cyber security Crossword Puzzles

Cybercrime 2013-09-08

Cybercrime crossword puzzle
Across
  1. Testing unit for humans to be identified
  2. False website leading to identity theft.
  3. Most popular social media
  4. Destructive program diguised as a usefull application
Down
  1. Illegal access into private cyber information
  2. E-mails overcrowding from unknown sources
  3. E-mail article intended to deceive
  4. Physical apparatus in terms of computing
  5. Programmes loaded onto a computer
  6. Fake automated computers
  7. Illegal unauthorized downloads eg. music

11 Clues: Fake automated computersMost popular social mediaProgrammes loaded onto a computerE-mail article intended to deceiveTesting unit for humans to be identifiedFalse website leading to identity theft.Physical apparatus in terms of computingIllegal unauthorized downloads eg. musicE-mails overcrowding from unknown sources...

Security Role Check 2023-08-07

Security Role Check crossword puzzle
Across
  1. If my role is authenticated I only need to confirm my name and appointment
  2. I'm treated like an owner but I can't make changes over the phone
  3. Party Without security, you can't tell me much other than if a policy is active/inactive and why
  4. Home Claims usually helps us with most calls
  5. I just have to confirm my full name and who I report to
  6. I only have say if I'm authorized
Down
  1. I represent the deceased owner
  2. We can only discuss 5 policies once security has passed
  3. Anyone can call on my behalf, as long as they can provide my full name and the last-4 of my SSN
  4. My role is unique as there can be many and I have full autonomy once I pass security
  5. My role is significant but if I'm not the owner, I need permission
  6. I'm only authorized if I'm on a list and pass security
  7. Assignee I'm usually a bank

13 Clues: Assignee I'm usually a bankI represent the deceased ownerI only have say if I'm authorizedHome Claims usually helps us with most callsI'm only authorized if I'm on a list and pass securityWe can only discuss 5 policies once security has passedI just have to confirm my full name and who I report to...

meta stadium 2023-10-02

meta stadium crossword puzzle
Across
  1. Transportation
  2. Disability@
  3. EHS
  4. Black@
  5. Site
  6. Fitness
  7. Women@
  8. Latin@
Down
  1. Interfaith@
  2. Facilities
  3. Lap
  4. Culinary
  5. Events
  6. Security
  7. AV
  8. Pride@
  9. ITSupport
  10. Native@
  11. Ship

19 Clues: AVLapEHSSiteShipEventsPride@Black@Women@Latin@Native@FitnessCulinarySecurityITSupportFacilitiesInterfaith@Disability@Transportation

Cyber ethics terms 2021-08-25

Cyber ethics terms crossword puzzle
Across
  1. unauthorized use or reproduction of another's work
  2. legal right, given to an originator
  3. a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
  4. correct or acceptable way of communicating on the internet
  5. moral principles
  6. a document stipulating constraints and practices that a user must agree to for access
  7. a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
  1. the philosophic study of ethics pertaining to computers
  2. all rights associated with intangible assets owned by a person or company
  3. criminal activities carried out by means of computers or the internet
  4. bullying that is cyber
  5. tricking someone on the web
  6. allows the creator protection from theft of their idea
  7. abusive message posted on the internet

14 Clues: moral principlesbullying that is cybertricking someone on the weblegal right, given to an originatorabusive message posted on the internetunauthorized use or reproduction of another's workallows the creator protection from theft of their ideathe philosophic study of ethics pertaining to computers...

cyber final crossword 2022-12-08

cyber final crossword crossword puzzle
Across
  1. known as "apps"
  2. a commercial operating system for computers
  3. smart algorithms that learn
  4. what runs applications
  5. processing machine in the computer
Down
  1. circuit board
  2. helps display image on the computer
  3. software to use for coding/debugging
  4. physical computer component
  5. intangible computer component
  6. storage device on a computer
  7. helps give the result of the input data
  8. helps enter data into the computer
  9. an open source operating system for computers

14 Clues: circuit boardknown as "apps"what runs applicationsphysical computer componentsmart algorithms that learnstorage device on a computerintangible computer componenthelps enter data into the computerprocessing machine in the computerhelps display image on the computersoftware to use for coding/debugginghelps give the result of the input data...

Among us 2021-11-05

Among us crossword puzzle
Across
  1. wepons
  2. defeat
  3. ejection
  4. emergency
  5. cafeteria
  6. security cameras
  7. electrical
  8. navigation
  9. kill
  10. Among us
Down
  1. crewmate
  2. admin
  3. imposter
  4. report
  5. medical center
  6. victory
  7. reactor
  8. vent
  9. lights
  10. leaves

20 Clues: ventkilladminweponsdefeatreportlightsleavesvictoryreactorcrewmateejectionimposterAmong usemergencycafeteriaelectricalnavigationmedical centersecurity cameras

Texts 8A and 8B 2022-09-22

Texts 8A and 8B crossword puzzle
Across
  1. epävirallinen
  2. liittolainen
  3. istuttaa
  4. treaty
  5. prominent
  6. provide
  7. turvallisuuspolitiikka
  8. rewarding
  9. collapse
  10. neuvosto
Down
  1. toimiala
  2. yhteistyö
  3. policy
  4. predictability
  5. non-aligned
  6. pragmatic
  7. operatiivinen
  8. pursue
  9. hankkia
  10. tutkinto

20 Clues: policytreatypursuehankkiaprovidetoimialaistuttaatutkintocollapseneuvostoyhteistyöpragmaticprominentrewardingnon-alignedliittolainenepävirallinenoperatiivinenpredictabilityturvallisuuspolitiikka

Travel 2022-10-13

Travel crossword puzzle
Across
  1. itinerary
  2. arrival
  3. airplane
  4. security
  5. suitcase
  6. airport
  7. departure
  8. passenger
  9. gate
  10. ticket
Down
  1. vacation
  2. customs
  3. screen
  4. to travel
  5. luggage
  6. to board
  7. flight
  8. passport
  9. line
  10. bus

20 Clues: buslinegatescreenflightticketarrivalcustomsluggageairportvacationairplanesecuritysuitcaseto boardpassportitineraryto traveldeparturepassenger

Vocabulario, Unidad 1.1 (El aeropuerto) 2018-02-12

Vocabulario, Unidad 1.1 (El aeropuerto) crossword puzzle
Across
  1. suitcase
  2. departure
  3. security
  4. travel agent
  5. passenger
  6. airline
  7. aisle
  8. pilot
  9. trip
Down
  1. female flight attendant
  2. customs
  3. seat
  4. flight
  5. luggage
  6. window
  7. sign
  8. arrival
  9. passport
  10. counter
  11. ticket

20 Clues: seatsigntripaislepilotflightwindowticketcustomsluggagearrivalcounterairlinesuitcasesecuritypassportdeparturepassengertravel agentfemale flight attendant

PERSONALITY nouns and adjectives 2019-11-06

PERSONALITY nouns and adjectives crossword puzzle
Across
  1. čustvo
  2. pustolovščina
  3. občutljivost
  4. odgovoren
  5. zgovoren
  6. družaben
  7. radodarnost
  8. spoštovanje
  9. zvest
  10. iskren
Down
  1. potrpežljivost
  2. samozavesten
  3. pomemben
  4. sebičen
  5. samostojnost
  6. veselje
  7. prijaznost
  8. pozoren
  9. varnost
  10. sproščen
  11. skrivnost

21 Clues: zvestčustvoiskrensebičenveseljepozorenvarnostpomembenzgovorendružabensproščenodgovorenskrivnostprijaznostradodarnostspoštovanjesamozavestenobčutljivostsamostojnostpustolovščinapotrpežljivost

Tatiana 2024-04-21

Tatiana crossword puzzle
Across
  1. спутник
  2. доступ
  3. безопасность
  4. порождать, создавать
  5. цифровой
  6. знание
  7. поддерживать
  8. наблюдение
  9. распознать
  10. almost
  11. защита
Down
  1. прикрепить
  2. общий, распространенный
  3. привычка
  4. существенный
  5. анализировать
  6. рекламный
  7. общество
  8. среднестатистический
  9. удобство

20 Clues: доступзнаниеalmostзащитаспутникпривычкацифровойобществоудобстворекламныйприкрепитьнаблюдениераспознатьсущественныйбезопасностьподдерживатьанализироватьпорождать, создаватьсреднестатистическийобщий, распространенный

pazdan olaolczak03@gmail.com 2018-01-29

pazdan olaolczak03@gmail.com crossword puzzle
Across
  1. Osoba,która próbuje włamać się na komputer
  2. Wymyślasz go sobie, inaczej nick
  3. Najpopularniejsza wyszukiwarka internetowa
  4. Złośliwy program, który można pobrać z internetu nieświadomie
Down
  1. Nie zdradzaj go przez internet
  2. Najpopularniejszy portal społecznościowy
  3. Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu
  4. Nielegalnie pobiera i sprzedaje filmy lub gry
  5. Nękanie w cyber przestrzeni
  6. Powinno być ciężkie do złamania

10 Clues: Nękanie w cyber przestrzeniNie zdradzaj go przez internetPowinno być ciężkie do złamaniaWymyślasz go sobie, inaczej nickNajpopularniejszy portal społecznościowyOsoba,która próbuje włamać się na komputerNajpopularniejsza wyszukiwarka internetowaNielegalnie pobiera i sprzedaje filmy lub gryMiesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu...

