cyber security Crossword Puzzles
Spanish Vocabulary 2023-04-26
20 Clues: gum • sun • boat • candy • cloud • train • skier • shade • plain • energy • avocado • airport • baggage • weather • snorkle • to fish • to board • security • suitcase • butterfly
CHS 2017-02-08
20 Clues: one • two • ten • six • nine • four • five • seven • three • eight • twelve • eleven • twenty • sixteen • fifteen • fourteen • eighteen • thirteen • nineteen • seventeen
At the airport 2023-08-15
20 Clues: tull • pass • säten • pilot • bagage • avgång • bording • ankomst • personal • mittgång • resväska • flygplan • säkerhet • flygkabin • Flygplats • Nödutgång • bagagevagn • förarkabin • passagerare • säkerhetsbälte
Human Rights 2025-07-17
20 Clues: – qonun • – ta’lim • – himoya • – adolat • – hurmat • – qonuniy • – tenglik • – ozodlik • – buzilish • – huquqlar • – erkinlik • – kamsitish • – xavfsizlik • – zo‘ravonlik • – demokratiya • – qadr-qimmat • – qadriyatlar • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
Human Rights 2025-07-26
20 Clues: – qonun • – adolat • – himoya • – hurmat • – ta’lim • – ozodlik • – qonuniy • – tenglik • – erkinlik • – huquqlar • – buzilish • – kamsitish • – xavfsizlik • – demokratiya • – zo‘ravonlik • – qadr-qimmat • – qadriyatlar • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
CSC Crossword 2021-06-09
Across
- If you hear it, _____ it
- Anaheim Angels _____
- Color of pen a security guard uses
- Used to protect your skin from the sun
- Common hair color abbreviation
- Someone leaving with a subject who is being evicted
- Observe and _____
- Verbal or physical
- OC's branch manager
- Non-guard carded staff is _____ staff
- See something, _____ something
Down
- Wash your _____frequently
- What does CP stand for
- Text _____ to 474747 to place a contactless concessions order
- _____ items include weapons, alcohol and large bags
- Required to wear a security shirt
- Common eye color abbreviation
- 7th _____ stretch
- Guests are not allowed to re-_____ the stadium
- What day is payday?
- _____board
- A13's first name
22 Clues: _____board • A13's first name • 7th _____ stretch • Observe and _____ • Verbal or physical • What day is payday? • OC's branch manager • Anaheim Angels _____ • What does CP stand for • If you hear it, _____ it • Wash your _____frequently • Common eye color abbreviation • Common hair color abbreviation • See something, _____ something • Required to wear a security shirt • ...
Digital Fortress Crossword 2012-11-19
Across
- NSA failure
- NSA motto: Everything is _________
- National Security Agency
- Outranked Strathmore; Director of NSA
- The late Tankado's father
- _______ 3; working area for the cryptographers
- Star Wars reference
- English meaning of Rocío
- Code-breaker
- Suspected murder
- Without wax
- Anagram
- Quis custodiet ipsos ________
- Late Strathmore
- Assassin
- City where Hulohot died
- What David wanted
Down
- What NSA wanted
- Elevator password
- Protagonist
- Hulohot is _____ ; disability
- Pass-key
- What would happen is Digital Fortress was released
- Midge's security
- Rotating ________ ; computer theory
- Iceberg-like machine, hacks into personal things
- Strathmore's natural trait
- The new type of virus
- TRANSLTR's safety net
29 Clues: Anagram • Pass-key • Assassin • NSA failure • Protagonist • Without wax • Code-breaker • What NSA wanted • Late Strathmore • Midge's security • Suspected murder • Elevator password • What David wanted • Star Wars reference • The new type of virus • TRANSLTR's safety net • City where Hulohot died • National Security Agency • English meaning of Rocío • The late Tankado's father • Strathmore's natural trait • ...
Cybersecurity CIS178 2024-07-12
Across
- Portable chip storing cellular connection
- Network Defense against unauthorized access
- Deceptive scheme to trick victims
- Fraudulent attempts to steal your data
- File or document sent electronically
- Cybercriminal skilled in breaching security
- Online content displayed in a browser
- Bad software directed at computers
- Digital Crimes committed using technology
- Developer updates to fix vulnerabilities
- Essential access code for security
Down
- Identifies you using something you are
- Affects system displaying unwanted ads
- Virus that disguises as legitimate software
- Holds data hostage for money
- Records users keystrokes to steal information
- Physical object used for authentication
- Detects and removes viruses
- Unauthorized software that gathers information
- Way to secure data trough coded algorithms
20 Clues: Detects and removes viruses • Holds data hostage for money • Deceptive scheme to trick victims • Bad software directed at computers • Essential access code for security • File or document sent electronically • Online content displayed in a browser • Identifies you using something you are • Affects system displaying unwanted ads • Fraudulent attempts to steal your data • ...
Rubrik 2024-11-06
Across
- Sucks according to reddit
- He's him
- Dad
- SLED team name for October
- OCD
- Ancient
- Backups that cannot be deleted or changed
- Sparty
- Feature that scans for sensitive data
- Rubrik HQ
- Approach to security that trusts no system or person
- Worst city in the USA - see 4 down
Down
- Concussed
- Hates onions
- Worst team in the NFL
- Just married
- The ability to restore with a single button press
- Father of 9
- Your social security number is classified as this data type
- Badger
- Rubrik partner that has a shared responsibility model
- Company featured in Rubrik's most famous customer story
- Can be logical or physical
23 Clues: Dad • OCD • Badger • Sparty • Ancient • He's him • Concussed • Rubrik HQ • Father of 9 • Hates onions • Just married • Worst team in the NFL • Sucks according to reddit • SLED team name for October • Can be logical or physical • Worst city in the USA - see 4 down • Feature that scans for sensitive data • Backups that cannot be deleted or changed • The ability to restore with a single button press • ...
Impact of computing Vocabulary 2025-03-04
Across
- Rules for online behavior
- Unintended data use
- The result of encryption.
- Used to encrypt and decrypt data.
- Software that damages computers
- Data collected about you
- Unwanted email
- To convert encrypted data back to its original form.
- Code that scrambles data
- The goal of encryption.
- Automated decision making
Down
- Illegal access to computer systems
- Online identity theft
- between those who have and don't have tech access
- Protecting computer systems
- Study of ethical choices in computing
- A process used in encryption.
- The process of encoding data.
- A system or way of doing something, like encryption.
- What is protected by encryption.
- To convert data into a code.
21 Clues: Unwanted email • Unintended data use • Online identity theft • The goal of encryption. • Data collected about you • Code that scrambles data • Rules for online behavior • The result of encryption. • Automated decision making • Protecting computer systems • To convert data into a code. • A process used in encryption. • The process of encoding data. • Software that damages computers • ...
Series 63 - Chapter 3 2024-05-02
Across
- kept on file for 6 years, detailed record of trading activity
- quick build up of interest in a security, followed by disposition of security, and typically price decline
- maximum prison sentence for willful violation of the USA
- block trades immediately as the market opens
- making market decisions for a portfolio with NPI
- winner of crossword two
- administrator does NOT have authority to
Down
- first name of your 63 coach (Hint: it's not Hunter, and you can find this information independently)
- Administrator may do this when they are investigating potential violations
- trading ahead of large pending orders
- block trades immediately before market close
- winner of crossword one
- willful deceit of client
- excessive trades in the account for commission
- typically rectified by way of payment of fees & covering cost of litigation never prison time
- buy and sale of security repeatedly to create illusion of activity
- placing fake orders to move prices up or down
17 Clues: winner of crossword one • winner of crossword two • willful deceit of client • trading ahead of large pending orders • administrator does NOT have authority to • block trades immediately before market close • block trades immediately as the market opens • placing fake orders to move prices up or down • excessive trades in the account for commission • ...
