cyber security Crossword Puzzles

Spanish Vocabulary 2023-04-26

Spanish Vocabulary crossword puzzle
Across
  1. gum
  2. cloud
  3. butterfly
  4. boat
  5. train
  6. sun
  7. energy
  8. suitcase
  9. plain
  10. to fish
Down
  1. avocado
  2. candy
  3. airport
  4. baggage
  5. to board
  6. security
  7. weather
  8. skier
  9. snorkle
  10. shade

20 Clues: gumsunboatcandycloudtrainskiershadeplainenergyavocadoairportbaggageweathersnorkleto fishto boardsecuritysuitcasebutterfly

CHS 2017-02-08

CHS crossword puzzle
Across
  1. eighteen
  2. thirteen
  3. sixteen
  4. fifteen
  5. nineteen
  6. eight
  7. one
  8. twenty
  9. ten
  10. six
Down
  1. nine
  2. fourteen
  3. four
  4. seventeen
  5. five
  6. twelve
  7. seven
  8. three
  9. eleven
  10. two

20 Clues: onetwotensixninefourfiveseventhreeeighttwelveeleventwentysixteenfifteenfourteeneighteenthirteennineteenseventeen

At the airport 2023-08-15

At the airport crossword puzzle
Across
  1. säten
  2. personal
  3. passagerare
  4. mittgång
  5. bagagevagn
  6. pilot
  7. förarkabin
  8. resväska
  9. ankomst
  10. Nödutgång
Down
  1. bagage
  2. flygkabin
  3. bording
  4. Flygplats
  5. avgång
  6. säkerhetsbälte
  7. tull
  8. pass
  9. flygplan
  10. säkerhet

20 Clues: tullpasssätenpilotbagageavgångbordingankomstpersonalmittgångresväskaflygplansäkerhetflygkabinFlygplatsNödutgångbagagevagnförarkabinpassageraresäkerhetsbälte

Human Rights 2025-07-17

Human Rights crossword puzzle
Across
  1. – buzilish
  2. – huquqlar
  3. – ta’lim
  4. – adolat
  5. – qonuniy
  6. – sog‘liqni saqlash
  7. – kamsitish
  8. – tenglik
  9. – ozodlik
  10. – erkinlik
  11. – qadriyatlar
Down
  1. – qo‘llab-quvvatlash
  2. – zo‘ravonlik
  3. – demokratiya
  4. – insonparvarlik
  5. – qadr-qimmat
  6. – xavfsizlik
  7. – himoya
  8. – hurmat
  9. – qonun

20 Clues: – qonun– ta’lim– himoya– adolat– hurmat– qonuniy– tenglik– ozodlik– buzilish– huquqlar– erkinlik– kamsitish– xavfsizlik– zo‘ravonlik– demokratiya– qadr-qimmat– qadriyatlar– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash

Human Rights 2025-07-26

Human Rights crossword puzzle
Across
  1. – demokratiya
  2. – adolat
  3. – himoya
  4. – tenglik
  5. – sog‘liqni saqlash
  6. – xavfsizlik
  7. – ta’lim
  8. – qadriyatlar
Down
  1. – kamsitish
  2. – zo‘ravonlik
  3. – ozodlik
  4. – qonuniy
  5. – qadr-qimmat
  6. – qo‘llab-quvvatlash
  7. – qonun
  8. – hurmat
  9. – insonparvarlik
  10. – erkinlik
  11. – huquqlar
  12. – buzilish

20 Clues: – qonun– adolat– himoya– hurmat– ta’lim– ozodlik– qonuniy– tenglik– erkinlik– huquqlar– buzilish– kamsitish– xavfsizlik– demokratiya– zo‘ravonlik– qadr-qimmat– qadriyatlar– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash

CSC Crossword 2021-06-09

CSC Crossword crossword puzzle
Across
  1. If you hear it, _____ it
  2. Anaheim Angels _____
  3. Color of pen a security guard uses
  4. Used to protect your skin from the sun
  5. Common hair color abbreviation
  6. Someone leaving with a subject who is being evicted
  7. Observe and _____
  8. Verbal or physical
  9. OC's branch manager
  10. Non-guard carded staff is _____ staff
  11. See something, _____ something
Down
  1. Wash your _____frequently
  2. What does CP stand for
  3. Text _____ to 474747 to place a contactless concessions order
  4. _____ items include weapons, alcohol and large bags
  5. Required to wear a security shirt
  6. Common eye color abbreviation
  7. 7th _____ stretch
  8. Guests are not allowed to re-_____ the stadium
  9. What day is payday?
  10. _____board
  11. A13's first name

22 Clues: _____boardA13's first name7th _____ stretchObserve and _____Verbal or physicalWhat day is payday?OC's branch managerAnaheim Angels _____What does CP stand forIf you hear it, _____ itWash your _____frequentlyCommon eye color abbreviationCommon hair color abbreviationSee something, _____ somethingRequired to wear a security shirt...

Digital Fortress Crossword 2012-11-19

Digital Fortress Crossword crossword puzzle
Across
  1. NSA failure
  2. NSA motto: Everything is _________
  3. National Security Agency
  4. Outranked Strathmore; Director of NSA
  5. The late Tankado's father
  6. _______ 3; working area for the cryptographers
  7. Star Wars reference
  8. English meaning of Rocío
  9. Code-breaker
  10. Suspected murder
  11. Without wax
  12. Anagram
  13. Quis custodiet ipsos ________
  14. Late Strathmore
  15. Assassin
  16. City where Hulohot died
  17. What David wanted
Down
  1. What NSA wanted
  2. Elevator password
  3. Protagonist
  4. Hulohot is _____ ; disability
  5. Pass-key
  6. What would happen is Digital Fortress was released
  7. Midge's security
  8. Rotating ________ ; computer theory
  9. Iceberg-like machine, hacks into personal things
  10. Strathmore's natural trait
  11. The new type of virus
  12. TRANSLTR's safety net

29 Clues: AnagramPass-keyAssassinNSA failureProtagonistWithout waxCode-breakerWhat NSA wantedLate StrathmoreMidge's securitySuspected murderElevator passwordWhat David wantedStar Wars referenceThe new type of virusTRANSLTR's safety netCity where Hulohot diedNational Security AgencyEnglish meaning of RocíoThe late Tankado's fatherStrathmore's natural trait...

Cybersecurity CIS178 2024-07-12

Cybersecurity CIS178 crossword puzzle
Across
  1. Portable chip storing cellular connection
  2. Network Defense against unauthorized access
  3. Deceptive scheme to trick victims
  4. Fraudulent attempts to steal your data
  5. File or document sent electronically
  6. Cybercriminal skilled in breaching security
  7. Online content displayed in a browser
  8. Bad software directed at computers
  9. Digital Crimes committed using technology
  10. Developer updates to fix vulnerabilities
  11. Essential access code for security
Down
  1. Identifies you using something you are
  2. Affects system displaying unwanted ads
  3. Virus that disguises as legitimate software
  4. Holds data hostage for money
  5. Records users keystrokes to steal information
  6. Physical object used for authentication
  7. Detects and removes viruses
  8. Unauthorized software that gathers information
  9. Way to secure data trough coded algorithms

20 Clues: Detects and removes virusesHolds data hostage for moneyDeceptive scheme to trick victimsBad software directed at computersEssential access code for securityFile or document sent electronicallyOnline content displayed in a browserIdentifies you using something you areAffects system displaying unwanted adsFraudulent attempts to steal your data...

