cyber security Crossword Puzzles
Cybercrime 2013-09-08
Across
- Testing unit for humans to be identified
- False website leading to identity theft.
- Most popular social media
- Destructive program diguised as a usefull application
Down
- Illegal access into private cyber information
- E-mails overcrowding from unknown sources
- E-mail article intended to deceive
- Physical apparatus in terms of computing
- Programmes loaded onto a computer
- Fake automated computers
- Illegal unauthorized downloads eg. music
11 Clues: Fake automated computers • Most popular social media • Programmes loaded onto a computer • E-mail article intended to deceive • Testing unit for humans to be identified • False website leading to identity theft. • Physical apparatus in terms of computing • Illegal unauthorized downloads eg. music • E-mails overcrowding from unknown sources • ...
Security Role Check 2023-08-07
Across
- If my role is authenticated I only need to confirm my name and appointment
- I'm treated like an owner but I can't make changes over the phone
- Party Without security, you can't tell me much other than if a policy is active/inactive and why
- Home Claims usually helps us with most calls
- I just have to confirm my full name and who I report to
- I only have say if I'm authorized
Down
- I represent the deceased owner
- We can only discuss 5 policies once security has passed
- Anyone can call on my behalf, as long as they can provide my full name and the last-4 of my SSN
- My role is unique as there can be many and I have full autonomy once I pass security
- My role is significant but if I'm not the owner, I need permission
- I'm only authorized if I'm on a list and pass security
- Assignee I'm usually a bank
13 Clues: Assignee I'm usually a bank • I represent the deceased owner • I only have say if I'm authorized • Home Claims usually helps us with most calls • I'm only authorized if I'm on a list and pass security • We can only discuss 5 policies once security has passed • I just have to confirm my full name and who I report to • ...
meta stadium 2023-10-02
19 Clues: AV • Lap • EHS • Site • Ship • Events • Pride@ • Black@ • Women@ • Latin@ • Native@ • Fitness • Culinary • Security • ITSupport • Facilities • Interfaith@ • Disability@ • Transportation
Cyber ethics terms 2021-08-25
Across
- unauthorized use or reproduction of another's work
- legal right, given to an originator
- a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
- correct or acceptable way of communicating on the internet
- moral principles
- a document stipulating constraints and practices that a user must agree to for access
- a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
- the philosophic study of ethics pertaining to computers
- all rights associated with intangible assets owned by a person or company
- criminal activities carried out by means of computers or the internet
- bullying that is cyber
- tricking someone on the web
- allows the creator protection from theft of their idea
- abusive message posted on the internet
14 Clues: moral principles • bullying that is cyber • tricking someone on the web • legal right, given to an originator • abusive message posted on the internet • unauthorized use or reproduction of another's work • allows the creator protection from theft of their idea • the philosophic study of ethics pertaining to computers • ...
cyber final crossword 2022-12-08
Across
- known as "apps"
- a commercial operating system for computers
- smart algorithms that learn
- what runs applications
- processing machine in the computer
Down
- circuit board
- helps display image on the computer
- software to use for coding/debugging
- physical computer component
- intangible computer component
- storage device on a computer
- helps give the result of the input data
- helps enter data into the computer
- an open source operating system for computers
14 Clues: circuit board • known as "apps" • what runs applications • physical computer component • smart algorithms that learn • storage device on a computer • intangible computer component • helps enter data into the computer • processing machine in the computer • helps display image on the computer • software to use for coding/debugging • helps give the result of the input data • ...
Among us 2021-11-05
20 Clues: vent • kill • admin • wepons • defeat • report • lights • leaves • victory • reactor • crewmate • ejection • imposter • Among us • emergency • cafeteria • electrical • navigation • medical center • security cameras
Texts 8A and 8B 2022-09-22
20 Clues: policy • treaty • pursue • hankkia • provide • toimiala • istuttaa • tutkinto • collapse • neuvosto • yhteistyö • pragmatic • prominent • rewarding • non-aligned • liittolainen • epävirallinen • operatiivinen • predictability • turvallisuuspolitiikka
Travel 2022-10-13
20 Clues: bus • line • gate • screen • flight • ticket • arrival • customs • luggage • airport • vacation • airplane • security • suitcase • to board • passport • itinerary • to travel • departure • passenger
Vocabulario, Unidad 1.1 (El aeropuerto) 2018-02-12
20 Clues: seat • sign • trip • aisle • pilot • flight • window • ticket • customs • luggage • arrival • counter • airline • suitcase • security • passport • departure • passenger • travel agent • female flight attendant
PERSONALITY nouns and adjectives 2019-11-06
21 Clues: zvest • čustvo • iskren • sebičen • veselje • pozoren • varnost • pomemben • zgovoren • družaben • sproščen • odgovoren • skrivnost • prijaznost • radodarnost • spoštovanje • samozavesten • občutljivost • samostojnost • pustolovščina • potrpežljivost
Tatiana 2024-04-21
20 Clues: доступ • знание • almost • защита • спутник • привычка • цифровой • общество • удобство • рекламный • прикрепить • наблюдение • распознать • существенный • безопасность • поддерживать • анализировать • порождать, создавать • среднестатистический • общий, распространенный
pazdan olaolczak03@gmail.com 2018-01-29
Across
- Osoba,która próbuje włamać się na komputer
- Wymyślasz go sobie, inaczej nick
- Najpopularniejsza wyszukiwarka internetowa
- Złośliwy program, który można pobrać z internetu nieświadomie
Down
- Nie zdradzaj go przez internet
- Najpopularniejszy portal społecznościowy
- Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu
- Nielegalnie pobiera i sprzedaje filmy lub gry
- Nękanie w cyber przestrzeni
- Powinno być ciężkie do złamania
10 Clues: Nękanie w cyber przestrzeni • Nie zdradzaj go przez internet • Powinno być ciężkie do złamania • Wymyślasz go sobie, inaczej nick • Najpopularniejszy portal społecznościowy • Osoba,która próbuje włamać się na komputer • Najpopularniejsza wyszukiwarka internetowa • Nielegalnie pobiera i sprzedaje filmy lub gry • Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu • ...
E-Safety 10 key words 2019-03-04
10 Clues: bullying online • which you download • numbers like a password • group of people chatting • personal website or page • email address for an account • the internet by going on a link • password for account,a secret word • system which connects to a comouter • stop a computer account reaching you
Health 2023-09-01
Across
- someone who gets made fun because of the color of their skin
- someone who leads a school
- someone who helps the victim
- person who stands around doing nothing
Down
- person who gets bullied
- a choice you make
- someone who teaches a large group of students
- the act of protection
- bullying someone getting bullied online
- mean person
10 Clues: mean person • a choice you make • the act of protection • person who gets bullied • someone who leads a school • someone who helps the victim • person who stands around doing nothing • bullying someone getting bullied online • someone who teaches a large group of students • someone who gets made fun because of the color of their skin
kelas 75_Keisha Sunjaya 2023-05-10
Across
- keinginan untuk menyendiri
- memperoleh informasi yg tepat dan akurat merupakan dampak yg
- salah satu contoh pengaruh tik
- kartu untuk mengakses kesehatan
- contoh perdagangan e-commerce
Down
- mendapatkan jaringan nama lainnya
- semua kolaborasi yg diupayakan pasti dimediasi olehn proses
- proyek kolaborasi merupakan media sosial yg berbentuk
- privasi berhubungan dengan fisik seseorang
- cyber bullying merupakan contoh dampak yg
10 Clues: keinginan untuk menyendiri • contoh perdagangan e-commerce • salah satu contoh pengaruh tik • kartu untuk mengakses kesehatan • mendapatkan jaringan nama lainnya • cyber bullying merupakan contoh dampak yg • privasi berhubungan dengan fisik seseorang • proyek kolaborasi merupakan media sosial yg berbentuk • semua kolaborasi yg diupayakan pasti dimediasi olehn proses • ...