BIDEN'S BORDER CRISIS 2022-07-07
Across
- number of times V.P. Harris has been to the border
- "________ Border Crisis"
- number of times Rep. Cammack has been to the border
- Homeland Security Secretary
- "______ 42"
- agents who deport illegal immigrants
- "Build The ______"
- nickname for those who smuggle immigrants across the border
- acronym for 'Remain In Mexico' Policy
Down
- "Every town is a _______ town."
- type of drug smuggled across border
- "__________ in Chief"
- the 'Border Czar'
- Department of _________ Security
- primary border control organization
15 Clues: "______ 42" • the 'Border Czar' • "Build The ______" • "__________ in Chief" • "________ Border Crisis" • Homeland Security Secretary • "Every town is a _______ town." • Department of _________ Security • type of drug smuggled across border • primary border control organization • agents who deport illegal immigrants • acronym for 'Remain In Mexico' Policy • ...
The United Nations 2013-06-17
Across
- What is needed for a motion to be passed.
- Number of permanent members on the Security Council
- General Secretary of the United Nations
- Largest financial contributor to the United Nations.
- Charitable agency that particularly helps women and children
- One of the founding countries of the United Nations
Down
- Eight goals that the United Nations established.
- A proposal to be debated in the General Assembly.
- Personnel that attempt to keep peace in an area of conflict
- What the United Nations is trying to promote
- The colour that peacekeepers wear
- Document outlining the rules and role of the United Nations
- The world-wide event that prompted the formation of the United Nations.
- Number of members on the Security Council
- How long a non-permanent member of the Security council can keep their seat.
15 Clues: The colour that peacekeepers wear • General Secretary of the United Nations • What is needed for a motion to be passed. • Number of members on the Security Council • What the United Nations is trying to promote • Eight goals that the United Nations established. • A proposal to be debated in the General Assembly. • Number of permanent members on the Security Council • ...
Bullying 2022-10-24
Across
- Gossiping about someone then spreading it
- self harm
- saying something mean about someone
- a person who does nothing about a bullying.
- for example touching peoples private areas
Down
- writing mean things online, etc
- bullying to hurt someones feelings
- a person who helps the victim stand up.
- not a real form of bullying friends often do.
- bullying through words
10 Clues: self harm • bullying through words • writing mean things online, etc • bullying to hurt someones feelings • saying something mean about someone • a person who helps the victim stand up. • Gossiping about someone then spreading it • for example touching peoples private areas • a person who does nothing about a bullying. • not a real form of bullying friends often do.
Digital Identity Crossword 2025-04-24
Across
- what you do to find something
- leaves your mark behind
- your online display ____
Down
- protects your stuff
- what are you on right now
- your teachers name
- your online identity
- something that uses the internet or a computer
- what are you using for to access this
- A word that means something happens on the internet or with computers.
10 Clues: your teachers name • protects your stuff • your online identity • leaves your mark behind • your online display ____ • what are you on right now • what you do to find something • what are you using for to access this • something that uses the internet or a computer • A word that means something happens on the internet or with computers.
TTS INFORMATIKA 2025-06-09
Across
- Tipe data untuk menyimpan teks
- ciri-ciri fakta
- bullying. Perundungan digital
- garis. Menampilkan Tren data dari suatu selang waktu
- Microsoft exel disebut juga dengan nama aplikasi
Down
- Ciri-ciri opini
- publik. Informasi yang dapat diakses oleh siapapun
- Tempat penyimpanan Data sementara yang dapat berubah-ubah selama program berjalan
- pernyataan yang dapat di buktikan kebenaranya
- Imformasi palsu
10 Clues: Ciri-ciri opini • ciri-ciri fakta • Imformasi palsu • Tipe data untuk menyimpan teks • bullying. Perundungan digital • pernyataan yang dapat di buktikan kebenaranya • Microsoft exel disebut juga dengan nama aplikasi • publik. Informasi yang dapat diakses oleh siapapun • garis. Menampilkan Tren data dari suatu selang waktu • ...
psychomotoricke zrucnosti 2021-02-24
Across
- Name of a modification that is not performed via the application business user interface
- Strategic Access Management tool
- Second goal of IT security
- Third goal of IT security
- Corporate .... Deviation (CDD)
- The second step in risk management process
- Chapter 8 of ASCA Procedure Manual
- What document helps you to check whether you are compliant with our security standard
- Opposite of DAST
- Corporate instruction covering IBM Worldwide records management
- Name of the tool that replaced WST
- Standard describing requirements on IT Business Continuity
- Standard that describes therisk severity guidelines
- To what data types LEG116 applies
- The first step in risk management process
Down
- What is CHS162 applied for
- What does ASCA stand for
- First element of risk
- Where the deviations are maintained
- Other word for separation in Separation of duties
- Where can you read through BPBC127? Where is it located?
- Third element of risk
- Standard that ASCA is driven by
- Where the DSR requests are handled
- California .... Privacy Act
- Name of the new privacy tool
- Who do you need confirmation from whether your application processes crown jewel data
- Corporate instruction for registration criteria
28 Clues: Opposite of DAST • First element of risk • Third element of risk • What does ASCA stand for • Third goal of IT security • What is CHS162 applied for • Second goal of IT security • California .... Privacy Act • Name of the new privacy tool • Corporate .... Deviation (CDD) • Standard that ASCA is driven by • Strategic Access Management tool • To what data types LEG116 applies • ...
Crossword 2024-06-27
Across
- Extortion software locking access until a ransom is paid.
- Notification signaling an impending or current security threat.
- Control Mechanism governing resource visibility and usage permissions.
- Sniffing Analysis technique for capturing and inspecting network traffic.
- Exit or departure point from a system or network.
- Entity opposing or competing against one's security measures.
- Detection Systematic monitoring for suspicious network activities indicating potential threats.
- Unpermitted access gained by following an authorized individual into a secure area.
- Decoy system designed to lure and trap attackers.
- Deviation from standard norms indicating potential security issues.
- Covert surveillance software used to secretly monitor another user's digital activities.
Down
- Deceptive program masquerading as beneficial software to compromise systems.
- Interconnected ensemble of computers facilitating communication.
- Distributed attack aimed at overwhelming network resources to cause service disruption.
- Elevation of privileges typically exploited in unauthorized access.
- Process of encoding data to prevent unauthorized access.
- Software tool leveraging system vulnerabilities for unauthorized advantage.
- Successful breach resulting in unauthorized system control.
- Unauthorized disclosure of internal data to external entities.
- Malicious software disguised as legitimate to breach defenses.
- Test Probing examination simulating cyberattacks to identify vulnerabilities.
- Secure service ensuring private internet connectivity.
- Security Safeguarding measures to prevent unauthorized network intrusions.
- Team Group conducting simulated adversary attacks to test defensive capabilities.
24 Clues: Exit or departure point from a system or network. • Decoy system designed to lure and trap attackers. • Secure service ensuring private internet connectivity. • Process of encoding data to prevent unauthorized access. • Extortion software locking access until a ransom is paid. • Successful breach resulting in unauthorized system control. • ...
Cyberbullying 2021-10-29
Across
- If you are bullied, tell an ......
- Cyberbullying is against the law.
- in position of power towards one or more.
- Denial of access to particular parts of
- An example of cyberbullying.
Down
- Repeated or deliberate harassment by one
- Bullying online, is called .....
- A wireless handheld device for telephone
- Many websites have reported functions for
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An example of cyberbullying. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell an ...... • Denial of access to particular parts of • Repeated or deliberate harassment by one • A wireless handheld device for telephone • Many websites have reported functions for • ...
the eye of minds crossword puzzle 2024-05-12
Across
- the main character
- how they access the vertnet
- michaels best friend also knowen as the best gamer
- when your in the game
- the name of the virus
Down
- the cyber-terrorist in the game
- the main way michael gets information
- the name of the game
- the network of the game
- michaels friend is known for her coding.
