cyber security Crossword Puzzles

Pass the B___ 2021-02-18

Pass the B___ crossword puzzle
Across
  1. hail the computer
  2. generic doesn't mean boring
  3. it's not Korea, China, or Japan
  4. the other one
Down
  1. I am the walrus
  2. this supernatural rpg is a ball
  3. where the cyber-pope lives
  4. jyhad no more

8 Clues: jyhad no morethe other oneI am the walrushail the computerwhere the cyber-pope livesgeneric doesn't mean boringthis supernatural rpg is a ballit's not Korea, China, or Japan

Online bullying 2024-06-11

Online bullying crossword puzzle
Across
  1. online platform
  2. when someone is picking on you constantly
  3. going to the police to fill in a
  4. someone to talk to at school
Down
  1. connected to a group of things
  2. someone you can seek out
  3. protecting yourself online
  4. another name for the internet
  5. a platform used with internet
  6. to stop people contacting you
  7. someone to talk to at home

11 Clues: online platformsomeone you can seek outprotecting yourself onlinesomeone to talk to at homesomeone to talk to at schoolanother name for the interneta platform used with internetto stop people contacting youconnected to a group of thingsgoing to the police to fill in awhen someone is picking on you constantly

I can't find you, Mum! 2025-11-19

I can't find you, Mum! crossword puzzle
Across
  1. Jessie followed her mom to the clothing shop and found it ____.
  2. Jessie and her mother went ____.
  3. The stranger ___ Jessie, and she ran away.
  4. Mom ___ that they were safe and sound now.
  5. Don't talk to strangers, even if they are ____.
Down
  1. Jessie mistook the security guard for a ____.
  2. Jessie and her mother were back ____, safe and sound.
  3. She didn't ____ when someone came into the room.
  4. Jessie ___ back the curtain.
  5. They will tell their ____ that Jessie is in the office.
  6. The security guard took Jessie into his ____.
  7. The security ___ promised to help Jessie.

12 Clues: Jessie ___ back the curtain.Jessie and her mother went ____.The security ___ promised to help Jessie.The stranger ___ Jessie, and she ran away.Mom ___ that they were safe and sound now.Jessie mistook the security guard for a ____.The security guard took Jessie into his ____.Don't talk to strangers, even if they are ____....

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  2. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  3. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  5. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  6. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  2. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  4. A type of fraud that targets high-profile end users.
  5. Crime conducted via the Internet or some other computer network.
  6. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. A secret word or phrase known only to you.
  8. What tells you that the website is secure in the browser.

14 Clues: A secret word or phrase known only to you.A type of fraud that targets high-profile end users.What tells you that the website is secure in the browser.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

balduini paolo 2021-11-21

balduini paolo crossword puzzle
Across
  1. indirizzo web o ....
  2. bullismo in rete
  3. netiquette ti insegna il ...... del web
  4. "mi piace navigare sul ....."
  5. sul web ce ne sono tantissimi
Down
  1. non puoi postare tutto ciò che vuoi...
  2. chi fa bullismo in rete
  3. non usarle a caso!
  4. strumento di ricerca più usato al mondo
  5. una lettera scritta dal computer
  6. prima di navigare sul web chiedi il .... ai tuoi genitori
  7. abbreviazione di "applicazione"

12 Clues: bullismo in retenon usarle a caso!indirizzo web o ....chi fa bullismo in rete"mi piace navigare sul ....."sul web ce ne sono tantissimiabbreviazione di "applicazione"una lettera scritta dal computernon puoi postare tutto ciò che vuoi...strumento di ricerca più usato al mondonetiquette ti insegna il ...... del web...

Mental Health 2022-10-11

Mental Health crossword puzzle
Across
  1. physical activity releases
  2. action or event that causes stress
  3. what does the T stand for in SMART
  4. when a person uses mindfulness to relax
  5. mental blank that is diagnosed
  6. progressive blank relaxation
Down
  1. meditation helps improve blank
  2. bullying when someone attacks your feelings
  3. what does the S stand for in SMART
  4. sadness is a
  5. when someone uses social media to bully
  6. someone who watches someone get bullied

12 Clues: sadness is aphysical activity releasesprogressive blank relaxationmeditation helps improve blankmental blank that is diagnosedaction or event that causes stresswhat does the S stand for in SMARTwhat does the T stand for in SMARTwhen someone uses social media to bullywhen a person uses mindfulness to relaxsomeone who watches someone get bullied...

Hanshaft Crossword 2015-06-18

Hanshaft Crossword crossword puzzle
Across
  1. / Acquire shares
  2. / payout
  3. buy 100_
  4. / money earned
  5. / Intelligent _
  6. / assets held here
  7. / buyout
  8. / 1 ½ by 1 ¾
  9. / expiring contract
  10. stocks traded
  11. / holdings
  12. / paper form
  13. / transferrable
  14. / cash or stock _
  15. / opposite of DK'ed
  16. / broker
Down
  1. / cash or _
  2. / It is a debt security
  3. / money due you
  4. / A preliminary prospectus
  5. / not today but tomorrow
  6. / into two or more
  7. / Another word for shares
  8. / reregistration company
  9. / taxes
  10. / another word for money
  11. identifying number
  12. / bid price
  13. / shares in a basket
  14. / attorney letter
  15. / trade shares
  16. / to vote
  17. / trading happens
  18. / __exchange

34 Clues: / taxes/ payoutbuy 100_/ buyout/ broker/ to vote/ holdings/ cash or _/ bid price/ 1 ½ by 1 ¾/ paper form/ __exchangestocks traded/ money earned/ trade shares/ money due you/ Intelligent _/ transferrable/ Acquire shares/ attorney letter/ cash or stock _/ trading happens/ into two or more/ assets held hereidentifying number/ expiring contract...

Drew's Crossword puzzle 2023-08-24

Drew's Crossword puzzle crossword puzzle
Across
  1. Attackers who are strongly motivated
  2. collection of harmful computer code
  3. security method of “scrambling” information
  4. Program that stores multiple passcodes
  5. Malware hiding inside another program
  6. A false warning
  7. An individual who launches attacks
  8. Stalking through use of technology.
  9. State of freedom from public
Down
  1. Social manipulation to receive information
  2. process of unlocking encrypted information
  3. Science of healthy computer practices
  4. Inside security threat to companies
  5. Electronic waste from discarded devices
  6. Backup power source
  7. stealing someone’s personal information
  8. Malicious software, like viruses,spyware
  9. malicious computer code that reproduces
  10. A wireless high-speed data network
  11. consistent unwanted emails or messages

20 Clues: A false warningBackup power sourceState of freedom from publicA wireless high-speed data networkAn individual who launches attacksInside security threat to companiescollection of harmful computer codeStalking through use of technology.Attackers who are strongly motivatedScience of healthy computer practicesMalware hiding inside another program...

D2 Me Too! 2020-11-23

D2 Me Too! crossword puzzle
Across
  1. Subtitles
  2. DBX OM's first name
  3. Lion's site
  4. Prevents purchases/sets viewing limits
  5. short-range wireless connection
  6. Sometimes downloaded on Fire sticks
  7. Last name of a D2 TM
  8. Must do for security
  9. System used by D2 team
  10. Amazon's AI
  11. Should not be suppressed in most cases
Down
  1. Pay every month
  2. AMZ Device for reading
  3. This includes talk time, ACW, hold time
  4. Customer's security code
  5. D2 SOM's maiden name
  6. Tool which tells us what to do for Cx
  7. Manually reset the device
  8. D2's major KPI
  9. AMZ preferred customer
  10. Screen-sharing tool
  11. 5-Digit code ending Cx address

22 Clues: SubtitlesLion's siteAmazon's AID2's major KPIPay every monthDBX OM's first nameScreen-sharing toolD2 SOM's maiden nameLast name of a D2 TMMust do for securityAMZ Device for readingAMZ preferred customerSystem used by D2 teamCustomer's security codeManually reset the device5-Digit code ending Cx addressshort-range wireless connection...

Cybersecurity Crossword Puzzle 2023-03-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Prevents unauthorized axes.
  2. Encrypts user data.
  3. Malware disguised as legit files.
  4. Provides services over the internet.
  5. Scrambles data for security.
  6. Dangerous and can bypass security.
  7. A group of applications.
  8. Series of computers and peripherals.
  9. Waves of requests force shutdown.
  10. Malware that collects and transmits.
  11. Changes, corrupts, or destroys information.
Down
  1. Protects data during encryption.
  2. Shields users against viruses.
  3. Hacker changes the IP address.
  4. Malware that hijacks and encrypts.
  5. Network of compromised computers.
  6. Bad, evil software.
  7. Fools victim into giving information.
  8. A series of numbers.
  9. Malware that reproduces and spreads.

20 Clues: Encrypts user data.Bad, evil software.A series of numbers.A group of applications.Prevents unauthorized axes.Scrambles data for security.Shields users against viruses.Hacker changes the IP address.Protects data during encryption.Network of compromised computers.Malware disguised as legit files.Waves of requests force shutdown....

Series 6 Puzzle #1 2022-12-28

Series 6 Puzzle #1 crossword puzzle
Across
  1. Leveraged Purchase of Securities
  2. Entity Offering Securities for Sale
  3. Rights of Accumulation, Abrev
  4. Debt Security
  5. Net Asset Value, Abrev
  6. Amount Added to NAV to Arrive at Offer Price
  7. Individual Retirement Account, Abrev
  8. Owning a Security
  9. Modern Portfolio Theory, Abrev
  10. Not Entitled to Dividends
Down
  1. Easily Convert an Asset Into Cash
  2. Excessive Trading
  3. Financial Industry Regulatory Authority, Abrev
  4. Schedule of Sales Charge Discounts
  5. Letter of Intent, Abrev
  6. Transfer of Funds from One Qualified Retirement Plan to Another
  7. Price at Which Investor Can Buy
  8. Self Regulatory Organization, Abrev
  9. Price at Which Investor Can Sell
  10. Increase in Asset Value

20 Clues: Debt SecurityExcessive TradingOwning a SecurityNet Asset Value, AbrevLetter of Intent, AbrevIncrease in Asset ValueNot Entitled to DividendsRights of Accumulation, AbrevModern Portfolio Theory, AbrevPrice at Which Investor Can BuyLeveraged Purchase of SecuritiesPrice at Which Investor Can SellEasily Convert an Asset Into Cash...

Government Acronyms 2024-10-24

Government Acronyms crossword puzzle
Across
  1. National Institute of Standard and Technology
  2. Department of Justice
  3. Department of Interior
  4. National Oceanic Atmospheric Administration
  5. Housing and Development
  6. Approves food, cosmetics and drugs
  7. Department of Health and Human Services
  8. Securities and Exchange Commission
  9. Social Security Administration
  10. Federal Deposit Insurance Cooperation
  11. Department of Veterans Affairs
  12. Environmental Protection Agency
Down
  1. Department of Transportation
  2. Department of Agriculture
  3. National Institute of Health
  4. Department of Defense
  5. National Aeronautics and Space Administration
  6. Department of Homeland Security
  7. Provides DoD with personnel during national emergency
  8. Federal Communications Commission
  9. Bus, Rails, Mass Transportation
  10. Central Intelligence Agency
  11. Small Business Administration
  12. Health, Education and Welfare

24 Clues: Department of JusticeDepartment of DefenseDepartment of InteriorHousing and DevelopmentDepartment of AgricultureCentral Intelligence AgencyDepartment of TransportationNational Institute of HealthSmall Business AdministrationHealth, Education and WelfareSocial Security AdministrationDepartment of Veterans AffairsDepartment of Homeland Security...