Standard 15.0 Vocabulary Terms 2022-05-08
Across
- The steps you take to make sure you are safe before, during and after an emergency or natural disaster.
- A form of terrorism in which victims "within a country are targeted by a perpetrator with the same citizenship" as the victims.
- The organization and management of the resources and responsibilities for dealing with all humanitarian aspects of emergencies (prevention, preparedness, response, mitigation, and recovery).
- The action of reducing the severity, seriousness, or painfulness of something.
- They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste.
Down
- They prepare plans and procedures for responding to natural disasters and other emergencies.
- Provides first responders with a go-to manual to help deal with hazmat transportation accidents during the critical first 30 minutes.
- They establishes protocols and creates prevention and recovery systems in case of a cyber-attack or natural disaster.
- Department that works to improve the security of the United States. Includes customs, border, and immigration enforcement, emergency response to natural and manmade disasters, antiterrorism work, and cybersecurity.
- Any substance or material that is capable of posing an unreasonable risk to health, safety, and property when transported in commerce.
- The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
- The National Incident Management System guides all levels of government, nongovernmental organizations and the private sector to work together to prevent, protect against, mitigate, respond to and recover from incidents.
12 Clues: The action of reducing the severity, seriousness, or painfulness of something. • They prepare plans and procedures for responding to natural disasters and other emergencies. • They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste. • ...
Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06
Across
- What is the weakest link in cybersecurity?
- ___ was the first personal computer virus?
- A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
- Necessary when the circumstances of an incident require more details
- Our company may _________ your internet usage
Down
- is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
- What is the best way to maintain privacy between two parties?
- When someone sends an e-mail with a link a bogus website is called
- This horse can stampede your security defence for the bad guy and make you look sheepish too!
- What type of calls are made by social engineers
10 Clues: What is the weakest link in cybersecurity? • ___ was the first personal computer virus? • Our company may _________ your internet usage • What type of calls are made by social engineers • What is the best way to maintain privacy between two parties? • When someone sends an e-mail with a link a bogus website is called • ...
the eye of minds crossword puzzle 2024-05-12
Across
- the main character
- how they access the vertnet
- michaels best friend also knowen as the best gamer
- when your in the game
- the name of the virus
Down
- the cyber-terrorist in the game
- the main way michael gets information
- the name of the game
- the network of the game
- michaels friend is known for her coding.
- the agency trying to stop kaine
11 Clues: the main character • the name of the game • when your in the game • the name of the virus • the network of the game • how they access the vertnet • the cyber-terrorist in the game • the agency trying to stop kaine • the main way michael gets information • michaels friend is known for her coding. • michaels best friend also knowen as the best gamer
fund - chapter 10 2020-06-28
Across
- The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank. 2w
- The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”. 3w
- A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause. 2w
- The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien. 3w
- A provision giving the borrower the right to regain title to the security property when the debt is repaid. 2w
- A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments. 2w
- A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
- Two interest rates controlled by the Fed that have an effect on market interest rates. 6w
Down
- The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece. 3w
- The Fed’s activities in buying and selling government securities. 3w
- A written promise to repay a debt. 2w
- The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders. 2w
- A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults. 3w
- The national finance market, where mortgages are bought and sold as investments. 2w
- A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults. 2w
- When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.
16 Clues: A written promise to repay a debt. 2w • The Fed’s activities in buying and selling government securities. 3w • The national finance market, where mortgages are bought and sold as investments. 2w • Two interest rates controlled by the Fed that have an effect on market interest rates. 6w • ...
Digital Safety 2024-10-09
ICT in Home 2016-04-18
Across
- bulling Children could become depressed
- small portable media player
- Money is taken straight out of the cutomour account
- Take Many But only keep the ones you want
- Health concern caused by bad posture
- EFTPOS
- finding another person to love you
- Way of preventing data loss
- Gamble
- Keep in touch with others
- Clever Screen
Down
- Health concern caused by repetitive movements
- stating at a computer all day leads to
- Talk to a variety of people
- When people dont leave the house for days
- Can lead to addiction and anti social behavior
16 Clues: EFTPOS • Gamble • Clever Screen • Keep in touch with others • small portable media player • Talk to a variety of people • Way of preventing data loss • finding another person to love you • Health concern caused by bad posture • stating at a computer all day leads to • bulling Children could become depressed • Take Many But only keep the ones you want • ...
Innovation AWL Page34 2019-05-01
20 Clues: form • goal • shown • income • choose • change • extent • safety • service • manners • limited • location • direction • techniques • steadiness • replacement • characteristic • because/ considering • ancillary/ subordinate • questionnaire/ research
African Crossword - Chad 2024-05-01
20 Clues: vote • flood • blood • refuge • ration • tension • liberte • rebelle • general • torture • officer • dictator • violence • atrocity • security • massacre • evacuation • terroriste • oppression • fire/weapon
Unit 15-16 2023-03-13
20 Clues: toll • padi • lomp • ooper • trahv • sadam • rabav • kandik • tankla • tšello • kirurg • fuajee • tegelik • vahekäik • karistus • aksessuaar • pardapääse • turvalisus • deklareerima • kellegi kallal norima
Aeropuerto/Viaje 2023-02-17
20 Clues: sign • seat • trip • aisle • ticket • flight • window • screen • airline • luggage • customs • counter • To board • passport • arrival´ • suitcase • security • departure • passenger • flight attendant
Spanish Airport Vocabulary 2022-10-13
21 Clues: bus • gate • line • agent • train • flight • screen • ticket • confirm • airport • customs • reclaim • arrival • airplane • passport • suitcase • security • departure • to travel • itinerary • passenger
Brexit_A.Murges 2022-02-08
20 Clues: break • trust • dist. • result • vot.area • strateg. • interval • security • landmark • cause.fear • exceed.sth. • break.apart • body.of.laws • voting.amount • topic.problem • econom.agreem. • talks.w/.polit. • to.take.part.in • direct/lead.sth. • collect.o.opinion
Social Media 2015-05-20
Across
- secutity
- a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
- unsecured computer
- a short description of someone's life, work, character, etc
- everybody wants it
- you can watch films there
- risk
- danger for children
- everybody does it every day
- chances
- consequense of someone annoy you
- a huge group with common interests
- receive and send from...
Down
- a other word for data security
- a green,framed telephone
- opportunities
- 1,44 billions User
- a accumulation of persons you know
- platform
- you can post
- an informal name for someone or something
21 Clues: risk • chances • secutity • platform • you can post • opportunities • unsecured computer • 1,44 billions User • everybody wants it • danger for children • a green,framed telephone • receive and send from... • you can watch films there • everybody does it every day • a other word for data security • consequense of someone annoy you • a accumulation of persons you know • ...
social media 2015-05-20
Across
- an informal name for someone or something
- secutity
- 1,44 billions User
- a short description of someone's life, work, character, etc
- unsecured computer
- everybody wants it
- you can watch films there
- you can post
- a other word for data security
- platform
- a green,framed telephone
- everybody does it every day
- chances
Down
- a accumulation of persons you know
- consequense of someone annoy you
- opportunities
- a huge group with common interests
- danger for children
- risk
- a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
- receive and send from...
21 Clues: risk • chances • secutity • platform • you can post • opportunities • 1,44 billions User • unsecured computer • everybody wants it • danger for children • a green,framed telephone • receive and send from... • you can watch films there • everybody does it every day • a other word for data security • consequense of someone annoy you • a accumulation of persons you know • ...