- the agency trying to stop kaine
11 Clues: the main character • the name of the game • when your in the game • the name of the virus • the network of the game • how they access the vertnet • the cyber-terrorist in the game • the agency trying to stop kaine • the main way michael gets information • michaels friend is known for her coding. • michaels best friend also knowen as the best gamer
Espanol 4: Unidad 4 Contexto 1 2017-04-30
21 Clues: rest • value • hobby • relax • check • retire • choose • relieve • quality • anxiety • leisure • scatter • together • prestige • dedicate • security • interview • unsatisfied • scholarship • application • apprenticeship
Crossword Englisch 2015-10-19
20 Clues: BTW • boet • apart • ingang • schade • verval • met-zorg • weegbrug • kostbaar • herkomst • omleiding • zichtbaar • koppeling • bederfbare • bestemming • beveiliging • versnelling • verzekering • overstroming • kentekenplaat
The outbreak of the Cold War 2015-02-22
Kintahdi Diné Binidaanishígíí Opal Mohs-6th 2023-03-06
20 Clues: baker • barber • writer • doorman • plumber • butcher • painter • florist • janitor • mechanic • gardener • carpenter • architect • pharmacist • electrician • shop worker • salesperson • photographer • security guard • weather forecaster
viajes felizes 2022-10-13
20 Clues: gate • line • check • agent • ticket • flight • agency • screen • confirm • to call • luggage • security • suitcase • to board • passport • to travel • departure • passenger • itinerary • assistant
Human Rights 2025-07-26
20 Clues: – qonun • – ta’lim • – adolat • – hurmat • – himoya • – tenglik • – qonuniy • – ozodlik • – erkinlik • – buzilish • – huquqlar • – kamsitish • – xavfsizlik • – demokratiya • – qadriyatlar • – zo‘ravonlik • – qadr-qimmat • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
tourism 2019-07-16
Across
- Z in the phonetic alphabet
- Y in the phonetic alphabet
- S in the phonetic alphabet
- Where is Qantas based
- NZ's low cost carrier
- the area before departing through security
- The capital of New Zealand
- Charles De Gaulle airport is situated where
- World's busiest airport
- Japans busiest airport
- Q in the phonetic alphabet
Down
- Hamilton's three letter code
- F in the phonetic alphabet
- Another word for baggage
- Busiest country in the world in regards to airports
- NZ's full service carrier
- where you go through security and hand over your passport
- ROT stands for
- 1900 Is what in the 12 hour clock
- Hokitika's three letter code
20 Clues: ROT stands for • Where is Qantas based • NZ's low cost carrier • Japans busiest airport • World's busiest airport • Another word for baggage • NZ's full service carrier • F in the phonetic alphabet • Z in the phonetic alphabet • Y in the phonetic alphabet • S in the phonetic alphabet • The capital of New Zealand • Q in the phonetic alphabet • Hamilton's three letter code • ...
CIS 120 Cybersecurity Crossword Puzzle 2023-02-21
Across
- software that is constantly updating
- software/hardware keep intruders out
- text read by human eye
- transform ciphertext into original plaintext
- test distinguishes between human/robot
- security mechanism determining who's authorized
- intent to cause mischief/theft
- code imbedded into computer hardware
- technique to click bad url
- physical parts of a computer
- core of computers operating system
Down
- trap or decoy for attackers
- coding used to protect information
- connect computers to encrypted network
- attempt to violate security perimeter
- language to create/control website content
- shield users against computer damage
- term for unauthorized computer attacker
- malicious software to damage systems
- an error in computer program
20 Clues: text read by human eye • technique to click bad url • trap or decoy for attackers • an error in computer program • physical parts of a computer • intent to cause mischief/theft • coding used to protect information • core of computers operating system • software that is constantly updating • software/hardware keep intruders out • shield users against computer damage • ...
Cybersecurity 2024-08-31
Across
- bring your own computer
- coding used to protect information
- a method of gaining access to a network
- protects users from fraudulent websites
- a string used to identify user
- a program that is run without installation
- malicious software
- bring your own device
- items that are temporarily blocked
- process of identifying someone
- taking advantage of a vulnerability in a network
Down
- combination of robot and network
- individual with intent to hack maliciously
- network security system
- a kind of spyware
- a denial of service
- computer security system trap
- casting a reel in water
- intrusive software
- someone with knowledge of exploits
- misuse of devices to corrupt
21 Clues: a kind of spyware • malicious software • intrusive software • a denial of service • bring your own device • bring your own computer • network security system • casting a reel in water • misuse of devices to corrupt • computer security system trap • process of identifying someone • a string used to identify user • combination of robot and network • coding used to protect information • ...
Social Security and Medicare Taxes 2023-09-11
Across
- Gross Income: $13,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $50,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $3,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $53,100 Find amount withheld for Medicare. Round to the nearest dollar.
Down
- Gross Income: $73,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $10,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar.
10 Clues: Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar. • ...
MEDIMUN Crossword 2022-03-24
Across
- every committee has 2 … and many delegates
- the theme of this years MEDIMUN is Global …
- games that relieve tension between students before the debate
- GA2 focuses …, financial and economic development
- the annual session of MEDIMUN is also referred to as the annual …
- One of the themes of the … council is the situation in Afghanistan
- delegates make can make speeches for and …
- an instance of declining to vote for or against a proposal or motion.
Down
- the … team are the team of reporters that put this issue together
- the security historical … discussed the Sino-Vietnamese war this year
- …of information
- this is the 17th … of MediNews
- the name of the wonderful disease that caused a change in venue
- delegates can form … with other delegates
- the name of the country which is a permanent member of the UN security councils and has crepes
- a formal discussion on a particular matter In which opposing arguments are put forward
- the name of the newly formed committee on the topic of crime
17 Clues: …of information • this is the 17th … of MediNews • delegates can form … with other delegates • every committee has 2 … and many delegates • delegates make can make speeches for and … • the theme of this years MEDIMUN is Global … • GA2 focuses …, financial and economic development • the name of the newly formed committee on the topic of crime • ...
Unit 1, Chapter 2 Vocabulary 2017-01-25
Across
- most of the people or things in a group
- restriction (n), _____ (v), restricting (adj)
- controversial (adj), _____ (n)
- contribute (v), _____ (n), contributor (n – person), contributory (adj)
- participate (v), _____ (n), participatory (adj.)
- the basic idea that a plan or system is based on
- to take part in an activity or event
- a person who is considered separately from the rest of the group or society that they live in
- immigrant (n), immigration (n), _____ (v)
- things that are done to keep a person, building, or country safe from danger or crime
Down
- someone who enters another country to live there permanently
- to help to make something happen
- security (n), _____ (v), security (adj)
- existing or happening in many places or situations, or among many people
- a rule or law that limits or controls what people can do
- causing a lot of disagreement because many people have strong opinions about the subject being discussed
- individual (n), individual (adj), _____ (adv)
- impose (v), _____ (n)
- to force someone to have the same ideas, beliefs, etc. as you
- resident (n: person), _____ (n: place), residential (adj)
- someone who lives or stays in a particular place
21 Clues: impose (v), _____ (n) • controversial (adj), _____ (n) • to help to make something happen • to take part in an activity or event • security (n), _____ (v), security (adj) • most of the people or things in a group • immigrant (n), immigration (n), _____ (v) • restriction (n), _____ (v), restricting (adj) • individual (n), individual (adj), _____ (adv) • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- malware type in which security mechanism is bypassed to access a system.
- The information about someone on the Internet
- Using material another person has created and claims it as your own
- acts as a security guard between the internet and a network
- the amount of data that can travel over an analog medium
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- application for performing numerical and statistical calculations
- a program that can analyze and execute a program line by line.
Down
- The purpose of scrambling data so it can be sent securely over networks.
- A number assigned to any item that is connected to the Internet
- a method used for a security breach in wireless networks
- instructions programmed on a hardware
- Initialize the system hardware components
- blockchain programming
- Vendor-created program modifications are called
- To allow communication inside the organization
- A location that provides wireless Internet access.
- name of the system that manages and programs hardware resources for a computer
- is a layout software
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Bengkel SOP 2024 2024-01-04
Across
- To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
- Objective ___ is to reduce the risk of fraud, error and bypassing of information security controls.
- To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered is objective for ___.
- Any devices that require wi-fi access must get authorized from ___.