COMMERCE INVESTMENT 2022-06-07

COMMERCE INVESTMENT crossword puzzle
Across
  1. use of money to purchase equipment for a new business or an existing business
  2. to overcharge or swindle (a threat to financial security)
  3. an estimate of income for a set period of time (a step that can minimise impacts of events)
  4. Expand your portfolio with different types of shares
  5. personal group with lots of money that are willing to lose it
  6. Real estate that is bought with the aim of earning some kind of financial return
  7. money owing to external sources (e.g a bank)
  8. a type of scam that sends fraudulent messages & emails to access details of a consumer (a threat to financial security)
  9. illegal business practice (a threat to financial security)
  10. a type of investment that is acceptable to society’s current standards
  11. spending more money than your disposable income allows (a threat to financial security)
  12. a collection of financial investments like stocks and cash etc.
  13. Part ownership of a company
Down
  1. Australian Stock exchange
  2. setting aside a pool of money in case of an emergency (a step that can minimise impacts of events)
  3. a payment made into a fund by an employee towards a future pension
  4. portion of a company's profit paid to common and preferred shareholders
  5. A currency used to invest in stocks, shares as well as goods and services etc.
  6. A practice of funding a project by raising money from a large number of people
  7. the profit you receive on your investment as a percentage of your original investment
  8. Investments that provide regulate profits
  9. Any investment that grows or has potential to grow

22 Clues: Australian Stock exchangePart ownership of a companyInvestments that provide regulate profitsmoney owing to external sources (e.g a bank)Any investment that grows or has potential to growExpand your portfolio with different types of sharesto overcharge or swindle (a threat to financial security)...

9.8 Institutions Developing in a Globalized World 2025-05-19

9.8 Institutions Developing in a  Globalized World crossword puzzle
Across
  1. 1948 declaration adopted to promote human dignity and freedom
  2. Group that provides food aid globally
  3. Powerful UN council with veto powers
  4. Term for people fleeing war or disaster
  5. Created in 1944 to offer loans to countries for infrastructure and development
  6. Organization that promotes science, culture, and education
  7. The first global organization after WWI that failed to prevent WWII
Down
  1. International financial organization helping with short-term economic issues
  2. NGO known for monitoring human rights abuses
  3. Former trust territory that gained independence in 1994
  4. UN agency that helps children, originally post-WWII
  5. UN body where all nations are represented
  6. Peacekeeping force country involved in conflicts in Congo and Haiti
  7. One of the five permanent members of the Security Council, formerly USSR
  8. Powerful nations have this privilege in the Security Council

15 Clues: Powerful UN council with veto powersGroup that provides food aid globallyTerm for people fleeing war or disasterUN body where all nations are representedNGO known for monitoring human rights abusesUN agency that helps children, originally post-WWIIFormer trust territory that gained independence in 1994...

Investing Ava Larm 2026-03-20

Investing Ava Larm crossword puzzle
Across
  1. who invested in social security
  2. Investing all the money you have available at that given time
  3. Index representing the top 500 market cap companies
  4. Required minimum distributions must start at what age
  5. Roth IRA contributions are made
  6. Age you can claim full social security benefits
  7. A market where stock prices are generally falling
  8. Social Security and medicare taxes combined
  9. A system of recording information in a way that makes it difficult or impossible to change
Down
  1. A market where stock prices are rising
  2. Managed by your employer
  3. Traditional IRA contributions are made
  4. You invest your money in legal amounts, at regular intervals
  5. Providing retirement, survivor, and disability benefits to millions of Americans
  6. How old do you have to be to invest in crypto

15 Clues: Managed by your employerwho invested in social securityRoth IRA contributions are madeA market where stock prices are risingTraditional IRA contributions are madeSocial Security and medicare taxes combinedHow old do you have to be to invest in cryptoAge you can claim full social security benefitsA market where stock prices are generally falling...

Jadian crossword puzzle title 2026-04-06

Jadian crossword puzzle title crossword puzzle
Across
  1. — A copy of data stored in case of loss.
  2. — Software that secretly collects user information.
  3. — Fake messages that trick people into giving personal information.
  4. Engineering — Manipulating people into giving confidential information.
  5. — A malicious program that spreads by attaching itself to files.
  6. Authentication — A login method requiring two forms of verification.
  7. Footprint — The trail of data you leave online.
  8. — Malware that spreads automatically across networks without user action.
Down
  1. — Scrambling data so only authorized users can read it.
  2. — Malware that locks files and demands payment to unlock them.
  3. — A secret word used to access an account.
  4. — A security system that blocks unauthorized network access.
  5. — Installing the latest software fixes and security patches.
  6. Security — Protecting a computer network from threats.
  7. — Software designed to harm or exploit a computer system.

15 Clues: — A copy of data stored in case of loss.— A secret word used to access an account.Footprint — The trail of data you leave online.— Software that secretly collects user information.Security — Protecting a computer network from threats.— Scrambling data so only authorized users can read it.— Software designed to harm or exploit a computer system....

Cyber 2024-09-24

Cyber crossword puzzle
Across
  1. Virus that infects
  2. Man's best friend
  3. Likes to chase mice
  4. Flying mammal
Down
  1. Large marsupial
  2. Has a trunk

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendVirus that infectsLikes to chase mice

teka teki silang keamanan jaringan 2025-11-29

teka teki silang keamanan jaringan crossword puzzle
Across
  1. Sistem yang dirancang untuk menarik dan menangkap penyerang, sering kali sebagai umpan untuk mempelajari taktik mereka.
  2. Perangkat lunak atau keras yang memantau dan mengontrol lalu lintas jaringan berdasarkan aturan keamanan yang telah ditentukan.
  3. SECURITY Melindungi perangkat di ujung jaringan seperti komputer dan ponsel.
  4. Metode keamanan yang membutuhkan dua atau lebih cara verifikasi untuk mengakses sumber daya.
  5. SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.
  6. Program yang dirancang untuk mendeteksi, mencegah, dan menghapus perangkat lunak berbahaya.
  7. DDOS Serangan yang membanjiri server atau jaringan untuk membuatnya tidak tersedia bagi pengguna yang sah.
  8. Serangan yang menyamar sebagai entitas tepercaya untuk mencuri informasi sensitif.
  9. Menjaga keakuratan dan kelengkapan data dari modifikasi yang tidak sah.
  10. Memastikan hanya pengguna yang berwenang yang dapat mengakses data.
Down
  1. Jaringan server yang dapat diakses melalui internet untuk menyimpan dan mengelola data, bukan di perangkat lokal.
  2. Memastikan data dan sumber daya jaringan dapat diakses oleh pengguna yang berwenang kapan pun dibutuhkan.
  3. Praktik dan studi tentang teknik komunikasi yang aman di hadapan pihak ketiga (ancaman).
  4. Perangkat lunak berbahaya yang dapat menginfeksi atau merusak sistem (misalnya, virus, ransomware).
  5. MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak.
  6. SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.
  7. Proses mengubah data menjadi kode yang hanya dapat dibaca oleh pihak yang berwenang.
  8. (Virtual Private Network) Jaringan pribadi yang terenkripsi melalui jaringan publik untuk meningkatkan keamanan dan privasi.
  9. Brute Force Upaya untuk menebak kata sandi atau kunci enkripsi melalui uji coba berulang.
  10. SECURITY Melindungi jaringan nirkabel dari akses tidak sah.
  11. IP Pengenal numerik unik yang ditetapkan untuk setiap perangkat dalam jaringan komputer yang menggunakan Protokol Internet untuk komunikasi.

21 Clues: SECURITY Melindungi jaringan nirkabel dari akses tidak sah.SECURITY Menjaga keamanan saat mengakses dan menjelajahi web.SECURITY Melindungi sistem dan pengguna dari ancaman melalui email.Memastikan hanya pengguna yang berwenang yang dapat mengakses data.MTIM Serangan di mana penyerang menyadap komunikasi antara dua pihak....

CrytoMaze 3 2024-12-09

CrytoMaze 3 crossword puzzle
Across
  1. Replacing sensitive data with non-sensitive equivalents.
  2. Faking the origin of a message or communication to deceive the recipient.
  3. Measures taken to protect information from unauthorized access or damage.
  4. Malicious software that replicates itself to spread to other systems.
  5. Digital document used to verify identities in secure communications.
  6. An incident where unauthorized access to data occurs.
  7. To convert information into a secure format.
  8. A method of bypassing normal authentication or security controls.
Down
  1. Entity that issues digital certificates in a PKI.
  2. The discovery and interpretation of meaningful patterns in data, often used for security monitoring.
  3. Process of identifying and evaluating risks to information assets.
  4. An isolated environment for safely executing untested code.
  5. A piece of software or code that takes advantage of a vulnerability.
  6. Ensuring data consistency across multiple systems.
  7. Set of rules governing data communication.
  8. Secure area within a system for processing sensitive data.
  9. To convert encrypted data back to its original form.
  10. Fraudulent attempt to obtain sensitive information by deception.

18 Clues: Set of rules governing data communication.To convert information into a secure format.Entity that issues digital certificates in a PKI.Ensuring data consistency across multiple systems.To convert encrypted data back to its original form.An incident where unauthorized access to data occurs.Replacing sensitive data with non-sensitive equivalents....

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

November Crossword 2025-10-30

November Crossword crossword puzzle
Across
  1. Annual shopping frenzy, with 5-Down
  2. “Fall back” phenomenon, with 17-Across
  3. Day of the Dead altar
  4. Boat, to Pilgrims
  5. Seasonal crop roundup
  6. Popular flavor, for pie or cider
  7. Livestock lunch?
  8. “Fall back” phenomenon, with 4-Across
  9. Canned sauce flavor
  10. Mythical symbol of abundance
  11. Turkey substitute
  12. Thanksgiving spread
Down
  1. Lucky break?
  2. Touchdown territory
  3. ___ Moon: November supermoon
  4. Annual shopping frenzy, with 3-Across
  5. Soft potato preparation
  6. Backyard broom?
  7. Eaten on the cob
  8. Objects of gratitude
  9. Celebrated patriots
  10. Post-turkey sweet treat
  11. Cozy feeling, to the Danish
  12. Boat, to gravy
  13. Crispy potato preparation
  14. Day of online purchases, with “Cyber”

26 Clues: Lucky break?Boat, to gravyBackyard broom?Eaten on the cobLivestock lunch?Boat, to PilgrimsTurkey substituteTouchdown territoryCelebrated patriotsCanned sauce flavorThanksgiving spreadObjects of gratitudeDay of the Dead altarSeasonal crop roundupSoft potato preparationPost-turkey sweet treatCrispy potato preparationCozy feeling, to the Danish...

RAA NRTW Crossword 2025-10-30

RAA NRTW Crossword crossword puzzle
Across
  1. helping bones tell their story, one snapshot at a time
  2. the wizard protectors of cyber trolls
  3. people whisper
  4. compliance guardian
  5. first impression for patients, front lines
  6. patient wrangler
  7. facility maestro
  8. keeper of secrets
  9. body scanner extraordinaire
  10. master of forms , check in and friendly faces
Down
  1. masters of decoding
  2. master of sound waves
  3. multitasker and keeper of radiologist schedules
  4. the breast friend
  5. budget boss
  6. image detective
  7. our right hand for everything
  8. bone density detective
  9. invoice avengers
  10. plays with magnets
  11. support ninja 24hrs a day
  12. delivery prodigy
  13. chaos tamer in chief
  14. promotes our company
  15. magicians who start our patient care, one call at a time

25 Clues: budget bosspeople whisperimage detectivepatient wranglerinvoice avengersfacility maestrodelivery prodigythe breast friendkeeper of secretsplays with magnetsmasters of decodingcompliance guardianchaos tamer in chiefpromotes our companymaster of sound wavesbone density detectivesupport ninja 24hrs a daybody scanner extraordinaire...