Rubrik 2024-11-06
Across
- Sucks according to reddit
- He's him
- Dad
- SLED team name for October
- OCD
- Ancient
- Backups that cannot be deleted or changed
- Sparty
- Feature that scans for sensitive data
- Rubrik HQ
- Approach to security that trusts no system or person
- Worst city in the USA - see xxxxx
Down
- Concussed
- Hates onions
- Worst team in the NFL
- Just married
- The ability to restore with a single button press
- Father of 9
- Your social security number is classified as this data type
- Badger
- Rubrik partner that has a shared responsibility model
- Company featured in Rubrik's most famous customer story
- Can be logical or physical
23 Clues: Dad • OCD • Badger • Sparty • Ancient • He's him • Concussed • Rubrik HQ • Father of 9 • Hates onions • Just married • Worst team in the NFL • Sucks according to reddit • SLED team name for October • Can be logical or physical • Worst city in the USA - see xxxxx • Feature that scans for sensitive data • Backups that cannot be deleted or changed • The ability to restore with a single button press • ...
Developing Network Security Strategies and Network Management Strategies 2021-12-18
Across
- A protocol that identify devices and monitor their performance
- There is how many network management components?
- Management process that keep track of the network used by department
- Is asset important in network security?
- Protocol used for remote authentication
Down
- How many components of security policies exist ?
- Encryption often used for vpn
- Performance metric
- Short form of remote monitoring
- Enforces security policies at the boundary between networks
10 Clues: Performance metric • Encryption often used for vpn • Short form of remote monitoring • Is asset important in network security? • Protocol used for remote authentication • How many components of security policies exist ? • There is how many network management components? • Enforces security policies at the boundary between networks • ...
MOSCO RP 2023-01-25
Across
- - cannot be brought inside the Operation or the security zone
- alarm - what the UK test each tuesday
- - Best RPO
- request - form to send when you have visitors
- - what we do
- - where you find the security rules
Down
- - what MPSS give out
- - must be read and followed for travel
- - must not be worn outside of the embassy perimeter
- - must be locked when away from your computer
10 Clues: - Best RPO • - what we do • - what MPSS give out • - where you find the security rules • alarm - what the UK test each tuesday • - must be read and followed for travel • - must be locked when away from your computer • request - form to send when you have visitors • - must not be worn outside of the embassy perimeter • ...
Fourteen Points 2015-01-11
19 Clues: อพยพ • ทำลาย • นำทาง • อิสระ • สร้าง • การทูต • รวบรวม • ยืนยัน • ชายแดน • การพูด • การลดลง • บทลงโทษ • ในอุดมคติ • การแก้แค้น • การซ่อมแซม • วางเค้าโครง • ความปลอดภัย • ความมุ่งหมาย • อย่างไม่เต็มใจ
UBCV 2019-09-22
20 Clues: , ASDASD • , ASDASD • ,ADFSDFDF • , ASDFADFG • , DGSDCFSD • , ASDGSADF • , AFASDFAS • , SFHGSFGS • , ADSFASDF • , SDGSFDSD • , SDASDASD • , DGHWDFAER • , ADFGADFAS • , FBHSFGSDF • , SDGSDFSDF • , FDGSFDGSDF • , DASFRADSFA • , ADFADGWHWRT • , WRNHJEFSGSD • , ASDFAGSDGHGA
KAJKA 2024-03-25
19 Clues: bok • zrelý • etapa • úplný • súhlas • trpiaci • viazaný • nedočkavý • vrstovník • dospelosť • sposobilý • zodpovedný • bezpečnosť • očakávanie • záležitosť • pochybnosť • úzkostlivý • posadnutosť • tehotenstvo
2021 Q4 Security 2021-12-15
Across
- The company that monitors our alarms
- ___ with all demands of the robber
- Number of people that are emailed when we call 911
- Never write down or share _____
- Packet in vault room with specific instructions
- Great ___ is our best robbery deterrent
Down
- Remain _____ during a robbery
- To call 911 dial _-911
- When safe to do so press your ____ buttons
- ____ have more than $5k in your cash drawer
- Use the ____ button when you receive a 'sus'email
- Always leave the building in ____
- ___ parking lot is our Secondary Meeting Spot
- ____, hide, neutralize in an active shooter situation
- In the event of a fire, ____ mbr sensitive info
- Packet under the phone
16 Clues: To call 911 dial _-911 • Packet under the phone • Remain _____ during a robbery • Never write down or share _____ • Always leave the building in ____ • ___ with all demands of the robber • The company that monitors our alarms • Great ___ is our best robbery deterrent • When safe to do so press your ____ buttons • ____ have more than $5k in your cash drawer • ...
2021 Q4 Security 2021-12-15
Across
- Packet under the phone
- Use the ____ button when you receive a 'sus'email
- When safe to do so press your ____ buttons
- Remain _____ during a robbery
- ___ parking lot is our Secondary Meeting Spot
- The company that monitors our alarms
- Packet in vault room with specific instructions
- Great ___ is our best robbery deterrent
Down
- ___ with all demands of the robber
- ____ have more than $5k in your cash drawer
- Number of people that are emailed when we call 911
- Never write down or share _____
- In the event of a fire, ____ mbr sensitive info
- Always leave the building in ____
- ____, hide, neutralize in an active shooter situation
- To call 911 dial _-911
16 Clues: Packet under the phone • To call 911 dial _-911 • Remain _____ during a robbery • Never write down or share _____ • Always leave the building in ____ • ___ with all demands of the robber • The company that monitors our alarms • Great ___ is our best robbery deterrent • When safe to do so press your ____ buttons • ____ have more than $5k in your cash drawer • ...
Information Security crossword 2021-07-05
Across
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
- ______ of any organizational security policy can result in disciplinary actions
- ISMS is a set of policies and procedures for managing an organization’s _______ data
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- A formal process for training and educating employees about IT protection
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
- An asset that is essential to an organization and must be suitably protected
- A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
- Set of rules that limits access to information
- Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Guarantee of reliable access to the information by authorized people
- Protecting the accuracy and completeness of information and processing methods
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Effect of Uncertainty on objectives
16 Clues: Effect of Uncertainty on objectives • Set of rules that limits access to information • Guarantee of reliable access to the information by authorized people • A formal process for training and educating employees about IT protection • An asset that is essential to an organization and must be suitably protected • ...
VMWare Knowledge Check 2022-01-18
Across
- enables hybrid and edge computing applications to be built across locations
- number of VMWare products
- the process of creating a virtual representation of something
- VMware's server virtualization
- this architecture uses one application per server
- tool used for storage virtualization
- ________ and Opex are reduced by using virtualization
- ______ availability
Down
- integration system’s management plug-in to VMware vCenter. (OMIVV)
- mitigates risk
- Device Management Tool
- tool used for desktop and app provisioning
- A VM is a Virtual _________
- the whole virtualized server
- acronym for Hyperconverged Infrastructure
- allows multiple host servers to pool resources
- _______ end to end security
- VMWare turnkey appliance
- VSphere's hypervisor
19 Clues: mitigates risk • ______ availability • VSphere's hypervisor • Device Management Tool • VMWare turnkey appliance • number of VMWare products • A VM is a Virtual _________ • _______ end to end security • the whole virtualized server • VMware's server virtualization • tool used for storage virtualization • acronym for Hyperconverged Infrastructure • ...