E-Safety 10 key words 2019-03-04

E-Safety 10 key words crossword puzzle
Across
  1. stop a computer account reaching you
  2. system which connects to a comouter
  3. numbers like a password
  4. personal website or page
  5. bullying online
Down
  1. password for account,a secret word
  2. which you download
  3. the internet by going on a link
  4. email address for an account
  5. group of people chatting

10 Clues: bullying onlinewhich you downloadnumbers like a passwordgroup of people chattingpersonal website or pageemail address for an accountthe internet by going on a linkpassword for account,a secret wordsystem which connects to a comouterstop a computer account reaching you

Health 2023-09-01

Health crossword puzzle
Across
  1. someone who gets made fun because of the color of their skin
  2. someone who leads a school
  3. someone who helps the victim
  4. person who stands around doing nothing
Down
  1. person who gets bullied
  2. a choice you make
  3. someone who teaches a large group of students
  4. the act of protection
  5. bullying someone getting bullied online
  6. mean person

10 Clues: mean persona choice you makethe act of protectionperson who gets bulliedsomeone who leads a schoolsomeone who helps the victimperson who stands around doing nothingbullying someone getting bullied onlinesomeone who teaches a large group of studentssomeone who gets made fun because of the color of their skin

kelas 75_Keisha Sunjaya 2023-05-10

kelas 75_Keisha Sunjaya crossword puzzle
Across
  1. keinginan untuk menyendiri
  2. memperoleh informasi yg tepat dan akurat merupakan dampak yg
  3. salah satu contoh pengaruh tik
  4. kartu untuk mengakses kesehatan
  5. contoh perdagangan e-commerce
Down
  1. mendapatkan jaringan nama lainnya
  2. semua kolaborasi yg diupayakan pasti dimediasi olehn proses
  3. proyek kolaborasi merupakan media sosial yg berbentuk
  4. privasi berhubungan dengan fisik seseorang
  5. cyber bullying merupakan contoh dampak yg

10 Clues: keinginan untuk menyendiricontoh perdagangan e-commercesalah satu contoh pengaruh tikkartu untuk mengakses kesehatanmendapatkan jaringan nama lainnyacyber bullying merupakan contoh dampak ygprivasi berhubungan dengan fisik seseorangproyek kolaborasi merupakan media sosial yg berbentuksemua kolaborasi yg diupayakan pasti dimediasi olehn proses...

Standard 15.0 Vocabulary Terms 2022-05-08

Standard 15.0 Vocabulary Terms crossword puzzle
Across
  1. The steps you take to make sure you are safe before, during and after an emergency or natural disaster.
  2. A form of terrorism in which victims "within a country are targeted by a perpetrator with the same citizenship" as the victims.
  3. The organization and management of the resources and responsibilities for dealing with all humanitarian aspects of emergencies (prevention, preparedness, response, mitigation, and recovery).
  4. The action of reducing the severity, seriousness, or painfulness of something.
  5. They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste.
Down
  1. They prepare plans and procedures for responding to natural disasters and other emergencies.
  2. Provides first responders with a go-to manual to help deal with hazmat transportation accidents during the critical first 30 minutes.
  3. They establishes protocols and creates prevention and recovery systems in case of a cyber-attack or natural disaster.
  4. Department that works to improve the security of the United States. Includes customs, border, and immigration enforcement, emergency response to natural and manmade disasters, antiterrorism work, and cybersecurity.
  5. Any substance or material that is capable of posing an unreasonable risk to health, safety, and property when transported in commerce.
  6. The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
  7. The National Incident Management System guides all levels of government, nongovernmental organizations and the private sector to work together to prevent, protect against, mitigate, respond to and recover from incidents.

12 Clues: The action of reducing the severity, seriousness, or painfulness of something.They prepare plans and procedures for responding to natural disasters and other emergencies.They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste....

Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06

Cyber Security Awareness Month Crossword Puzzle - Week 1 crossword puzzle
Across
  1. What is the weakest link in cybersecurity?
  2. ___ was the first personal computer virus?
  3. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  4. Necessary when the circumstances of an incident require more details
  5. Our company may _________ your internet usage
Down
  1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  2. What is the best way to maintain privacy between two parties?
  3. When someone sends an e-mail with a link a bogus website is called
  4. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  5. What type of calls are made by social engineers

10 Clues: What is the weakest link in cybersecurity?___ was the first personal computer virus?Our company may _________ your internet usageWhat type of calls are made by social engineersWhat is the best way to maintain privacy between two parties?When someone sends an e-mail with a link a bogus website is called...

the eye of minds crossword puzzle 2024-05-12

the eye of minds crossword puzzle crossword puzzle
Across
  1. the main character
  2. how they access the vertnet
  3. michaels best friend also knowen as the best gamer
  4. when your in the game
  5. the name of the virus
Down
  1. the cyber-terrorist in the game
  2. the main way michael gets information
  3. the name of the game
  4. the network of the game
  5. michaels friend is known for her coding.
  6. the agency trying to stop kaine

11 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamehow they access the vertnetthe cyber-terrorist in the gamethe agency trying to stop kainethe main way michael gets informationmichaels friend is known for her coding.michaels best friend also knowen as the best gamer

fund - chapter 10 2020-06-28

fund - chapter 10 crossword puzzle
Across
  1. The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank. 2w
  2. The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”. 3w
  3. A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause. 2w
  4. The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien. 3w
  5. A provision giving the borrower the right to regain title to the security property when the debt is repaid. 2w
  6. A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments. 2w
  7. A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
  8. Two interest rates controlled by the Fed that have an effect on market interest rates. 6w
Down
  1. The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece. 3w
  2. The Fed’s activities in buying and selling government securities. 3w
  3. A written promise to repay a debt. 2w
  4. The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders. 2w
  5. A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults. 3w
  6. The national finance market, where mortgages are bought and sold as investments. 2w
  7. A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults. 2w
  8. When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.

16 Clues: A written promise to repay a debt. 2wThe Fed’s activities in buying and selling government securities. 3wThe national finance market, where mortgages are bought and sold as investments. 2wTwo interest rates controlled by the Fed that have an effect on market interest rates. 6w...

Digital Safety 2024-10-09

Digital Safety crossword puzzle
Across
  1. Bullying
  2. Art
Down
  1. bad
  2. Jessie
  3. Prescott

5 Clues: badArtJessieBullyingPrescott

ICT in Home 2016-04-18

ICT in Home crossword puzzle
Across
  1. bulling Children could become depressed
  2. small portable media player
  3. Money is taken straight out of the cutomour account
  4. Take Many But only keep the ones you want
  5. Health concern caused by bad posture
  6. EFTPOS
  7. finding another person to love you
  8. Way of preventing data loss
  9. Gamble
  10. Keep in touch with others
  11. Clever Screen
Down
  1. Health concern caused by repetitive movements
  2. stating at a computer all day leads to
  3. Talk to a variety of people
  4. When people dont leave the house for days
  5. Can lead to addiction and anti social behavior

16 Clues: EFTPOSGambleClever ScreenKeep in touch with otherssmall portable media playerTalk to a variety of peopleWay of preventing data lossfinding another person to love youHealth concern caused by bad posturestating at a computer all day leads tobulling Children could become depressedTake Many But only keep the ones you want...

Innovation AWL Page34 2019-05-01

Innovation AWL Page34 crossword puzzle
Across
  1. ancillary/ subordinate
  2. techniques
  3. choose
  4. limited
  5. questionnaire/ research
  6. change
  7. characteristic
  8. location
  9. safety
Down
  1. service
  2. manners
  3. replacement
  4. because/ considering
  5. income
  6. shown
  7. direction
  8. steadiness
  9. form
  10. goal
  11. extent

20 Clues: formgoalshownincomechoosechangeextentsafetyservicemannerslimitedlocationdirectiontechniquessteadinessreplacementcharacteristicbecause/ consideringancillary/ subordinatequestionnaire/ research

African Crossword - Chad 2024-05-01

African Crossword - Chad crossword puzzle
Across
  1. violence
  2. fire/weapon
  3. evacuation
  4. general
  5. torture
  6. ration
  7. officer
  8. security
  9. oppression
  10. massacre
Down
  1. dictator
  2. flood
  3. refuge
  4. tension
  5. liberte
  6. rebelle
  7. terroriste
  8. vote
  9. atrocity
  10. blood

20 Clues: votefloodbloodrefugerationtensionliberterebellegeneraltortureofficerdictatorviolenceatrocitysecuritymassacreevacuationterroristeoppressionfire/weapon

Unit 15-16 2023-03-13

Unit 15-16 crossword puzzle
Across
  1. toll
  2. ooper
  3. tšello
  4. padi
  5. rabav
  6. kirurg
  7. tegelik
  8. deklareerima
  9. fuajee
  10. turvalisus
Down
  1. vahekäik
  2. kandik
  3. kellegi kallal norima
  4. tankla
  5. aksessuaar
  6. trahv
  7. karistus
  8. lomp
  9. sadam
  10. pardapääse

20 Clues: tollpadilompoopertrahvsadamrabavkandiktanklatšellokirurgfuajeetegelikvahekäikkaristusaksessuaarpardapääseturvalisusdeklareerimakellegi kallal norima

