action that causes something to happen in a program
  4. Internet protocol address that is 128 bits long
  5. Internet protocol address that is 32 binary digits long
  6. A seven-layer architecture for communication systems
  7. Text-based language that provides deep understanding of programming techniques
  8. A computer in a network that provides services like websites or emails
  9. The high-capacity network that carries internet traffic across the world
  10. System that translates easy-to-remember domain names into IP addresses
  11. Uses radio waves for transporting data without physical cables
  12. Fast, easy-to-learn and beginner-friendly text-based programming language
  13. An error in a program that prevents it from running as expected
  14. A list of steps to finish a task
  15. Protocol for dynamically assigning IP addresses to network devices
Down
  1. The most common form of cable used for wired networking
  2. A set of rules that defines how two entities communicate across a network
  3. A unique identifier assigned to internet-connected devices
  4. Small units of data into which messages are split for transmission across a network
  5. Text-based programming language for basic coding skills just like a programmer
  6. Device that guides data to its correct destination, preventing traffic jams
  7. A permanent address for a device, usually set up manually
  8. Free programming language from MIT that uses block-based technology
  9. Free programming language developed by Google which uses visual blocks
  10. Finding and fixing errors in programs that prevent them from running correctly
  11. Requires a physical medium for transporting information between nodes
  12. Programming language often used for creating modifications in Minecraft
  13. Programming language developed by Microsoft for creating 3D games
  14. The action of doing something over and over again in programming
  15. A cyber security threat that tricks victims into sharing sensitive data

30 Clues: A list of steps to finish a taskA device that requests services from a serverInternet protocol address that is 128 bits longA seven-layer architecture for communication systemsAn action that causes something to happen in a programThe most common form of cable used for wired networkingInternet protocol address that is 32 binary digits long...

11.5 Testout Crossword 2023-03-28

11.5 Testout Crossword crossword puzzle
Across
  1. uses radio waves to transmit data from small circuit boards
  2. the standard mechanism to dynamically assign IP addresses within a network
  3. a triple-A protocol
  4. an encrypted security protocol that protects internet traffic on wireless networks.
  5. electromagnetic radiation with wavelengths longer than those of visible light and shorter than radio waves
  6. developed at MIT and is a key component of Windows Active Directory
  7. a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
  8. a file-level storage architecture that makes stored data more accessible to networked devices
  9. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
  1. Internet Protocol Address
  2. is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs
  3. a symmetric block cipher chosen by the U.S. government to protect classified information.
  4. combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
  5. a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
  6. a new WFA security standard for personal and enterprise networks
  7. network that uses wireless data connections between network nodes.
  8. Characters that give wifi a unique name
  9. allows the antennae to divide streams between multiple devices.

18 Clues: a triple-A protocolInternet Protocol AddressCharacters that give wifi a unique nameuses radio waves to transmit data from small circuit boardsallows the antennae to divide streams between multiple devices.a new WFA security standard for personal and enterprise networksnetwork that uses wireless data connections between network nodes....

Chapter 2 Vocabulary 2022-11-21

Chapter 2 Vocabulary crossword puzzle
Across
  1. A type of ETF transaction; money is deposited directly into the customer's checking account.
  2. someone who assists you with purchasing stocks and bonds
  3. Any organization that provides services related to money
  4. A security that pays interest over terms of ten or thirty years.
  5. owners are personally liable for their company’s losses
  6. A security that matures in a year or loss.
Down
  1. A financial institution that does not accept deposits
  2. Action taken to manage supply of money and interest rate.
  3. A financial institution that accepts money from customers and deposits it into the customer's account.
  4. A document guaranteeing payment of a specific amount.
  5. A security that pays interest over terms ranging from two to ten years.
  6. A financial investment issued by a corporation, government, or other organization.

12 Clues: A security that matures in a year or loss.A financial institution that does not accept depositsA document guaranteeing payment of a specific amount.owners are personally liable for their company’s lossessomeone who assists you with purchasing stocks and bondsAny organization that provides services related to money...

teka teki keamanan jaringan 2025-11-29

teka teki keamanan jaringan crossword puzzle
Across
  1. SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
  2. Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
  3. (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
  4. Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
  5. SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
  6. IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.
  7. DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
  8. MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
  9. Metodekeamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
  10. Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
  11. SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
  12. Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
  13. Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
Down
  1. Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
  2. Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
  3. Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
  4. Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
  5. Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
  6. SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
  7. Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
  8. Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.

21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah.Memastikan hanya pengguna yang berwenang yang dapat mengakses data.SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak....

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. over a computer
  2. bully that threats you
  3. words
  4. a person that watches
Down
  1. punching hitting and kicking
  2. the person that is being bullied
  3. the person that touch’s you in spots you don’t want to be touch
  4. the person that stops it
  5. wants to hurt you

9 Clues: wordsover a computerwants to hurt youa person that watchesbully that threats youthe person that stops itpunching hitting and kickingthe person that is being bulliedthe person that touch’s you in spots you don’t want to be touch

Security Crossword Puzzle 2022-10-17

Security Crossword Puzzle crossword puzzle
Across
  1. All members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected
  2. Improper Security Practices, Classified data spills, Improper marking of classified information, Introduction, or use of unauthorized electronics
  3. An ongoing screening process to review the background of an individual who is already assigned to a sensitive position or has access to classified information.
  4. You must notify your FSO/CPSO of this at least 30 days before
  5. Giovanni Fiorella
  6. Controlled Unclassified Information
  7. Information or material the unauthorized disclosure of which reasonably could be expected to cause SERIOUS damage to national security
Down
  1. 800-424-9098
  2. Jay Triplett, Jason Hughes, and Bradley Beatty
  3. Non-Disclosure agreement
  4. Joey Barone
  5. Information or material the unauthorized disclosure of which reasonably could be expected to cause EXCEPTIONALLY GRAVE damage to national security

12 Clues: Joey Barone800-424-9098Giovanni FiorellaNon-Disclosure agreementControlled Unclassified InformationJay Triplett, Jason Hughes, and Bradley BeattyYou must notify your FSO/CPSO of this at least 30 days beforeAll members must do this through security to ensure TMC badges, CAC, facility keys, etc. are collected...

Descriptions Of Tax Category 2026-03-05

Descriptions Of Tax Category crossword puzzle
Across
  1. National defense, nuclear weapons activities, war costs, and international security assistance.
  2. Income security programs, federal employee retirement and disability, and job training.
  3. Payments to retired and disabled individuals and managing the program
  4. Health care, housing, education and income security for veterans.
  5. Natural resources and environment, conservation
  6. Annual interest paid on the national debt, net of interest income received by assets the federal government owns.
  7. Legislative functions, federal employee salaries, tax refunds, maintaining federal properties and records
  8. Various departments responsible for trade, record keeping, and banking
  9. Homeland security, IRS Enforcement, border patrol and immigration, DEA
Down
  1. and support of air, water, ground, and other transportation.
  2. Elementary, secondary, higher and vocational education, employment training and social services for children and families
  3. Health care programs and serves, and occupation and consumer health & Safety.

12 Clues: Natural resources and environment, conservationand support of air, water, ground, and other transportation.Health care, housing, education and income security for veterans.Payments to retired and disabled individuals and managing the programVarious departments responsible for trade, record keeping, and banking...