Chapter 15.1 created by Jordyn Charron 2024-05-09
Across
- action taken to manage the supply of money and interest rates in an economy
- banks that are part of the FDR
- A security that matures in a year or less
- Anything of value that is accepted in return for goods or services
- Another word for money
- means that money is a common measure of the worth or price of a good or service
- To exchange one good or service for another good or service
- money is used in exchange for goods and services needed by individuals, businesses, and governments
- a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
- means that money can be saved and used at a later date
- the mechanism a nation uses to provide and manage money for itself
- A type of financial investment issued by a corporation, government, or other organization
- a transfer of money from one bank account to another
- allows customers to pay for purchases directly from their checking account
- A security that pays interest over terms ranging from 2-10 years
- the process of transferring money from one individual or organization to another.
- the concept that money received today can be invested or deposited in the bank to earn interest
- A type of a document guaranteeing the payment of a specific amount of money (demand or set time)
- A security that pays interest over terms of 10-30 years
19 Clues: Another word for money • banks that are part of the FDR • A security that matures in a year or less • a transfer of money from one bank account to another • means that money can be saved and used at a later date • A security that pays interest over terms of 10-30 years • To exchange one good or service for another good or service • ...
CAT theory 2025-08-20
Across
- Input The process of using a person's physical characteristics for authentication.
- A type of malware that appears to be a legitimate program but hides malicious code.
- A type of network that connects devices within a person's immediate workspace.
- The process of making a system usable for people with disabilities.
- A utility program that rearranges fragmented files on a storage device.
- The act of sending data from a local computer to a server.
- A technology that allows devices to communicate when they are a few centimeters apart.
- of Things (IOT) The concept of a network of physical objects embedded with sensors and software.
Down
- The act of receiving data from a server to a local computer.
- Computer A type of computer that is a single-user system designed for personal or home use.
- Drive (SSD) A type of storage device that uses flash memory and has no moving parts.
- Source Software A form of software licensing that allows the software to be freely used, modified, and shared.
- A type of cyber-attack that hijacks your browser to redirect you to a fake website.
- A network that covers a small geographical area, like a home or office.
- Logging A program that tracks and records every keystroke made on a computer.
- A system that uses sound waves to communicate over the internet.
- Attack A type of cyber-attack where multiple compromised systems flood a target's network, causing it to crash.
- Theft A computer crime that involves acquiring a person's personal information for fraudulent use.
18 Clues: The act of sending data from a local computer to a server. • The act of receiving data from a server to a local computer. • A system that uses sound waves to communicate over the internet. • The process of making a system usable for people with disabilities. • A network that covers a small geographical area, like a home or office. • ...
Cyber Bullying 2023-03-16
8 Clues: of unknown name • unfitting, ill-suited • very bad or unpleasant • disrespectful, insulting • self-confidence, self-respect • discuss private matters or problems • someone who hurts or frightens someone else • involving, using, or relating to computers, especially the internet
stage 2 2018-03-27
8 Clues: Civil status • what we do in college • Person who teaches us • word by which we identify • occupation where you earn money • Number where we can communicate • fundamental people in your life • cyber contact where we send messages
Cyber Safety 2023-05-22
9 Clues: (Online Arguments) • (excluding someone) • (giving information) • (Embarrassing someone) • (Repeating rude messages) • (Stalking someone online) • (bullying someone online) • (Offensive comments roomer and gossip) • (pretending to be someone and getting them trouble)
CYBER SAFETY 2023-05-22
Across
- (sending mean and nasty message)
- (stalking someone online)
- (bullying someone)
- (pretending to be someone and getting them in trouble)
- (online fights or argument)
Down
- (giving information)
- (sending or posting gossip or rumours about a person to damage his or her reputation or friendship)
- (excluding someone)
- (embarrassing someone)
9 Clues: (bullying someone) • (excluding someone) • (giving information) • (embarrassing someone) • (stalking someone online) • (online fights or argument) • (sending mean and nasty message) • (pretending to be someone and getting them in trouble) • (sending or posting gossip or rumours about a person to damage his or her reputation or friendship)
Cyber saftey 2021-09-16
Across
- The logo is a blue bird
- Evan Spiegel and Bobby Murphy are the owners of this company
- photo and video sharing social networking service created by Kevin Systrom and Mike Krieger.
- Mark Zuckerberg is the owner of this company
Down
- A state in which one is not observed or disturbed by other people.
- A malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
- To help protect from unauthorized access
- Gaining unauthorized access to data in a system or computer.
- Addison Rae is famous on this app
9 Clues: The logo is a blue bird • Addison Rae is famous on this app • To help protect from unauthorized access • Mark Zuckerberg is the owner of this company • Gaining unauthorized access to data in a system or computer. • Evan Spiegel and Bobby Murphy are the owners of this company • A state in which one is not observed or disturbed by other people. • ...
Cyber Ethics 2025-06-19
Across
- personal information and not engaging in activities that violate others' privacy, such as snooping or unauthorized access to data.
- harm:
- plagiarism, respecting copyright laws, and not using or distributing software or content without proper authorization.
- intellectual property:
- privacy:
- mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication.
Down
- security:
- responsible digital citizenship:
- and access:
- the integrity of computer systems and networks, protecting them from unauthorized access, malware, and other threats.
- that technology is used equitably and that everyone has access to the benefits of technology.
- using technology to cause physical or emotional harm to others, including spreading misinformation, harassment, or hate speech.
12 Clues: harm: • privacy: • security: • and access: • intellectual property: • responsible digital citizenship: • that technology is used equitably and that everyone has access to the benefits of technology. • mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication. • ...
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Crossword Puzzle On Records Security 2012-10-31
Across
- Measures, policies and procedures used to protect a covered entity electronic systems.
- Second step in records security programme.
- Electronic..........
- To protect records from unauthorized users.
Down
- A type of responsibility.
- To protect records from physical hazards.
- To protect records from computer.........
- First step in records security.
- Access......
9 Clues: Access...... • Electronic.......... • A type of responsibility. • First step in records security. • To protect records from physical hazards. • To protect records from computer......... • Second step in records security programme. • To protect records from unauthorized users. • Measures, policies and procedures used to protect a covered entity electronic systems.
Juniper Networks for Healthcare 2021-11-12
Across
- Juniper Mist upholds "___"-first networking.
- Our EX "___" devices forward data to the destination device.
- A place to care for the NHS' patients.
- Where is the sphygmomanometer? "___" services allow you to track users easily.
- The Wi-Fi here is rubbish, I can't "___".
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The patients, staff, and IoT devices that you're responsible for on the network.
Down
- This strategy is vital to protecting patient and hospital data records.
- Juniper Mist's cloud microservices ensures network updates without this.
- What's the "___" password? I can't connect.
- The NHS provides this exceptionally.
- The people that the NHS looks after.
- Technology that uses machine learning to proactively process data and tasks.
- This connects directly to a wired LAN.
- This device forwards packets between networks.
15 Clues: The NHS provides this exceptionally. • The people that the NHS looks after. • A place to care for the NHS' patients. • This connects directly to a wired LAN. • The Wi-Fi here is rubbish, I can't "___". • What's the "___" password? I can't connect. • Juniper Mist upholds "___"-first networking. • This device forwards packets between networks. • ...
Airport by: Madelyn Horner 2022-10-13
19 Clues: buy • call • train • board • ticket • arrive • screen • flight • luggage • station • confirm • airport • reclaim • customs • security • suitcase • passport • passenger • to travel
Godrej Security Solutions' Highlights of 2020 2020-12-23
Across
- Exclusive interview with this CAT A publication on Health Security technology
- Best research feature (Love thy neighbor)in this leading online lifestyle publication
- Best Home Automation story of the year with India’s leading financial publication was done by this journalist
- Renowned TV journo who reviewed the UV Case
- Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
- The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
- Participation in maximum number of Industry stories with this publication
- Godrej Security Solutions ventured into the health security segment with this product
- Authored article on Reflecting on your child’s safety post-COVID-19 crisis
- The best front-page coverage (UV-based disinfectants in demand) was received in this publication
- Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
- Maximum regional coverage garnered in this city
12 Clues: Renowned TV journo who reviewed the UV Case • Maximum regional coverage garnered in this city • Participation in maximum number of Industry stories with this publication • Authored article on Reflecting on your child’s safety post-COVID-19 crisis • Exclusive interview with this CAT A publication on Health Security technology • ...