Aeropuerto/Viaje 2023-02-17

Aeropuerto/Viaje crossword puzzle
Across
  1. To board
  2. sign
  3. passenger
  4. flight
  5. customs
  6. suitcase
  7. aisle
  8. security
  9. window
  10. screen
Down
  1. airline
  2. ticket
  3. passport
  4. departure
  5. luggage
  6. arrival´
  7. counter
  8. flight attendant
  9. seat
  10. trip

20 Clues: signseattripaisleticketflightwindowscreenairlineluggagecustomscounterTo boardpassportarrival´suitcasesecuritydeparturepassengerflight attendant

Spanish Airport Vocabulary 2022-10-13

Spanish Airport Vocabulary crossword puzzle
Across
  1. agent
  2. itinerary
  3. customs
  4. reclaim
  5. passenger
  6. screen
  7. gate
  8. train
  9. line
  10. ticket
  11. security
Down
  1. departure
  2. confirm
  3. flight
  4. to travel
  5. airport
  6. airplane
  7. passport
  8. suitcase
  9. arrival
  10. bus

21 Clues: busgatelineagenttrainflightscreenticketconfirmairportcustomsreclaimarrivalairplanepassportsuitcasesecuritydepartureto travelitinerarypassenger

Brexit_A.Murges 2022-02-08

Brexit_A.Murges crossword puzzle
Across
  1. result
  2. vot.area
  3. strateg.
  4. to.take.part.in
  5. cause.fear
  6. security
  7. voting.amount
  8. break.apart
  9. dist.
  10. landmark
Down
  1. direct/lead.sth.
  2. break
  3. trust
  4. body.of.laws
  5. interval
  6. collect.o.opinion
  7. talks.w/.polit.
  8. exceed.sth.
  9. econom.agreem.
  10. topic.problem

20 Clues: breaktrustdist.resultvot.areastrateg.intervalsecuritylandmarkcause.fearexceed.sth.break.apartbody.of.lawsvoting.amounttopic.problemeconom.agreem.talks.w/.polit.to.take.part.indirect/lead.sth.collect.o.opinion

Social Media 2015-05-20

Social Media crossword puzzle
Across
  1. secutity
  2. a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
  3. unsecured computer
  4. a short description of someone's life, work, character, etc
  5. everybody wants it
  6. you can watch films there
  7. risk
  8. danger for children
  9. everybody does it every day
  10. chances
  11. consequense of someone annoy you
  12. a huge group with common interests
  13. receive and send from...
Down
  1. a other word for data security
  2. a green,framed telephone
  3. opportunities
  4. 1,44 billions User
  5. a accumulation of persons you know
  6. platform
  7. you can post
  8. an informal name for someone or something

21 Clues: riskchancessecutityplatformyou can postopportunitiesunsecured computer1,44 billions Usereverybody wants itdanger for childrena green,framed telephonereceive and send from...you can watch films thereeverybody does it every daya other word for data securityconsequense of someone annoy youa accumulation of persons you know...

social media 2015-05-20

social media crossword puzzle
Across
  1. an informal name for someone or something
  2. secutity
  3. 1,44 billions User
  4. a short description of someone's life, work, character, etc
  5. unsecured computer
  6. everybody wants it
  7. you can watch films there
  8. you can post
  9. a other word for data security
  10. platform
  11. a green,framed telephone
  12. everybody does it every day
  13. chances
Down
  1. a accumulation of persons you know
  2. consequense of someone annoy you
  3. opportunities
  4. a huge group with common interests
  5. danger for children
  6. risk
  7. a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
  8. receive and send from...

21 Clues: riskchancessecutityplatformyou can postopportunities1,44 billions Userunsecured computereverybody wants itdanger for childrena green,framed telephonereceive and send from...you can watch films thereeverybody does it every daya other word for data securityconsequense of someone annoy youa accumulation of persons you know...

Rubrik 2024-11-06

Rubrik crossword puzzle
Across
  1. Sucks according to reddit
  2. He's him
  3. Dad
  4. SLED team name for October
  5. OCD
  6. Ancient
  7. Backups that cannot be deleted or changed
  8. Sparty
  9. Feature that scans for sensitive data
  10. Rubrik HQ
  11. Approach to security that trusts no system or person
  12. Worst city in the USA - see xxxxx
Down
  1. Concussed
  2. Hates onions
  3. Worst team in the NFL
  4. Just married
  5. The ability to restore with a single button press
  6. Father of 9
  7. Your social security number is classified as this data type
  8. Badger
  9. Rubrik partner that has a shared responsibility model
  10. Company featured in Rubrik's most famous customer story
  11. Can be logical or physical

23 Clues: DadOCDBadgerSpartyAncientHe's himConcussedRubrik HQFather of 9Hates onionsJust marriedWorst team in the NFLSucks according to redditSLED team name for OctoberCan be logical or physicalWorst city in the USA - see xxxxxFeature that scans for sensitive dataBackups that cannot be deleted or changedThe ability to restore with a single button press...

Developing Network Security Strategies and Network Management Strategies 2021-12-18

Developing Network Security Strategies and Network Management Strategies crossword puzzle
Across
  1. A protocol that identify devices and monitor their performance
  2. There is how many network management components?
  3. Management process that keep track of the network used by department
  4. Is asset important in network security?
  5. Protocol used for remote authentication
Down
  1. How many components of security policies exist ?
  2. Encryption often used for vpn
  3. Performance metric
  4. Short form of remote monitoring
  5. Enforces security policies at the boundary between networks

10 Clues: Performance metricEncryption often used for vpnShort form of remote monitoringIs asset important in network security?Protocol used for remote authenticationHow many components of security policies exist ?There is how many network management components?Enforces security policies at the boundary between networks...

MOSCO RP 2023-01-25

MOSCO RP crossword puzzle
Across
  1. - cannot be brought inside the Operation or the security zone
  2. alarm - what the UK test each tuesday
  3. - Best RPO
  4. request - form to send when you have visitors
  5. - what we do
  6. - where you find the security rules
Down
  1. - what MPSS give out
  2. - must be read and followed for travel
  3. - must not be worn outside of the embassy perimeter
  4. - must be locked when away from your computer

10 Clues: - Best RPO- what we do- what MPSS give out- where you find the security rulesalarm - what the UK test each tuesday- must be read and followed for travel- must be locked when away from your computerrequest - form to send when you have visitors- must not be worn outside of the embassy perimeter...

Fourteen Points 2015-01-11

Fourteen Points crossword puzzle
Across
  1. ทำลาย
  2. นำทาง
  3. การทูต
  4. รวบรวม
  5. ในอุดมคติ
  6. ชายแดน
  7. วางเค้าโครง
  8. การพูด
  9. อย่างไม่เต็มใจ
  10. ความปลอดภัย
Down
  1. อพยพ
  2. การแก้แค้น
  3. การลดลง
  4. การซ่อมแซม
  5. อิสระ
  6. ยืนยัน
  7. สร้าง
  8. บทลงโทษ
  9. ความมุ่งหมาย

19 Clues: อพยพทำลายนำทางอิสระสร้างการทูตรวบรวมยืนยันชายแดนการพูดการลดลงบทลงโทษในอุดมคติการแก้แค้นการซ่อมแซมวางเค้าโครงความปลอดภัยความมุ่งหมายอย่างไม่เต็มใจ

UBCV 2019-09-22

UBCV crossword puzzle
Across
  1. , DGHWDFAER
  2. , ASDASD
  3. , FBHSFGSDF
  4. , ASDFAGSDGHGA
  5. , ADFADGWHWRT
  6. , AFASDFAS
  7. , WRNHJEFSGSD
  8. , SFHGSFGS
  9. , ADSFASDF
  10. , SDGSFDSD
  11. , SDASDASD
  12. , DASFRADSFA
Down
  1. , ASDFADFG
  2. ,ADFSDFDF
  3. , ASDASD
  4. , DGSDCFSD
  5. , ADFGADFAS
  6. , SDGSDFSDF
  7. , FDGSFDGSDF
  8. , ASDGSADF

20 Clues: , ASDASD, ASDASD,ADFSDFDF, ASDFADFG, DGSDCFSD, ASDGSADF, AFASDFAS, SFHGSFGS, ADSFASDF, SDGSFDSD, SDASDASD, DGHWDFAER, ADFGADFAS, FBHSFGSDF, SDGSDFSDF, FDGSFDGSDF, DASFRADSFA, ADFADGWHWRT, WRNHJEFSGSD, ASDFAGSDGHGA

KAJKA 2024-03-25

KAJKA crossword puzzle
Across
  1. zrelý
  2. očakávanie
  3. súhlas
  4. dospelosť
  5. úzkostlivý
  6. etapa
  7. tehotenstvo
  8. úplný
Down
  1. posadnutosť
  2. zodpovedný
  3. bezpečnosť
  4. nedočkavý
  5. trpiaci
  6. záležitosť
  7. vrstovník
  8. pochybnosť
  9. sposobilý
  10. bok
  11. viazaný

19 Clues: bokzrelýetapaúplnýsúhlastrpiaciviazanýnedočkavývrstovníkdospelosťsposobilýzodpovednýbezpečnosťočakávaniezáležitosťpochybnosťúzkostlivýposadnutosťtehotenstvo