Shoulder surfing 2020-06-03

Shoulder surfing crossword puzzle
Across
  1. bahasa inggris siber
  2. yang dilakukan wanita di komik
  3. akun punya id dan ....
  4. ponsel pintar
Down
  1. facebook, whatsapp, instagram disebut
  2. orang yang melakukan hacking
  3. surat elektronik

7 Clues: ponsel pintarsurat elektronikbahasa inggris siberakun punya id dan ....orang yang melakukan hackingyang dilakukan wanita di komikfacebook, whatsapp, instagram disebut

safe internet 2022-02-11

safe internet crossword puzzle
Across
  1. παιχνίδια (online gaming)
  2. Hygiene υγιεινή των συσκευών
  3. Διαδίκτυο
  4. διαδικτυακός εκφοβισμός (cyberbullying)
Down
  1. Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα
  2. ερωτική επικοινωνία μέσω διαδικτύο
  3. Κανόνες ορθής διαδικτυακής συμπεριφοράς

7 Clues: Διαδίκτυοπαιχνίδια (online gaming)Hygiene υγιεινή των συσκευώνερωτική επικοινωνία μέσω διαδικτύοΚανόνες ορθής διαδικτυακής συμπεριφοράςδιαδικτυακός εκφοβισμός (cyberbullying)Πνευματική ιδιοκτησία ή πνευματικά δικαιώματα

FITDVocab.jg 2013-05-15

FITDVocab.jg crossword puzzle
Across
  1. A port for a PlayStation2
  2. Where is something processed
  3. A written set of instructions
  4. Host A host that is on the internet, or a site hoster
  5. Manners Online
  6. When a new president gets assigned and uses a bible
  7. Random.........
  8. A server in the "sky"
  9. What is that tower thingy called?
  10. "Fidelity"
  11. Protecting Passwords online
  12. The made layout by a company or software
  13. A device that you use for the computer using a mechanical ball
  14. To restart your computer
  15. A HUGE search engine
  16. What "things" are installed on your computer?
  17. The way things are arranged
  18. Light emitting diodes, Light crystal display
  19. A website that is like an "engine"
  20. Where documents and Power-points are stored in
  21. A catchy phrase a company uses
  22. Online safety
  23. You need 8 of these to make a byte
  24. What is your screen called
Down
  1. Feeding something "out" of your computer
  2. Things you plug into your computer
  3. What does "©" stand for?
  4. What do you plug your flash-drive in?
  5. Those square things on your homepage on an iPhone
  6. A drive that is very, very important
  7. OSX,MAC,PC,WINDOWS7
  8. Online
  9. where do you plug in your headphones?
  10. the stuff inside your computer
  11. .docs .xcxl .pp
  12. Someone who provides their internet service
  13. think of a "disc Drive"
  14. Something that you type in, like "word"
  15. 1,000 of these equals a terabyte
  16. Something that feeds info "into" your computer
  17. Extra slots
  18. Something that you can call off of
  19. do you have 4G or 3G?
  20. A host that connects you to the internet
  21. When you "cite" a source, what is that called?
  22. A picture for a business
  23. Social security i_

47 Clues: Online"Fidelity"Extra slotsOnline safetyManners Online.docs .xcxl .ppRandom.........Social security i_OSX,MAC,PC,WINDOWS7A HUGE search engineA server in the "sky"do you have 4G or 3G?think of a "disc Drive"What does "©" stand for?To restart your computerA picture for a businessA port for a PlayStation2What is your screen called...

Semester 2 Religion Crossword 2022-05-15

Semester 2 Religion Crossword crossword puzzle
Across
  1. church law enforced by force/violence
  2. no supernatural
  3. Islamic word for "God"
  4. western European philosophical movement
  5. monk inspired by Antony of Syria (wanted structure)
  6. a false teaching
  7. the killing of an unborn child
  8. what language was mass used to be said in?
  9. national internal order
  10. Islamic follower
  11. absolute Muslim law
  12. most depicted figure besides Jesus
  13. battles for the holy land
  14. anyone who didn't speak Latin or Greek
  15. monk who gave all Christians the Bible
  16. someone who dies for the faith
  17. warriors for God
  18. first book printed by Gutenberg's press
  19. became Paul after Jesus appeared to him on the road to Damascus
  20. international law and order to avoid war
  21. fired for massacring Samaritans, sent Jesus to his crucifixion
  22. God's plan of salvation in Jesus Christ
  23. Putin's experience with computers and cyber attacks
Down
  1. sister of Benedict
  2. "for the people," everyone can read it
  3. no belief in any god
  4. What country is under Putin's attack?
  5. place of the pope
  6. life should be centered around this gospel's chapter 28
  7. the supernatural is accepted
  8. a person who isn't Jewish
  9. What's one thing that depicts Christianity?
  10. war crimes, "just war"
  11. ninth month of the Islamic calendar
  12. biggest and strongest barbarian tribe
  13. "most holy"
  14. How was around 1,000,000 Muslims converted?
  15. english priest that was sentenced but never executed
  16. founder of Islam
  17. states rights vs omnipotent Federal gov.
  18. "God's true religion"
  19. freedom of speech, religion, etc (replaced European bias)
  20. equal maximum rights for all citizens under primary "law"
  21. patriarch for Putin
  22. Roman emperor who killed 400,000 Christians
  23. wealth, power, glory, and pleasure at the center of your life
  24. right wing extreme begun by Mussolini
  25. Roman officials (wear a collar)
  26. essential absolute truths of God
  27. corrupt priest who sold salvation
  28. who was Gabriel really to the Protestants?

51 Clues: "most holy"no supernaturala false teachingIslamic followerfounder of Islamwarriors for Godplace of the popesister of Benedictabsolute Muslim lawpatriarch for Putinno belief in any god"God's true religion"Islamic word for "God"war crimes, "just war"national internal ordera person who isn't Jewishbattles for the holy landthe supernatural is accepted...

Brices Puzzle 2024-01-05

Brices Puzzle crossword puzzle
Across
  1. The code of acceptable behaviors users should follow while on the Internet
  2. Social Network its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
  3. Device Any hardware component that allows you to enter data and instructions
  4. An applied science devoted to incorporating comfort
  5. Extortionist Someone who demands payment to stop an attack
  6. A small text file that a web server stores on your computer.
  7. A business transaction that occurs over an electronic network
  8. A collection of computers and mobile devices connected
  9. Device Any hardware component that conveys information from a computer or mobile device
  10. The number of horizontal and vertical pixels in a display device.
  11. The electronic component of a computer that interprets and carries
  12. Firewall A security tool that detects and protects a personal computer and its data
Down
  1. Computing Practices that involve reducing electricity and environmental waste while using computers, mobile devices, and related technologies.
  2. Device Convergence The trend of computers and devices with technologies
  3. Web Design A website development approach that adapts the layout of a website to fit the screen
  4. A program designed to make users more productive
  5. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  6. Compression Tool Tool that shrinks the size of a file(s).
  7. A computer that delivers requested webpages
  8. Protector A device that uses electrical components to provide a stable current flow and minimize
  9. Someone who accesses a computer or network illegally.
  10. Vision Syndrome A technology-related health condition that affects eyesight.
  11. A compromised computer or device whose owner is unaware
  12. Aggregation A website or web app sometimes called a curation website
  13. Defragmenter A tool that reorganizes the files and unused space on a computer’s hard disk
  14. System Number system that has just two unique digits, 0 and 1, called bits.

26 Clues: A computer that delivers requested webpagesA program designed to make users more productiveAn applied science devoted to incorporating comfortSomeone who accesses a computer or network illegally.A collection of computers and mobile devices connectedA compromised computer or device whose owner is unaware...