It's a Disaster 2025-06-13
Across
- The collapse of land downhill
- Widespread disease outbreak
- Oil leak in oceans or rivers
- Pollution from nuclear plants or bombs
- Overflow of water onto dry land
- War between countries
- Ice falling from the sky in a storm
- Sudden shaking of the ground
- A big wave caused by an underwater quake
- A long dry period without rain
Down
- Cold weather event with heavy snow and wind
- A powerful rotating storm
- A moving river of hot lava
- Fire caused by people or accidents
- Cyber event causing digital damage
- Large fire spreading fast in nature
- Climate issue caused by humans
17 Clues: War between countries • A powerful rotating storm • A moving river of hot lava • Widespread disease outbreak • Oil leak in oceans or rivers • Sudden shaking of the ground • The collapse of land downhill • Climate issue caused by humans • A long dry period without rain • Overflow of water onto dry land • Fire caused by people or accidents • Cyber event causing digital damage • ...
5th pd - School People 2023-02-16
11 Clues: best AP ever • reading teacher • cooking teacher • teacher from Mexico • teacher from Ireland • new office assistant • tallest security staff • the voice of the school • 11th grade English teacher • most serious security staff • name of a student's favorite cat
Drew Hunts A Clue! 2024-03-07
Across
- To describe a person
- Science, Technology, Engineering and Math
- Person harmed as a result of a crime
- Piece of evidence and information
- A Data displayed on a screen of a phone
- A person who has committed a crime
- Seek to harm
Down
- The process of observing
- Final Result
- A small digital image to describe an emotion
- Facts collected for reference or analysis
- Troll An online bully who offends others
12 Clues: Final Result • Seek to harm • To describe a person • The process of observing • Piece of evidence and information • A person who has committed a crime • Person harmed as a result of a crime • A Data displayed on a screen of a phone • Science, Technology, Engineering and Math • Facts collected for reference or analysis • Troll An online bully who offends others • ...
Information Security crossword 2021-07-05
Across
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
- ______ of any organizational security policy can result in disciplinary actions
- ISMS is a set of policies and procedures for managing an organization’s _______ data
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- A formal process for training and educating employees about IT protection
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
- An asset that is essential to an organization and must be suitably protected
- A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
- prevents the unauthorized use or disclosure of information
- Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Guarantee of reliable access to the information by authorized people
- Protecting the accuracy and completeness of information and processing methods
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Effect of uncertainty on objectives
16 Clues: Effect of uncertainty on objectives • prevents the unauthorized use or disclosure of information • Guarantee of reliable access to the information by authorized people • A formal process for training and educating employees about IT protection • An asset that is essential to an organization and must be suitably protected • ...
Information Security crossword 2021-07-05
Across
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
- ______ of any organizational security policy can result in disciplinary actions
- ISMS is a set of policies and procedures for managing an organization’s _______ data
- Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
- A formal process for training and educating employees about IT protection
- Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
- An asset that is essential to an organization and must be suitably protected
- A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
- Prevents the unauthorized use or disclosure of information
- Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
- A sampling exercise limited to a selection of projects/business functions and a selection of security controls
- Guarantee of reliable access to the information by authorized people
- Protecting the accuracy and completeness of information and processing methods
- Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
- Effect of uncertainty on objectives
16 Clues: Effect of uncertainty on objectives • Prevents the unauthorized use or disclosure of information • Guarantee of reliable access to the information by authorized people • A formal process for training and educating employees about IT protection • An asset that is essential to an organization and must be suitably protected • ...
KPL 17 2016-03-29
18 Clues: läpi • luola • hauta • lahja • tuskin • saapua • kolkko • ruokala • tuulinen • maisemat • kohokohta • matkustaa • laskeutua • innostunut • lentokenttä • kotikaupunki • lopenuupunut • turvatarkastus
mass media 2024-11-05
18 Clues: сеть • канал • флешка • сериал • ноутбук • новости • портить • унижать • персонал • угрожать • сведения • общество • гражданин • сообщение • обсуждение • безопасность • рекламировать • транслировать
Trend Micro Mobile Security 4 2024-05-07
Across
- Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
- Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)
- Trend Micro Mobile Security regularly releases ____ for its mobile security products to address new threats and vulnerabilities. (Starts with u)
- Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
Down
- Trend Micro Mobile Security provides ____ security protection. (Starts with c)
- Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)
- Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.
7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e) • Trend Micro Mobile Security provides ____ security protection. (Starts with c) • Trend Micro regular updates help to enhance ____ capabilities. (Starts with p) • Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i) • ...
Cyberbullying 2021-10-29
Across
- If you are bullied, tell and ......
- Cyberbullying is against the law.
- in position of power towards one or more.
- Denial of access to particular parts of
- An example of cyberbullying.
Down
- Repeated or deliberate harassment by one
- Bullying online, is called .....
- A wireless handheld device for telephone
- Many websites have reported functions for
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An example of cyberbullying. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell and ...... • Denial of access to particular parts of • Repeated or deliberate harassment by one • A wireless handheld device for telephone • Many websites have reported functions for • ...
Test Crossword 2023-01-25
Across
- adujeevitham set
- Value in Latin
- one of the indigenous groups of Washington, waterfall
- To Shun
Down
- all things computer and information technology
- Greek temple,Smitha mol’s old apartment
- “Soul of Seattle”
- Leavenworth, German State
- a homonym that could either mean “be angry” or refers to a famous religious symbol
9 Clues: To Shun • Value in Latin • adujeevitham set • “Soul of Seattle” • Leavenworth, German State • Greek temple,Smitha mol’s old apartment • all things computer and information technology • one of the indigenous groups of Washington, waterfall • a homonym that could either mean “be angry” or refers to a famous religious symbol
Cyber Test 2023-09-13
Across
- A type of malware
- The most well-known malware attack in the past few years
Down
- The world's number one password
- The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center
- This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.
5 Clues: A type of malware • The world's number one password • The most well-known malware attack in the past few years • The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center • This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.
Information Security 2016-05-17
Across
- hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
- Use this tool to dispose of hard copy documents that contain (stricly) confidential information.
- Do not __________ your password or account with anyone.
- ID credentials
- contact point in case of Information Security (near) incident.
- an individual whose primary aim in life is to penetrate the security defences of large, sophisticated, computer systems
Down
- conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
- form of fraud in which the attacker attempts to gather personal, financial or business confidential information.
- malicious software that kidnaps your data
- classic form of malware
10 Clues: ID credentials • classic form of malware • malicious software that kidnaps your data • Do not __________ your password or account with anyone. • contact point in case of Information Security (near) incident. • Use this tool to dispose of hard copy documents that contain (stricly) confidential information. • ...
IT-Security 2016-01-29
Across
- Wie wird das Chatten in Echtzeit genannt?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Welche Programme, protokollieren die Tastatureingabe mit?
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
Down
- Wie werden unerwünschte Werbemails genannt?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
internet security 2021-03-01
Across
- software designed to collect information from computers for commercial or criminal purposes
- black-hat hackers
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a program designed to prevent spyware from gaining access to the internal network.
- horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
- a deceptive scheme or trick used to cheat someone out of something, especially money
- the illegal copying and distribution of copyrighted software, information, music and video files
- self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
- programs that spread by attaching themselves to executable files or documents
- certificate an electronic way of proving your identity, when you are doing business on the Internet
10 Clues: black-hat hackers • programs that spread by attaching themselves to executable files or documents • a program designed to prevent spyware from gaining access to the internal network. • a deceptive scheme or trick used to cheat someone out of something, especially money • ...
Platform security 2021-10-23
Across
- Separate low-level system software running on the host machine to perform visualization.
- Synchronous condition that results from a particularly undesirable situation.
- Linux uses this technique to define the priority of processes
- A real-time operating system used in mission-critical applications
- An asynchronous event that can occur at any time irrespective of what the processor is doing
- Processes running in the background, started by the kernel itself.
Down
- A connection used to exchange data between the processes.
- One method to block buffer overflow attacks
- Helps to prevent unauthorized access to data on lost or stolen computers by combining
- the process responsible for secure logon.
10 Clues: the process responsible for secure logon. • One method to block buffer overflow attacks • A connection used to exchange data between the processes. • Linux uses this technique to define the priority of processes • A real-time operating system used in mission-critical applications • Processes running in the background, started by the kernel itself. • ...
Computer security 2022-07-22
Across
- occurs at the receivers side
- never save your password on a
- prevents unauthorised access to a network
- software created to infect a computer
Down
- the data we want to hide
- harming or harassing others online
- unwanted email
- converting information into secret code
- computer expert who does the act of hacking
- never share it with anyone
10 Clues: unwanted email • the data we want to hide • never share it with anyone • occurs at the receivers side • never save your password on a • harming or harassing others online • software created to infect a computer • converting information into secret code • prevents unauthorised access to a network • computer expert who does the act of hacking
Data Security 2022-06-07
Across
- the practice of sending emails pretending to be from reputable companies in order to cause individuals to reveal personal information, such as passwords and credit card numbers
- the gaining of unauthorized access to data in a system or computer
- This protects computers on a network from intentional hostile intrusion which could result in data corruption or denial of service
- downloading software and other copyrighted material illegally
- stealing data and information and presenting it as your own
- this term refers to all malicious programs, but in essence, it’s a code that attaches itself to a legitimate, piece of software and then reproduces itself when that file is run
Down
- the practice of using another person's name and personal information in order to obtain credit, loans, etc.
- this is the process of converting plain text using a cipher (an algorithm) to make it unreadable to anyone who does not have a key
- bullying people online
- this refers to characters used for validating a user on a computer system. A username along with a password is usually used
10 Clues: bullying people online • stealing data and information and presenting it as your own • downloading software and other copyrighted material illegally • the gaining of unauthorized access to data in a system or computer • the practice of using another person's name and personal information in order to obtain credit, loans, etc. • ...
software security 2022-11-01
Across
- πρόσφατη ορισμοί ιών
- οι συγγραφείς των ιών
- λογισμικό προστασίας από ιούς
- το λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή
- κακόβουλο πρόγραμμα
Down
- κακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικό
- κατασκοπείας κακόβουλο πρόγραμμα που προσκολλάται κρυφά σε αρχεία που κατεβάζουμε απ' το διαδίκτυο.
- τα ψηφιακά αποτυπώματα των ιών
- βλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού του
- τείχος προστασίας
10 Clues: τείχος προστασίας • κακόβουλο πρόγραμμα • πρόσφατη ορισμοί ιών • οι συγγραφείς των ιών • λογισμικό προστασίας από ιούς • τα ψηφιακά αποτυπώματα των ιών • κακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικό • βλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού του • το λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή • ...
security plan 2021-04-14
Across
- State law determines how organizations qualify as political parties to get candidates on the ballot, party membership ____, the right to vote in a party’s primary, the requirements for party officials, the party nomination process, and the regulation of party finances (although such regulations have had little success).
- Party activists are not ____per se and tend to be people who are decidedly liberal or conservative in their issue positions.
- Party activists who serve on the city, county, or state party organizations, or who regularly work in campaigns constitute a(n) _____ pool for candidates for public office.
- State committees are headed by party _____who hail from varied backgrounds.
Down
- _____ committees have become service providers to candidates’ campaigns.
- Most local parties are an entirely _____-based operation with limited permanent resources.
- City and county party officers and committees are chosen ______and cannot be removed by any higher party authority.
- The role of local party organizations is mostly ____to that of the candidates’ own organizations.
- Professional campaigns develop a campaign theme to ___the essence of the campaign and help the candidate “stay on message.”
- Political party organizations in the U.S. are decentralized with power flowing from the bottom up, consisting of city and county _____, state committees, and national committees.
10 Clues: _____ committees have become service providers to candidates’ campaigns. • State committees are headed by party _____who hail from varied backgrounds. • Most local parties are an entirely _____-based operation with limited permanent resources. • The role of local party organizations is mostly ____to that of the candidates’ own organizations. • ...
Security Quiz 2022-10-24
Across
- to dump out information about things
- a well known term for encryption
- malicious piece of code
- Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
- An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
- The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
- Internet file sharing utility
- A worm program that flooded the apranet
- Sending strange packets to a system in order to gauge how it responds to determine the operating system
- Software to detect unprotected shares
10 Clues: malicious piece of code • Internet file sharing utility • a well known term for encryption • to dump out information about things • Software to detect unprotected shares • A worm program that flooded the apranet • Sending strange packets to a system in order to gauge how it responds to determine the operating system • ...
Security Awareness 2023-09-01
Across
- The process of verifying the identity of a user or a piece of information
- A method for guessing a password that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- Which month is observed as Insider Threat month?
- The use of AI to replace the likeness of one person with another in video or audio
- Abbreviation of an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
Down
- A weakness in the system is called --------------------
- Malware that uses tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites
- Targeted phishing attack aimed at senior executives masquerading as a legitimate email
- The use of electronic means, primarily messaging and social media platforms, to bully and harass a victim
- A kind of spyware software that records every keystroke made on a computer’s keyboard
10 Clues: Which month is observed as Insider Threat month? • A weakness in the system is called -------------------- • The process of verifying the identity of a user or a piece of information • The use of AI to replace the likeness of one person with another in video or audio • A kind of spyware software that records every keystroke made on a computer’s keyboard • ...
Ιnternet Security 2024-02-12
10 Clues: ψευδείς ειδήσεις • Κωδικού πρόσβασης • Ηλεκτρονικές Απάτες • Κακόβουλο λογισμικό • Εθισμός στο διαδίκτυο • Άγνωστοι στο διαδίκτυο • Στοχευμένες Διαφημίσεις • Παιχνίδια στο διαδίκτyo • Διαδικτυακός εκφοβισμός • Εικόνα Σώματος& κοινωνικά δίκτυα
Privacy & Security 2023-12-20
Across
- coding protecting information from hackers
- the right to be let alone
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
Down
- (2 words) information about an individual
- common examples are viruses and trojans
- the process of identifying a user's identity
- international organization for standardization
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
10 Clues: compromise of security • the right to be let alone • common examples are viruses and trojans • (2 words) information about an individual • coding protecting information from hackers • the process of identifying a user's identity • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
Internet Security 2020-07-10
Across
- a business deal or action such as buying or selling something
- to protect information by putting it into a special code that only some people can read
- a system that protects a computer
- when two or more machines or telephones are joined together or joined to a larger system,using anelectrical connection
- something that protects a website from attacks
Down
- proof that something is true or real
- an attempt to cause damage or injury
- someone who uses computers to secretly use or change the information in another person's computer system
- connected to the internet, or available through the internet
- and prevents other people from using it or damaging it
10 Clues: a system that protects a computer • proof that something is true or real • an attempt to cause damage or injury • something that protects a website from attacks • and prevents other people from using it or damaging it • connected to the internet, or available through the internet • a business deal or action such as buying or selling something • ...