- How many guideline do we have in JTMD
Down
- ___ is to preserve information security when executing changes.
- How many policy do we have in ISP ?
- Test information is To ensure relevance of testing and protection of operational information used for ___?
- Copyright, software license, trademarks, design rights is example of ___.
- Personal identifiable information should follow accordingly with ___.
- ___ must be implemented to ensure data security, including at the stages of data in transit, data at rest, and data in use.
- ___ is shortform for Information Security Policy
12 Clues: How many policy do we have in ISP ? • How many guideline do we have in JTMD • ___ is shortform for Information Security Policy • ___ is to preserve information security when executing changes. • Any devices that require wi-fi access must get authorized from ___. • Personal identifiable information should follow accordingly with ___. • ...
Cyber Safety 2020-02-19
Across
- flagfeeling when something happens on digital media that makes you feeluncomfortable, worried, sad, or anxious
- information about you that can be used to identify you because it isunique to you (e.g. your full name or your address)
- an attempt to trick someone, usually with the intention of stealing moneyor private information
- a type of crime in which your private information is stolen and used forcriminal activity
- using media in a way that feels healthy and in balance with other lifeactivities (family, friends, school, hobbies, etc.)
Down
- information that comes to us through the internet, often through a tablet,smartphone, or laptop
- information about you that can be used to identify you because it is
- to engage in activities that don't involve devices, apps, or the internet
- URL:a web address that has been condensed and which could mislead anuser into going into a risky website
- when someone poses as an institution, like a bank or school, and sends you apersonalized message asking you to provide private information
10 Clues: information about you that can be used to identify you because it is • to engage in activities that don't involve devices, apps, or the internet • a type of crime in which your private information is stolen and used forcriminal activity • information that comes to us through the internet, often through a tablet,smartphone, or laptop • ...
Cyber Crossword 2021-04-26
Across
- A result or effect, typically one that is unwelcome or unpleasant.
- the use of technology to harass, threaten, embarrass, or target another person.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- Electronic device most students own at home and is square and mostly portable.
Down
- An individual who causes harm or stress to another human intentionally and repetitively.
- A repetitive action toward another human purposely causing harm or intimidation.
- The act of protecting ones self or others from harm or intimidation online.
- Having firm belief or reliability in someone.
- media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
9 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • The act of protecting ones self or others from harm or intimidation online. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • ...
Cyber stuff 2021-09-17
9 Clues: is what i keep saying • use this to text people • mark Zuckerberg made this • YOU WATCH SAM PILGRIM ON IT • use it do do everything online • what you have to do online. one word • this unlocks you personal information • when people be mean to you online. one word • instagram is one of them.two words combined
cyber bullying 2021-09-17
Across
- we ALL have experience with this event hint covid
- it is the thing we are doing this about
- showing still things to imbrues people
- giving people soping that means they can take your stuff or look trough their history
Down
- a game with toxic people that will cus at u and they have a ninja
- places with people faking there appearance
- a mobile divice that people use for cyberbulling that can fit in your pocket
- jack has had an experience on it
- it is a popular social media with a toxic environment start with a t t
9 Clues: jack has had an experience on it • showing still things to imbrues people • it is the thing we are doing this about • places with people faking there appearance • we ALL have experience with this event hint covid • a game with toxic people that will cus at u and they have a ninja • it is a popular social media with a toxic environment start with a t t • ...
Cyber Crimes 2017-04-16
Across
- The largest social network in the world, founded by Mark Zuckerberg
- conditional word or set of characters
- breaking the law (adjective)
- type of malicious software that can make copies of itself and infect other programs code
Down
- place where information on the Internet is lokated
- specialist in programming
- machine Automatic machine for receiving cash on a credit plastic card
- type of address on which content is located
- computer burglar
9 Clues: computer burglar • specialist in programming • breaking the law (adjective) • conditional word or set of characters • type of address on which content is located • place where information on the Internet is lokated • The largest social network in the world, founded by Mark Zuckerberg • machine Automatic machine for receiving cash on a credit plastic card • ...
cyber bullying 2019-07-12
9 Clues: a media • a group • not offline • seek to harm • not very well • opposite to kind • killing yourself • always texting you • makes you go red and want to cry
CYBER HYGΙΕΝΕ 2023-12-09
Across
- Έλεγχος .....δύο παραγόντων
- Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing)
- ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ
- Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης
Down
- Μπορεί να είναι και ηλεκτρονική
- Τι σημαίνει cyber hygiene?
- Λογισμικό για να είναι ασφαλής ο υπολογιστής μας
- ...(virus)ένα πρόγραμμα που εισβάλλει στον υπολογιστή μας με ανεπιθύμητες παρενέργειες
- Προσπάθεια για .... κωδικών πρόσβασης
9 Clues: Τι σημαίνει cyber hygiene? • Έλεγχος .....δύο παραγόντων • Μπορεί να είναι και ηλεκτρονική • Προσπάθεια για .... κωδικών πρόσβασης • Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing) • Λογισμικό για να είναι ασφαλής ο υπολογιστής μας • ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ • Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης • ...
Cyber Crime 2024-03-22
Across
- Sending nasty messages online to get a reaction
- Repeatedly bothering or scaring someone online
- Using internet, devices, electronics to bully someone.
Down
- Software that can harm your computer
- Prenteding to be a genuine website/ source in an email to steal information
- Stealing someone's personal information online
- Trying to trick someone out of money
- Breaking into a computer system
- Pretending o be someone else online to trick you.
9 Clues: Breaking into a computer system • Software that can harm your computer • Trying to trick someone out of money • Stealing someone's personal information online • Repeatedly bothering or scaring someone online • Sending nasty messages online to get a reaction • Pretending o be someone else online to trick you. • Using internet, devices, electronics to bully someone. • ...
Cyber Crosswords 2024-06-19
Across
- A secret word or phrase used to gain access to a computer system (8 letters)
- A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- Software that is designed to detect and destroy computer viruses (9 letters)
- The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- Unsolicited email, often used for advertising or phishing (4 letters)
9 Clues: Unsolicited email, often used for advertising or phishing (4 letters) • Software that is designed to detect and destroy computer viruses (9 letters) • A secret word or phrase used to gain access to a computer system (8 letters) • The practice of protecting systems, networks, and programs from digital attacks (10 letters) • ...
Cyber Quiz 2024-08-29
Across
- Attack involving the use of Malicious Software
- Process of Verifying Identity
- Secure connection Protocol
- Communicating devices in a network
Down
- Software that protects against malware
- Method use to protect/Hide information
- A method use to protect integrity of a data
- A network security devices
- Threat that involves fraudulent emails
9 Clues: A network security devices • Secure connection Protocol • Process of Verifying Identity • Communicating devices in a network • Software that protects against malware • Method use to protect/Hide information • Threat that involves fraudulent emails • A method use to protect integrity of a data • Attack involving the use of Malicious Software
Cyber Safety 2024-10-03
Across
- a type of malicious software that finds weak spots in different apps and slides its way into your information
- a device similar to number 4 that you can play mobile games on
- an app the has the symbol of a ghost on its logo
- a device I can do my homework on
- a type of computer malicious software that takes over a device potentially locking yourself out of your device
Down
- a device where you can call your friends on facetime
- malicious software
- an app that has the letter F on its logo (this app has had a cyber attack before)
- sending emails with links hoping to gain peoples passwords
9 Clues: malicious software • a device I can do my homework on • an app the has the symbol of a ghost on its logo • a device where you can call your friends on facetime • sending emails with links hoping to gain peoples passwords • a device similar to number 4 that you can play mobile games on • ...