Goog Test 2023-03-31

Goog Test crossword puzzle
Across
  1. Barista
  2. Android
  3. Google
  4. Cloud
Down
  1. Facilities
  2. Security
  3. Develop
  4. Campus
  5. Tech

9 Clues: TechCloudCampusGoogleBaristaDevelopAndroidSecurityFacilities

CySec 2025-06-05

CySec crossword puzzle
Across
  1. Attack exploiting built-in processors in hardware to execute malicious code
  2. Preferred framework for IP level security analysis
  3. Attack technique doesn't physically alter the chip but changes behavior through environmental stress
  4. Security impact leading to loss of core vehicle function
  5. Speculative execution attack targeting x86-64 processors
  6. Security Property most impacted by Denial of Service attack
Down
  1. Attack that adds hidden functionality during chip design
  2. Measurement setup often used in side-channel analysis
  3. Security Property ensuring information is accessible to only authorized agents
  4. Hardware protection that can be bypassed by repeatedly accessing memory

10 Clues: Preferred framework for IP level security analysisMeasurement setup often used in side-channel analysisAttack that adds hidden functionality during chip designSecurity impact leading to loss of core vehicle functionSpeculative execution attack targeting x86-64 processorsSecurity Property most impacted by Denial of Service attack...

Français Aéroport Crossword 2023-11-24

Français Aéroport Crossword crossword puzzle
Across
  1. plane ticket
  2. security checkpoint
  3. security belt
  4. boarding pass
Down
  1. check in counter
  2. passport
  3. suitcases
  4. luggage
  5. seat (on the plane)
  6. gate (for boarding)

10 Clues: luggagepassportsuitcasesplane ticketsecurity beltboarding passcheck in counterseat (on the plane)security checkpointgate (for boarding)

Compliance Champions League 2023 - Crossword 2023-11-22

Compliance Champions League 2023 - Crossword crossword puzzle
Across
  1. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance
  2. The _____ feature enables SAP to secure the usage of any application specific function
  3. What should be the status of a product security incident if you get a CVSS score of 0.0
  4. _______ field ensures that the action plan step documented will be visible to the custome
  5. Software with rating ___________ at SAP should not be installed:
  6. Which tool is used to access cloud systems?
  7. Who approves the cloud corrections
  8. Which Board area does AIS belong to?
  9. _______ tools targets at providing missing functionality and enhancements to Agent Workspace
  10. _______ notes must be entered to put the case to status Resolved
  11. SLA that guarantees the continuous communication with SAP S/4Hana Customers
  12. What is the frequency of Hot-Fix deployment
Down
  1. Who deploys cloud correction to customer systems
  2. Attachments are made visible externally by setting the _ flag
  3. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com
  4. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security inciden
  5. What should be the final status of a Security Incident
  6. _____________ team is responsible for the hotfix and its processes involved until the deployment to the customer system.
  7. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP
  8. S4hana cloud systems upgrade happens every __________ month/months

20 Clues: Who approves the cloud correctionsWhich Board area does AIS belong to?Which tool is used to access cloud systems?What is the frequency of Hot-Fix deploymentWho deploys cloud correction to customer systemsWhat should be the final status of a Security IncidentAttachments are made visible externally by setting the _ flag...

Electronic Payment Systems and Security 2023-03-29

Electronic Payment Systems and Security crossword puzzle
Across
  1. Adherence to security standards to protect against fraud
  2. Verification of user or system identity
  3. Process of granting access to a system or resource
  4. Electronic devices worn on the body that collect and transmit data
  5. Payment authentication method that uses physical characteristics such as fingerprints or facial recognition
  6. Digital currency that uses encryption techniques for secure transactions
  7. Software that damages or disrupts computer systems
  8. Payment method that allows customers to complete transactions by tapping or waving their card or mobile device
  9. Use of physical or behavioral characteristics for authentication
  10. Payment system that operates on a peer-to-peer network without a central authority or intermediary
  11. Type of artificial intelligence that allows devices to learn and improve without explicit programming
  12. Ability of devices to connect and communicate with other devices or networks
  13. Network security system that controls access
  14. Payment method that allows customers to complete transactions using their smartphone or other mobile device
Down
  1. Residence equipped with Internet of Things devices that can be controlled remotely
  2. Cryptographic method of verifying document authenticity
  3. Data security technique that replaces sensitive data with unique identification symbols
  4. Security process that requires two methods of authentication
  5. Deliberate deception for unlawful gain
  6. Dispute resolution process where a customer can reverse a transaction
  7. Use of algorithms to identify and prevent fraudulent activity
  8. The process of verifying and adding transactions to a blockchain by solving complex mathematical equations
  9. Service that authorizes and processes electronic payments
  10. Process of encoding data for secure transmission
  11. Devices that detect and respond to changes in the physical environment

25 Clues: Deliberate deception for unlawful gainVerification of user or system identityNetwork security system that controls accessProcess of encoding data for secure transmissionProcess of granting access to a system or resourceSoftware that damages or disrupts computer systemsCryptographic method of verifying document authenticity...

Digital Technology Cross Word 2021-07-23

Digital Technology Cross Word crossword puzzle
Across
  1. Online Theft
  2. A Portible Computer
  3. A Online Map
Down
  1. Two things join or ______
  2. A connection between devices
  3. Another word for smartphone
  4. A Large Technology Company

7 Clues: Online TheftA Online MapA Portible ComputerTwo things join or ______A Large Technology CompanyAnother word for smartphoneA connection between devices

Digital Citizenship crossword 2021-02-25

Digital Citizenship crossword crossword puzzle
Across
  1. Being polite online
  2. When you're tricked by a rando online
  3. A combination of #s letters and symbols
  4. A member of the online world
  5. a victim of Cyber bullying
  6. (bing, google, yahoo)
Down
  1. being mean online
  2. where you can search things up
  3. what you leave online
  4. Sending letters through a computer
  5. When someone steals your info online
  6. getting angry online and posting about it

12 Clues: being mean onlineBeing polite onlinewhat you leave online(bing, google, yahoo)a victim of Cyber bullyingA member of the online worldwhere you can search things upSending letters through a computerWhen someone steals your info onlineWhen you're tricked by a rando onlineA combination of #s letters and symbolsgetting angry online and posting about it

La Cyber-Société 2023-01-08

La Cyber-Société crossword puzzle
Across
  1. mobile Commerce électronique, acheter et vendre des produits ou services en ligne
  2. Ordinateurs, téléphones portables et tablettes
  3. Dangers
  4. Concept faisant référence à l'influence croissante de la technologie et de l'Internet sur notre vie quotidienne
  5. Cours en ligne
Down
  1. Harcèlement en ligne
  2. Criminalité informatique
  3. S'exprimer par écrit ou à haute voix
  4. Acheter des produits en ligne
  5. Travail en équipe en ligne
  6. Faits ou informations
  7. Commerce en ligne

12 Clues: DangersCours en ligneCommerce en ligneHarcèlement en ligneFaits ou informationsCriminalité informatiqueTravail en équipe en ligneAcheter des produits en ligneS'exprimer par écrit ou à haute voixOrdinateurs, téléphones portables et tablettesmobile Commerce électronique, acheter et vendre des produits ou services en ligne...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

klausimai 2023-05-17

klausimai crossword puzzle
Across
  1. Kas yra „object-oriented programming“?
  2. Kas yra žurnalavimas?
  3. Kas yra „data cente?
  4. Kas yra „software development life cycle“?
  5. Kas yra „operating system“?
  6. Kas yra „network protocol“?
  7. Kas yra „serveris“?
  8. Kas yra „cloud computing“?
  9. Kas yra „version control“?
  10. Kas yra „URL“?
  11. Kas yra „cybersecurity“?
  12. Kas yra „cache“?
  13. Kas yra „cyber attack“?
  14. Kas yra „bug“
  15. Kas yra „router“?
  16. Kas yra „firewall“?
Down
  1. Kas yra „artificial intelligence“?
  2. Kas yra „RAM“?
  3. Kas yra „encryption“?
  4. Kas yra „HTML“?
  5. Kas yra „API“?
  6. Kas yra „data backup“?
  7. Kas yra „malware“?
  8. Kas yra „database management system“?
  9. Kas yra algoritmas
  10. Kas yra duomenų bazė?
  11. Kas yra „programming language“?
  12. Kas yra „data mining“?
  13. Kas yra „open source“?
  14. Kas yra „user interface“?

30 Clues: Kas yra „bug“Kas yra „RAM“?Kas yra „API“?Kas yra „URL“?Kas yra „HTML“?Kas yra „cache“?Kas yra „router“?Kas yra „malware“?Kas yra algoritmasKas yra „serveris“?Kas yra „firewall“?Kas yra „data cente?Kas yra „encryption“?Kas yra žurnalavimas?Kas yra duomenų bazė?Kas yra „data backup“?Kas yra „data mining“?Kas yra „open source“?Kas yra „cyber attack“?...

Teka-Teki Silang kata serapan dan konjungsi 2025-09-15

Teka-Teki Silang kata serapan dan konjungsi crossword puzzle
Across
  1. kata siber diserap dari kata
  2. luring contoh kata serapan
  3. Sarah suka baca buku.baca merupakan jenis kata serapan
  4. seperti dan seolah-olah termasuk subordinatif
  5. kata "atau"merupakan konjungsi
  6. kata "terakhir "merupakan konjungsi
  7. biarpun dan meskipun termasuk subordinatif
  8. kata "sebelumnya" merupakan konjungsi
  9. konjungsi merupakan kata...dalam suatu kalimat
  10. kata angka diserap dari bahasa
Down
  1. kata"tetapi, melainkan"merupakan kata hubung
  2. peramban merupakan serapan dari kata
  3. kata yang digunakan untuk menghilangkan frasa/klausa disebut konjungsi
  4. memperkaya kosakata merupakan fungsi dari
  5. dosen berasal dari bahasa Belanda yaitu
  6. salah satu dari klausa itu adalah anak
  7. bola berasal dari bahasa
  8. bisnis berasal dari bahasa
  9. kata "guna" merupakan konjungsi
  10. rekening adalah contoh kata serapan

20 Clues: bola berasal dari bahasaluring contoh kata serapanbisnis berasal dari bahasakata siber diserap dari katakata "atau"merupakan konjungsikata angka diserap dari bahasakata "guna" merupakan konjungsikata "terakhir "merupakan konjungsirekening adalah contoh kata serapanperamban merupakan serapan dari katakata "sebelumnya" merupakan konjungsi...