Computer Security and Ethics 2024-08-23

Computer Security and Ethics crossword puzzle
Across
  1. Emails that pretend to be from your bank or other trusted site, to trick you into giving up your passwords or credit card info.
  2. Make sure you use a different ____ for different sites and keep them long and complex.
  3. Computer activities often leave a digital ____ that leads back to the offender.
  4. You should regularly make a ____ of your data/photos.
  5. Blocks your access to your computer and files, asking you to pay a ransom to get it back.
  6. When you use ____ storage, your data is housed online, keeping it safe from hard drive failures.
  7. A hacker can gain control of many people's computers and use them to commit crimes (ex. steal passwords, distribute malware, DDOS etc.). The group of slave computers is called a ____.
  8. If you are cyber-bullied, don't ____ the messages. They can be used to track the offender and prove their guilt.
  9. To protect your device from malware, you should install reputable ____ software and run frequent scans.
  10. If you download software, ____ it before running it.
Down
  1. Malware that damages files on your computer or stops your computer from running properly.
  2. Being infected with malware can lead to ____ theft, where a criminal can impersonate you to steal your money or commit other crimes.
  3. When you copy sections of someone else's work and claim it is your own.
  4. Spreads quickly through networks causing slow connections and sometimes carrying other malware with it.
  5. Emails can spread malware, most often when you click links or open ____.
  6. People might feel more comfortable committing crimes on a computer because they feel like they are ____.
  7. When people steal intellectual property like moves, music and software. It results in a loss of income for the people who developed those resources.
  8. Keep your operating system secure by running all the latest.
  9. Avoid making financial transactions on ____ networks or computers.
  10. Tries to open security holes in your computer so a hacker can gain access.

20 Clues: If you download software, ____ it before running it.You should regularly make a ____ of your data/photos.Keep your operating system secure by running all the latest.Avoid making financial transactions on ____ networks or computers.When you copy sections of someone else's work and claim it is your own....

TETATEKI 2025-05-07

TETATEKI crossword puzzle
Across
  1. Kumpulan data atau dokumen yang disimpan di komputer
  2. Satuan terkecil dalam data digital
  3. Alat elektronik untuk mengolah data
  4. Alat input yang digunakan untuk menggerakkan pointer di layar
  5. Aplikasi untuk membuka halaman web
  6. Amanat atau wilayah dunia maya
  7. Fakta mentah yang bisa diolah menjadi informasi
  8. Surat elektronik
Down
  1. Perangkat lunak yang membantu komputer menjalankan tugas
  2. Hasil dari pengolahan data
  3. Perangkat output yang menampilkan gambar atau teks
  4. Jaringan komunikasi global yang menghubungkan komputer di seluruh dunia
  5. Tempat penyimpanan data secara online
  6. Perangkat keras dalam sistem komputer
  7. Alat input berupa papan ketik

15 Clues: Surat elektronikHasil dari pengolahan dataAlat input berupa papan ketikAmanat atau wilayah dunia mayaSatuan terkecil dalam data digitalAplikasi untuk membuka halaman webAlat elektronik untuk mengolah dataTempat penyimpanan data secara onlinePerangkat keras dalam sistem komputerFakta mentah yang bisa diolah menjadi informasi...

Unit 3 + 4 2026-01-09

Unit 3 + 4 crossword puzzle
Across
  1. an important thing
  2. to get an advantage from something
  3. normally/ most of the time
  4. completely
  5. forever/can't be removed
  6. someone you want to be like or admire
  7. permanent mark on the skin caused by a cut or injury
Down
  1. to talk to each other or work together
  2. to give someone a particular job
  3. a man who is admired for doing something
  4. relating to computers
  5. a picture that is permanently marked onto your skin
  6. to give something a different colour using a dye
  7. needed or required
  8. what actually happens

15 Clues: completelyan important thingneeded or requiredrelating to computerswhat actually happensforever/can't be removednormally/ most of the timeto give someone a particular jobto get an advantage from somethingsomeone you want to be like or admireto talk to each other or work togethera man who is admired for doing something...

Jace Keenhold 2017-09-07

Jace Keenhold crossword puzzle
Across
  1. Copyright / Taking something that's not yours
  2. Danger / Someone you don't know
  3. Media / Snapchat , Instagram
  4. Passwords / Good passwords
Down
  1. / The right way to communicate over the internet
  2. research / Finding things over the internet
  3. Domain / Public Information
  4. Plagiarism / Taking someone else's work
  5. bullying / Bullying over the internet
  6. Safety / Be safe on the internet

10 Clues: Passwords / Good passwordsDomain / Public InformationMedia / Snapchat , InstagramDanger / Someone you don't knowSafety / Be safe on the internetbullying / Bullying over the internetPlagiarism / Taking someone else's workresearch / Finding things over the internetCopyright / Taking something that's not yours...

STOP BULLYING !! 2024-02-19

STOP BULLYING !! crossword puzzle
Across
  1. memberi komentar negatif, menyebar gosip orang lain di medsos
  2. memukul, menendang, mendorong
  3. tempat untuk menuntut ilmu
  4. nama lain dari bullying
  5. pihak yang melihat terjadinya bullying
Down
  1. pihak yang melakukan tindakan bullying
  2. perilaku yang tidak menyenangkan secara verbal dan fisik
  3. pihak yang menerima tindakan bullying
  4. dengan sengaja mengabaikan, menyebarkan gosip
  5. menghina, menyindir, memanggil dengan julukan

10 Clues: nama lain dari bullyingtempat untuk menuntut ilmumemukul, menendang, mendorongpihak yang menerima tindakan bullyingpihak yang melakukan tindakan bullyingpihak yang melihat terjadinya bullyingdengan sengaja mengabaikan, menyebarkan gosipmenghina, menyindir, memanggil dengan julukanperilaku yang tidak menyenangkan secara verbal dan fisik...

Crossword 2025-11-18

Crossword crossword puzzle
Across
  1. Watching somebody get picked on
  2. Who you should tell when somethings wrong
  3. media A way to communicate to others
  4. something that is yours
  5. bullying Picking on somebody online
Down
  1. a mean thing to say
  2. How to get into a account
  3. standing up for somebody
  4. Picking on somebody repeatedly
  5. How bullying can make someone feel

10 Clues: a mean thing to saysomething that is yoursstanding up for somebodyHow to get into a accountPicking on somebody repeatedlyWatching somebody get picked onHow bullying can make someone feelbullying Picking on somebody onlinemedia A way to communicate to othersWho you should tell when somethings wrong

Cyber Security Crossword Puzzle 2022-01-30

Cyber Security Crossword Puzzle crossword puzzle
Across
  1. The act of creating a fake identity online to exploit individuals they connect with on dating sites
  2. Malicious software which can be obtained after downloading suspicious files
  3. Ensure it is ''strong'' to reduce chances of getting hacked
Down
  1. Beware of these online thieves who uses computers to gain unauthorized access to data

4 Clues: Ensure it is ''strong'' to reduce chances of getting hackedMalicious software which can be obtained after downloading suspicious filesBeware of these online thieves who uses computers to gain unauthorized access to dataThe act of creating a fake identity online to exploit individuals they connect with on dating sites

Information Security Crossword 2017-02-15

Information Security Crossword crossword puzzle
Across
  1. Completion of Information Security and DPA annual training is ____________
  2. When you receive an email with a link to a bogus website it is called _________
  3. A type of use that should be limited when using Society systems ________
  4. This should only be installed on Society systems by approved administrators ______
  5. Something that can infect a PC/Laptop is known as a ________
  6. Personal information is protected by this act _______
  7. All colleagues must comply with these information security documents _______
  8. This should be worn at all times when on Society premises __________
  9. You should not allow others to do this when accessing Society premises ______
Down
  1. Always ensure your _________ is locked when you are away from your computer.
  2. A tidy desk is also known as a _________ desk
  3. When you received unsolicited email from unknown sources this is called ______
  4. These should never be shared __________
  5. It should be changed immediately if suspected of being compromised
  6. Information Security policies are published on it ___________
  7. Skipton may ______________ your internet usage
  8. Personal journal published on the World Wide Web ________

17 Clues: These should never be shared __________A tidy desk is also known as a _________ deskSkipton may ______________ your internet usagePersonal information is protected by this act _______Personal journal published on the World Wide Web ________Something that can infect a PC/Laptop is known as a ________...