Cyber monday 2024-11-28
9 Clues: THE COST OF AN ITEM • TO BUY SOMETHING ONLINE • ITEMS AVAILABLE FOR SALE • WHAT YOU BUY FOR SOMEONE ELSE • A COLLECTION OF THINGS TO BUY • WHAT YOU DO TO LOOK FOR ITEMS • WHAT YOU DO WITH MONEY ONLINE • WHERE YOU RECEIVE PROMO CODES • A SHORTENED TERM FOR PROMOTION
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Cyber Hunt 2025-09-30
Across
- A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
- MALICIOUS SOFTWARE
- WEAKNESS OF A SYSTEM
- A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW
- THE STATE OF KEEPING SECRET
Down
- THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT
- VERIFYING SOMEONE'S IDENTITY IS VALID
- POTENTIAL RISK
- A TYPE OF MALWARE THAT SPREADS BY ITSELF
9 Clues: POTENTIAL RISK • MALICIOUS SOFTWARE • WEAKNESS OF A SYSTEM • THE STATE OF KEEPING SECRET • VERIFYING SOMEONE'S IDENTITY IS VALID • A TYPE OF MALWARE THAT SPREADS BY ITSELF • A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW • THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT • A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
Cyber tools 2023-01-09
Across
- best social networking site to chat
- best social networking site to watch videos
- a form of blogging using short posts without titles.
- an American social networking service based in San Francisco, California
Down
- to
- best way to connect with friends, work colleagues or random people
- apps GPS
- Similar to Microsoft OneDrive
- best way to find a job
9 Clues: to • apps GPS • best way to find a job • Similar to Microsoft OneDrive • best social networking site to chat • best social networking site to watch videos • a form of blogging using short posts without titles. • best way to connect with friends, work colleagues or random people • an American social networking service based in San Francisco, California
Cyber-Mobbing 2019-05-07
Across
- Eine Plattform wo Videos hochgeladen und angeschaut werden können
- Ein Messenger wo wir tagtäglich damit schreiben
- Das Thema welches hier behandelt wird
- Ein tragbarer Computer
Down
- Eine Taste auf der Tastatur mit der man zum Beispiel ein Programm schließen kann
- Ein Spiel welches virtuell
- Wenn jemand gehasst wird
- Gerät welches viele Jugendliche verwenden
- Ein Profil das nicht echt ist
9 Clues: Ein tragbarer Computer • Wenn jemand gehasst wird • Ein Spiel welches virtuell • Ein Profil das nicht echt ist • Das Thema welches hier behandelt wird • Gerät welches viele Jugendliche verwenden • Ein Messenger wo wir tagtäglich damit schreiben • Eine Plattform wo Videos hochgeladen und angeschaut werden können • ...
Cyber Safety 2023-05-22
9 Clues: [Online Arguments] • [Stalking someone] • [excluding someone] • [giving information] • [embarrassing someone] • [bullying someone online] • [Repeating rude messages] • [offensive comments roomers and gossiping] • [Pretending to be someone and getting them in Trouble]
Cyber Safety 2023-05-22
9 Clues: (Online Arguments) • (excluding someone) • (giving information) • (Embarrassing someone) • (Repeating rude messages) • (Stalking someone online) • (bullying someone online) • (Offensive comments roomer and gossip) • (pretending to be someone and getting them trouble)
Cyber Safety 2013-08-12
Across
- How often do you change your password?
- Who do you share your password with?
- What is the name of the setting to block unwanted messages?
Down
- You should never keep online _____.
- What do you do before posting?
- What is the name of someone who hassles you online?
- Information on the internet is available for how long?
- Never give your friends your online or phone____.
- When someone sends you inappropriate texts you ____ them.
9 Clues: What do you do before posting? • You should never keep online _____. • Who do you share your password with? • How often do you change your password? • Never give your friends your online or phone____. • What is the name of someone who hassles you online? • Information on the internet is available for how long? • When someone sends you inappropriate texts you ____ them. • ...
Cyber Smart 2024-01-18
Across
- Measures taken to discourage or prevent unwanted actions or behaviors.
- A mode in web browsers that allows users to browse privately, leaving no trace in the browsing history.
- Alertness and watchfulness to detect and prevent potential dangers or threats.
- A software update designed to fix security vulnerabilities or improve functionality.
Down
- Authentication techniques based on unique physical or behavioral characteristics.
- The state of being anonymous, without revealing one's identity.
- The process of converting information into a code to prevent unauthorized access.
- A decentralized and secure digital ledger used in cryptocurrency transactions.
- A security system designed to prevent unauthorized access to or from a private network.
9 Clues: The state of being anonymous, without revealing one's identity. • Measures taken to discourage or prevent unwanted actions or behaviors. • A decentralized and secure digital ledger used in cryptocurrency transactions. • Alertness and watchfulness to detect and prevent potential dangers or threats. • ...
Cyber Awareness 2023-10-02
Across
- A program that can harm your computer and steal your information.
- A set of characters used to access an account.
- The place where you can adjust your account settings.
- Private information you should never share online.
- Being disrespectful online
Down
- Protects your computer from viruses and malware.
- The practice of tricking people into giving up sensitive information.
- Treating others the way you want to be treated.
- A message or email that tries to deceive you into giving out personal information.
9 Clues: Being disrespectful online • A set of characters used to access an account. • Treating others the way you want to be treated. • Protects your computer from viruses and malware. • Private information you should never share online. • The place where you can adjust your account settings. • A program that can harm your computer and steal your information. • ...
Cyber bullying 2024-06-11
Across
- someone you can talk to at school
- helpline can be
- someone we can talk to at home
- when your device is malfunctioning you
- someone you can talk to at home
- what do you do to stop following you online
Down
- someone who gives good advice is
- what do you do when you are having problems you ask for
- to send out a message
- to get help outside
10 Clues: helpline can be • to get help outside • to send out a message • someone we can talk to at home • someone you can talk to at home • someone who gives good advice is • someone you can talk to at school • when your device is malfunctioning you • what do you do to stop following you online • what do you do when you are having problems you ask for
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Cyber Crossword 2025-07-14
Across
- Unwanted or unsolicited email often used to distribute malware.
- A scam where attackers impersonate senior executives.
- Type of malware that locks files and demands payment to unlock them.
- Keeping your software and operating system ________ is a key part of security.
Down
- Software that secretly gathers information from a computer.
- A common method used by cybercriminals to trick users into revealing sensitive information.
- A software program designed to protect against viruses and malware.
- A criminal who uses computers and networks to commit crimes.
- A secret word or phrase used to access a system.
9 Clues: A secret word or phrase used to access a system. • A scam where attackers impersonate senior executives. • Software that secretly gathers information from a computer. • A criminal who uses computers and networks to commit crimes. • Unwanted or unsolicited email often used to distribute malware. • A software program designed to protect against viruses and malware. • ...
Root Word List 2 Crossword Puzzle 2016-09-21
Across
- Someone that carries bags
- In charge, has the final say on anything
- Easily liked by a lot of people
- A machine used in farming
- Easily moved from place to place
Down
- shows a moving picture than can be saved in cyber space
- Grabbing a hold onto something
- A form of connection
- A person walking along a road
- A specific style
- A unit of measurement
- To turn from one thing into another
12 Clues: A specific style • A form of connection • A unit of measurement • Someone that carries bags • A machine used in farming • A person walking along a road • Grabbing a hold onto something • Easily liked by a lot of people • Easily moved from place to place • To turn from one thing into another • In charge, has the final say on anything • ...
COMPUTER SCIENCE KEY WORDS 2025-10-09
Across
- a network built of networks
- portable computer
- facility allowing portable devices to connect to the internet
- a software application for looking at websites
- a service on the internet
- fake Wi-Fi network used to steal data
Down
- the way data is transferred through devices
- devices connected for communication
- a set of rules on how to communicate
- a website that will show links
- a remote computer that has a website
- a cyber crime
12 Clues: a cyber crime • portable computer • a service on the internet • a network built of networks • a website that will show links • devices connected for communication • a set of rules on how to communicate • a remote computer that has a website • fake Wi-Fi network used to steal data • the way data is transferred through devices • a software application for looking at websites • ...
security crossword puzzle 2023-10-04
Across
- Helps to continue in disruption
- protection against improper modification
- Security is ____________'s responsibility
- Abbreviation for a D&B data classification
- 9 digit unique identifier for entities
- Process mandated before every new project
- Cybercrime to mine cryptocurrency
- Laptop physical fastener
- ____desk
Down
- Security is a ____________ enabler
- ____the franchise
- Helps identify machines and improve web browsing experience
- QR code based fraud attempts
- Are you a robot ?