Cyber Threats and Security 2026-01-19

Cyber Threats and Security crossword puzzle
Across
  1. theft
  2. spoofing
Down
  1. stalking
  2. dos attack

4 Clues: theftstalkingspoofingdos attack

La Citoyenneté Numérique 2024-11-22

La Citoyenneté Numérique crossword puzzle
Across
  1. resource
  2. an app
  3. unlimited
  4. Behavior
  5. to have access to
  6. To use
  7. to light up
  8. data
  9. To communicate
  10. To become
  11. to move a file
  12. Addicted
  13. To prevent
  14. risk, danger
  15. To report
  16. Addicted
  17. To behave
  18. smartphone
  19. Negative comment
  20. to post
  21. Private
  22. digital identity
  23. With difficulty
  24. to stay up to date/informed of
  25. Social media/networks
  26. search engine
  27. Targeted by
  28. Respectful
  29. Private life
  30. to save a file
  31. text message
  32. plan
  33. To permit/allow
  34. Cyber-bullying
  35. To forbid/prohibit
  36. To stream and watch a movie
Down
  1. connected, trendy, plugged-in
  2. Prudent/careful
  3. password
  4. To send
  5. home page
  6. To secure/protect oneś profile
  7. computer
  8. to download
  9. to broadcast, distribute
  10. To receive
  11. digital footprint
  12. user
  13. An account
  14. To remove
  15. Threat
  16. Easily
  17. to interact
  18. To protect oneself
  19. To choose to
  20. To belong to/be part of
  21. To have the right to
  22. Punished
  23. To learn
  24. network
  25. Plagiarism
  26. Hyperconected
  27. La
  28. File
  29. Cyber-dependent
  30. screen
  31. internet user
  32. Victim
  33. To protect
  34. world

70 Clues: LauserdataFileplanworldan appTo useThreatEasilyscreenVictimTo sendto postPrivatenetworkresourcepasswordBehaviorcomputerAddictedAddictedPunishedTo learnhome pageunlimitedTo becomeTo removeTo reportTo behaveTo receiveAn accountTo preventsmartphonePlagiarismRespectfulTo protectto downloadto light upto interactTargeted byrisk, dangerTo choose to...

The eye of minds cross word 2024-05-10

The eye of minds cross word crossword puzzle
Across
  1. Michaels friend know for her coding
  2. how they access the vetnet
  3. the name of the game
  4. the main character
  5. Michaels best friends also known as the best gamer
Down
  1. the main way Micheal gets information
  2. the agency trying to stop kaine
  3. the network of the game
  4. when your in the game
  5. the name of the virus
  6. what protects the coding
  7. the cyber-terrarist in the game

12 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamewhat protects the codinghow they access the vetnetthe agency trying to stop kainethe cyber-terrarist in the gameMichaels friend know for her codingthe main way Micheal gets informationMichaels best friends also known as the best gamer

LEGAL 2024-11-13

LEGAL crossword puzzle
Across
  1. refers to luring users to log onto a fake website that appears real to gather sensitive information, such as the user’s password, account number, ATM PIN, and credit card.
  2. Online tools and social media applications are used to harass, intimidate, or embarrass another person or other identifiable groups.
  3. These are attacks that use computers against other computers or networks to modify, steal, or gain information through unauthorized access. An insider or an outsider can initiate an attack
  4. is committed in cyberspace using information and communication technologies such as televisions, smartphones, computers, networks, and other communication devices.
Down
  1. refers to the fraudulent impersonation of someone to gain an advantage, obtain property, cause a disadvantage, or avoid prosecution.
  2. is securing computer systems, networks, and programs from any cyber-attack. It is one of the fastest-growing global challenges that is becoming increasingly important to address, with its enormous implications for government security, economic prosperity, and public safety.
  3. theft refers to obtaining or possessing another’s identity and information to commit a legal offense.
  4. refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization

8 Clues: theft refers to obtaining or possessing another’s identity and information to commit a legal offense.refers to someone manipulating a computer system or private network to access digital files or systems without proper authorization...

Investing Ava Larm 2026-03-20

Investing Ava Larm crossword puzzle
Across
  1. who invested in social security
  2. Investing all the money you have available at that given time
  3. Index representing the top 500 market cap companies
  4. Required minimum distributions must start at what age
  5. Roth IRA contributions are made
  6. Age you can claim full social security benefits
  7. A market where stock prices are generally falling
  8. Social Security and medicare taxes combined
  9. A system of recording information in a way that makes it difficult or impossible to change
Down
  1. A market where stock prices are rising
  2. Managed by your employer
  3. Traditional IRA contributions are made
  4. You invest your money in legal amounts, at regular intervals
  5. Providing retirement, survivor, and disability benefits to millions of Americans
  6. How old do you have to be to invest in crypto

15 Clues: Managed by your employerwho invested in social securityRoth IRA contributions are madeA market where stock prices are risingTraditional IRA contributions are madeSocial Security and medicare taxes combinedHow old do you have to be to invest in cryptoAge you can claim full social security benefitsA market where stock prices are generally falling...

dgeconomy 2025-03-12

dgeconomy crossword puzzle
Across
  1. Fifth-generation wireless technology
  2. Protection of digital systems from cyber threats
  3. Large and complex data sets
  4. A newly established business
  5. Secure and decentralized digital ledger
  6. Immersive virtual reality technology
  7. Use of technology to perform tasks with minimal human intervention
  8. Technology overlaying digital images onto the real world
Down
  1. Electronic system for storing and making transactions
  2. Internet-based computing services
  3. Digital or virtual currency
  4. Technology-driven financial services
  5. Online buying and selling of goods and services
  6. Network of connected smart devices
  7. Machines performing human-like intelligence tasks

15 Clues: Digital or virtual currencyLarge and complex data setsA newly established businessInternet-based computing servicesNetwork of connected smart devicesFifth-generation wireless technologyTechnology-driven financial servicesImmersive virtual reality technologySecure and decentralized digital ledgerOnline buying and selling of goods and services...

Unit 3 + 4 2026-01-09

Unit 3 + 4 crossword puzzle
Across
  1. an important thing
  2. to get an advantage from something
  3. normally/ most of the time
  4. completely
  5. forever/can't be removed
  6. someone you want to be like or admire
  7. permanent mark on the skin caused by a cut or injury
Down
  1. to talk to each other or work together
  2. to give someone a particular job
  3. a man who is admired for doing something
  4. relating to computers
  5. a picture that is permanently marked onto your skin
  6. to give something a different colour using a dye
  7. needed or required
  8. what actually happens

15 Clues: completelyan important thingneeded or requiredrelating to computerswhat actually happensforever/can't be removednormally/ most of the timeto give someone a particular jobto get an advantage from somethingsomeone you want to be like or admireto talk to each other or work togethera man who is admired for doing something...

Princess and the pop star 2020-12-04

Princess and the pop star crossword puzzle
Across
  1. Pop star' surname
  2. security guard #2
  3. What they made on the farm
  4. who Princess sang to each morning
  5. where Princess got the milk from
  6. Pop star's first name
  7. little brother
Down
  1. what is so special
  2. Dad's invention
  3. Surname of the family
  4. Name of girl on the farm
  5. where Princess was singing
  6. security guard #1
  7. Where the family went to find Princess
  8. God has one for us

15 Clues: little brotherDad's inventionPop star' surnamesecurity guard #2security guard #1what is so specialGod has one for usSurname of the familyPop star's first nameName of girl on the farmwhere Princess was singingWhat they made on the farmwhere Princess got the milk fromwho Princess sang to each morningWhere the family went to find Princess

Cyber safety-Hugh barry 2016-05-31

Cyber safety-Hugh barry crossword puzzle
Across
  1. social media
  2. a persons details
  3. ups don't click on them because bad things will happen
  4. they block viruses
  5. bullying someone who bullies online
  6. someone sends you a discusting picture
  7. ask to do it
  8. internet
  9. a website comes out and persuades you
  10. don't tell anyone
  11. so I can tell what's appropriate
  12. one per class
  13. a thing that hacks electronic devices
Down
  1. controls so I can't see inappropriate websites
  2. someone who makes up a name to be someone else
  3. don't let enyone see
  4. one per school
  5. a way to communicate with some else
  6. don't let people go on it
  7. someone who looks after you

20 Clues: internetsocial mediaask to do itone per classone per schoola persons detailsdon't tell anyonethey block virusesdon't let enyone seedon't let people go on itsomeone who looks after youso I can tell what's appropriatebullying someone who bullies onlinea way to communicate with some elsea website comes out and persuades you...

Perth Forensic Crossword 2023-10-20

Perth Forensic Crossword crossword puzzle
Across
  1. Strong moral principles
  2. Meet the team, clue: Russell
  3. Meeting to discussion allegations
  4. Meet the team, clue: East USA
  5. Digital forensics
  6. Meet the team, clue: South-east USA
  7. May provide information
  8. Process of improving a situation
  9. Meet the team, clue: Eddard
  10. Used to make findings
  11. Meet the team, clue: Sansa
  12. Subject of investigations
Down
  1. Personal relationship that can affect work
  2. Deception for gain
  3. Preliminary assessment
  4. Examination of allegations
  5. Financial crime
  6. Collection of information
  7. A party with an interest
  8. Dishonest conduct
  9. Meet the team, clue: The Great
  10. Provides a service
  11. Acronym for a type of investigation against a person
  12. Vetting a client carefully

24 Clues: Financial crimeDigital forensicsDishonest conductDeception for gainProvides a serviceUsed to make findingsPreliminary assessmentStrong moral principlesMay provide informationA party with an interestCollection of informationSubject of investigationsExamination of allegationsMeet the team, clue: SansaVetting a client carefully...

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Conversion of data into a form that cannot be easily understood by unauthorized people.
  2. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  3. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  4. A secret word or phrase known only to you.
  5. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  6. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  7. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  8. Crime conducted via the Internet or some other computer network.
Down
  1. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  2. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  3. What tells you that the website is secure in the browser.
  4. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  5. Whaling A type of fraud that targets high-profile end users.
  6. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.

14 Clues: A secret word or phrase known only to you.What tells you that the website is secure in the browser.Whaling A type of fraud that targets high-profile end users.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. What tells you that the website is secure in the browser.
  2. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  3. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
  4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  6. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  7. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
Down
  1. Conversion of data into a form that cannot be easily understood by unauthorized people.
  2. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. A secret word or phrase known only to you.
  5. A type of fraud that targets high-profile end users.
  6. Crime conducted via the Internet or some other computer network.
  7. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

14 Clues: A secret word or phrase known only to you.A type of fraud that targets high-profile end users.What tells you that the website is secure in the browser.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Security CW 2023-04-24

Security CW crossword puzzle
Across
  1. A type of security testing that simulates an attacker with knowledge of the system ( ____ testing)
  2. A security principle that means users should have access only to the resources they need (least ____)
  3. A type of vulnerability that allows attackers to execute code remotely (remote code ____)
Down
  1. A type of security control that can help prevent cross-site scripting attacks (input ____)
  2. A type of security control that can help prevent buffer overflow attacks (stack ____)
  3. A type of security control that can help prevent cross-site request forgery attacks (____ token)
  4. A type of vulnerability that can allow attackers to access sensitive information (____ injection)
  5. A common technique used to prevent SQL injection attacks (____ parameters)
  6. A type of security testing that tries to break an application by feeding unexpected input (_____testing)

9 Clues: A common technique used to prevent SQL injection attacks (____ parameters)A type of security control that can help prevent buffer overflow attacks (stack ____)A type of vulnerability that allows attackers to execute code remotely (remote code ____)A type of security control that can help prevent cross-site scripting attacks (input ____)...