High Security Estate 2017-01-31

High Security Estate crossword puzzle
Across
  1. Untidy place to eat
  2. To pay for company
  3. Spikey steel
  4. After a shampoo
  5. Location to catch a plane from
  6. Provide relevant information
  7. fixteen in a room
Down
  1. To come and go
  2. Part of me
  3. Stop drop roll
  4. More then a scan
  5. Hands on
  6. Above standard
  7. Silver stripe
  8. Party after a wedding
  9. Wireless
  10. American word for phone

17 Clues: Hands onWirelessPart of meSpikey steelSilver stripeTo come and goStop drop rollAbove standardAfter a shampooMore then a scanfixteen in a roomTo pay for companyUntidy place to eatParty after a weddingAmerican word for phoneProvide relevant informationLocation to catch a plane from

IFG Security Knowledge 2025-11-24

IFG Security Knowledge crossword puzzle
Across
  1. Primary source for finding SAP CPI
  2. Accredited area to work SAP
  3. F-22 ISSM
  4. F-22 CSSO
  5. Report travel to CSSO __ days prior to travel
  6. Willful or negligent action
  7. Days to complete PSQ Template 3 after travel
  8. Used to Nominate an individual for SAP Access
Down
  1. Provides guidance on security baseline policies
  2. Utilized to indicate the SAP accesses of LM Aero Employees
  3. Secure Voice/fax capable
  4. Dedicated unclassified F-22 program area
  5. F-16 CSSO
  6. Required form to request network access
  7. F-16 ISSM
  8. Individual whose program access is not maintained by LM Aero
  9. Risk Management Methodology

17 Clues: F-22 ISSMF-16 CSSOF-22 CSSOF-16 ISSMSecure Voice/fax capableAccredited area to work SAPWillful or negligent actionRisk Management MethodologyPrimary source for finding SAP CPIRequired form to request network accessDedicated unclassified F-22 program areaDays to complete PSQ Template 3 after travelReport travel to CSSO __ days prior to travel...

Aidan's personality 2021-11-01

Aidan's personality crossword puzzle
Across
  1. who I live with at the momment
  2. my fave yellowish colour
  3. being socially happy
  4. what I do when i'm sick and can't do anything else
  5. education
  6. what life is filled with! (words and all)
  7. what has me actively boogy
Down
  1. what I dance to!
  2. What the best cyber activity is
  3. what people love and deserve!
  4. my best friend (name starts with ge and ends with ge)
  5. my fave coding game
  6. fun with____
  7. what occupies me

14 Clues: educationfun with____what I dance to!what occupies memy fave coding gamebeing socially happymy fave yellowish colourwhat has me actively boogywhat people love and deserve!who I live with at the mommentWhat the best cyber activity iswhat life is filled with! (words and all)what I do when i'm sick and can't do anything else...

INFORMATIKA 2024-08-13

INFORMATIKA crossword puzzle
Across
  1. Penghitungan dengan menggunakan komputer
  2. ilmu yang mempelajari tentang penggunaan komputer
  3. Salah satu aplikasi media sosial
  4. Pembelajaran secara online
  5. Dunia Maya
  6. Situs web berbagi video
  7. Media sosial yang didirikan oleh Mark Zuckerberg
Down
  1. Salah satu aplikasi penyedia layanan transportasi
  2. Salah satu aplikasi jual beli online
  3. Salah satu game online popular
  4. Pembelajaran secara offline
  5. Salah satu karakter dalam profil pelajar pancasila
  6. Seseorang yang tidak begitu mahir dalam bermain
  7. Metode pembayaran yang dilakukan secara langsung di tempat Pembeli setelah pesanan dari kurir diterima

14 Clues: Dunia MayaSitus web berbagi videoPembelajaran secara onlinePembelajaran secara offlineSalah satu game online popularSalah satu aplikasi media sosialSalah satu aplikasi jual beli onlinePenghitungan dengan menggunakan komputerSeseorang yang tidak begitu mahir dalam bermainMedia sosial yang didirikan oleh Mark Zuckerberg...

cyber threats and security 2026-01-19

cyber threats and security crossword puzzle
Across
  1. use to conduct terrorism though computer
Down
  1. Hover over links to check for fake URLs.
  2. refers to illegal entry to the computer
  3. a criminal act involving the unauthorized creation, modification, or imitation of an object—most commonly a document or signature—with the specific intent to deceive or defraud others.

4 Clues: refers to illegal entry to the computerHover over links to check for fake URLs.use to conduct terrorism though computera criminal act involving the unauthorized creation, modification, or imitation of an object—most commonly a document or signature—with the specific intent to deceive or defraud others.

Bullying 2023-10-23

Bullying crossword puzzle
Across
  1. The use of technology to harass, threaten, embarrass, or target another person
  2. A tool to verbally bully
  3. Spread behind peoples back
  4. A Bird that cyberbullies
  5. Saying or writing mean things
  6. Involves hurting someone’s reputation or relationships
Down
  1. Person who is nearby or a witness to a bullying situation
  2. A tool to cyberbully
  3. Hurting a person’s body or possessions
  4. Person who steps in to stop a bullying situation
  5. A tool to physically bully
  6. Target
  7. Aggressor

13 Clues: TargetAggressorA tool to cyberbullyA tool to verbally bullyA Bird that cyberbulliesA tool to physically bullySpread behind peoples backSaying or writing mean thingsHurting a person’s body or possessionsPerson who steps in to stop a bullying situationInvolves hurting someone’s reputation or relationships...