14 Clues: ____desk • ____the franchise • Are you a robot ? • Laptop physical fastener • QR code based fraud attempts • Helps to continue in disruption • Cybercrime to mine cryptocurrency • Security is a ____________ enabler • 9 digit unique identifier for entities • protection against improper modification • Process mandated before every new project • ...
CJCC Crossword 2023-05-09
Across
- our abbreviation
- chairman of victims comp board
- who is the one who is going to send you an email on friday with admin leave
- how many seats are there on the council
- how old is cjcc
- where our CJCC attorney's went to school
- Our executive director
- who handles all media requests
- our governor
- historian
Down
- Stef's division
- how many NCVRW events did we hold in 2023
- where our office is located
- current council chairman
- First lady
- Our friendly neighborhood CFO
- what branch of government are we
- who is going to reminder you to do your cyber training
- where madeline and dannielle spend their time j-a,
19 Clues: historian • First lady • our governor • Stef's division • how old is cjcc • our abbreviation • Our executive director • current council chairman • where our office is located • Our friendly neighborhood CFO • chairman of victims comp board • who handles all media requests • what branch of government are we • how many seats are there on the council • where our CJCC attorney's went to school • ...
J808 4.1 Types of Threats 2019-01-09
Across
- Malware that allows a cyber-security attacker to take control of an infected computer.
- Criminals make a promise of goods in return for details, such as offering a free music download.
- When someone deceives by pretending to be someone else in order to get personal data.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Collection of captured bot computers
- Software that encrypts programs and data until a ransom is paid to remove it.
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- An error in a program that prevents the program from running as expected.
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- A type of Malware that locates and saves data from users without them knowing about it.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
15 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
J808 4.1 Types of Threats 2019-01-09
Across
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Criminals make a promise of goods in return for details, such as offering a free music download.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- When someone deceives by pretending to be someone else in order to get personal data.
- Software that encrypts programs and data until a ransom is paid to remove it.
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- An error in a program that prevents the program from running as expected.
- Collection of captured bot computers
- A type of Malware that locates and saves data from users without them knowing about it.
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
15 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Cabinet Crossword 2022-02-15
Across
- Advises the President and leads the nation in foreign policy issues for example, negotiates treaties and agreements with foreign entities
- Manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans
- manages the United States' nuclear infrastructure and administers the country's energy policy
- Responsible for maintaining policies related to learning and improving the educational system
- responsible for national policy and programs that address America's home needs, that improve and develop the Nation's communities, and enforce fair home laws.
- provide leadership on food, agriculture, natural resources, rural development, nutrition, and related issues based on public policy, the best available science, and effective management
Down
- for planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation
- Prosecutes federal law offenders and represents the U.S. Government in court; its attorneys represent the rights and interests of the American people and enforce federal criminal and civil laws
- operates and maintains systems that are critical to the nation's financial infrastructure, such as the production of coin and currency
- responsible for occupational safety and health, wage and hour standards, unemployment benefits, reemployment services, and occasionally, economic statistics
- promotes job creation and economic growth by ensuring fair trade, providing the data necessary to support commerce and constitutional democracy, and fostering innovation by setting standards and conducting foundational research and development.
- responsible for providing vital services to America's soldiers
- Responsible for providing the military forces needed to deter war and protect the security of our country
- provide national policy direction and develop national plans, technical standards and guidelines on health
- has overall responsibility for protecting federal civilian executive branch systems from cyber threats, helping agencies better defend themselves, and providing response teams to assist agencies during significant incidents
15 Clues: responsible for providing vital services to America's soldiers • manages the United States' nuclear infrastructure and administers the country's energy policy • Responsible for maintaining policies related to learning and improving the educational system • ...
personal finance 2021-02-24
19 Clues: fnizsf • jaiofna • nfapjcz • fanofna • aiofpna • nfiopfz • jfdiaofj • naiofnoa • fjioeanfo • roiahweng • fjieowanf • zcjvziofd • jfoienafo • ajofneonf • fjizopfjz • fjeioawnf • fnakopzjfd • fialf;mkzl • fajiosnjcz
Unit 16 2020-04-16
19 Clues: / padi • / toll • / trahv • / pagas • / rabav • / kirurg • / kandik • / kohver • / vahekäik • / õpipoiss • / sihtkoht • / mehaanik • / aksessuaar • / turvalisus • / sissekanne • / ürgne loodus • / deklareerima • / reisiterminal • / meditsiiniline
Highlights of 2020 2020-12-24
Across
- Exclusive interview with this CAT A publication on Health Security technology
- Best research feature (Love thy neighbor)in this leading online lifestyle publication
- Best Home Automation story of the year with India’s leading financial publication was done by this journalist
- Renowned TV journo who reviewed the UV Case
- Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
- The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
- Participation in maximum number of Industry stories with this publication
- Godrej Security Solutions ventured into the health security segment with this product
- Authored article on Reflecting on your child’s safety post-COVID-19 crisis
- The best front-page coverage (UV-based disinfectants in demand) was received in this publication
- Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
- Maximum regional coverage garnered in this city
12 Clues: Renowned TV journo who reviewed the UV Case • Maximum regional coverage garnered in this city • Participation in maximum number of Industry stories with this publication • Authored article on Reflecting on your child’s safety post-COVID-19 crisis • Exclusive interview with this CAT A publication on Health Security technology • ...
Highlights of 2020 2020-12-24
Across
- Participation in maximum number of Industry stories with this publication
- Renowned TV journo who reviewed the UV Case
- Godrej Security Solutions ventured into the health security segment with this product
- STUFF is _ baseded publication who did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners
- Best research feature (Love thy neighbor) in this leading online lifestyle publication
- Godrej Security Solutions celebrated ‘Family Safety Month’ this month
Down
- The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
- The best front-page coverage (UV-based disinfectants in demand) was received in this publication
- Best Home Automation story of the year with India’s leading financial publication was done by this journalist
- Exclusive interview with this CAT A publication on Health Security technology
- Authored article on Reflecting on your child’s safety post COVID-19 crisis
- Maximum regional coverage garnered in this city
12 Clues: Renowned TV journo who reviewed the UV Case • Maximum regional coverage garnered in this city • Godrej Security Solutions celebrated ‘Family Safety Month’ this month • Participation in maximum number of Industry stories with this publication • Authored article on Reflecting on your child’s safety post COVID-19 crisis • ...
Programming 2021-01-21
Across
- Popular object notation
- Used to update node
- Cyber Group developed this using the Heroku platform
- IDE named after smallest unit of an element
- This guides pirates to treasure
Down
- Used to manage packages in NodeJS
- Used to manage packages in .NET
- Open–source version control system
- IDE named after astronomical events
9 Clues: Used to update node • Popular object notation • Used to manage packages in .NET • This guides pirates to treasure • Used to manage packages in NodeJS • Open–source version control system • IDE named after astronomical events • IDE named after smallest unit of an element • Cyber Group developed this using the Heroku platform
Programming 2021-01-21
Across
- Popular object notation
- Used to update node
- Cyber Group developed this using the Heroku platform
- IDE named after smallest unit of an element
- This guides pirates to treasure
Down
- Used to manage packages in NodeJS
- Used to manage packages in .NET
- Open–source version control system
- IDE named after astronomical events
9 Clues: Used to update node • Popular object notation • Used to manage packages in .NET • This guides pirates to treasure • Used to manage packages in NodeJS • Open–source version control system • IDE named after astronomical events • IDE named after smallest unit of an element • Cyber Group developed this using the Heroku platform
Cyberbullying 2021-10-29
Across
- If you are bullied, tell an ......
- Cyberbullying is against the law.
- in position of power towards one or more.
- Denial of access to particular parts of
- An example of cyberbullying.
Down
- Repeated or deliberate harassment by one
- Bullying online, is called .....