Computer management - safe-guardung our data 2016-04-14

Computer management - safe-guardung our data crossword puzzle
Across
  1. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  2. 9. An error is also known as a …
  3. Array of Inexpensive 1. What does RAID stand for ?
  4. 1. A water related natural disaster
  5. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  6. verification 8. Checking for the accuracy of data from a human perspective
  7. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  8. Power Supply 10. What does “UPS” stand for ?
  9. 5. What is the term for ‘fishing for Information’
  10. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
Down
  1. 5. ‘Garbage In, Garbage Out’
  2. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  3. 7. Volatile memory
  4. 6. The first line of defence is
  5. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  6. 3. A form of malware disguised as a useful program
  7. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  8. problems 8. Power outages or power dips are also known as…
  9. User Interface 2. What does GUI stand for?
  10. issues 2. A category of threats to data beginning with H

20 Clues: 7. Volatile memory5. ‘Garbage In, Garbage Out’6. The first line of defence is9. An error is also known as a …1. A water related natural disasterUser Interface 2. What does GUI stand for?Power Supply 10. What does “UPS” stand for ?5. What is the term for ‘fishing for Information’Array of Inexpensive 1. What does RAID stand for ?...

Computer management - safe-guardung our data 2016-04-14

Computer management - safe-guardung our data crossword puzzle
Across
  1. 9. An error is also known as a …
  2. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  3. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  4. issues 2. A category of threats to data beginning with H
  5. Power Supply 10. What does “UPS” stand for ?
  6. 6. The first line of defence is
  7. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  8. 5. What is the term for ‘fishing for Information’
  9. 1. A water related natural disaster
  10. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
  11. 7. Volatile memory
Down
  1. 3. A form of malware disguised as a useful program
  2. 5. ‘Garbage In, Garbage Out’
  3. User Interface 2. What does GUI stand for?
  4. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  5. Array of Inexpensive 1. What does RAID stand for ?
  6. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  7. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  8. problems 8. Power outages or power dips are also known as…
  9. verification 8. Checking for the accuracy of data from a human perspective

20 Clues: 7. Volatile memory5. ‘Garbage In, Garbage Out’6. The first line of defence is9. An error is also known as a …1. A water related natural disasterUser Interface 2. What does GUI stand for?Power Supply 10. What does “UPS” stand for ?5. What is the term for ‘fishing for Information’3. A form of malware disguised as a useful program...

Chapter 6 Advance Cyber 2025-11-16

Chapter 6 Advance Cyber crossword puzzle
Across
  1. Unpatched or outdated applications that create security holes.
  2. An attack that compromises a website known to be frequented by a specific target group.
  3. False information spread intentionally to deceive.
  4. The social engineering tactic of creating a fabricated scenario to obtain information.
  5. A network connected using physical cables, like Ethernet.
  6. A threat delivered via an attachment, like a malicious PDF or DOC file.
  7. Phishing conducted via SMS text message.
  8. A potential physical threat vector, like a USB drive.
  9. False information that is spread, regardless of the intent to deceive.
  10. Registering a domain name very similar to a popular one, relying on user mistypes.
  11. End-of-life (EOL) software that no longer receives security patches. (2 Words)
  12. A network that uses radio waves, like Wi-Fi.
  13. A short-range wireless protocol used for PANs (Personal Area Networks).
Down
  1. A type of spam that embeds its message in a picture to evade text filters.
  2. Network ports left accessible and running services, creating potential entry points.
  3. Security software installed directly on an endpoint, like a laptop or PC.
  4. An attack that mimics the look and feel of a legitimate company's logo, website, or email.
  5. Security scanning performed remotely, without installing software on the target device.
  6. A social engineering attack using email to trick a user into revealing credentials.
  7. Phishing conducted over a voice call.
  8. Unsolicited and unwanted bulk email.
  9. The technical name for text messaging (Abbr: SMS).
  10. An attack that targets a trusted third-party vendor to compromise the final target.
  11. The medium used for a 'vishing' attack.

24 Clues: Unsolicited and unwanted bulk email.Phishing conducted over a voice call.The medium used for a 'vishing' attack.Phishing conducted via SMS text message.A network that uses radio waves, like Wi-Fi.False information spread intentionally to deceive.The technical name for text messaging (Abbr: SMS).A potential physical threat vector, like a USB drive....

P&SD Xword Challenge 2017-11-13

P&SD Xword Challenge crossword puzzle
Across
  1. Close to Tommy Coopers head from Chirag
  2. More than three of the dib dib dib boys
  3. Beyoncé’s husband sizing in the cloud
  4. A number of Derek’s on the voice
  5. Approving the twinkle twinkle
  6. Apportioning F5 weight
  7. Nearly the Bullseye presenter Bid.
  8. PM with Skyfall hit
Down
  1. 24 / 7 Lancashire Cyber Town
  2. Society of Swindon based Customers building
  3. Made up place name with an OA's building material
  4. Heating the registration number
  5. Burning interior structure
  6. Vendor stop and search area
  7. Supplier with Archery kit

15 Clues: PM with Skyfall hitApportioning F5 weightSupplier with Archery kitBurning interior structureVendor stop and search area24 / 7 Lancashire Cyber TownApproving the twinkle twinkleHeating the registration numberA number of Derek’s on the voiceNearly the Bullseye presenter Bid.Beyoncé’s husband sizing in the cloudClose to Tommy Coopers head from Chirag...

Kuis Materi Perkembangan Teknlologi Industri 2024-01-31

Kuis Materi Perkembangan Teknlologi Industri crossword puzzle
Across
  1. Chloro Fluoro Carbon
  2. salah satu lapisan atmosfer bumi
  3. salah satu yang meningkat, dampak dari penggunaan IoT
  4. dampak kehilangan 23 juta lapangan pekerjaan pada tahun 2030
  5. manusia dan mesin akan bekerja sama pada era digitalisasi
  6. Sistem Cyber Physical
  7. teknologi yang memungkinkan untuk membuat prototipe
Down
  1. mahluk hidup dengan mahluk hidup lain
  2. salah satu contoh senyawa
  3. Merupakan otak dari sebuah perangkat keras
  4. teknologi yang sudah memiliki keahlian seperti manusia
  5. salah satu komponen IoT
  6. penyimpanan data dengan jumlah tidak terbatas
  7. bahan bekas hasil produksi industri
  8. teknologi yang ada pada perangkat fisik

15 Clues: Chloro Fluoro CarbonSistem Cyber Physicalsalah satu komponen IoTsalah satu contoh senyawasalah satu lapisan atmosfer bumibahan bekas hasil produksi industrimahluk hidup dengan mahluk hidup lainteknologi yang ada pada perangkat fisikMerupakan otak dari sebuah perangkat keraspenyimpanan data dengan jumlah tidak terbatas...

enkkuristikko 2016-02-23

enkkuristikko crossword puzzle
Across
  1. hierarkia
  2. luova
  3. joustava
  4. vastuullisuus
  5. yritys
  6. motivaatio
  7. työnjohto
  8. resurssit
  9. turvallisuus
Down
  1. sopeutuva
  2. ansioluettelo
  3. kilpailuhenkinen
  4. työnjohtaja
  5. aikaraja
  6. neuvottelu
  7. tiedottaja
  8. työ
  9. ongelma
  10. työntekijä
  11. kunnianhimoinen

20 Clues: työluovayritysongelmaaikarajajoustavahierarkiasopeutuvatyönjohtoresurssitneuvottelutiedottajamotivaatiotyöntekijätyönjohtajaturvallisuusansioluettelovastuullisuuskunnianhimoinenkilpailuhenkinen

computer engineer vocab(both verbs and nouns) 2023-02-09

computer engineer vocab(both verbs and nouns) crossword puzzle
Across
  1. lograr
  2. cybernetic
  3. Moniter
  4. protect
  5. investigacion
  6. computer
  7. pensar
  8. teclado
  9. silla
  10. adaptar
  11. online
Down
  1. aprender
  2. resolver
  3. electritcity
  4. work
  5. Specialist
  6. codigo
  7. Security
  8. mirar
  9. tipo

20 Clues: worktipomirarsillalograrcodigopensaronlineMoniterprotecttecladoadaptaraprenderresolverSecuritycomputercyberneticSpecialistelectritcityinvestigacion

June 2022 Crossword 2022-05-26

June 2022 Crossword crossword puzzle
Across
  1. the Lord
  2. future
  3. him
  4. path
  5. through
  6. fiction
  7. wilderness
  8. test
Down
  1. she
  2. hope
  3. Your
  4. man
  5. blessed
  6. hope
  7. show
  8. bodily
  9. works
  10. comfort
  11. work
  12. redirect
  13. hears
  14. take

22 Clues: shemanhimhopeYourhopeshowpathworktaketestworkshearsbodilyfutureblessedthroughcomfortfictionthe Lordredirectwilderness

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. passport
  2. vacation
  3. luggage
  4. ticket
  5. airport
  6. to travel
  7. customs
  8. confirm
  9. train
Down
  1. call
  2. suitcase
  3. security
  4. buy
  5. flight
  6. arrive
  7. station
  8. board
  9. passenger
  10. reclaim
  11. screen

20 Clues: buycallboardtrainflightarriveticketscreenluggagestationairportreclaimcustomsconfirmsuitcasesecuritypassportvacationto travelpassenger

el aeropuerto 2022-10-13

el aeropuerto crossword puzzle
Across
  1. passenger
  2. identification
  3. departure
  4. aboard
  5. passport
  6. airport
  7. gate
  8. taxi
  9. flight
  10. vacation
  11. security
Down
  1. suitcase
  2. check
  3. itinerary
  4. customs
  5. ticket
  6. screen
  7. arrival
  8. luggage
  9. airplane

20 Clues: gatetaxicheckticketscreenaboardflightcustomsarrivalairportluggagesuitcasepassportvacationairplanesecuritypassengeritinerarydepartureidentification

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente 2023-10-19

2° D Letícia da Silva Santos, Izabelli Vitória Carvalho e Letícia Briguente crossword puzzle
Across
  1. Universidade
  2. Tiro
  3. Exaustivo
  4. Técnico
  5. Academia
  6. Família
  7. Revolucionando
  8. Diferente
  9. Atraído
Down
  1. Apresentando
  2. Expansão
  3. Segurança
  4. Educação
  5. Organizado
  6. Crianças
  7. Completamente
  8. Chuveiro
  9. Recrutamento
  10. Dois
  11. honesto

20 Clues: TiroDoisTécnicoFamíliahonestoAtraídoExpansãoEducaçãoCriançasChuveiroAcademiaSegurançaExaustivoDiferenteOrganizadoUniversidadeApresentandoRecrutamentoCompletamenteRevolucionando

FITCVocab.jeht 2013-05-15

FITCVocab.jeht crossword puzzle
Across
  1. a person who gives food
  2. games
  3. a place where you store things
  4. board the queen of your computer
  5. a graphic image for for your company
  6. elliptical or touch pad
  7. something that you put in
  8. a symbol that has a letter in a circle
  9. a server in the sky
  10. wireless internet
  11. online
Down
  1. online power point
  2. 4g 3g
  3. access memory ram
  4. a commercial
  5. disc drive like a flash drive
  6. of office what presidents have to do
  7. things that you can hear see or get
  8. what is the abbreviation for document
  9. processing unit cpu
  10. host a online director
  11. just a little

22 Clues: 4g 3ggamesonlinea commercialjust a littleaccess memory ramwireless internetonline power pointprocessing unit cpua server in the skyhost a online directora person who gives foodelliptical or touch padsomething that you put indisc drive like a flash drivea place where you store thingsboard the queen of your computerthings that you can hear see or get...