Rubrik 2024-11-06

Rubrik crossword puzzle
Across
  1. Sucks according to reddit
  2. He's him
  3. Dad
  4. SLED team name for October
  5. OCD
  6. Ancient
  7. Backups that cannot be deleted or changed
  8. Sparty
  9. Feature that scans for sensitive data
  10. Rubrik HQ
  11. Approach to security that trusts no system or person
  12. Worst city in the USA - see 4 down
Down
  1. Concussed
  2. Hates onions
  3. Worst team in the NFL
  4. Just married
  5. The ability to restore with a single button press
  6. Father of 9
  7. Your social security number is classified as this data type
  8. Badger
  9. Rubrik partner that has a shared responsibility model
  10. Company featured in Rubrik's most famous customer story
  11. Can be logical or physical

23 Clues: DadOCDBadgerSpartyAncientHe's himConcussedRubrik HQFather of 9Hates onionsJust marriedWorst team in the NFLSucks according to redditSLED team name for OctoberCan be logical or physicalWorst city in the USA - see 4 downFeature that scans for sensitive dataBackups that cannot be deleted or changedThe ability to restore with a single button press...

Impact of computing Vocabulary 2025-03-04

Impact of computing Vocabulary crossword puzzle
Across
  1. Rules for online behavior
  2. Unintended data use
  3. The result of encryption.
  4. Used to encrypt and decrypt data.
  5. Software that damages computers
  6. Data collected about you
  7. Unwanted email
  8. To convert encrypted data back to its original form.
  9. Code that scrambles data
  10. The goal of encryption.
  11. Automated decision making
Down
  1. Illegal access to computer systems
  2. Online identity theft
  3. between those who have and don't have tech access
  4. Protecting computer systems
  5. Study of ethical choices in computing
  6. A process used in encryption.
  7. The process of encoding data.
  8. A system or way of doing something, like encryption.
  9. What is protected by encryption.
  10. To convert data into a code.

21 Clues: Unwanted emailUnintended data useOnline identity theftThe goal of encryption.Data collected about youCode that scrambles dataRules for online behaviorThe result of encryption.Automated decision makingProtecting computer systemsTo convert data into a code.A process used in encryption.The process of encoding data.Software that damages computers...

Series 63 - Chapter 3 2024-05-02

Series 63 - Chapter 3 crossword puzzle
Across
  1. kept on file for 6 years, detailed record of trading activity
  2. quick build up of interest in a security, followed by disposition of security, and typically price decline
  3. maximum prison sentence for willful violation of the USA
  4. block trades immediately as the market opens
  5. making market decisions for a portfolio with NPI
  6. winner of crossword two
  7. administrator does NOT have authority to
Down
  1. first name of your 63 coach (Hint: it's not Hunter, and you can find this information independently)
  2. Administrator may do this when they are investigating potential violations
  3. trading ahead of large pending orders
  4. block trades immediately before market close
  5. winner of crossword one
  6. willful deceit of client
  7. excessive trades in the account for commission
  8. typically rectified by way of payment of fees & covering cost of litigation never prison time
  9. buy and sale of security repeatedly to create illusion of activity
  10. placing fake orders to move prices up or down

17 Clues: winner of crossword onewinner of crossword twowillful deceit of clienttrading ahead of large pending ordersadministrator does NOT have authority toblock trades immediately before market closeblock trades immediately as the market opensplacing fake orders to move prices up or downexcessive trades in the account for commission...

BIDEN'S BORDER CRISIS 2022-07-07

BIDEN'S BORDER CRISIS crossword puzzle
Across
  1. number of times V.P. Harris has been to the border
  2. "________ Border Crisis"
  3. number of times Rep. Cammack has been to the border
  4. Homeland Security Secretary
  5. "______ 42"
  6. agents who deport illegal immigrants
  7. "Build The ______"
  8. nickname for those who smuggle immigrants across the border
  9. acronym for 'Remain In Mexico' Policy
Down
  1. "Every town is a _______ town."
  2. type of drug smuggled across border
  3. "__________ in Chief"
  4. the 'Border Czar'
  5. Department of _________ Security
  6. primary border control organization

15 Clues: "______ 42"the 'Border Czar'"Build The ______""__________ in Chief""________ Border Crisis"Homeland Security Secretary"Every town is a _______ town."Department of _________ Securitytype of drug smuggled across borderprimary border control organizationagents who deport illegal immigrantsacronym for 'Remain In Mexico' Policy...