Food Security 2024-05-21
Across
- - meeting the needs of the present generation without compromising the ability of future generations to meet their own needs.
- - something that is needed to survive
- - Access to food that is nutritious safe, and produced in environmentally sustainable ways.
- - a type of protection
- - Physical and economic access to food for all at all times.
- - the process of providing or obtaining the food necessary for health and growth.
Down
- - the rate of increase in prices over a given period of time.
- - enough to meet the needs of a situation or a proposed end.
- - Access to culturally acceptable food
- - Sufficient (enough) food for all people at all times.
10 Clues: - a type of protection • - something that is needed to survive • - Access to culturally acceptable food • - Sufficient (enough) food for all people at all times. • - enough to meet the needs of a situation or a proposed end. • - Physical and economic access to food for all at all times. • - the rate of increase in prices over a given period of time. • ...
IT Security 2023-06-01
Across
- Haubtstandort des BSI(DE)
- Zeichenfolge für Zugang
- Gerät, um sich daheim mit dem Internet zu verbiden
- 2021 feierte das BSI sein 30-jähriges...
- Unautorisierter Zugriff auf IT-Systeme
- An einem elektronischen Ort aufbewahren(Verb)
- Veraltetes Speichermedium
Down
- Körperliches Merkmal zur Authentisierung
- Programm zum Darstellen von Webseiten
- Zusammenschaltung mehrerer Systeme
10 Clues: Zeichenfolge für Zugang • Haubtstandort des BSI(DE) • Veraltetes Speichermedium • Zusammenschaltung mehrerer Systeme • Programm zum Darstellen von Webseiten • Unautorisierter Zugriff auf IT-Systeme • Körperliches Merkmal zur Authentisierung • 2021 feierte das BSI sein 30-jähriges... • An einem elektronischen Ort aufbewahren(Verb) • ...
computer security 2023-08-08
10 Clues: encoding • infector • protection • greek myth • take advantage of • user confirmation • attracting suckers • unauthorized access • self-controlled invader • program designed to disrupt
Food security 2024-12-18
Across
- cannot grow without water
- affect the availability of food
- the condition in which people lack stable access to sufficient food
- having enough money to be sufficient nutritious food
Down
- can lead to widespread famine
- The process of protecting food from spoilageand contamination in cold environment
- food being within reach of every person
- deficiency of enough resources
- the ability to consistently access enough nutritious food
- harmful microorganisms
10 Clues: harmful microorganisms • cannot grow without water • can lead to widespread famine • deficiency of enough resources • affect the availability of food • food being within reach of every person • having enough money to be sufficient nutritious food • the ability to consistently access enough nutritious food • ...
Food Security 2024-12-18
Across
- Which vegetable is long, green, and rhymes with "teen"?
- What long, green vegetable is also called a cucumber?
- What vegetable is used to make french fries?
- What are the key nutrients essential for child growth?
- Which vegetable is purple and shaped like an egg?
Down
- Which vegetable is Popeye's favorite?
- Which round, red vegetable is often used in salads?
- What orange vegetable do rabbits like to eat?
- What is essential for calcium absorption, promoting strong bones and teeth
- What color is a carrot?
10 Clues: What color is a carrot? • Which vegetable is Popeye's favorite? • What vegetable is used to make french fries? • What orange vegetable do rabbits like to eat? • Which vegetable is purple and shaped like an egg? • Which round, red vegetable is often used in salads? • What long, green vegetable is also called a cucumber? • ...
Food Security 2024-12-18
10 Clues: Cereal grain • kind of fruits • It keeps doctor away • Every kid morning drink • Vegetable with bitter taste • Vegetable with golden seeds • Snack eat while watching movie • This vegetable can make you cry • Indian kid have to increase memory • looks like ginger when grown in plant
Food Security 2024-12-18
10 Clues: A common crop • A drink from cows • Where plants grow • What we eat to live • Planted to grow crops • Food eaten at one time • Natural water for plants • Essential for growing plants • A place where crops are grown • A staple food in many countries
Food security 2024-12-17
10 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Small animal raised • Animal raised for wool • Poultry raised for eggs • – This animal gives milk and is important in the desert • Pollinator that plays a critical role in food production
Food Security 2024-12-18
10 Clues: plants grow in this • plants grown for food • collecting ripe crops • not old or spoiled food • long period without rain • place where food is grown • you plant this to grow food • feeling when you need to eat • small area to grow vegetables • recycled plant material for soil
Food Security 2024-12-18
Across
- Helps to Increase Hemoglobin % in blood
- contains natural sugars, like glucose, fructose, and sucrose, which can quickly replenish energy levels.
- Rich in antioxidants and Boosts heart health
- Helps to gain Vitamin C
- contain antioxidants that may help prevent certain types of cancer
Down
- contain vitamin A, which helps prevent xerophthalmia, an eye disease that can lead to vision loss
- Contain fiber, manganese, vitamin C, vitamin K, and anthocyanins, a type of phytonutrient
- A good source of monounsaturated fat, vitamin E, and folate, which are all good for the heart
- High in potassium and vitamin K, which are good for the heart
- Contain prebiotic fiber, which is good for gut health, and potassium
10 Clues: Helps to gain Vitamin C • Helps to Increase Hemoglobin % in blood • Rich in antioxidants and Boosts heart health • High in potassium and vitamin K, which are good for the heart • contain antioxidants that may help prevent certain types of cancer • Contain prebiotic fiber, which is good for gut health, and potassium • ...
Information Security 2025-03-24
Across
- techniques are cons (Schwindel) conducted through technology. The goal is to trick someone into giving up money, information, or valuables through manipulation and false promises.
- Scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as key. Even if copied or stolen.
- bad guys, also known as “crackers”
- One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files
- networks of infiltrated and compromised machines controlled by a central command
- seeks to compromise a computing system without permission. There are many forms of Malware for instance Viruses, Worms, Trojans
Down
- good guys, probe for weaknesses, but don’t exploit them. They share their knowledge so that holes can be found & plugged hence security improves. They are part of the company auditing & security process
- examines traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication
- hackers use psychology (exploit trust or curiosity) rather than code to trick employees into revealing information or performing other tasks that compromise a firm.
- effectively shutting down Websites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines.
10 Clues: bad guys, also known as “crackers” • networks of infiltrated and compromised machines controlled by a central command • One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files • ...
Food Security 2024-10-17
Across
- The farming of fish and other aquatic animals for food production.
- Milk and foods made from milk, like cheese and yogurt.
- A severe shortage of food that can lead to starvation and death.
- Maintaining cleanliness to prevent the spread of illness and disease.
- The process of providing water to crops to help them grow.
- The substances in food that our bodies need to grow and stay healthy.
- A type of grain that is used to make bread, pasta, and other foods.
Down
- Helps plants grow by providing them with important nutrients.
- To kill bacteria by chemical process, we need to
- To prevent contamination,food should be kept what?
10 Clues: To kill bacteria by chemical process, we need to • To prevent contamination,food should be kept what? • Milk and foods made from milk, like cheese and yogurt. • The process of providing water to crops to help them grow. • Helps plants grow by providing them with important nutrients. • A severe shortage of food that can lead to starvation and death. • ...