Kolletsch-Kreuzworträtsel 2021-04-16

Kolletsch-Kreuzworträtsel crossword puzzle
Across
  1. pädagogische Squaw
  2. Comic-er
  3. Guitar Hero
  4. Kolletsch Bürgermeister
  5. wer war's?
  6. kommt notorisch zu spät
  7. Rekordhalter speed talking
  8. schweizer E-Biker
  9. singende Basteltante
  10. sozialpäd. Menstruationszyklus
  11. wäre fast davon gerollt
  12. bakip Sportsfreundin
  13. lila Fee
  14. Häfnschwester
  15. Shoe-maniac
  16. ehem. Zirkusartistin
  17. Agnes
  18. Postschwimmerin
Down
  1. Kolletsch-Hausverstand
  2. Sägespähnenspanner
  3. Maskenfetischistin
  4. Dolmetscher für deutsch-altmann
  5. Cyber-Nonne
  6. bischöfliches Kulinarikum
  7. handwerken ugs.
  8. nachhaltiger Brötchenversorger
  9. mex. Komponistin
  10. Überläuferin aus Baden
  11. ehem. Direktorin, Vorname
  12. legasthenischer Wolleballtreina
  13. Rap-Slam-Queen
  14. Supervikinger (Nachname)
  15. Müch-man
  16. Chilli(ge)
  17. Kolleg ugs.
  18. stilles, aflenzer Wasser
  19. Mag.a Dr.in Eidschi-Beidschi
  20. legale Schoko-Dealerin
  21. SOS-Sitzformation
  22. Miesmacher alias Besserwisser

40 Clues: AgnesComic-erMüch-manlila Feewer war's?Chilli(ge)Cyber-NonneGuitar HeroKolleg ugs.Shoe-maniacHäfnschwesterRap-Slam-Queenhandwerken ugs.Postschwimmerinmex. Komponistinschweizer E-BikerSOS-SitzformationSägespähnenspannerMaskenfetischistinpädagogische Squawsingende Basteltantebakip Sportsfreundinehem. ZirkusartistinKolletsch-Hausverstand...

Digital Citizenship Vocabulary 2022-11-04

Digital Citizenship Vocabulary crossword puzzle
Across
  1. imagine feelings
  2. facts for different purposes
  3. piece of advice
  4. storing app or item
  5. app using information
  6. someone who shares your information
  7. online bulling
  8. over sharing feelings
  9. someone who supports you to a cyber bully
  10. using something without any permission
  11. something that collects data from you
Down
  1. something that makes you uncomfortable
  2. something that lasts
  3. something that you do and share online
  4. something to ask before using
  5. someone who helps you defeat a bully
  6. merging copyright music with other music
  7. buys products
  8. balance using media in a healthy way
  9. something that uses all info of you
  10. using something online on certain situations

21 Clues: buys productsonline bullingpiece of adviceimagine feelingsstoring app or itemsomething that lastsapp using informationover sharing feelingsfacts for different purposessomething to ask before usingsomething that uses all info of yousomeone who shares your informationsomeone who helps you defeat a bullybalance using media in a healthy way...

B&P Holiday Edition 2023 2023-09-22

B&P Holiday Edition 2023 crossword puzzle
Across
  1. Popular sport to watch on Thanksgiving
  2. Scrooge’s first name from “A Christmas Carol”
  3. Christmas-themed Tchaikovsky ballet
  4. Candle holder for Kwanzaa
  5. A model of a person made with snow
  6. Sour and dark red berries
  7. Fall squash or gourd
  8. Brief and light snowfalls
Down
  1. Singing from one door to another
  2. A Hansel and Gretel inspired house
  3. Hung by the chimney with care
  4. Roasting on an open fire
  5. Elf on a ----
  6. Popular "Friday" shopping day
  7. This animal receives a President's pardon
  8. The most famous reindeer of all
  9. Wood that is burnt as fuel
  10. Synonym for corn
  11. Candle holder for Hanukkah
  12. Popular "Monday" shopping day
  13. Santa's ride

21 Clues: Santa's rideElf on a ----Synonym for cornFall squash or gourdRoasting on an open fireCandle holder for KwanzaaSour and dark red berriesBrief and light snowfallsWood that is burnt as fuelCandle holder for HanukkahHung by the chimney with carePopular "Friday" shopping dayPopular "Monday" shopping dayThe most famous reindeer of all...

Black Friday 2025-11-12

Black Friday crossword puzzle
Across
  1. Brick and ______
  2. Very brief promotion, or Barry Allen
  3. Get money back
  4. A collection of items you want
  5. Business selling goods
  6. Biggest shopping day of the _____
  7. In the ___
  8. Out of ____
  9. Where you keep your money
  10. Thanksgiving meat
  11. Where a Londoner waits
  12. Issue or warning
Down
  1. Bad deal, or what to do with a band-aid
  2. Place with many stores in close proximity
  3. Rainbow
  4. To just look around
  5. What you need to do if few items remain or if late
  6. To just look around, on Cyber Monday
  7. In the ___
  8. Attractive offer
  9. Booklet displaying a company's products
  10. Where a Bostonian waits
  11. Strategy to make you want to buy something right away

23 Clues: RainbowIn the ___In the ___Out of ____Get money backBrick and ______Attractive offerIssue or warningThanksgiving meatTo just look aroundBusiness selling goodsWhere a Londoner waitsWhere a Bostonian waitsWhere you keep your moneyA collection of items you wantBiggest shopping day of the _____Very brief promotion, or Barry Allen...

Gone Phishing 2017-09-08

Gone Phishing crossword puzzle
Across
  1. Crime conducted via the Internet or some other computer network.
  2. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
  3. An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
  4. Controls that restrict unauthorized individuals from gaining access to a company's computer facilities.
  5. Conversion of data into a form that cannot be easily understood by unauthorized people.
Down
  1. An email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  2. A secret word or phrase known only to you.
  3. Whaling A type of fraud that targets high-profile end users.
  4. Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
  5. Policy that indicates what kind of information a website will take from you and what they intend to do with it.
  6. Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
  7. A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties.
  8. What tells you that the website is secure in the browser.
  9. An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

14 Clues: A secret word or phrase known only to you.What tells you that the website is secure in the browser.Whaling A type of fraud that targets high-profile end users.Crime conducted via the Internet or some other computer network.Conversion of data into a form that cannot be easily understood by unauthorized people....

Malware 2024-04-26

Malware crossword puzzle
Across
  1. A cyber attack intended to redirect a website's traffic to another, fraudulent site.
  2. Attempts to crack passwords or keys through trial and error, not by exploiting any inherent weakness in the encryption but by sheer volume of attempts.
  3. The placement of malicious code in SQL statements, via web page input, to manipulate a database behind the website.
  4. The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
  5. Insufficient rules and guidelines that govern the use and security of a network, which can lead to vulnerabilities.
  6. The act of capturing and reading packets as they cross a network or part of a network. If the packets are not encrypted, their content can be read.
Down
  1. Any software package which automatically renders advertisements to generate revenue for its author.
  2. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. A form of malware designed to trick victims into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
  4. Malicious software that replicates itself by modifying other computer programs and inserting its own code.
  5. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  6. Malware that locks or encrypts the victim's data until a ransom is paid.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

14 Clues: Malware that locks or encrypts the victim's data until a ransom is paid.A cyber attack intended to redirect a website's traffic to another, fraudulent site.Software designed to disrupt, damage, or gain unauthorized access to a computer system.Any software package which automatically renders advertisements to generate revenue for its author....

ж2 2025-11-24

ж2 crossword puzzle
Across
  1. – Process to reduce risk.
  2. – Risk of not being able to meet short-term obligations.
  3. – Risk of damage to a company’s public image.
  4. – Prefix for risks related to computers and networks.
  5. – Measure to manage or reduce risk.
Down
  1. – Adhering to laws and regulations.
  2. – Formal examination of financial records.
  3. – An event that disrupts normal operations.
  4. – Protection against financial risk.
  5. – Risk of borrower default.
  6. – Penalty for non-compliance.
  7. – Deceptive act for personal gain.
  8. – Financial damage or disadvantage.

13 Clues: – Process to reduce risk.– Risk of borrower default.– Penalty for non-compliance.– Deceptive act for personal gain.– Adhering to laws and regulations.– Measure to manage or reduce risk.– Financial damage or disadvantage.– Protection against financial risk.– Formal examination of financial records.– An event that disrupts normal operations....

11.2 Cabinet Departments and Independent Agencies 2021-04-22

11.2 Cabinet Departments and Independent Agencies crossword puzzle
Across
  1. counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
  2. providing the military forces needed to deter war and protect the security of our country.
  3. the health of all Americans and providing essential human services.
  4. enforcing the laws of the United States federal government
  5. representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
  6. manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
  7. national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
  8. manage the liquidity of a business.
Down
  1. planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
  2. integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
  3. oversees the American farming industry
  4. the management and distribution of the federal budget for education initiatives.
  5. what is the title of the head of the executive branch departments?
  6. laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.

14 Clues: manage the liquidity of a business.oversees the American farming industryenforcing the laws of the United States federal governmentwhat is the title of the head of the executive branch departments?the health of all Americans and providing essential human services.the management and distribution of the federal budget for education initiatives....

Private Security Chapter 1-3 Terminology 2019-09-27

Private Security Chapter 1-3 Terminology crossword puzzle
Across
  1. the first regular police force in London
  2. a call to citizens to assist in an emergency situation
  3. Scanning Analysis Response Assess
  4. any action taken to reduce crime risks and build individual and community safety
  5. official data on crime that are reported to law enforcement agencies across the United States
  6. Conducted by the Bureau of Justice Statistics and the U.S. Census Bureau
Down
  1. a citizen’s organization devoted to preventing crime and vandalism in their neighborhood
  2. the aim of punishment is to prevent or deter persons from engaging in future crime
  3. when security officers respond for security purposes after a crime has been attempted or committed
  4. when security organizations police the community all work together to solve crime
  5. the eight major crimes included in Part 1 of the Uniform Crime Report
  6. when security organizations work to prevent crime

12 Clues: Scanning Analysis Response Assessthe first regular police force in Londonwhen security organizations work to prevent crimea call to citizens to assist in an emergency situationthe eight major crimes included in Part 1 of the Uniform Crime ReportConducted by the Bureau of Justice Statistics and the U.S. Census Bureau...

Misc 2024-07-29

Misc crossword puzzle
Across
  1. A KNOWN C2 AND Adversary Simulations and Red Team Operations
  2. HACKER WHO DIED THIS YEAR
  3. A THREAT ACTOR WHICH WAS INVOLVED IN BANGLADESH BANK HEIST
  4. CONFERENCE DEDICATED FOR MACOS SECURITY
  5. created by the Spanish security company Hispasec Sistemas
  6. RECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TO
Down
  1. standard for sending and receiving notification messages
  2. first modern and online darknet market
  3. Launched in 1989 as a cooperative for information security thought leadership,
  4. Who shifted to a new threat actor naming taxonomy?
  5. A standard programming language used, supported, and promoted by Apple
  6. A subsystem to be termination next year
  7. Largest acquisition of Salesforce till date

13 Clues: HACKER WHO DIED THIS YEARfirst modern and online darknet marketCONFERENCE DEDICATED FOR MACOS SECURITYA subsystem to be termination next yearLargest acquisition of Salesforce till dateRECENT CROWDSTRIKE INCIDENT WAS CAUSED DUE TOWho shifted to a new threat actor naming taxonomy?standard for sending and receiving notification messages...