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. The company that monitors our alarms
  2. ___ with all demands of the robber
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. Packet in vault room with specific instructions
  6. Great ___ is our best robbery deterrent
Down
  1. Remain _____ during a robbery
  2. To call 911 dial _-911
  3. When safe to do so press your ____ buttons
  4. ____ have more than $5k in your cash drawer
  5. Use the ____ button when you receive a 'sus'email
  6. Always leave the building in ____
  7. ___ parking lot is our Secondary Meeting Spot
  8. ____, hide, neutralize in an active shooter situation
  9. In the event of a fire, ____ mbr sensitive info
  10. Packet under the phone

16 Clues: To call 911 dial _-911Packet under the phoneRemain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. Packet under the phone
  2. Use the ____ button when you receive a 'sus'email
  3. When safe to do so press your ____ buttons
  4. Remain _____ during a robbery
  5. ___ parking lot is our Secondary Meeting Spot
  6. The company that monitors our alarms
  7. Packet in vault room with specific instructions
  8. Great ___ is our best robbery deterrent
Down
  1. ___ with all demands of the robber
  2. ____ have more than $5k in your cash drawer
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. In the event of a fire, ____ mbr sensitive info
  6. Always leave the building in ____
  7. ____, hide, neutralize in an active shooter situation
  8. To call 911 dial _-911

16 Clues: Packet under the phoneTo call 911 dial _-911Remain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. Set of rules that limits access to information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of Uncertainty on objectives

16 Clues: Effect of Uncertainty on objectivesSet of rules that limits access to informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

VMWare Knowledge Check 2022-01-18

VMWare Knowledge Check crossword puzzle
Across
  1. enables hybrid and edge computing applications to be built across locations
  2. number of VMWare products
  3. the process of creating a virtual representation of something
  4. VMware's server virtualization
  5. this architecture uses one application per server
  6. tool used for storage virtualization
  7. ________ and Opex are reduced by using virtualization
  8. ______ availability
Down
  1. integration system’s management plug-in to VMware vCenter. (OMIVV)​
  2. mitigates risk
  3. Device Management Tool
  4. tool used for desktop and app provisioning
  5. A VM is a Virtual _________
  6. the whole virtualized server
  7. acronym for Hyperconverged Infrastructure
  8. allows multiple host servers to pool resources
  9. _______ end to end security
  10. VMWare turnkey appliance
  11. VSphere's hypervisor

19 Clues: mitigates risk______ availabilityVSphere's hypervisorDevice Management ToolVMWare turnkey appliancenumber of VMWare productsA VM is a Virtual ________________ end to end securitythe whole virtualized serverVMware's server virtualizationtool used for storage virtualizationacronym for Hyperconverged Infrastructure...

Chapter 15.1 created by Jordyn Charron 2024-05-09

Chapter 15.1 created by Jordyn Charron crossword puzzle
Across
  1. action taken to manage the supply of money and interest rates in an economy
  2. banks that are part of the FDR
  3. A security that matures in a year or less
  4. Anything of value that is accepted in return for goods or services
  5. Another word for money
  6. means that money is a common measure of the worth or price of a good or service
  7. To exchange one good or service for another good or service
  8. money is used in exchange for goods and services needed by individuals, businesses, and governments
  9. a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
  1. means that money can be saved and used at a later date
  2. the mechanism a nation uses to provide and manage money for itself
  3. A type of financial investment issued by a corporation, government, or other organization
  4. a transfer of money from one bank account to another
  5. allows customers to pay for purchases directly from their checking account
  6. A security that pays interest over terms ranging from 2-10 years
  7. the process of transferring money from one individual or organization to another.
  8. the concept that money received today can be invested or deposited in the bank to earn interest
  9. A type of a document guaranteeing the payment of a specific amount of money (demand or set time)
  10. A security that pays interest over terms of 10-30 years

19 Clues: Another word for moneybanks that are part of the FDRA security that matures in a year or lessa transfer of money from one bank account to anothermeans that money can be saved and used at a later dateA security that pays interest over terms of 10-30 yearsTo exchange one good or service for another good or service...

CAT theory 2025-08-20

CAT theory crossword puzzle
Across
  1. Input The process of using a person's physical characteristics for authentication.
  2. A type of malware that appears to be a legitimate program but hides malicious code.
  3. A type of network that connects devices within a person's immediate workspace.
  4. The process of making a system usable for people with disabilities.
  5. A utility program that rearranges fragmented files on a storage device.
  6. The act of sending data from a local computer to a server.
  7. A technology that allows devices to communicate when they are a few centimeters apart.
  8. of Things (IOT) The concept of a network of physical objects embedded with sensors and software.
Down
  1. The act of receiving data from a server to a local computer.
  2. Computer A type of computer that is a single-user system designed for personal or home use.
  3. Drive (SSD) A type of storage device that uses flash memory and has no moving parts.
  4. Source Software A form of software licensing that allows the software to be freely used, modified, and shared.
  5. A type of cyber-attack that hijacks your browser to redirect you to a fake website.
  6. A network that covers a small geographical area, like a home or office.
  7. Logging A program that tracks and records every keystroke made on a computer.
  8. A system that uses sound waves to communicate over the internet.
  9. Attack A type of cyber-attack where multiple compromised systems flood a target's network, causing it to crash.
  10. Theft A computer crime that involves acquiring a person's personal information for fraudulent use.

18 Clues: The act of sending data from a local computer to a server.The act of receiving data from a server to a local computer.A system that uses sound waves to communicate over the internet.The process of making a system usable for people with disabilities.A network that covers a small geographical area, like a home or office....

Cyber Bullying 2023-03-16

Cyber Bullying crossword puzzle
Across
  1. discuss private matters or problems
  2. of unknown name
  3. involving, using, or relating to computers, especially the internet
Down
  1. unfitting, ill-suited
  2. self-confidence, self-respect
  3. disrespectful, insulting
  4. someone who hurts or frightens someone else
  5. very bad or unpleasant

8 Clues: of unknown nameunfitting, ill-suitedvery bad or unpleasantdisrespectful, insultingself-confidence, self-respectdiscuss private matters or problemssomeone who hurts or frightens someone elseinvolving, using, or relating to computers, especially the internet

stage 2 2018-03-27

stage 2 crossword puzzle
Across
  1. Number where we can communicate
  2. fundamental people in your life
  3. Person who teaches us
  4. word by which we identify
Down
  1. occupation where you earn money
  2. cyber contact where we send messages
  3. Civil status
  4. what we do in college

8 Clues: Civil statuswhat we do in collegePerson who teaches usword by which we identifyoccupation where you earn moneyNumber where we can communicatefundamental people in your lifecyber contact where we send messages

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. (Stalking someone online)
  2. (pretending to be someone and getting them trouble)
  3. (Offensive comments roomer and gossip)
  4. (Embarrassing someone)
  5. (Online Arguments)
Down
  1. (Repeating rude messages)
  2. (bullying someone online)
  3. (giving information)
  4. (excluding someone)

9 Clues: (Online Arguments)(excluding someone)(giving information)(Embarrassing someone)(Repeating rude messages)(Stalking someone online)(bullying someone online)(Offensive comments roomer and gossip)(pretending to be someone and getting them trouble)

CYBER SAFETY 2023-05-22

CYBER SAFETY crossword puzzle
Across
  1. (sending mean and nasty message)
  2. (stalking someone online)
  3. (bullying someone)
  4. (pretending to be someone and getting them in trouble)
  5. (online fights or argument)
Down
  1. (giving information)
  2. (sending or posting gossip or rumours about a person to damage his or her reputation or friendship)
  3. (excluding someone)
  4. (embarrassing someone)

9 Clues: (bullying someone)(excluding someone)(giving information)(embarrassing someone)(stalking someone online)(online fights or argument)(sending mean and nasty message)(pretending to be someone and getting them in trouble)(sending or posting gossip or rumours about a person to damage his or her reputation or friendship)

Cyber saftey 2021-09-16

Cyber saftey crossword puzzle
Across
  1. The logo is a blue bird
  2. Evan Spiegel and Bobby Murphy are the owners of this company
  3. photo and video sharing social networking service created by Kevin Systrom and Mike Krieger.
  4. Mark Zuckerberg is the owner of this company
Down
  1. A state in which one is not observed or disturbed by other people.
  2. A malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
  3. To help protect from unauthorized access
  4. Gaining unauthorized access to data in a system or computer.
  5. Addison Rae is famous on this app

9 Clues: The logo is a blue birdAddison Rae is famous on this appTo help protect from unauthorized accessMark Zuckerberg is the owner of this companyGaining unauthorized access to data in a system or computer.Evan Spiegel and Bobby Murphy are the owners of this companyA state in which one is not observed or disturbed by other people....

Cyber Ethics 2025-06-19

Cyber Ethics crossword puzzle
Across
  1. personal information and not engaging in activities that violate others' privacy, such as snooping or unauthorized access to data.
  2. harm:
  3. plagiarism, respecting copyright laws, and not using or distributing software or content without proper authorization.
  4. intellectual property:
  5. privacy:
  6. mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication.
Down
  1. security:
  2. responsible digital citizenship:
  3. and access:
  4. the integrity of computer systems and networks, protecting them from unauthorized access, malware, and other threats.
  5. that technology is used equitably and that everyone has access to the benefits of technology.
  6. using technology to cause physical or emotional harm to others, including spreading misinformation, harassment, or hate speech.