- A wireless handheld device for telephone
- Many websites have reported functions for
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An example of cyberbullying. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell an ...... • Denial of access to particular parts of • Repeated or deliberate harassment by one • A wireless handheld device for telephone • Many websites have reported functions for • ...
MY SPELLING CROSSWORD PUZZLE 2013-04-03
United Nations (Worksheet 2) 2015-06-10
21 Clues: ปัญหา • พิเศษ • องค์กร • ปกป้อง • เอกสาร • ป้องกัน • ข้อตกลง • ก่อตั้ง • มาตรฐาน • สนับสนุน • กระทบต่อ • การประกาศ • กิ่งมะกอก • สัญลักษณ์ • ความสงบสุข • ความสงบสุข • เป็นตัวแทน • เป็นทางการ • ความปลอดภัย • ความสัมพันธ์ • UN stands for ______________.
Cryptogram crossword 2023-12-12
21 Clues: iovnkx • iujotm • vgyycuxj • vuresgzn • jkiujotm • ykiaxoze • Grmuxozns • ynuxzngtj • vxotiovgr • Lxkwaktie • kyvoutgmk • jkixevzout • ktixevzout • Vykajuxgtjus • iushotgzuxoiy • ixevzgtgreyoy • vuregrvnghkzoi • iussatoigzouty • gaznktzoigzout • qkxiqnull'yVxotiovgr • Machine KtomsgSginotk
less50 2024-05-15
21 Clues: wall • flies • cured • present • agility • Control • General • consider • required • security • suitable • distance • conducted • dependent • Available • confirmed • limitation • flexibility • substantial • announcement • administrator
Job Vacancy 2025-01-20
20 Clues: akan • dapat • jadwal • proyek • panduan • mengulas • kemajuan • memimpin • domisili • keamanan • mengawasi • perumahan • sebaiknya • menyiapkan • memastikan • penempatan • menyediakan • mengkoordinasi • memahami/ mampu • synonym of supervisor
Wireless Network 2020-04-29
Across
- 802.11__ is the latest standard establish in 2019.
- One of the wireless security protocols that supports only 8 characters for password.
- One of the WLAN design that involves no network infrastructure.
- Mesh APs helps expanding wireless network coverage by receiving the wireless signal and ______ it.
- _____ allows multiple devices to connect to the internet.
- One of the advantages of Infrastructure WLAN.
- _____ is a technology that scramble the data in a sense that it will not be understandable by any network hacker.
- The _____ will receive the signal transmitted by the ISP.
- One of the disadvantages of wireless network over wired network.
- One type of WPA2 that is designed for a larger business setting.
- Devices without Ethernet ports need to connect to the internet through _____ router, creating a WLAN.
- The coverage of a wireless network can be expanded by adding wireless _____ points connected to the wireless router.
Down
- One of the purposes of password in wireless security.
- 802.11 is an example of the wireless ______.
- Wireless network is a network set up by using ______ signal frequency
- Device can hard-wire directly into the _____ port of the modem to connect to the internet.
- Modem stands for _____-Demodulator
- 802.11__ is the wireless standard that broadcast only at 5GHz.
- 5GHz transmit data in shorter range, but with higher speed and lesser _____.
- One of the wireless security protocols that served as a temporary solution that address the vulnerability of WEP.
- ISP stands for ______ Service Provider
- The modem is responsible to convert analog signal to _____ signal.
- 802.11 is established by _____ in 1997.
- One of the wireless security protocols that supports up to 64 characters for password.
24 Clues: Modem stands for _____-Demodulator • ISP stands for ______ Service Provider • 802.11 is established by _____ in 1997. • 802.11 is an example of the wireless ______. • One of the advantages of Infrastructure WLAN. • 802.11__ is the latest standard establish in 2019. • One of the purposes of password in wireless security. • ...
LiTe Crossword Puzzle 2024-11-20
Across
- An individual who breaks into computer systems to steal, change, or destroy information.
- One of the more common methods of both sending information out and collecting it from unsuspecting people.
- Use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- Any action derived from intelligent threats to violate the security of the system.
- The process of detecting and preventing illegal or unauthorized use of a computerand preventing intruders from accessing any part of a computer system.
- A term used to describe actions taken by someone to gain unauthorized access to a computer.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization.
- An unprivileged false statement of fact which tends to harm the reputation of a person or company.
- It is an executable file that will install itself and run automatically once it's downloaded.
- Any action of stealing information from a users system.
Down
- Ensuring that the information is accessible to authorized persons when required without delay.
- Refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- One of the more common ways to infiltrate or damage of your computer.
- An action or event that has the potential to compromise and/or violate security.
- Often used by third parties to infiltrate your computer.
- A defined method of breaching the security of an IT system through vulnerability.
- The applications on the computers and operating system.
- A common type of online fraud.
- The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.
20 Clues: A common type of online fraud. • The applications on the computers and operating system. • Any action of stealing information from a users system. • Often used by third parties to infiltrate your computer. • One of the more common ways to infiltrate or damage of your computer. • An action or event that has the potential to compromise and/or violate security. • ...
Domestic and International Airports 2018-07-19
Across
- 3 letter code for Kapiti Coast
- Used for security screening
- "Is this your bag?"
- Area of the airport where the public can access for free
- 3 letter code for Singapore
- What does the "R" represent in WCHR
- Adjacent to a terminal
- To get on the plane
- 2 letter code for Virgin Australia
- Number of runways at Auckland Airport
- Abbreviation for Unaccompanied Minors
Down
- Passenger
- Giving permission to enter a country for a certain time
- Access to an aircraft from the terminal
- Used for going overseas
- Phonetic alphabet for "V"
- 6th busiest airport in New Zealand
- 3 letter code for Coolangatta
- Phonetic alphabet for "B"
- Money dispenser
20 Clues: Passenger • Money dispenser • "Is this your bag?" • To get on the plane • Adjacent to a terminal • Used for going overseas • Phonetic alphabet for "V" • Phonetic alphabet for "B" • Used for security screening • 3 letter code for Singapore • 3 letter code for Coolangatta • 3 letter code for Kapiti Coast • 6th busiest airport in New Zealand • 2 letter code for Virgin Australia • ...
CSC Crossword 2021-06-09
Across
- If you hear it, _____ it
- Anaheim Angels _____
- Color of pen a security guard uses
- Used to protect your skin from the sun
- Common hair color abbreviation
- Someone leaving with a subject who is being evicted
- Observe and _____
- Verbal or physical
- OC's branch manager
- Non-guard carded staff is _____ staff
- See something, _____ something
Down
- Wash your _____frequently
- What does CP stand for
- Text _____ to 474747 to place a contactless concessions order
- _____ items include weapons, alcohol and large bags
- Required to wear a security shirt
- Common eye color abbreviation
- 7th _____ stretch
- Guests are not allowed to re-_____ the stadium
- What day is payday?
- _____board
- A13's first name
22 Clues: _____board • A13's first name • 7th _____ stretch • Observe and _____ • Verbal or physical • What day is payday? • OC's branch manager • Anaheim Angels _____ • What does CP stand for • If you hear it, _____ it • Wash your _____frequently • Common eye color abbreviation • Common hair color abbreviation • See something, _____ something • Required to wear a security shirt • ...
Jared's crossword 3 2014-04-29
8 Clues: a safe on line classroom • unwelcomesexual advances • a sense of common purpose • bullying through cyber meadum • teaching and learning strategy • repeted cruelty or physical harm • bring together social and academic learning • a place of learning with rules and conditions
bullying crossword :Jamie 2023-03-21
8 Clues: the person who is mean. • bullying that is online . • talk to a trusted _______. • the person getting bullied. • bullying that pushes people. • bullying that says mean words. • the person watching the bullying. • bullying that is related to the emotions.