System Hardening Quiz 1 2023-08-23

System Hardening Quiz 1 crossword puzzle
Across
  1. Prove an identity through login
  2. Security ____ uses predefined set of security settings to configure security settings of a computer
  3. Data is accessible only to authorized users
  4. Type _____ Multifactor Authentication is based on something you know
  5. Type _____ Multifactor Authentication is based on something you have
  6. Data can only be created and modified by authorized users
Down
  1. Grant access to resources based on user
  2. Type _____ Multifactor Authentication is based on something you are
  3. Data is available and accessible when required
  4. This encryption uses the same key to encrypt and decrypt
  5. Control which application can be executed
  6. Tracks and audit access and capabilities
  7. Data can only be created and modified by authorized users
  8. Filter contents of packets and traffic

14 Clues: Prove an identity through loginFilter contents of packets and trafficGrant access to resources based on userTracks and audit access and capabilitiesControl which application can be executedData is accessible only to authorized usersData is available and accessible when requiredThis encryption uses the same key to encrypt and decrypt...

ISACA BC 2022-10-15

ISACA BC crossword puzzle
Across
  1. way to create a secure software
  2. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)
  3. a computer malware program that was originally developed in the form of a banking Trojan
  4. integrates all of the cloud security capabilities into a single cloud-native solution
  5. Toughest privacy and security law in the world
Down
  1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  3. method that requires the user to provide two or more verification factors to gain access to a resource
  4. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse

10 Clues: way to create a secure softwareToughest privacy and security law in the worldintegrates all of the cloud security capabilities into a single cloud-native solutiona computer malware program that was originally developed in the form of a banking Trojan...

IT - Crossword 2024-11-25

IT - Crossword crossword puzzle
Across
  1. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that
  2. film, or record literary, artistic, or musical material, and to authorize
  3. The identification and assurance of the origin of information
  4. Unauthorized access of or interference with computer systems, servers, or
  5. author without authorization
  6. An act or instance of using or closely imitating the language and thoughts of
  7. A weakness, design, or implementation error that can lead to an
  8. event that compromises the security of the system.
  9. in order to induce individuals to reveal personal information, such as
  10. Action taken in advance to protect the system against potential threats or
  11. only by those authorized
  12. Ensuring that the information is accessible to authorized persons when required without delay.
  13. Any action derived from intelligent threats to violate the security of the
  14. fraudulent practice of sending emails purporting to be from reputable
  15. your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  16. to do the same
  17. phishing, spamming and child pornography) is used as a tool to commit
  18. may use computer technology to access personal information,
  19. of sexual organs or sexual activity with the aid of a computer system for favor or
Down
  1. A defined method of breaching the security of an IT system through
  2. information and communication systems
  3. and credit card numbers
  4. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious
  5. Ensuring that the information/data can be
  6. Involves actions that supplement the precautionary measures
  7. A common type of online fraud
  8. An assurance for which someone cannot deny something
  9. trade secrets or use the internet for exploitative or malicious purposes.
  10. Any action of stealing information from a users’ system.
  11. offense
  12. a crime in which a computer is the object of the crime
  13. User security allows the system to set security rules to determine what is displayed to which user.
  14. The exclusive legal right, given to an originator or an assignee to print, publish,

33 Clues: offenseto do the sameand credit card numbersonly by those authorizedauthor without authorizationA common type of online fraudinformation and communication systemsEnsuring that the information/data can beevent that compromises the security of the system.An assurance for which someone cannot deny something...

LSS- News letter 2014-06-09

LSS- News letter crossword puzzle
Across
  1. Acquired it more?, then burn it.
  2. Codes for genetic make up
  3. Got fever? Have a .....
  4. Thrives in conditions where no other life forms could exist and where nutrients come only from inorganic matter.
  5. an_ _ _,cat_ _ _
  6. Exists in Biological and cyber world,mostly harmful.
  7. A Life begins
  8. Fundamenta unit of life
  9. Sounds similar to a casual outfit
Down
  1. The SI unit of energy
  2. cross
  3. Incharge of Involuntary actions,Part of brain.
  4. Biological classification,Hollywood movie
  5. causes Cancer
  6. Nature's camera,Apple has it too.

15 Clues: crosscauses CancerA Life beginsan_ _ _,cat_ _ _The SI unit of energyGot fever? Have a .....Fundamenta unit of lifeCodes for genetic make upAcquired it more?, then burn it.Nature's camera,Apple has it too.Sounds similar to a casual outfitBiological classification,Hollywood movieIncharge of Involuntary actions,Part of brain....

Choice Board Crossword Puzzle 2021-03-05

Choice Board Crossword Puzzle crossword puzzle
Across
  1. avion
  2. traer
  3. pasaporte
  4. saber
  5. pasillo
  6. tener
  7. seguridad
  8. conducir
  9. caber
Down
  1. producir
  2. decir
  3. traducir
  4. andar
  5. poder
  6. venir
  7. hacer
  8. despegar
  9. querer
  10. poner
  11. boleto

20 Clues: deciraviontraerandarpodervenirhacersabertenerponercaberquererboletopasilloproducirtraducirdespegarconducirpasaporteseguridad

Unit 3 vocabulary 2016-11-20

Unit 3 vocabulary crossword puzzle
Across
  1. schuldig
  2. overval
  3. vermijden
  4. onschuldig
  5. liever
  6. getuige
  7. straffen
  8. wet
  9. onbeleefd
  10. zaak
Down
  1. kwaadaardig
  2. grijpen
  3. gevangenis
  4. crimineel
  5. beveiliging
  6. verward
  7. verspillen
  8. oplossen
  9. achterkant
  10. ontkennen

20 Clues: wetzaaklievergrijpenovervalverwardgetuigeschuldigoplossenstraffencrimineelvermijdenonbeleefdontkennengevangenisonschuldigverspillenachterkantkwaadaardigbeveiliging

D 3 Reisenvokabeln 2020-11-16

D 3 Reisenvokabeln crossword puzzle
Across
  1. baggage_claim
  2. arrive
  3. motion_sickness
  4. traffic_ticket
  5. toll_booth
  6. round_trip
  7. flat_tire
  8. customs
  9. to_turn
  10. redeye_flight
  11. sights
Down
  1. carry-on_luggage
  2. straight_ahead
  3. to_cross
  4. layover
  5. security
  6. speed_trap
  7. breakdown
  8. intersection
  9. traffic_jam

20 Clues: arrivesightslayovercustomsto_turnto_crosssecurityflat_tirebreakdownspeed_traptoll_boothround_triptraffic_jamintersectionbaggage_claimredeye_flightstraight_aheadtraffic_ticketmotion_sicknesscarry-on_luggage

Ok 2023-09-21

Ok crossword puzzle
Across
  1. fix
  2. light
  3. miss
  4. excited
  5. lazy
  6. sister
  7. girl
  8. security
  9. wrong
  10. careless
  11. floor
  12. destroy
Down
  1. son
  2. repair
  3. fear
  4. laugh
  5. sell
  6. safe
  7. narrow
  8. human

20 Clues: sonfixmissfearlazysellsafegirllightlaughwronghumanfloorrepairsisternarrowexciteddestroysecuritycareless

Everyday Uses: 2025-01-27

Everyday Uses: crossword puzzle
Across
  1. materials
  2. morning
  3. time
  4. evening
  5. eat
  6. home
  7. liquid
  8. Akre
  9. refugee
  10. oven
Down
  1. load
  2. Erbil
  3. community
  4. drive
  5. security
  6. Boss
  7. outside
  8. midday
  9. animal
  10. work

20 Clues: eatloadBosstimehomeAkreworkovenErbildrivemiddayanimalliquidmorningeveningoutsiderefugeesecuritymaterialscommunity

Stary Przyjaciel 2025-04-06

Stary Przyjaciel crossword puzzle
Across
  1. mask
  2. partner
  3. perpetrator
  4. hand
  5. box
  6. ink
  7. police
  8. friend
  9. escape
  10. money
Down
  1. gate
  2. passerby
  3. bank
  4. security
  5. criminal
  6. suspicion
  7. meeting
  8. cell
  9. car
  10. smile

20 Clues: boxcarinkgatebankmaskcellhandsmilemoneypolicefriendescapepartnermeetingpasserbysecuritycriminalsuspicionperpetrator

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. passport
  2. vacation
  3. luggage
  4. ticket
  5. airport
  6. to travel
  7. customs
  8. confirm
  9. train
Down
  1. call
  2. suitcase
  3. security
  4. buy
  5. flight
  6. arrive
  7. station
  8. board
  9. passenger
  10. reclaim
  11. screen

20 Clues: buycallboardtrainflightarriveticketscreenluggagestationairportreclaimcustomsconfirmsuitcasesecuritypassportvacationto travelpassenger

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. ToGetInLine
  2. airport
  3. ToGoOnVacasion
  4. GoThroughCustoms
  5. security
  6. itinerary
  7. passport
  8. moniter
  9. Flight
  10. ticket
Down
  1. TravelAgency
  2. ToBoard
  3. passenger
  4. ToCallSomeone
  5. boardingpass
  6. gate
  7. suitcase
  8. departure
  9. arrival
  10. luggage

20 Clues: gateFlightticketToBoardairportarrivalmoniterluggagesecuritysuitcasepassportpassengeritinerarydepartureToGetInLineTravelAgencyboardingpassToCallSomeoneToGoOnVacasionGoThroughCustoms

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. passport
  2. Flight
  3. suitcase
  4. airport
  5. GoThroughCustoms
  6. security
  7. arrival
  8. ToGoOnVacasion
  9. passenger
  10. moniter
  11. gate
Down
  1. itinerary
  2. luggage
  3. ToCallSomeone
  4. TravelAgency
  5. departure
  6. ToGetInLine
  7. ToBoard
  8. ticket
  9. boardingpass

20 Clues: gateFlightticketluggageairportToBoardarrivalmoniterpassportsuitcasesecurityitinerarydeparturepassengerToGetInLineTravelAgencyboardingpassToCallSomeoneToGoOnVacasionGoThroughCustoms

BIMBINGAN KONSELING 2023-10-27

BIMBINGAN KONSELING crossword puzzle
Across
  1. : ORANG YANG MEMBULLY
  2. STANDER : ORANG YANG MELIHAT KEJADIAN BULLYING
  3. : BULLYING YANG TERJADI DI MASYARAKAT
  4. : BULLYING YANG TERJADI DI DUNIA MAYA
  5. : TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG
Down
  1. : BULLYING MEMUKUL ORANG LAIN
  2. : BULLYING DENGAN MENGOLOK NAMA ORANG TUA
  3. : ORANG YANG DIBULLY
  4. : MELAPORKAN KE SIAPA BULLYING DI SEKOLAH

9 Clues: : ORANG YANG DIBULLY: ORANG YANG MEMBULLY: BULLYING MEMUKUL ORANG LAIN: BULLYING YANG TERJADI DI MASYARAKAT: BULLYING YANG TERJADI DI DUNIA MAYA: BULLYING DENGAN MENGOLOK NAMA ORANG TUA: MELAPORKAN KE SIAPA BULLYING DI SEKOLAHSTANDER : ORANG YANG MELIHAT KEJADIAN BULLYING: TINDAKAN MENYAKITI ORANG LAIN SECARA BERULANG

EMPLOYMENT OPPORTUNITIES IN LODI UNIFIED 2021-08-13

EMPLOYMENT OPPORTUNITIES IN LODI UNIFIED crossword puzzle
Across
  1. driver: transports students to school
  2. guard: helps students cross streets
  3. accounts for expenses
  4. assistant: prepares meals for students
  5. repairs and maintains vehicles
  6. clerical assistance in school office
  7. repairs and maintains wiring
Down
  1. cleans and maintains the school
  2. maintains the school grounds
  3. customer service and clerical duties
  4. assists classroom teachers
  5. manager: supervises the cafeteria
  6. security: provides security at school
  7. monitor: monitors students at school
  8. repairs and maintains plumbing

15 Clues: accounts for expensesassists classroom teachersmaintains the school groundsrepairs and maintains wiringrepairs and maintains vehiclesrepairs and maintains plumbingcleans and maintains the schoolmanager: supervises the cafeteriaguard: helps students cross streetscustomer service and clerical dutiesmonitor: monitors students at school...