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  2. As usual, the father was ? by the beeping of his phone at 6:00 am.
  3. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  4. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  5. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.
  6. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  7. For their safety, they ? to the Neighbourhood Watch program.
  8. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  9. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  10. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  11. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  12. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  13. The ? gardener was willing to travel to different places where there was work.
  14. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
Down
  1. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  2. Nervously, the resident noticed the ? of a figure below the street light.
  3. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  4. As ? for the broken security alarm, the company offered them six months of service for no charge.
  5. Residents ? their fears of criminals by putting in security devices for their homes.
  6. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
  7. Due to neglect, some of the ? of the homes required some painting and repairs.
  8. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  9. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  10. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

Investing Unit 2024-03-20

Investing Unit crossword puzzle
Across
  1. At what age can you collect even more benefits from Social Security if you wait
  2. Ease with which an asset or security can be converted into cash without affecting the market price
  3. A sustained period of rising prices and optimistic sentiment in a financial market
  4. These funds are sold actively throughout the day and are Passively managed
  5. How can I buy a Mutual Fund
  6. An individual who buys and sells with the intention of profiting short term
  7. Bonds issued by company that have a fixed interest rate and face value
  8. At what age can you invest in Crypto
  9. Portion of the company's earnings distributed to shareholders as a return on investment
  10. Profit realized from sale of a capital asset like stock or real estate
  11. What indices comprises 30 blue chip companies?
  12. Who has the rules 1. “Never lose money” and 2. “Never forget Rule #1”
Down
  1. An individual who allocates capital into various financial assets with the expectation of generating long term returns and building wealth overtime
  2. Buying different stocks from different companies
  3. Investing equal amounts of money at regular intervals
  4. At what age must you take a minimum from your retirement accounts each year (RMD)
  5. These funds are bought and sold once per day, they are actively managed, and the price is set at the beginning of the day and does not change
  6. The age you can start collecting Social Security
  7. The process of offering shares of a private corporation to the public in a new stock issuance
  8. This alongside Social security is deducted from your paycheck. Its expected to run out of funds by 2031
  9. A unique combination of letters to represent a particular publically traded company's stock or security
  10. A security that represents ownership of a fraction of a corporation
  11. Retirement account where money goes in after tax and is taken out penalty and tax free
  12. Bonds issued by the Government where you pay under face value and don't pay interest
  13. Retirement account where money is put in before taxes but is taken out taxed
  14. A market where prices are falling and a pessimistic outlook overall
  15. Type of mutual fund that follows a particular segment of the market (ex: S&P 500)
  16. This is a federal payroll tax that is deducted from every paycheck
  17. Types of jobs that usually offer a pension
  18. Investing a big sum of money in one go

30 Clues: How can I buy a Mutual FundAt what age can you invest in CryptoInvesting a big sum of money in one goTypes of jobs that usually offer a pensionWhat indices comprises 30 blue chip companies?Buying different stocks from different companiesThe age you can start collecting Social SecurityInvesting equal amounts of money at regular intervals...

EMD Polices & Procedures 2024-04-09

EMD Polices & Procedures crossword puzzle
Across
  1. _______ is to be completed every time a foreign national enters the shop for a tour
  2. Badge worn by visitors who are sole US citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
  3. Looking for on visitor ID
  4. Application used for alarms and event view
  5. This badge has a yellow background with red lettering
  6. Required any time work is being done inside the building that could potentially spark a fire
  7. Post where you control and perform 100% vehicle inspections
  8. Sticker on a personal owned cell phone that have been approved by EMD security
  9. Members of _______ assume control over all emergency situations
  10. Temporary badges can only be issued and returned to _______
  11. Only post that is manned from 0630-2230 Monday thru Friday
  12. Issued to employees and long term contractors to identify a vehicle in the parking lot
  13. These passes are issued for a maximum of 5 days at a time
  14. This form is used for all reports beside that of an injury report bomb threat or the DAR
  15. Inspection performed by security officers to ensure that employees are using their assigned badge
  16. _______are issued if a person's vehicle information is not in the system
Down
  1. Form generated by and issued by the purchasing department authorizing equipment to be removed
  2. Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
  3. CW-EMD cleared employee has a _______on their badge
  4. 2 pop-up windows in security expert
  5. _______ book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
  6. All visitors must have a _______completed in order to allowed into the facility or do work on the grounds
  7. Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard
  8. _______visitors wearing this must always have a EMD escort with them
  9. Document needed when taking company property off site
  10. FN are permitted to have electronics in this area ONLY
  11. How many steps to disable or enable fire panel
  12. Document with information that must be reported to the next officer
  13. Badge color reserved specifically for Foreign Nationals
  14. Secured area located in Bldg 3A 2nd floor
  15. This report is a firsthad account of the activities the security officer performed while on duty
  16. What type of alarm is High Water bldg 12

32 Clues: Looking for on visitor ID2 pop-up windows in security expertWhat type of alarm is High Water bldg 12Secured area located in Bldg 3A 2nd floorApplication used for alarms and event viewHow many steps to disable or enable fire panelCW-EMD cleared employee has a _______on their badgeThis badge has a yellow background with red lettering...

EMD Polices & Procedures 2024-04-08

EMD Polices & Procedures crossword puzzle
Across
  1. All visitors must have a _______ completed in order to be allowed into the facility or do work on the grounds
  2. _______visitors wearing this must always have a EMD escort with them
  3. These passes are issued for a maximum of 5 days at a time
  4. Special arrangements have been made to allow _______ employees to bring company provided cell phones through property
  5. Document with information that must be reported to the next officer
  6. Form generated by and issued by the purchasing department authorizing equipment to be removed from the site
  7. Badge worn by visitors who are sole US Citizens who have a business relationship that requires daily or frequent visits but not required access to classified information
  8. Only post that is manned from 0630-2230 Monday thru Friday
  9. _______book is used by CW-EMD security to alert security officers of individuals who previously had access to the site
  10. Issued to employees and long term contractors to identify a vehicle in the parking lot
  11. Application used for alarms and event view
  12. _________is to be completed every time a foreign national enters the shop for a tour
  13. What type of alarm is High Water bldg 12
  14. Looking for on visitor ID
  15. Stickers on a personal owned cell phone that have been approved by EMD Security
  16. Badge color reserved specifically for Foreign Nationals
  17. Inspection performed by security officers to ensure that employees are using their assigned badge
Down
  1. This badge has a yellow background with red lettering
  2. Post where you control and perform 100% vehicle inspections
  3. Form used by employee to declare and drop off incoming business necessary computer storage/media at Central guard
  4. 2 pop-up windows in security expert
  5. Document needed when taking company property off site
  6. CW-EMD cleared employee has a __________ on their badge
  7. Members of _______ assume control over all emergency situations
  8. Reuqired any time work is being done inside the building that could potentially spark a fire
  9. ________are issued if a person's vehicle information is not in the system
  10. Temporary badge can on be issued and returned to _______
  11. How many steps to disable or enable fire panel
  12. Secure area located in Bldg 3A 2nd floor
  13. This report is a firsthand account of the activities the security officer performed while on duty
  14. FN are permitted to have electronics in this area only
  15. This form is used for all reports besides that of an injury report bomb threat or the DAR

32 Clues: Looking for on visitor ID2 pop-up windows in security expertSecure area located in Bldg 3A 2nd floorWhat type of alarm is High Water bldg 12Application used for alarms and event viewHow many steps to disable or enable fire panelThis badge has a yellow background with red letteringDocument needed when taking company property off site...

balduini paolo 2021-11-21

balduini paolo crossword puzzle
Across
  1. indirizzo web o ....
  2. bullismo in rete
  3. netiquette ti insegna il ...... del web
  4. "mi piace navigare sul ....."
  5. sul web ce ne sono tantissimi
Down
  1. non puoi postare tutto ciò che vuoi...
  2. chi fa bullismo in rete
  3. non usarle a caso!
  4. strumento di ricerca più usato al mondo
  5. una lettera scritta dal computer
  6. prima di navigare sul web chiedi il .... ai tuoi genitori
  7. abbreviazione di "applicazione"

12 Clues: bullismo in retenon usarle a caso!indirizzo web o ....chi fa bullismo in rete"mi piace navigare sul ....."sul web ce ne sono tantissimiabbreviazione di "applicazione"una lettera scritta dal computernon puoi postare tutto ciò che vuoi...strumento di ricerca più usato al mondonetiquette ti insegna il ...... del web...