Food Security 2024-10-17
Across
- a severe shortage of food (as through crop failure) resulting in violent hunger and starvation and death
- a substance that can be used or prepared for use as food
- a storehouse for threshed grain or animal feed
- of or providing nourishment
- any substance that can be metabolized by an animal to give energy and build tissue
Down
- a stock or supply of foods
- the act of depriving of food or subjecting to famine
- fuel derived immediately from living matter
- the act of searching for food and provisions
- any substance that can be used as food
10 Clues: a stock or supply of foods • of or providing nourishment • any substance that can be used as food • fuel derived immediately from living matter • the act of searching for food and provisions • a storehouse for threshed grain or animal feed • the act of depriving of food or subjecting to famine • a substance that can be used or prepared for use as food • ...
Food Security 2024-10-17
10 Clues: Is a staple grain • Affects crop production? • Is used to store grains? • Can reduce soil fertility? • Is a main source of protein? • Are needed for healthy diet? • Is necessary for irrigation? • Is essential for plant growth? • Is the practice of growing food? • Type of farming uses fewer chemicals?
Food Security 2024-10-17
Across
- Traditional Korean dish made of fermented vegetables, primarily napa cabbage
- An ________ a day keeps the doctor away
- Type of cookie that originated in France, often almond-based with a chewy texture
- A rich, slow-cooked French stew often made with beef
- Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
- Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
- A Japanese noodle soup made with a meat or fish-based broth
- Aromatic spice often used in Indian cooking
- A method of cooking meat slowly in its own fat
- A salad made with tomatoes, cucumbers, onions, and feta cheese
10 Clues: An ________ a day keeps the doctor away • Aromatic spice often used in Indian cooking • A method of cooking meat slowly in its own fat • A rich, slow-cooked French stew often made with beef • A Japanese noodle soup made with a meat or fish-based broth • A salad made with tomatoes, cucumbers, onions, and feta cheese • ...
Food Security 2024-10-17
Across
- Which city is an example of a food surplus state in India
- The mother dairy is an important cooperative in
- Buffer stock is the stock of foodgrains procured by the government through
- The success of wheat was replicated in
- Which State has the highest production of rice in India
- Which state is associated with AMUL
Down
- What has been a major issue in distribution system.
- the sector which has about 60% plus population-dependence
- These are factors which can affect Food Security
- The land on which the crops are grown is known as
10 Clues: Which state is associated with AMUL • The success of wheat was replicated in • The mother dairy is an important cooperative in • These are factors which can affect Food Security • The land on which the crops are grown is known as • What has been a major issue in distribution system. • Which State has the highest production of rice in India • ...
FOOD Security 2024-10-17
Across
- something that is suitable or safe to eat a mixture of organic matter, minerals, gases, liquids, and organisms that together support the life of plants and soil organisms.
- a substance that is added to food in order to improve its taste or appearance
- the process or period of gathering in crops
- when an organism gets too few or too many nutrients, resulting in health problems
- the distress associated with lack of food
Down
- Bank a place where stocks of food, typically basic provisions and non-perishable items
- substances that are used to control pests
- A type of farming that uses no pesticides or Chemicals
- the activity or business of growing crops
- a cultivated plant that is grown on a large scale commercially, especially a cereal, fruit, or vegetable
10 Clues: substances that are used to control pests • the activity or business of growing crops • the distress associated with lack of food • the process or period of gathering in crops • A type of farming that uses no pesticides or Chemicals • a substance that is added to food in order to improve its taste or appearance • ...
Food Security 2025-09-01
Across
- – the buying, selling or exchanging of goods and services between people, businesses, or countries.
- – goods or services sold to another country.
- – when fertile land becomes dry and turns into desert, often due to drought, deforestation or poor farming practices.
- insecurity – when people do not have reliable access to enough safe and nutritious food.
Down
- – the practice of farming, including growing crops and raising animals for food and other products.
- change – long-term shifts in weather patterns and temperatures caused mostly by human activities like burning fossil fuels.
- – a set of rules, plans or actions made by governments or organisations to guide decisions.
- – the amount of crops or food produced from a piece of land (e.g., how many tonnes of wheat a farm grows).
- – the top layer of the earth where plants grow, made up of minerals, organic matter, air and water.
- – goods or services brought into a country from overseas.
10 Clues: – goods or services sold to another country. • – goods or services brought into a country from overseas. • insecurity – when people do not have reliable access to enough safe and nutritious food. • – a set of rules, plans or actions made by governments or organisations to guide decisions. • ...
Information Security 2025-09-28
Across
- Detailed minimum specifications for compliance
- Unauthorized entry into the real or virtual property of another party
- Common theft of credit card numbers (Information extortion)
- This threat actually evolves to elude detection
- Being secure and free from danger
Down
- The legal obligation to compensate an injured party for wrongs doings.
- Raw facts collected by an organization
- Step-by-step instructions for compliance
- regulate and define socially acceptable behavior.
- An adverse event begins to manifest as a threat to data, it becomes an
10 Clues: Being secure and free from danger • Raw facts collected by an organization • Step-by-step instructions for compliance • Detailed minimum specifications for compliance • This threat actually evolves to elude detection • regulate and define socially acceptable behavior. • Common theft of credit card numbers (Information extortion) • ...
Secure the Grid: Security Control Families Crossword 2024-12-04
Across
- Evaluation of systems to ensure compliance with security policies.
- Tracking activities to detect unauthorized access or misuse.
- The process of verifying a user's identity before access.
- Regular updates and repairs to keep systems secure.
- Procedures for restoring data and systems after an incident.
- Plans for continuity during an unexpected disruption.
Down
- Organized methods for securing and managing resources.
- Potential for a threat to exploit a vulnerability.
- Baseline settings to protect systems and reduce vulnerabilities.
- An event that compromises the security of information.
- Training to help users recognize and prevent security threats.
- Control mechanisms for who can enter or use resources.
12 Clues: Potential for a threat to exploit a vulnerability. • Regular updates and repairs to keep systems secure. • Plans for continuity during an unexpected disruption. • Organized methods for securing and managing resources. • An event that compromises the security of information. • Control mechanisms for who can enter or use resources. • ...
Secure the Grid: Security Control Families Crossword 2024-12-05
Across
- Tracking activities to detect unauthorized access or misuse.
- The process of verifying a user's identity before access.
- Potential for a threat to exploit a vulnerability.
- Baseline settings to protect systems and reduce vulnerabilities.
- Organized methods for securing and managing resources.
Down
- Evaluation of systems to ensure compliance with security policies.
- Training to help users recognize and prevent security threats.
- Plans for continuity during an unexpected disruption.
- Regular updates and repairs to keep systems secure.
- An event that compromises the security of information.
- Control mechanisms for who can enter or use resources.
- Procedures for restoring data and systems after an incident.
12 Clues: Potential for a threat to exploit a vulnerability. • Regular updates and repairs to keep systems secure. • Plans for continuity during an unexpected disruption. • An event that compromises the security of information. • Control mechanisms for who can enter or use resources. • Organized methods for securing and managing resources. • ...
Human rights 2022-11-07
23 Clues: køn • liv • tro • lov • tale • alder • lighed • frihed • tortur • lighed • slaveri • skyldig • religion • menneske • privatliv • bevægelse • udtagelse • sikkerhed • sikkerhed • realationer • rettigheder • nationalitet • forskellsbehandling
Ch. 9 (Plazas) viajar en avion 2019-01-22
20 Clues: seat • trip • plane • agency • aduana • ticket • flight • pasillo • arrival • equipaje • security • schedule • suitcase • to travel • departure • passenger • asistente • aerolínea • airplane window • sin _______ (stop)
Spanish Vocabulary 2023-04-26
20 Clues: gum • sun • boat • candy • cloud • train • skier • shade • plain • energy • avocado • airport • baggage • weather • snorkle • to fish • to board • security • suitcase • butterfly