12 Clues: harm:privacy:security:and access:intellectual property:responsible digital citizenship:that technology is used equitably and that everyone has access to the benefits of technology.mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Crossword Puzzle On Records Security 2012-10-31

Crossword Puzzle On Records Security crossword puzzle
Across
  1. Measures, policies and procedures used to protect a covered entity electronic systems.
  2. Second step in records security programme.
  3. Electronic..........
  4. To protect records from unauthorized users.
Down
  1. A type of responsibility.
  2. To protect records from physical hazards.
  3. To protect records from computer.........
  4. First step in records security.
  5. Access......

9 Clues: Access......Electronic..........A type of responsibility.First step in records security.To protect records from physical hazards.To protect records from computer.........Second step in records security programme.To protect records from unauthorized users.Measures, policies and procedures used to protect a covered entity electronic systems.

Juniper Networks for Healthcare 2021-11-12

Juniper Networks for Healthcare crossword puzzle
Across
  1. Juniper Mist upholds "___"-first networking.
  2. Our EX "___" devices forward data to the destination device.
  3. A place to care for the NHS' patients.
  4. Where is the sphygmomanometer? "___" services allow you to track users easily.
  5. The Wi-Fi here is rubbish, I can't "___".
  6. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  7. The patients, staff, and IoT devices that you're responsible for on the network.
Down
  1. This strategy is vital to protecting patient and hospital data records.
  2. Juniper Mist's cloud microservices ensures network updates without this.
  3. What's the "___" password? I can't connect.
  4. The NHS provides this exceptionally.
  5. The people that the NHS looks after.
  6. Technology that uses machine learning to proactively process data and tasks.
  7. This connects directly to a wired LAN.
  8. This device forwards packets between networks.

15 Clues: The NHS provides this exceptionally.The people that the NHS looks after.A place to care for the NHS' patients.This connects directly to a wired LAN.The Wi-Fi here is rubbish, I can't "___".What's the "___" password? I can't connect.Juniper Mist upholds "___"-first networking.This device forwards packets between networks....

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. buy
  2. station
  3. passenger
  4. screen
  5. train
  6. suitcase
  7. airport
  8. passport
  9. customs
  10. flight
Down
  1. ticket
  2. luggage
  3. arrive
  4. security
  5. confirm
  6. board
  7. call
  8. to travel
  9. reclaim

19 Clues: buycalltrainboardticketarrivescreenflightluggagestationconfirmairportreclaimcustomssecuritysuitcasepassportpassengerto travel

Godrej Security Solutions' Highlights of 2020 2020-12-23

Godrej Security Solutions' Highlights of 2020 crossword puzzle
Across
  1. Exclusive interview with this CAT A publication on Health Security technology
  2. Best research feature (Love thy neighbor)in this leading online lifestyle publication
  3. Best Home Automation story of the year with India’s leading financial publication was done by this journalist
  4. Renowned TV journo who reviewed the UV Case
  5. Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
  6. The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
  1. Participation in maximum number of Industry stories with this publication
  2. Godrej Security Solutions ventured into the health security segment with this product
  3. Authored article on Reflecting on your child’s safety post-COVID-19 crisis
  4. The best front-page coverage (UV-based disinfectants in demand) was received in this publication
  5. Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
  6. Maximum regional coverage garnered in this city

12 Clues: Renowned TV journo who reviewed the UV CaseMaximum regional coverage garnered in this cityParticipation in maximum number of Industry stories with this publicationAuthored article on Reflecting on your child’s safety post-COVID-19 crisisExclusive interview with this CAT A publication on Health Security technology...

It's a Disaster 2025-06-13

It's a Disaster crossword puzzle
Across
  1. The collapse of land downhill
  2. Widespread disease outbreak
  3. Oil leak in oceans or rivers
  4. Pollution from nuclear plants or bombs
  5. Overflow of water onto dry land
  6. War between countries
  7. Ice falling from the sky in a storm
  8. Sudden shaking of the ground
  9. A big wave caused by an underwater quake
  10. A long dry period without rain
Down
  1. Cold weather event with heavy snow and wind
  2. A powerful rotating storm
  3. A moving river of hot lava
  4. Fire caused by people or accidents
  5. Cyber event causing digital damage
  6. Large fire spreading fast in nature
  7. Climate issue caused by humans

17 Clues: War between countriesA powerful rotating stormA moving river of hot lavaWidespread disease outbreakOil leak in oceans or riversSudden shaking of the groundThe collapse of land downhillClimate issue caused by humansA long dry period without rainOverflow of water onto dry landFire caused by people or accidentsCyber event causing digital damage...

5th pd - School People 2023-02-16

5th pd - School People crossword puzzle
Across
  1. best AP ever
  2. tallest security staff
  3. most serious security staff
  4. teacher from Mexico
  5. name of a student's favorite cat
  6. cooking teacher
  7. new office assistant
Down
  1. the voice of the school
  2. teacher from Ireland
  3. 11th grade English teacher
  4. reading teacher

11 Clues: best AP everreading teachercooking teacherteacher from Mexicoteacher from Irelandnew office assistanttallest security staffthe voice of the school11th grade English teachermost serious security staffname of a student's favorite cat

Drew Hunts A Clue! 2024-03-07

Drew Hunts A Clue! crossword puzzle
Across
  1. To describe a person
  2. Science, Technology, Engineering and Math
  3. Person harmed as a result of a crime
  4. Piece of evidence and information
  5. A Data displayed on a screen of a phone
  6. A person who has committed a crime
  7. Seek to harm
Down
  1. The process of observing
  2. Final Result
  3. A small digital image to describe an emotion
  4. Facts collected for reference or analysis
  5. Troll An online bully who offends others

12 Clues: Final ResultSeek to harmTo describe a personThe process of observingPiece of evidence and informationA person who has committed a crimePerson harmed as a result of a crimeA Data displayed on a screen of a phoneScience, Technology, Engineering and MathFacts collected for reference or analysisTroll An online bully who offends others...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. prevents the unauthorized use or disclosure of information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of uncertainty on objectives

16 Clues: Effect of uncertainty on objectivesprevents the unauthorized use or disclosure of informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. Prevents the unauthorized use or disclosure of information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of uncertainty on objectives

16 Clues: Effect of uncertainty on objectivesPrevents the unauthorized use or disclosure of informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

KPL 17 2016-03-29

KPL 17 crossword puzzle
Across
  1. tuskin
  2. kotikaupunki
  3. lopenuupunut
  4. lentokenttä
  5. turvatarkastus
  6. hauta
  7. maisemat
  8. lahja
  9. ruokala
  10. kolkko
Down
  1. saapua
  2. kohokohta
  3. tuulinen
  4. läpi
  5. luola
  6. innostunut
  7. matkustaa
  8. laskeutua

18 Clues: läpiluolahautalahjatuskinsaapuakolkkoruokalatuulinenmaisematkohokohtamatkustaalaskeutuainnostunutlentokenttäkotikaupunkilopenuupunutturvatarkastus

mass media 2024-11-05

mass media crossword puzzle
Across
  1. ноутбук
  2. безопасность
  3. персонал
  4. рекламировать
  5. транслировать
  6. общество
  7. унижать
  8. сообщение
Down
  1. флешка
  2. новости
  3. обсуждение
  4. угрожать
  5. сериал
  6. сведения
  7. портить
  8. гражданин
  9. канал
  10. сеть

18 Clues: сетьканалфлешкасериалноутбукновостипортитьунижатьперсоналугрожатьсведенияобществогражданинсообщениеобсуждениебезопасностьрекламироватьтранслировать

Trend Micro Mobile Security 4 2024-05-07

Trend Micro Mobile Security 4 crossword puzzle
Across
  1. Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
  2. Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)
  3. Trend Micro Mobile Security regularly releases ____ for its mobile security products to address new threats and vulnerabilities. (Starts with u)
  4. Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
Down
  1. Trend Micro Mobile Security provides ____ security protection. (Starts with c)
  2. Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)
  3. Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.

7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)Trend Micro Mobile Security provides ____ security protection. (Starts with c)Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)...

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell and ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell and ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

Test Crossword 2023-01-25

Test Crossword crossword puzzle
Across
  1. adujeevitham set
  2. Value in Latin
  3. one of the indigenous groups of Washington, waterfall
  4. To Shun
Down
  1. all things computer and information technology
  2. Greek temple,Smitha mol’s old apartment
  3. “Soul of Seattle”
  4. Leavenworth, German State
  5. a homonym that could either mean “be angry” or refers to a famous religious symbol

9 Clues: To ShunValue in Latinadujeevitham set“Soul of Seattle”Leavenworth, German StateGreek temple,Smitha mol’s old apartmentall things computer and information technologyone of the indigenous groups of Washington, waterfalla homonym that could either mean “be angry” or refers to a famous religious symbol

Cyber Test 2023-09-13

Cyber Test crossword puzzle
Across
  1. A type of malware
  2. The most well-known malware attack in the past few years
Down
  1. The world's number one password
  2. The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center
  3. This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

5 Clues: A type of malwareThe world's number one passwordThe most well-known malware attack in the past few yearsThe number one type of cyber incident reported to the FBI's Internet Crime Complaint CenterThis includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

Information Security 2016-05-17

Information Security crossword puzzle
Across
  1. hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
  2. Use this tool to dispose of hard copy documents that contain (stricly) confidential information.
  3. Do not __________ your password or account with anyone.
  4. ID credentials
  5. contact point in case of Information Security (near) incident.
  6. an individual whose primary aim in life is to penetrate the security defences of large, sophisticated, computer systems
Down
  1. conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
  2. form of fraud in which the attacker attempts to gather personal, financial or business confidential information.
  3. malicious software that kidnaps your data
  4. classic form of malware

10 Clues: ID credentialsclassic form of malwaremalicious software that kidnaps your dataDo not __________ your password or account with anyone.contact point in case of Information Security (near) incident.Use this tool to dispose of hard copy documents that contain (stricly) confidential information....