Online Safety 2023-01-29

Online Safety crossword puzzle
Across
  1. security updates for software
  2. An unsecure Wi-Fi network
  3. Norton, McAfee, AVAST, or AVG
  4. weak-point in a network or system
  5. broad term for viruses
  6. like adware but sent to hackers
  7. confirming a user's identity
  8. using your click against you
  9. records info for advertising purposes
Down
  1. records keystrokes
  2. scan an IP address for open ports
  3. username and password
  4. common in forums and social media
  5. Login now www.amazon1.com
  6. Encrypts data, demands payment
  7. rule-based network security
  8. unsolicited or malicious emails
  9. Browse securely, or work remotely
  10. scrambled text meant to confuse bots
  11. overwhelms a servers resources

20 Clues: records keystrokesusername and passwordbroad term for virusesAn unsecure Wi-Fi networkLogin now www.amazon1.comrule-based network securityconfirming a user's identityusing your click against yousecurity updates for softwareNorton, McAfee, AVAST, or AVGEncrypts data, demands paymentoverwhelms a servers resourcesunsolicited or malicious emails...

Volunteer 2013-03-04

Volunteer crossword puzzle
Across
  1. Alcohol-based hand rub
  2. Body system supporting the spine
  3. Who is responsible for security?
  4. The most single effective way of removing bacteria from hands
  5. Security office location
  6. Bacteria in or on the body not causing illness
  7. Fibrous tissue that links together two bones
  8. Remove Alert Contain Evacuate
  9. Potential to harm health & safety of a person
Down
  1. Posture position with least stress
  2. Work Health & Safety
  3. Used to wash hands
  4. 33 (2 words)
  5. Micro-organisms
  6. A spinal structure
  7. Relates to work evironment
  8. Bacteria in or on the body causing illness
  9. Attach muscles to bone
  10. Code Red
  11. Report incidents to

20 Clues: Code Red33 (2 words)Micro-organismsUsed to wash handsA spinal structureReport incidents toWork Health & SafetyAlcohol-based hand rubAttach muscles to boneSecurity office locationRelates to work evironmentRemove Alert Contain EvacuateBody system supporting the spineWho is responsible for security?Posture position with least stress...

La Snoer crosswords 2014-09-10

La Snoer crosswords crossword puzzle
Across
  1. Spreker
  2. Toegangscontrole tot beschermd gebied
  3. Renaissancestad in Italie
  4. Afkorting van Nuclear Security Summit
  5. Vliegbelasting
  6. Moment waarop aandelen van een NV voor de eerste keer naar de effectenbeurs worden gebracht
  7. zoutjes gemaakt van flinterdunne aardappelschijfjes
  8. Getallen in kalenderjaar
  9. Ruggenraat (Engelse vertaling)
  10. Hoofdstad van Flevoland
  11. Film met Tom Hanks
  12. Engelse lowcost carrier
  13. Zuid Afrikaanse antilope
Down
  1. Onderricht
  2. voormalig bezoekerscentrum van Schiphol
  3. Vulkaan in IJsland
  4. Spaanse lowcost carrier
  5. Iranier
  6. Start- en landingsbaan ten westen van de Zwanenburgbaan
  7. Neerleggen van werk
  8. Watervogel
  9. Veiligheid
  10. Rechterhand van Sinterklaas
  11. Vloeistoffen (Engelse vertaling)
  12. Haarspul
  13. Miscalculatie

26 Clues: SprekerIranierHaarspulOnderrichtWatervogelVeiligheidMiscalculatieVliegbelastingVulkaan in IJslandFilm met Tom HanksNeerleggen van werkSpaanse lowcost carrierHoofdstad van FlevolandEngelse lowcost carrierGetallen in kalenderjaarZuid Afrikaanse antilopeRenaissancestad in ItalieRechterhand van SinterklaasRuggenraat (Engelse vertaling)...

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. opposite of DK'ed
  2. cash or stock _
  3. attorney letter
  4. not today but tomorrow
  5. buyout
  6. identifying number
  7. broker
  8. money due you
  9. reregistration company
  10. paper form
  11. into two or more
  12. holdings
  13. to vote
  14. bid price
  15. trading happens
  16. another word for money
  17. __exchange
Down
  1. Intelligent _
  2. Acquire shares
  3. cash or _
  4. transferrable
  5. trade shares
  6. It is a debt security
  7. 1 ½ by 1 ¾
  8. shares in a basket
  9. payout
  10. Another word for shares
  11. assets held here
  12. money earned
  13. stocks traded
  14. taxes
  15. buy 100_
  16. A preliminary prospectus
  17. expiring contract

34 Clues: taxespayoutbuyoutbrokerto voteholdingsbuy 100_cash or _bid price1 ½ by 1 ¾paper form__exchangetrade sharesmoney earnedIntelligent _transferrablestocks tradedmoney due youAcquire sharescash or stock _attorney lettertrading happensassets held hereinto two or moreopposite of DK'edexpiring contractshares in a basketidentifying number...

Good luck , MT77 !!! 2026-02-27

Good luck , MT77 !!! crossword puzzle
Across
  1. Rising price levels
  2. Business cost
  3. Money movement
  4. Asset value decrease
  5. Loan security asset
  6. Risk protection coverage
  7. Property purchase loan
  8. Valuable resource owned
  9. Financial obligation owed
  10. Spending plan
  11. Borrowing ability
  12. Shareholder payment
  13. Cash conversion ease
Down
  1. Legal debt inability
  2. Financial deficit
  3. Collection of investments
  4. Money used to earn returns
  5. Money set aside
  6. Total business income
  7. Ownership value
  8. Borrowed money
  9. Funds for business use
  10. Account amount remaining
  11. Financial gain
  12. Falling price levels
  13. Company ownership share
  14. Government charge
  15. Cost of borrowing
  16. Debt investment security
  17. Account withdrawal entry

30 Clues: Business costSpending planMoney movementBorrowed moneyFinancial gainMoney set asideOwnership valueFinancial deficitGovernment chargeCost of borrowingBorrowing abilityRising price levelsLoan security assetShareholder paymentLegal debt inabilityAsset value decreaseFalling price levelsCash conversion easeTotal business incomeFunds for business use...

informatika keresztrejtvény 2023-06-07

informatika keresztrejtvény crossword puzzle
Across
  1. valami kiadása megosztása
  2. valótlan fotók,hirek terjesztése másról
  3. lábnyom az interneten rólunk tárolt adatok,keresési előzmények
  4. véletlenszerű számot generál
  5. lopás valaki másnak
Down
  1. a számítógép kézzrl fogható részei
  2. funkcionalitás rendszerek amiket telepítve újabb és ujabb funkciok erhetők el
  3. személyes titkok,információk megosztása másról
  4. visszatérő sértő/bántó üzenetek
  5. bullying egy személy online térben való zaklatása
  6. betűk gyakoritsága magyar nyelvben

11 Clues: lopás valaki másnakvalami kiadása megosztásavéletlenszerű számot generálvisszatérő sértő/bántó üzeneteka számítógép kézzrl fogható részeibetűk gyakoritsága magyar nyelvbenvalótlan fotók,hirek terjesztése másrólszemélyes titkok,információk megosztása másrólbullying egy személy online térben való zaklatása...