Is it possible to avoid risk? 2024-10-17

Is it possible to avoid risk? crossword puzzle
Across
  1. OSI layer that opens and closes conversation between two devices
  2. Refer to an incident where unauthorized individual gain access to a system
  3. Cryptography method that uses a pair of keys
  4. refers to a security measure put in place to mitigate security risk
  5. cloud services that is perfect for Application developers
  6. The Indian bill for personal information protection,
Down
  1. encrypted form of message
  2. type of cybercrime that involves the use of QR codes
  3. provider’s applications running on a cloud
  4. cloud services available for general public
  5. set of rules and standards that define how data is transmitted and received across a network.
  6. / ware made for spying
  7. Non-profit organization that dedicated to improving software security
  8. European laws for privacy

14 Clues: / ware made for spyingencrypted form of messageEuropean laws for privacyprovider’s applications running on a cloudcloud services available for general publicCryptography method that uses a pair of keystype of cybercrime that involves the use of QR codesThe Indian bill for personal information protection,...

Human Rights 2025-05-12

Human Rights crossword puzzle
Across
  1. Solving an argument through discussion.
  2. Applying to everyone.
  3. Having the tendency to attack or harm others.
  4. Time spent awake.
  5. Given formal approval or permission for something.
  6. Supports.
Down
  1. The person or team against which the sport is played.
  2. Relating to computer and the web.
  3. Behavior that is cruel or unkind.
  4. Protects something for being changed.

10 Clues: Supports.Time spent awake.Applying to everyone.Relating to computer and the web.Behavior that is cruel or unkind.Protects something for being changed.Solving an argument through discussion.Having the tendency to attack or harm others.Given formal approval or permission for something.The person or team against which the sport is played.

Self-Esteem Word Search 2023-03-15

Self-Esteem Word Search crossword puzzle
Across
  1. People form these with each other
  2. Something you do in your spare time
  3. Something difficult/out of our comfort zone
  4. Where we live outside of school/hobbies/work
  5. Confidence in yourself
  6. We have co-workers, bosses here
  7. Where we get educated
  8. How to respond to a compliment
  9. Feeling certain in your abilities
Down
  1. Physical, Verbal, Cyber, Social
  2. Self-esteem is a _______ ranging from low, healthy, to overly high
  3. A comment which makes somebody feel good
  4. The opposite of unhealthy
  5. Overcoming our adversities
  6. Physical activity
  7. Getting past a challenge is to ___________

16 Clues: Physical activityWhere we get educatedConfidence in yourselfThe opposite of unhealthyOvercoming our adversitiesHow to respond to a complimentPhysical, Verbal, Cyber, SocialWe have co-workers, bosses herePeople form these with each otherFeeling certain in your abilitiesSomething you do in your spare timeA comment which makes somebody feel good...

ISACA BC 2022-10-15

ISACA BC crossword puzzle
Across
  1. Toughest privacy and security law in the world
  2. integrates all of the cloud security capabilities into a single cloud-native solution
  3. a computer malware program that was originally developed in the form of a banking Trojan
  4. to create a means for security solutions from different vendors to work together effectively to achieve certain security goals.
  5. is a new approach to threat detection and response that provides holistic protection against cyberattacks, unauthorized access and misuse
Down
  1. malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent
  2. way to create a secure software
  3. method that requires the user to provide two or more verification factors to gain access to a resource
  4. is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment
  5. is a security as a service offering designed to offer an alternative to an in-house Security Operations Center (SOC)

10 Clues: way to create a secure softwareToughest privacy and security law in the worldintegrates all of the cloud security capabilities into a single cloud-native solutiona computer malware program that was originally developed in the form of a banking Trojan...

Reportable Information 2023-07-27

Reportable Information crossword puzzle
Across
  1. Monetary management
  2. Actions in conflict with laws or policy
  3. A change in personal location, often for pleasure
  4. CH3−CH2−OH or C2H5OH
  5. Any event that threatens Security procedures
  6. Illegal activity
  7. Requests for classified information, unauthorized
  8. Of or from a country other than the USA
Down
  1. Breaching of security defenses
  2. Improper storage/transportation of classifieds
  3. Illegal substances
  4. Lawful detainment
  5. A state of being owed, usually financially
  6. Fraud/Scams/Trafficking via computer
  7. A formal partnering of two people
  8. A legal moniker

16 Clues: A legal monikerIllegal activityLawful detainmentIllegal substancesMonetary managementCH3−CH2−OH or C2H5OHBreaching of security defensesA formal partnering of two peopleFraud/Scams/Trafficking via computerActions in conflict with laws or policyOf or from a country other than the USAA state of being owed, usually financially...

Discharge Planning 2025-11-17

Discharge Planning crossword puzzle
Across
  1. supplemental security income
  2. single point of access
  3. ability to maintain a balanced mental state
  4. person/agency appointed to manage funds
  5. 24 hr supervised housing
  6. assertive community treatment
  7. engage in your own treatment
Down
  1. permanent housing, most independent
  2. middle level of spa housing
  3. determined, strong desire to do well/succeed
  4. assisted outpatient treatment
  5. treatment team in the community
  6. agreeable to treatment/medications
  7. social security disability
  8. state operated community residence
  9. ability to understand and accept diagnosis

16 Clues: single point of access24 hr supervised housingsocial security disabilitymiddle level of spa housingsupplemental security incomeengage in your own treatmentassisted outpatient treatmentassertive community treatmenttreatment team in the communityagreeable to treatment/medicationsstate operated community residencepermanent housing, most independent...

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  6. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  7. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  8. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  9. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  10. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  11. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  12. program kecil yang dapat merusak sistem komputer (5 huruf)
  13. perbuatan melanggar hukum didunia maya (10 huruf)
Down
  1. peraturan yang melindungi data pribadi (16 huruf)
  2. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  3. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  4. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  5. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  6. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  7. aturan dan normal berperilaku baik di media sosial (11 huruf)
  8. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  9. pencurian hak cipta (11 huruf)
  10. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  11. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  12. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  13. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  14. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  15. penyebaran informasi palsu yang luas (4 huruf)
  16. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  4. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  5. peraturan yang melindungi data pribadi (16 huruf)
  6. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  7. perbuatan melanggar hukum didunia maya (10 huruf)
  8. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  9. perilaku tidak atau kasar di dunia maya (10 huruf)
  10. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  11. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  12. pencurian hak cipta (11 huruf)
  13. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  14. aturan dan normal berperilaku baik di media sosial (11 huruf)
  15. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  16. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  17. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  18. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
Down
  1. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  2. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  3. program kecil yang dapat merusak sistem komputer (5 huruf)
  4. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  5. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  6. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  7. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  8. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  9. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  10. penyebaran informasi palsu yang luas (4 huruf)
  11. berbuat menyebar informasi yang merugikan orang lain (14 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

internet.01 2019-05-10

internet.01 crossword puzzle
Across
  1. verbreitete Lügen
  2. eine Art daten zu sichern
  3. gemeine Kommentare
Down
  1. man kann süchtig danach sein
  2. Belästigung im Internet
  3. eine Art beweise zu sichern
  4. auch Abhängigkeit genannt

7 Clues: verbreitete Lügengemeine KommentareBelästigung im Internetauch Abhängigkeit genannteine Art daten zu sicherneine Art beweise zu sichernman kann süchtig danach sein

history structure of law enforcement 2025-01-13

history structure of law enforcement crossword puzzle
Across
  1. people who provide security services to those who don't have their own for $
  2. the model in which state police have powers such as local police but statewide
  3. the authority of an agency based on area subject matter
  4. the person in charge of early English towns
  5. the model in which state police focus on traffic accidents
  6. 12 principles invented by Robert Peel that helped London Police and still used today
Down
  1. people who provide security to those who employ them
  2. a system in which citizens were used to guard the city or pursue criminals
  3. police activity working with the community to prevent crime
  4. a group of people called by the sheriff or constable to help
  5. the chief law enforcement officer of an area
  6. 10 families band together to enforce laws

12 Clues: 10 families band together to enforce lawsthe person in charge of early English townsthe chief law enforcement officer of an areapeople who provide security to those who employ themthe authority of an agency based on area subject matterthe model in which state police focus on traffic accidents...

FMA 2024-08-25

FMA crossword puzzle
Across
  1. - A prolonged decline in the market
  2. - Long-term debt security issued by a corporation or government
  3. - When the market is on a prolonged rise
  4. - Where stocks are bought and sold
  5. - A contract that derives its value from an underlying asset
  6. - The profit made from selling a security above its purchase price
  7. - An agreement to buy or sell a specific commodity at a future date
  8. - An institution that facilitates the exchange of securities between buyers and sellers
Down
  1. - A share of ownership in a company
  2. - A market for buying and selling currencies
  3. - The income generated from an investment
  4. - A market where new securities are issued
  5. - A bond or share that can be traded
  6. - The difference between the highest and lowest prices in a trading day
  7. - The initial offering of a company's stock to the public
  8. - A percentage of a loan charged as interest

16 Clues: - Where stocks are bought and sold- A prolonged decline in the market- A share of ownership in a company- A bond or share that can be traded- When the market is on a prolonged rise- The income generated from an investment- A market where new securities are issued- A market for buying and selling currencies...

Digital Citizenship 2024-05-07

Digital Citizenship crossword puzzle
Across
  1. ____before you type
  2. the digital ____ includes texts,social media, and video games
  3. always get this before posting online
  4. type of bullying that happens online
Down
  1. if you see bullying online, you should ____ it
  2. ____ citizen
  3. ___ your time on and offline
  4. ____ yourself and others online
  5. the K in THINK

9 Clues: ____ citizenthe K in THINK____before you type___ your time on and offline____ yourself and others onlinetype of bullying that happens onlinealways get this before posting onlineif you see bullying online, you should ____ itthe digital ____ includes texts,social media, and video games

Billionaires 2025-01-10

Billionaires crossword puzzle
Across
  1. The Gulf of America
  2. "Beyonce had one of the best videos of all time"
  3. "Hes wired in" "My Prada's at the cleaners"
  4. In her billionaire era
Down
  1. Other word for fence
  2. Lip Kit queen
  3. Cyber truck inventor
  4. Prime members get "it" quick
  5. NBAs shark in the tank"

9 Clues: Lip Kit queenThe Gulf of AmericaOther word for fenceCyber truck inventorIn her billionaire eraNBAs shark in the tank"Prime members get "it" quick"Hes wired in" "My Prada's at the cleaners""Beyonce had one of the best videos of all time"

Nina Nunez 2013-03-27

Nina Nunez crossword puzzle
Across
  1. personl stuff.
  2. websitets that contains data
  3. aout a particular topic
  4. of the internet and thats ileagle.
Down
  1. is a person that gose into other
  2. when you copy
  3. bully- a bully that
  4. on line useing the internet.

8 Clues: when you copypersonl stuff.bully- a bully thataout a particular topicon line useing the internet.websitets that contains datais a person that gose into otherof the internet and thats ileagle.