The United Nations 2013-06-17

The United Nations crossword puzzle
Across
  1. What is needed for a motion to be passed.
  2. Number of permanent members on the Security Council
  3. General Secretary of the United Nations
  4. Largest financial contributor to the United Nations.
  5. Charitable agency that particularly helps women and children
  6. One of the founding countries of the United Nations
Down
  1. Eight goals that the United Nations established.
  2. A proposal to be debated in the General Assembly.
  3. Personnel that attempt to keep peace in an area of conflict
  4. What the United Nations is trying to promote
  5. The colour that peacekeepers wear
  6. Document outlining the rules and role of the United Nations
  7. The world-wide event that prompted the formation of the United Nations.
  8. Number of members on the Security Council
  9. How long a non-permanent member of the Security council can keep their seat.

15 Clues: The colour that peacekeepers wearGeneral Secretary of the United NationsWhat is needed for a motion to be passed.Number of members on the Security CouncilWhat the United Nations is trying to promoteEight goals that the United Nations established.A proposal to be debated in the General Assembly.Number of permanent members on the Security Council...

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. Gossiping about someone then spreading it
  2. self harm
  3. saying something mean about someone
  4. a person who does nothing about a bullying.
  5. for example touching peoples private areas
Down
  1. writing mean things online, etc
  2. bullying to hurt someones feelings
  3. a person who helps the victim stand up.
  4. not a real form of bullying friends often do.
  5. bullying through words

10 Clues: self harmbullying through wordswriting mean things online, etcbullying to hurt someones feelingssaying something mean about someonea person who helps the victim stand up.Gossiping about someone then spreading itfor example touching peoples private areasa person who does nothing about a bullying.not a real form of bullying friends often do.

Digital Identity Crossword 2025-04-24

Digital Identity Crossword crossword puzzle
Across
  1. what you do to find something
  2. leaves your mark behind
  3. your online display ____
Down
  1. protects your stuff
  2. what are you on right now
  3. your teachers name
  4. your online identity
  5. something that uses the internet or a computer
  6. what are you using for to access this
  7. A word that means something happens on the internet or with computers.

10 Clues: your teachers nameprotects your stuffyour online identityleaves your mark behindyour online display ____what are you on right nowwhat you do to find somethingwhat are you using for to access thissomething that uses the internet or a computerA word that means something happens on the internet or with computers.

TTS INFORMATIKA 2025-06-09

TTS INFORMATIKA crossword puzzle
Across
  1. Tipe data untuk menyimpan teks
  2. ciri-ciri fakta
  3. bullying. Perundungan digital
  4. garis. Menampilkan Tren data dari suatu selang waktu
  5. Microsoft exel disebut juga dengan nama aplikasi
Down
  1. Ciri-ciri opini
  2. publik. Informasi yang dapat diakses oleh siapapun
  3. Tempat penyimpanan Data sementara yang dapat berubah-ubah selama program berjalan
  4. pernyataan yang dapat di buktikan kebenaranya
  5. Imformasi palsu

10 Clues: Ciri-ciri opiniciri-ciri faktaImformasi palsuTipe data untuk menyimpan teksbullying. Perundungan digitalpernyataan yang dapat di buktikan kebenaranyaMicrosoft exel disebut juga dengan nama aplikasipublik. Informasi yang dapat diakses oleh siapapungaris. Menampilkan Tren data dari suatu selang waktu...