Chapter 11 Crossword Puzzle 2023-10-19

Chapter 11 Crossword Puzzle crossword puzzle
Across
  1. A highly secure correctional facility which houses the worst criminal
  2. jail designed to encourage interactions between inmates and jail officials
  3. inmates separated at all times with activities in their individual cells
  4. The prison official in charge
  5. prison prison designed giving inmates a great deal of freedom
  6. the time spent in jail prior to being sentenced
  7. disciplinary action ordering inmates to their cells
  8. The security designation given to new inmates
Down
  1. Correctional facilities not operated by the government
  2. early form of correctional facility
  3. holds inmates awaiting trial or sentences of year or less
  4. inmates incarcerated in jail awaiting trial
  5. screening of inmates determining their security level
  6. Inmates kept in separate cells but worked together in silence
  7. reimbursement for costs of housing inmates

15 Clues: The prison official in chargeearly form of correctional facilityreimbursement for costs of housing inmatesinmates incarcerated in jail awaiting trialThe security designation given to new inmatesthe time spent in jail prior to being sentenceddisciplinary action ordering inmates to their cellsscreening of inmates determining their security level...

Rule of Thoughts Crossword Puzzle 2023-02-27

Rule of Thoughts Crossword Puzzle crossword puzzle
Across
  1. computer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terrorist
  2. VirtNet Security
  3. a computer generated life-form created by Kaine in the VirtNet which is transferred to the real world placed in the body of a human being and essentially removing that person's identity and replacing it with their manufactured ones
Down
  1. a program designed by Kaine in order to resurrect Tangents from the VirtNet and insert them into the real world and using human bodies as the hosts taking over the planet
  2. an advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience.

5 Clues: VirtNet Securitycomputer generated program in the VirtNet which has broken free of it's chains and has become a cyber-terroristan advanced version of the Internet, full body simulation (all senses are lured into a sleep in the first person), a 3-D video-gaming experience....

Cyberbullying 2022-09-29

Cyberbullying crossword puzzle
Across
  1. to be protected from risks and danger
  2. a false story about someone else
  3. extremely offensive or insulting
  4. controlled or connected to a computer
  5. computer, information, technology
  6. someone's individual online account
Down
  1. someone who feels hurt and upset
  2. online communication via typing
  3. share videos and photos with friends
  4. a person who purposely intimidates people

10 Clues: online communication via typingsomeone who feels hurt and upseta false story about someone elseextremely offensive or insultingcomputer, information, technologysomeone's individual online accountshare videos and photos with friendsto be protected from risks and dangercontrolled or connected to a computera person who purposely intimidates people

internet saftey 2024-02-27

internet saftey crossword puzzle
Across
  1. steal your personal info
  2. can show you bad stuff
  3. to use there matrial
  4. has a lot of dangerous stuff
Down
  1. bullies are trying to hurt your feelings
  2. email is trying to get you to spread your info
  3. needs to be strong
  4. try to take your money
  5. info needs to be private
  6. are mean people

10 Clues: are mean peopleneeds to be strongto use there matrialtry to take your moneycan show you bad stuffsteal your personal infoinfo needs to be privatehas a lot of dangerous stuffbullies are trying to hurt your feelingsemail is trying to get you to spread your info

Stop Bullying 2024-09-13

Stop Bullying crossword puzzle
Across
  1. penyebab anak melakukan bullying
  2. Karakteristik perilaku pelaku bullying
  3. mengintimidasi, mengucilkan, mengabaikan
  4. memaki, memfitnah, mengejek, mengancam
Down
  1. Perilaku agresif dan negatip seseorang atau sekelompok orang secara berulang kali
  2. Dampak korban bullying
  3. cyber bullying yang mengirimkan kata-kata kasar mengenai seseorang
  4. Ketika melihat kejadian bullying di sekolah
  5. memukul, menampar, memalak, mendorong
  6. Upaya mencegah bullying

10 Clues: Dampak korban bullyingUpaya mencegah bullyingpenyebab anak melakukan bullyingmemukul, menampar, memalak, mendorongKarakteristik perilaku pelaku bullyingmemaki, memfitnah, mengejek, mengancammengintimidasi, mengucilkan, mengabaikanKetika melihat kejadian bullying di sekolahcyber bullying yang mengirimkan kata-kata kasar mengenai seseorang...

Zajedno za bolji internet 2023-03-01

Zajedno za bolji internet crossword puzzle
Across
  1. (eng.)za elektroničko nasilje
  2. kod koji netko koristi za privatnost
  3. na njima se treba biti oprezan
  4. komuniciranje s drugima preko interneta
  5. namjenjeno za povećanje znajna onome kome je namijenjeno
  6. nasilje preko elektronike
  7. tragovi tragovi koje ne namjerno stavljamo na internet
Down
  1. ogromno i opasno mijesto
  2. neispravna informacija
  3. naša sigurnost na svakoj stranici
  4. (eng.) za kolačići
  5. tragovi tragovi koje namjerno stavljamo na internet
  6. tragovi koje ostavljaš na internetu
  7. neželjna pošta

14 Clues: neželjna pošta(eng.) za kolačićineispravna informacijaogromno i opasno mijestonasilje preko elektronike(eng.)za elektroničko nasiljena njima se treba biti oprezannaša sigurnost na svakoj stranicitragovi koje ostavljaš na internetukod koji netko koristi za privatnostkomuniciranje s drugima preko interneta...

Bullying 2023-02-14

Bullying crossword puzzle
Across
  1. You're a loser no one likes you
  2. causing harm or injury to another
  3. posting or sending mean info
  4. The NH state ______ is for people under 18
  5. you shouldn't share ________ info online
  6. leaving someone out to humiliate them
  7. to spread embarrassing information about someone
Down
  1. what you should do if you see bullying happening
  2. Watches ignores or laughs
  3. Bullying creates an imbalance of power
  4. The person making someone feel unsafe
  5. making someone feel alone
  6. feels unsafe or is harmed
  7. someone who helps

14 Clues: someone who helpsWatches ignores or laughsmaking someone feel alonefeels unsafe or is harmedposting or sending mean infoYou're a loser no one likes youcausing harm or injury to anotherThe person making someone feel unsafeleaving someone out to humiliate themBullying creates an imbalance of poweryou shouldn't share ________ info online...

Fall 2024-09-21

Fall crossword puzzle
Across
  1. Disney's movie of celebration
  2. Be cautious with sharp edges and candles around them
  3. Day before Saints day
  4. Popular name for autumn celebrations
  5. Children dread going back
  6. Fattest day of the year
Down
  1. A staple poultry in November
  2. The most and best sign in the world
  3. 2 week celebration in Germany
  4. Important to do this before winter.
  5. Length in months
  6. Black Friday and Cyber Monday are ...... days???
  7. Bill signed June of 1984
  8. Most know for during this time

14 Clues: Length in monthsDay before Saints dayFattest day of the yearBill signed June of 1984Children dread going backA staple poultry in NovemberDisney's movie of celebration2 week celebration in GermanyMost know for during this timeThe most and best sign in the worldImportant to do this before winter.Popular name for autumn celebrations...