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie wird das Chatten in Echtzeit genannt?
  2. Wie lautet der Überbegriff für unerwünschte, schädliche Software?
  3. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
  4. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
  5. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  6. Welche Programme, protokollieren die Tastatureingabe mit?
  7. Was versteckt sich hinter einem scheinbar nützlichem Programm?
Down
  1. Wie werden unerwünschte Werbemails genannt?
  2. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
  3. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

internet security 2021-03-01

internet security crossword puzzle
Across
  1. software designed to collect information from computers for commercial or criminal purposes
  2. black-hat hackers
  3. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  4. a program designed to prevent spyware from gaining access to the internal network.
  5. horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
  1. a deceptive scheme or trick used to cheat someone out of something, especially money
  2. the illegal copying and distribution of copyrighted software, information, music and video files
  3. self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
  4. programs that spread by attaching themselves to executable files or documents
  5. certificate an electronic way of proving your identity, when you are doing business on the Internet

10 Clues: black-hat hackersprograms that spread by attaching themselves to executable files or documentsa program designed to prevent spyware from gaining access to the internal network.a deceptive scheme or trick used to cheat someone out of something, especially money...

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. Separate low-level system software running on the host machine to perform visualization.
  2. Synchronous condition that results from a particularly undesirable situation.
  3. Linux uses this technique to define the priority of processes
  4. A real-time operating system used in mission-critical applications
  5. An asynchronous event that can occur at any time irrespective of what the processor is doing
  6. Processes running in the background, started by the kernel itself.
Down
  1. A connection used to exchange data between the processes.
  2. One method to block buffer overflow attacks
  3. Helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. the process responsible for secure logon.

10 Clues: the process responsible for secure logon.One method to block buffer overflow attacksA connection used to exchange data between the processes.Linux uses this technique to define the priority of processesA real-time operating system used in mission-critical applicationsProcesses running in the background, started by the kernel itself....

Computer security 2022-07-22

Computer security crossword puzzle
Across
  1. occurs at the receivers side
  2. never save your password on a
  3. prevents unauthorised access to a network
  4. software created to infect a computer
Down
  1. the data we want to hide
  2. harming or harassing others online
  3. unwanted email
  4. converting information into secret code
  5. computer expert who does the act of hacking
  6. never share it with anyone

10 Clues: unwanted emailthe data we want to hidenever share it with anyoneoccurs at the receivers sidenever save your password on aharming or harassing others onlinesoftware created to infect a computerconverting information into secret codeprevents unauthorised access to a networkcomputer expert who does the act of hacking

Data Security 2022-06-07

Data Security crossword puzzle
Across
  1. the practice of sending emails pretending to be from reputable companies in order to cause individuals to reveal personal information, such as passwords and credit card numbers
  2. the gaining of unauthorized access to data in a system or computer
  3. This protects computers on a network from intentional hostile intrusion which could result in data corruption or denial of service
  4. downloading software and other copyrighted material illegally
  5. stealing data and information and presenting it as your own
  6. this term refers to all malicious programs, but in essence, it’s a code that attaches itself to a legitimate, piece of software and then reproduces itself when that file is run
Down
  1. the practice of using another person's name and personal information in order to obtain credit, loans, etc.
  2. this is the process of converting plain text using a cipher (an algorithm) to make it unreadable to anyone who does not have a key
  3. bullying people online
  4. this refers to characters used for validating a user on a computer system. A username along with a password is usually used

10 Clues: bullying people onlinestealing data and information and presenting it as your owndownloading software and other copyrighted material illegallythe gaining of unauthorized access to data in a system or computerthe practice of using another person's name and personal information in order to obtain credit, loans, etc....

software security 2022-11-01

software security crossword puzzle
Across
  1. πρόσφατη ορισμοί ιών
  2. οι συγγραφείς των ιών
  3. λογισμικό προστασίας από ιούς
  4. το λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή
  5. κακόβουλο πρόγραμμα
Down
  1. κακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικό
  2. κατασκοπείας κακόβουλο πρόγραμμα που προσκολλάται κρυφά σε αρχεία που κατεβάζουμε απ' το διαδίκτυο.
  3. τα ψηφιακά αποτυπώματα των ιών
  4. βλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού του
  5. τείχος προστασίας

10 Clues: τείχος προστασίαςκακόβουλο πρόγραμμαπρόσφατη ορισμοί ιώνοι συγγραφείς των ιώνλογισμικό προστασίας από ιούςτα ψηφιακά αποτυπώματα των ιώνκακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικόβλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού τουτο λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή...

security plan 2021-04-14

security plan crossword puzzle
Across
  1. State law determines how organizations qualify as political parties to get candidates on the ballot, party membership ____, the right to vote in a party’s primary, the requirements for party officials, the party nomination process, and the regulation of party finances (although such regulations have had little success).
  2. Party activists are not ____per se and tend to be people who are decidedly liberal or conservative in their issue positions.
  3. Party activists who serve on the city, county, or state party organizations, or who regularly work in campaigns constitute a(n) _____ pool for candidates for public office.
  4. State committees are headed by party _____who hail from varied backgrounds.
Down
  1. _____ committees have become service providers to candidates’ campaigns.
  2. Most local parties are an entirely _____-based operation with limited permanent resources.
  3. City and county party officers and committees are chosen ______and cannot be removed by any higher party authority.
  4. The role of local party organizations is mostly ____to that of the candidates’ own organizations.
  5. Professional campaigns develop a campaign theme to ___the essence of the campaign and help the candidate “stay on message.”
  6. Political party organizations in the U.S. are decentralized with power flowing from the bottom up, consisting of city and county _____, state committees, and national committees.

10 Clues: _____ committees have become service providers to candidates’ campaigns.State committees are headed by party _____who hail from varied backgrounds.Most local parties are an entirely _____-based operation with limited permanent resources.The role of local party organizations is mostly ____to that of the candidates’ own organizations....

Security Quiz 2022-10-24

Security Quiz crossword puzzle
Across
  1. to dump out information about things
  2. a well known term for encryption
  3. malicious piece of code
  4. Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
  5. An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
  6. The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
  1. Internet file sharing utility
  2. A worm program that flooded the apranet
  3. Sending strange packets to a system in order to gauge how it responds to determine the operating system
  4. Software to detect unprotected shares

10 Clues: malicious piece of codeInternet file sharing utilitya well known term for encryptionto dump out information about thingsSoftware to detect unprotected sharesA worm program that flooded the apranetSending strange packets to a system in order to gauge how it responds to determine the operating system...

Security Awareness 2023-09-01

Security Awareness crossword puzzle
Across
  1. The process of verifying the identity of a user or a piece of information
  2. A method for guessing a password that involves systematically trying a high volume of possible combinations of characters until the correct one is found
  3. Which month is observed as Insider Threat month?
  4. The use of AI to replace the likeness of one person with another in video or audio
  5. Abbreviation of an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
Down
  1. A weakness in the system is called --------------------
  2. Malware that uses tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites
  3. Targeted phishing attack aimed at senior executives masquerading as a legitimate email
  4. The use of electronic means, primarily messaging and social media platforms, to bully and harass a victim
  5. A kind of spyware software that records every keystroke made on a computer’s keyboard

10 Clues: Which month is observed as Insider Threat month?A weakness in the system is called --------------------The process of verifying the identity of a user or a piece of informationThe use of AI to replace the likeness of one person with another in video or audioA kind of spyware software that records every keystroke made on a computer’s keyboard...

Ιnternet Security 2024-02-12

Ιnternet Security crossword puzzle
Across
  1. Παιχνίδια στο διαδίκτyo
  2. Διαδικτυακός εκφοβισμός
  3. Κωδικού πρόσβασης
  4. Εικόνα Σώματος& κοινωνικά δίκτυα
Down
  1. Στοχευμένες Διαφημίσεις
  2. Ηλεκτρονικές Απάτες
  3. Άγνωστοι στο διαδίκτυο
  4. ψευδείς ειδήσεις
  5. Εθισμός στο διαδίκτυο
  6. Κακόβουλο λογισμικό

10 Clues: ψευδείς ειδήσειςΚωδικού πρόσβασηςΗλεκτρονικές ΑπάτεςΚακόβουλο λογισμικόΕθισμός στο διαδίκτυοΆγνωστοι στο διαδίκτυοΣτοχευμένες ΔιαφημίσειςΠαιχνίδια στο διαδίκτyoΔιαδικτυακός εκφοβισμόςΕικόνα Σώματος& κοινωνικά δίκτυα

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Internet Security 2020-07-10

Internet Security crossword puzzle
Across
  1. a business deal or action such as buying or selling something
  2. to protect information by putting it into a special code that only some people can read
  3. a system that protects a computer
  4. when two or more machines or telephones are joined together or joined to a larger system,using anelectrical connection
  5. something that protects a website from attacks
Down
  1. proof that something is true or real
  2. an attempt to cause damage or injury
  3. someone who uses computers to secretly use or change the information in another person's computer system
  4. connected to the internet, or available through the internet
  5. and prevents other people from using it or damaging it

10 Clues: a system that protects a computerproof that something is true or realan attempt to cause damage or injurysomething that protects a website from attacksand prevents other people from using it or damaging itconnected to the internet, or available through the interneta business deal or action such as buying or selling something...