Cyber - safety Thomas 2016-06-06
Across
- online - connect to the internet
- - don't tell anyone your password
- - something mean people do to get you online
- - don't spend too much time online
- - protect personal information
- - if you feel something is wrong, then tell mum or dad
- - always ask your parents when it asks to spend money
Down
- - types of sites that we are allowed to visit
- - bad language that you shouldn't use on the internet
- - sites on the Internet you visit
- - dob on someone to mum or dad if you think something isn't right
- Email - types of emails that you get, that ask you to forward them on, but you shouldn't.
- - don't play too many games online
- - only talk to people you know online
14 Clues: - protect personal information • online - connect to the internet • - sites on the Internet you visit • - don't tell anyone your password • - don't play too many games online • - don't spend too much time online • - only talk to people you know online • - something mean people do to get you online • - types of sites that we are allowed to visit • ...
Cyber Bezpieczna Krzyżówka 2025-02-02
Across
- Program, który instaluje się, żeby zabezpieczyć komputer.
- Program na telefonie lub tablecie np. Do nauki, gier albo rozmów.
- To złośliwy program, który może zniszczyć twój komputer.
- Miejsce, gdzie możesz szukać informacji.
- Tworzysz je w grze lub na stronie internetowej, aby móc się później zalogować i korzystać z różnych funkcji.
- Coś co chronisz w internecie, nie podając sowich danych.
Down
- Klikasz go, by przejść na inną stronę internetową, ale musisz uważać, żeby nie był fałszywy.
- Kiedy ktoś obraża, straszy lub wyśmiewa innych internecie.
- Wykorzystanie czyjejś pracy jako swojej.
- To tajny kod, który chroni twoje konto w internecie.
- Informacje o tobie, takie jak imię, nazwisko, adres e-mail, które należy chronić w internecie.
- Miejsce w internecie, gdzie możesz rozmawiać z innymi ludźmi. Może być to w grze lub na stronie.
- Możesz ją wysłać do kogoś przez e-mail, komunikator lub SMS.
- Osoba, która potrafi włamać się do systemów komputerowych i może ukraść dane.
14 Clues: Wykorzystanie czyjejś pracy jako swojej. • Miejsce, gdzie możesz szukać informacji. • To tajny kod, który chroni twoje konto w internecie. • To złośliwy program, który może zniszczyć twój komputer. • Coś co chronisz w internecie, nie podając sowich danych. • Program, który instaluje się, żeby zabezpieczyć komputer. • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- you use it to keep your internet connection secure.
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
Down
- never send it to people meet online.
- when you download something, make sure it's a...
- before you post somenthing, you have to ask your...
- option to keep your profile private.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
10 Clues: you do it to avoid virus. • you have to keep them safe. • never send it to people meet online. • option to keep your profile private. • software used to delete viruses on a computer. • when you download something, make sure it's a... • before you post somenthing, you have to ask your... • you use it to keep your internet connection secure. • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
- never send it to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- option to keep your profile private.
- before you post somenthing, you have to ask yours...
10 Clues: you do it to avoid virus. • you have to keep them safe. • option to keep your profile private. • never send it to people meet online. • software used to delete viruses on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask yours... • ...
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
IT Security 2018-05-22
Across
- You should not be checking your ________ email while on work computers.
- When you temporarily leave the workstation you are working at, you should ___________ the computer.
- Where should you look for a policy and instructions on what to do during downtimes?
- When you receive an email from someone you don't know, you should click on links inside the email.
- Hospital computers and programs, including email, should be used for _______________ use only.
Down
- If you don't see a program on the desktop, where can you search for it?
- When calling or emailing the help desk, the ________ details you provide, the easier it will be to solve your issue quickly.
- Installing Windows updates on computers is important because it helps ____________ vulnerabilities on the computer.
- ePHI is everyone's responsibility.
- When you are done with your shift, you should always ________ of the workstation.
10 Clues: ePHI is everyone's responsibility. • If you don't see a program on the desktop, where can you search for it? • You should not be checking your ________ email while on work computers. • When you are done with your shift, you should always ________ of the workstation. • Where should you look for a policy and instructions on what to do during downtimes? • ...
Security Quiz 2019-02-19
Across
- Pleasing to the senses
- A person who is a member of a cooperative relationship
- A son of your brother or sister
- A female human offspring
Down
- Place of business where professional duties are performed
- The state of being free from danger or injury
- The principal activity in one's life to earn money
- A human offspring (son or daughter) of any age
- A daughter of your brother or sister
- A fully developed person from maturity onward
10 Clues: Pleasing to the senses • A female human offspring • A son of your brother or sister • A daughter of your brother or sister • The state of being free from danger or injury • A fully developed person from maturity onward • A human offspring (son or daughter) of any age • The principal activity in one's life to earn money • ...
IT Security 2020-01-06
Across
- password manager mentioned in presentation
- standalone malware computer program that replicates itself in order to spread to other computers
- network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- nickname of person who stolen Morele.net database
- a good hacker
- a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
10 Clues: a good hacker • password manager mentioned in presentation • nickname of person who stolen Morele.net database • standalone malware computer program that replicates itself in order to spread to other computers • a type of malicious software designed to block access to a computer system until a sum of money is paid. • ...
security puzzle 2015-03-03
Across
- A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
- A computer overtaken by a hacker and used to perform malicious tasks.
- is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
- A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
- A form of spyware that enters your computer from an Internet download.
- A new term for spam messages being sent to instant message addresses.
- Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
- The transfer of data from one computer (or server) to another computer.
- A person who enjoys exploring the details of computers and how to stretch their capabilities.
- A violation or infraction, as of a law, a legal obligation, or a promise.
10 Clues: A new term for spam messages being sent to instant message addresses. • A computer overtaken by a hacker and used to perform malicious tasks. • A form of spyware that enters your computer from an Internet download. • The transfer of data from one computer (or server) to another computer. • ...
Security - Medium 2023-11-28
Across
- routine of applying updates to software to address vulnerabilities
- cryptographic attack involves trying all possible keys until the correct one is found
- What do hackers do on a boat?
- type of encryption which uses the same key for both encryption and decryption
- a software vulnerability discovered by attackers before the vendor has become aware of it
- the secret code that enhances the security of passwords
Down
- type of attack involves intercepting and altering communication between two parties without their knowledge
- technique that involves gaining unauthorized access by pretending to be someone else
- a device or software that captures and records keystrokes on a computer
- security measure to verify a user's identity through a unique biological or behavioral characteristic
10 Clues: What do hackers do on a boat? • the secret code that enhances the security of passwords • routine of applying updates to software to address vulnerabilities • a device or software that captures and records keystrokes on a computer • type of encryption which uses the same key for both encryption and decryption • ...
Food Security 2024-01-10
Across
- Who added a new dimension to food security and emphasised the “access” to food?
- The introduction of __________ in India dates back to the 1940s Bengal Famine.
- A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as ______
- The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is _______
- Which revolution was adopted in July 1968?
Down
- Ration shops also known as
- Amul is a cooperative established in _________.
- Which was the most devastating famine faced by India?
- The price at which food grains are distributed in the deficit areas and among the poor strata of the society.
- The PDS card for below poverty line is ________.
10 Clues: Ration shops also known as • Which revolution was adopted in July 1968? • Amul is a cooperative established in _________. • The PDS card for below poverty line is ________. • Which was the most devastating famine faced by India? • The introduction of __________ in India dates back to the 1940s Bengal Famine. • ...
Data Security 2024-04-11
Across
- Involves intentional deception for financial gain or to cause harm.
- Process of converting data into a format that cannot be easily understood by unauthorized parties.
- Refers to the malfunctioning or breakdown of physical components in computer systems or devices.
- fires, floods, earthquakes
Down
- Record of events or activities occurring within a system, network, or application.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
- Used to authenticate users and control access to computer systems, networks, or applications.
- Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
- Security system designed to monitor and control incoming and outgoing network traffic.
- inaccurate data entry, accidental deletion or changing of data)
10 Clues: fires, floods, earthquakes • inaccurate data entry, accidental deletion or changing of data) • Involves intentional deception for financial gain or to cause harm. • Record of events or activities occurring within a system, network, or application. • Security system designed to monitor and control incoming and outgoing network traffic. • ...