Once Upon a Time Ada 2021-10-01

Once Upon a Time Ada crossword puzzle
Across
  1. Not surprisingly, Ms Fong ? Mr. Tesarski to stop making fun of her age and height.
  2. During the robbery, the thieves ? and vandalized the home, leaving quite the mess for the owners.
  3. Ms Fong ? to think what would happen if someone stole Mr. Tesarski’s and Mr. Cornwell’s cherished red wagon with the supplies for phys. Ed.
  4. For their safety, they ? to the Neighbourhood Watch program.
  5. ?, Mr. Cornwell arrives first at the school, disarms the alarm, and turns on the lights.
  6. Nervously, the resident noticed the ? of a figure below the street light.
  7. Hearing the ? of the car’s honking for fifteen minutes annoyed all of the residents as the owner tried to remember how to turn off the alarm.
  8. The neighbourhood's ? tried to overcome their fears by installing more elaborate security systems.
  9. They had trouble ? the friendliness of the employers to their cook and hostility towards the cook’s brother when he came to pick up his sister.
  10. The ? gardener was willing to travel to different places where there was work.
  11. Before a packed house, the leader of the Neighbourhood Watch delivered a(an) ? about safeguards for the residents.
Down
  1. Seeing the ? light on the security system, the owners knew not to enter the house and contacted the police immediately.
  2. Residents ? their fears of criminals by putting in security devices for their homes.
  3. ?, the stranger approached the woman and her child for some help, frightening them in the process.
  4. Demandingly, the residents wanted a law against ? from entering the neighbourhood and causing problems.
  5. Due to neglect, some of the ? of the homes required some painting and repairs.
  6. As ? for the broken security alarm, the company offered them six months of service for no charge.
  7. The large security company offered a(an) ? of security systems meeting most people’s income and needs.
  8. When Mr. Cornwell went to Greece, he liked the ? features of some of the churches.
  9. As usual, the father was ? by the beeping of his phone at 6:00 am.
  10. Obviously, the family was suspicious about the strangers’ ? who were looking for work in the neighbourhood.
  11. Scared, the residents were on the lookout for a(an) ? who was entering through the backyard like the previous robberies.
  12. The creature in the wall ? the alarm system when it escaped and wandered down the hallway.
  13. Every summer, Ms Williamson planted flowers in ? and placed them in the front yard by the main entrance.

24 Clues: For their safety, they ? to the Neighbourhood Watch program.As usual, the father was ? by the beeping of his phone at 6:00 am.Nervously, the resident noticed the ? of a figure below the street light.Due to neglect, some of the ? of the homes required some painting and repairs....

Positive Peer Influence 2021-01-22

Positive Peer Influence crossword puzzle
Across
  1. Be a ___________ peer influence online.
  2. Use _____________ for good.
  3. Be _________ of what you post.
  4. __________ before you post.
Down
  1. Do not post ____________ messages online.
  2. Do not spread ____________ news.
  3. Be an _____________ and don't ignore cyber bullying.
  4. Respect for self and _____________.

8 Clues: Use _____________ for good.__________ before you post.Be _________ of what you post.Do not spread ____________ news.Respect for self and _____________.Be a ___________ peer influence online.Do not post ____________ messages online.Be an _____________ and don't ignore cyber bullying.

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. trade shares
  2. opposite of DK'ed
  3. broker
  4. reregistration company
  5. to vote
  6. trading happens
  7. money due you
  8. paper form
  9. buyout
  10. attorney letter
  11. transferrable
  12. 1 ½ by 1 ¾
  13. buy 100_
  14. payout
  15. Another word for shares
  16. cash or stock _
  17. holdings
Down
  1. into two or more
  2. expiring contract
  3. assets held here
  4. stocks traded
  5. bid price
  6. not today but tomorrow
  7. taxes
  8. identifying number
  9. shares in a basket
  10. A preliminary prospectus
  11. Intelligent _
  12. It is a debt security
  13. money earned
  14. Acquire shares
  15. cash or _
  16. __exchange
  17. another word for money

34 Clues: taxesbrokerbuyoutpayoutto votebuy 100_holdingsbid pricecash or _paper form1 ½ by 1 ¾__exchangetrade sharesmoney earnedstocks tradedmoney due youIntelligent _transferrableAcquire sharestrading happensattorney lettercash or stock _into two or moreassets held hereexpiring contractopposite of DK'edidentifying numbershares in a basket...

AKS Crossword Puzzle 2024-07-22

AKS Crossword Puzzle crossword puzzle
Across
  1. Industry leader key machine
  2. Plug that hole
  3. Fill
  4. Keys or shavings
  5. .003 or .005, that is the question
  6. Picking & decoding in one
  7. High security key
  8. Favorite distributor of locksmith
  9. Metal tail
  10. Black mess lube
  11. Head
Down
  1. Slippery magic in a bottle
  2. High security angle cuts
  3. 10B
  4. Core quick-swap
  5. Recombinate
  6. Chicago ace
  7. Lock or nose
  8. Opposite of Kwikset
  9. The original ic core
  10. Push buttons and pull levers
  11. Pop a latch or pass a pin
  12. Favorite tool of the scammer
  13. Inner cylinder part
  14. Org loved and hated by auto locksmiths

25 Clues: 10BFillHeadMetal tailRecombinateChicago aceLock or nosePlug that holeCore quick-swapBlack mess lubeKeys or shavingsHigh security keyOpposite of KwiksetInner cylinder partThe original ic coreHigh security angle cutsPicking & decoding in onePop a latch or pass a pinSlippery magic in a bottleIndustry leader key machinePush buttons and pull levers...

Cybersecurity crossword 2023-04-22

Cybersecurity crossword crossword puzzle
Across
  1. unaware software vulnerability attacked
  2. computer damaging, harmful software
  3. website shutdown using multiple devices
  4. security during initial production stages
  5. seemingly harmless but malicious malware
  6. locks computer until random paid
  7. scrambling data method
  8. slows computer with unwanted ads
  9. required identification changing system settings
  10. Online repeated harassment
Down
  1. implements security for computer system
  2. access blocked for unauthorized users
  3. click hidden element, opening malware
  4. work policy for personal device
  5. misleading edited picture or video
  6. program designed to remove malware
  7. compromised system infecting other systems
  8. service for remotely connected wifi
  9. the guarding against unauthorized access
  10. personal information stealing tactic

20 Clues: scrambling data methodOnline repeated harassmentwork policy for personal devicelocks computer until random paidslows computer with unwanted adsmisleading edited picture or videoprogram designed to remove malwarecomputer damaging, harmful softwareservice for remotely connected wifipersonal information stealing tactic...

Security Terminology Puzzle (Participation 3) - Emily Pedrazzi 2023-01-25

Security Terminology Puzzle (Participation 3) - Emily Pedrazzi crossword puzzle
Across
  1. Many devices attack a target.
  2. Creates an encrypted tunnel.
  3. Many compromised computers sending cyberattacks.
  4. Detects and protects against malware.
  5. Pay to regain access to systems.
  6. Malicious software.
  7. Tricks users into providing information.
  8. Attack that exploits new vulnerabilities.
  9. Cisco's entry-level network certification.
  10. Someone who exploits vulnerabilities.
  11. Someone who penetration tests organizations.
Down
  1. Scrambles sensitive data; must decrypt.
  2. Saves hardware costs; increases risk.
  3. Legitimate app containing harmful malware.
  4. Free Internet access.
  5. Falsified media used for harm.
  6. Blocks unusual traffic and users.
  7. CompTIA's entry-level security certification.
  8. Sensitive information exposed to attackers.
  9. Requires users to confirm identity.

20 Clues: Malicious software.Free Internet access.Creates an encrypted tunnel.Many devices attack a target.Falsified media used for harm.Pay to regain access to systems.Blocks unusual traffic and users.Requires users to confirm identity.Saves hardware costs; increases risk.Detects and protects against malware.Someone who exploits vulnerabilities....