Food Security 2024-05-21

Food Security crossword puzzle
Across
  1. - meeting the needs of the present generation without compromising the ability of future generations to meet their own needs.
  2. - something that is needed to survive
  3. - Access to food that is nutritious safe, and produced in environmentally sustainable ways.
  4. - a type of protection
  5. - Physical and economic access to food for all at all times.
  6. - the process of providing or obtaining the food necessary for health and growth.
Down
  1. - the rate of increase in prices over a given period of time.
  2. - enough to meet the needs of a situation or a proposed end.
  3. - Access to culturally acceptable food
  4. - Sufficient (enough) food for all people at all times.

10 Clues: - a type of protection- something that is needed to survive- Access to culturally acceptable food- Sufficient (enough) food for all people at all times.- enough to meet the needs of a situation or a proposed end.- Physical and economic access to food for all at all times.- the rate of increase in prices over a given period of time....

IT Security 2023-06-01

IT Security crossword puzzle
Across
  1. Haubtstandort des BSI(DE)
  2. Zeichenfolge für Zugang
  3. Gerät, um sich daheim mit dem Internet zu verbiden
  4. 2021 feierte das BSI sein 30-jähriges...
  5. Unautorisierter Zugriff auf IT-Systeme
  6. An einem elektronischen Ort aufbewahren(Verb)
  7. Veraltetes Speichermedium
Down
  1. Körperliches Merkmal zur Authentisierung
  2. Programm zum Darstellen von Webseiten
  3. Zusammenschaltung mehrerer Systeme

10 Clues: Zeichenfolge für ZugangHaubtstandort des BSI(DE)Veraltetes SpeichermediumZusammenschaltung mehrerer SystemeProgramm zum Darstellen von WebseitenUnautorisierter Zugriff auf IT-SystemeKörperliches Merkmal zur Authentisierung2021 feierte das BSI sein 30-jähriges...An einem elektronischen Ort aufbewahren(Verb)...

computer security 2023-08-08

computer security crossword puzzle
Across
  1. protection
  2. infector
  3. self-controlled invader
  4. attracting suckers
Down
  1. encoding
  2. program designed to disrupt
  3. take advantage of
  4. user confirmation
  5. unauthorized access
  6. greek myth

10 Clues: encodinginfectorprotectiongreek mythtake advantage ofuser confirmationattracting suckersunauthorized accessself-controlled invaderprogram designed to disrupt

Food security 2024-12-18

Food security crossword puzzle
Across
  1. cannot grow without water
  2. affect the availability of food
  3. the condition in which people lack stable access to sufficient food
  4. having enough money to be sufficient nutritious food
Down
  1. can lead to widespread famine
  2. The process of protecting food from spoilageand contamination in cold environment
  3. food being within reach of every person
  4. deficiency of enough resources
  5. the ability to consistently access enough nutritious food
  6. harmful microorganisms

10 Clues: harmful microorganismscannot grow without watercan lead to widespread faminedeficiency of enough resourcesaffect the availability of foodfood being within reach of every personhaving enough money to be sufficient nutritious foodthe ability to consistently access enough nutritious food...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Which vegetable is long, green, and rhymes with "teen"?
  2. What long, green vegetable is also called a cucumber?
  3. What vegetable is used to make french fries?
  4. What are the key nutrients essential for child growth?
  5. Which vegetable is purple and shaped like an egg?
Down
  1. Which vegetable is Popeye's favorite?
  2. Which round, red vegetable is often used in salads?
  3. What orange vegetable do rabbits like to eat?
  4. What is essential for calcium absorption, promoting strong bones and teeth
  5. What color is a carrot?

10 Clues: What color is a carrot?Which vegetable is Popeye's favorite?What vegetable is used to make french fries?What orange vegetable do rabbits like to eat?Which vegetable is purple and shaped like an egg?Which round, red vegetable is often used in salads?What long, green vegetable is also called a cucumber?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Cereal grain
  2. Vegetable with bitter taste
  3. It keeps doctor away
  4. Vegetable with golden seeds
  5. This vegetable can make you cry
Down
  1. kind of fruits
  2. looks like ginger when grown in plant
  3. Snack eat while watching movie
  4. Every kid morning drink
  5. Indian kid have to increase memory

10 Clues: Cereal grainkind of fruitsIt keeps doctor awayEvery kid morning drinkVegetable with bitter tasteVegetable with golden seedsSnack eat while watching movieThis vegetable can make you cryIndian kid have to increase memorylooks like ginger when grown in plant

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs
  2. Man's best friend
  3. – This animal gives milk and is important in the desert
  4. Small animal raised
  5. Has a trunk
Down
  1. Large marsupial
  2. Animal raised for wool
  3. Likes to chase mice
  4. Pollinator that plays a critical role in food production
  5. Flying mammal

10 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raisedAnimal raised for woolPoultry raised for eggs– This animal gives milk and is important in the desertPollinator that plays a critical role in food production

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. plants grown for food
  2. place where food is grown
  3. you plant this to grow food
  4. long period without rain
  5. small area to grow vegetables
Down
  1. plants grow in this
  2. recycled plant material for soil
  3. not old or spoiled food
  4. feeling when you need to eat
  5. collecting ripe crops

10 Clues: plants grow in thisplants grown for foodcollecting ripe cropsnot old or spoiled foodlong period without rainplace where food is grownyou plant this to grow foodfeeling when you need to eatsmall area to grow vegetablesrecycled plant material for soil

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Helps to Increase Hemoglobin % in blood
  2. contains natural sugars, like glucose, fructose, and sucrose, which can quickly replenish energy levels.
  3. Rich in antioxidants and Boosts heart health
  4. Helps to gain Vitamin C
  5. contain antioxidants that may help prevent certain types of cancer
Down
  1. contain vitamin A, which helps prevent xerophthalmia, an eye disease that can lead to vision loss
  2. Contain fiber, manganese, vitamin C, vitamin K, and anthocyanins, a type of phytonutrient
  3. A good source of monounsaturated fat, vitamin E, and folate, which are all good for the heart
  4. High in potassium and vitamin K, which are good for the heart
  5. Contain prebiotic fiber, which is good for gut health, and potassium

10 Clues: Helps to gain Vitamin CHelps to Increase Hemoglobin % in bloodRich in antioxidants and Boosts heart healthHigh in potassium and vitamin K, which are good for the heartcontain antioxidants that may help prevent certain types of cancerContain prebiotic fiber, which is good for gut health, and potassium...

Information Security 2025-03-24

Information Security crossword puzzle
Across
  1. techniques are cons (Schwindel) conducted through technology. The goal is to trick someone into giving up money, information, or valuables through manipulation and false promises.
  2. Scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as key. Even if copied or stolen.
  3. bad guys, also known as “crackers”
  4. One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files
  5. networks of infiltrated and compromised machines controlled by a central command
  6. seeks to compromise a computing system without permission. There are many forms of Malware for instance Viruses, Worms, Trojans
Down
  1. good guys, probe for weaknesses, but don’t exploit them. They share their knowledge so that holes can be found & plugged hence security improves. They are part of the company auditing & security process
  2. examines traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication
  3. hackers use psychology (exploit trust or curiosity) rather than code to trick employees into revealing information or performing other tasks that compromise a firm.
  4. effectively shutting down Websites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines.

10 Clues: bad guys, also known as “crackers”networks of infiltrated and compromised machines controlled by a central commandOne of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. The farming of fish and other aquatic animals for food production.
  2. Milk and foods made from milk, like cheese and yogurt.
  3. A severe shortage of food that can lead to starvation and death.
  4. Maintaining cleanliness to prevent the spread of illness and disease.
  5. The process of providing water to crops to help them grow.
  6. The substances in food that our bodies need to grow and stay healthy.
  7. A type of grain that is used to make bread, pasta, and other foods.
Down
  1. Helps plants grow by providing them with important nutrients.
  2. To kill bacteria by chemical process, we need to
  3. To prevent contamination,food should be kept what?

10 Clues: To kill bacteria by chemical process, we need toTo prevent contamination,food should be kept what?Milk and foods made from milk, like cheese and yogurt.The process of providing water to crops to help them grow.Helps plants grow by providing them with important nutrients.A severe shortage of food that can lead to starvation and death....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. a severe shortage of food (as through crop failure) resulting in violent hunger and starvation and death
  2. a substance that can be used or prepared for use as food
  3. a storehouse for threshed grain or animal feed
  4. of or providing nourishment
  5. any substance that can be metabolized by an animal to give energy and build tissue
Down
  1. a stock or supply of foods
  2. the act of depriving of food or subjecting to famine
  3. fuel derived immediately from living matter
  4. the act of searching for food and provisions
  5. any substance that can be used as food

10 Clues: a stock or supply of foodsof or providing nourishmentany substance that can be used as foodfuel derived immediately from living matterthe act of searching for food and provisionsa storehouse for threshed grain or animal feedthe act of depriving of food or subjecting to faminea substance that can be used or prepared for use as food...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Is the practice of growing food?
  2. Is a staple grain
  3. Are needed for healthy diet?
  4. Is necessary for irrigation?
Down
  1. Is a main source of protein?
  2. Affects crop production?
  3. Type of farming uses fewer chemicals?
  4. Can reduce soil fertility?
  5. Is essential for plant growth?
  6. Is used to store grains?

10 Clues: Is a staple grainAffects crop production?Is used to store grains?Can reduce soil fertility?Is a main source of protein?Are needed for healthy diet?Is necessary for irrigation?Is essential for plant growth?Is the practice of growing food?Type of farming uses fewer chemicals?

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Traditional Korean dish made of fermented vegetables, primarily napa cabbage
  2. An ________ a day keeps the doctor away
  3. Type of cookie that originated in France, often almond-based with a chewy texture
  4. A rich, slow-cooked French stew often made with beef
  5. Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
  6. Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
  1. A Japanese noodle soup made with a meat or fish-based broth
  2. Aromatic spice often used in Indian cooking
  3. A method of cooking meat slowly in its own fat
  4. A salad made with tomatoes, cucumbers, onions, and feta cheese

10 Clues: An ________ a day keeps the doctor awayAromatic spice often used in Indian cookingA method of cooking meat slowly in its own fatA rich, slow-cooked French stew often made with beefA Japanese noodle soup made with a meat or fish-based brothA salad made with tomatoes, cucumbers, onions, and feta cheese...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Which city is an example of a food surplus state in India
  2. The mother dairy is an important cooperative in
  3. Buffer stock is the stock of foodgrains procured by the government through
  4. The success of wheat was replicated in
  5. Which State has the highest production of rice in India
  6. Which state is associated with AMUL
Down
  1. What has been a major issue in distribution system.
  2. the sector which has about 60% plus population-dependence
  3. These are factors which can affect Food Security
  4. The land on which the crops are grown is known as

10 Clues: Which state is associated with AMULThe success of wheat was replicated inThe mother dairy is an important cooperative inThese are factors which can affect Food SecurityThe land on which the crops are grown is known asWhat has been a major issue in distribution system.Which State has the highest production of rice in India...

FOOD Security 2024-10-17

FOOD Security crossword puzzle
Across
  1. something that is suitable or safe to eat a mixture of organic matter, minerals, gases, liquids, and organisms that together support the life of plants and soil organisms.
  2. a substance that is added to food in order to improve its taste or appearance
  3. the process or period of gathering in crops
  4. when an organism gets too few or too many nutrients, resulting in health problems
  5. the distress associated with lack of food
Down
  1. Bank a place where stocks of food, typically basic provisions and non-perishable items
  2. substances that are used to control pests
  3. A type of farming that uses no pesticides or Chemicals
  4. the activity or business of growing crops
  5. a cultivated plant that is grown on a large scale commercially, especially a cereal, fruit, or vegetable

10 Clues: substances that are used to control peststhe activity or business of growing cropsthe distress associated with lack of foodthe process or period of gathering in cropsA type of farming that uses no pesticides or Chemicalsa substance that is added to food in order to improve its taste or appearance...

Food Security 2025-09-01

Food Security crossword puzzle
Across
  1. – the buying, selling or exchanging of goods and services between people, businesses, or countries.
  2. – goods or services sold to another country.
  3. – when fertile land becomes dry and turns into desert, often due to drought, deforestation or poor farming practices.
  4. insecurity – when people do not have reliable access to enough safe and nutritious food.
Down
  1. – the practice of farming, including growing crops and raising animals for food and other products.
  2. change – long-term shifts in weather patterns and temperatures caused mostly by human activities like burning fossil fuels.
  3. – a set of rules, plans or actions made by governments or organisations to guide decisions.
  4. – the amount of crops or food produced from a piece of land (e.g., how many tonnes of wheat a farm grows).
  5. – the top layer of the earth where plants grow, made up of minerals, organic matter, air and water.
  6. – goods or services brought into a country from overseas.

10 Clues: – goods or services sold to another country.– goods or services brought into a country from overseas.insecurity – when people do not have reliable access to enough safe and nutritious food.– a set of rules, plans or actions made by governments or organisations to guide decisions....

Information Security 2025-09-28

Information Security crossword puzzle
Across
  1. Detailed minimum specifications for compliance
  2. Unauthorized entry into the real or virtual property of another party
  3. Common theft of credit card numbers (Information extortion)
  4. This threat actually evolves to elude detection
  5. Being secure and free from danger
Down
  1. The legal obligation to compensate an injured party for wrongs doings.
  2. Raw facts collected by an organization
  3. Step-by-step instructions for compliance
  4. regulate and define socially acceptable behavior.
  5. An adverse event begins to manifest as a threat to data, it becomes an

10 Clues: Being secure and free from dangerRaw facts collected by an organizationStep-by-step instructions for complianceDetailed minimum specifications for complianceThis threat actually evolves to elude detectionregulate and define socially acceptable behavior.Common theft of credit card numbers (Information extortion)...

Secure the Grid: Security Control Families Crossword 2024-12-04

Secure the Grid: Security Control Families Crossword crossword puzzle
Across
  1. Evaluation of systems to ensure compliance with security policies.
  2. Tracking activities to detect unauthorized access or misuse.
  3. The process of verifying a user's identity before access.
  4. Regular updates and repairs to keep systems secure.
  5. Procedures for restoring data and systems after an incident.
  6. Plans for continuity during an unexpected disruption.
Down
  1. Organized methods for securing and managing resources.
  2. Potential for a threat to exploit a vulnerability.
  3. Baseline settings to protect systems and reduce vulnerabilities.
  4. An event that compromises the security of information.
  5. Training to help users recognize and prevent security threats.
  6. Control mechanisms for who can enter or use resources.

12 Clues: Potential for a threat to exploit a vulnerability.Regular updates and repairs to keep systems secure.Plans for continuity during an unexpected disruption.Organized methods for securing and managing resources.An event that compromises the security of information.Control mechanisms for who can enter or use resources....

Secure the Grid: Security Control Families Crossword 2024-12-05

Secure the Grid: Security Control Families Crossword crossword puzzle
Across
  1. Tracking activities to detect unauthorized access or misuse.
  2. The process of verifying a user's identity before access.
  3. Potential for a threat to exploit a vulnerability.
  4. Baseline settings to protect systems and reduce vulnerabilities.
  5. Organized methods for securing and managing resources.
Down
  1. Evaluation of systems to ensure compliance with security policies.
  2. Training to help users recognize and prevent security threats.
  3. Plans for continuity during an unexpected disruption.
  4. Regular updates and repairs to keep systems secure.
  5. An event that compromises the security of information.
  6. Control mechanisms for who can enter or use resources.
  7. Procedures for restoring data and systems after an incident.

12 Clues: Potential for a threat to exploit a vulnerability.Regular updates and repairs to keep systems secure.Plans for continuity during an unexpected disruption.An event that compromises the security of information.Control mechanisms for who can enter or use resources.Organized methods for securing and managing resources....

Human rights 2022-11-07

Human rights crossword puzzle
Across
  1. privatliv
  2. realationer
  3. liv
  4. alder
  5. bevægelse
  6. tortur
  7. nationalitet
  8. lov
  9. lighed
  10. tale
  11. slaveri
  12. sikkerhed
  13. skyldig
Down
  1. forskellsbehandling
  2. religion
  3. køn
  4. lighed
  5. frihed
  6. tro
  7. menneske
  8. rettigheder
  9. udtagelse
  10. sikkerhed

23 Clues: kønlivtrolovtalealderlighedfrihedtorturlighedslaveriskyldigreligionmenneskeprivatlivbevægelseudtagelsesikkerhedsikkerhedrealationerrettighedernationalitetforskellsbehandling

Ch. 9 (Plazas) viajar en avion 2019-01-22

Ch. 9 (Plazas) viajar en avion crossword puzzle
Across
  1. to travel
  2. departure
  3. agency
  4. pasillo
  5. passenger
  6. asistente
  7. flight
  8. aerolínea
  9. arrival
Down
  1. sin _______ (stop)
  2. equipaje
  3. seat
  4. aduana
  5. airplane window
  6. ticket
  7. security
  8. schedule
  9. trip
  10. suitcase
  11. plane

20 Clues: seattripplaneagencyaduanaticketflightpasilloarrivalequipajesecurityschedulesuitcaseto traveldeparturepassengerasistenteaerolíneaairplane windowsin _______ (stop)

Spanish Vocabulary 2023-04-26

Spanish Vocabulary crossword puzzle
Across
  1. gum
  2. cloud
  3. butterfly
  4. boat
  5. train
  6. sun
  7. energy
  8. suitcase
  9. plain
  10. to fish
Down
  1. avocado
  2. candy
  3. airport
  4. baggage
  5. to board
  6. security
  7. weather
  8. skier
  9. snorkle
  10. shade

20 Clues: gumsunboatcandycloudtrainskiershadeplainenergyavocadoairportbaggageweathersnorkleto fishto boardsecuritysuitcasebutterfly