psychomotoricke zrucnosti 2021-02-24

psychomotoricke zrucnosti crossword puzzle
Across
  1. Name of a modification that is not performed via the application business user interface
  2. Strategic Access Management tool
  3. Second goal of IT security
  4. Third goal of IT security
  5. Corporate .... Deviation (CDD)
  6. The second step in risk management process
  7. Chapter 8 of ASCA Procedure Manual
  8. What document helps you to check whether you are compliant with our security standard
  9. Opposite of DAST
  10. Corporate instruction covering IBM Worldwide records management
  11. Name of the tool that replaced WST
  12. Standard describing requirements on IT Business Continuity
  13. Standard that describes therisk severity guidelines
  14. To what data types LEG116 applies
  15. The first step in risk management process
Down
  1. What is CHS162 applied for
  2. What does ASCA stand for
  3. First element of risk
  4. Where the deviations are maintained
  5. Other word for separation in Separation of duties
  6. Where can you read through BPBC127? Where is it located?
  7. Third element of risk
  8. Standard that ASCA is driven by
  9. Where the DSR requests are handled
  10. California .... Privacy Act
  11. Name of the new privacy tool
  12. Who do you need confirmation from whether your application processes crown jewel data
  13. Corporate instruction for registration criteria

28 Clues: Opposite of DASTFirst element of riskThird element of riskWhat does ASCA stand forThird goal of IT securityWhat is CHS162 applied forSecond goal of IT securityCalifornia .... Privacy ActName of the new privacy toolCorporate .... Deviation (CDD)Standard that ASCA is driven byStrategic Access Management toolTo what data types LEG116 applies...

Crossword 2024-06-27

Crossword crossword puzzle
Across
  1. Extortion software locking access until a ransom is paid.
  2. Notification signaling an impending or current security threat.
  3. Control Mechanism governing resource visibility and usage permissions.
  4. Sniffing Analysis technique for capturing and inspecting network traffic.
  5. Exit or departure point from a system or network.
  6. Entity opposing or competing against one's security measures.
  7. Detection Systematic monitoring for suspicious network activities indicating potential threats.
  8. Unpermitted access gained by following an authorized individual into a secure area.
  9. Decoy system designed to lure and trap attackers.
  10. Deviation from standard norms indicating potential security issues.
  11. Covert surveillance software used to secretly monitor another user's digital activities.
Down
  1. Deceptive program masquerading as beneficial software to compromise systems.
  2. Interconnected ensemble of computers facilitating communication.
  3. Distributed attack aimed at overwhelming network resources to cause service disruption.
  4. Elevation of privileges typically exploited in unauthorized access.
  5. Process of encoding data to prevent unauthorized access.
  6. Software tool leveraging system vulnerabilities for unauthorized advantage.
  7. Successful breach resulting in unauthorized system control.
  8. Unauthorized disclosure of internal data to external entities.
  9. Malicious software disguised as legitimate to breach defenses.
  10. Test Probing examination simulating cyberattacks to identify vulnerabilities.
  11. Secure service ensuring private internet connectivity.
  12. Security Safeguarding measures to prevent unauthorized network intrusions.
  13. Team Group conducting simulated adversary attacks to test defensive capabilities.

24 Clues: Exit or departure point from a system or network.Decoy system designed to lure and trap attackers.Secure service ensuring private internet connectivity.Process of encoding data to prevent unauthorized access.Extortion software locking access until a ransom is paid.Successful breach resulting in unauthorized system control....

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell an ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell an ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

the eye of minds crossword puzzle 2024-05-12

the eye of minds crossword puzzle crossword puzzle
Across
  1. the main character
  2. how they access the vertnet
  3. michaels best friend also knowen as the best gamer
  4. when your in the game
  5. the name of the virus
Down
  1. the cyber-terrorist in the game
  2. the main way michael gets information
  3. the name of the game
  4. the network of the game
  5. michaels friend is known for her coding.
  6. the agency trying to stop kaine

11 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamehow they access the vertnetthe cyber-terrorist in the gamethe agency trying to stop kainethe main way michael gets informationmichaels friend is known for her coding.michaels best friend also knowen as the best gamer

Espanol 4: Unidad 4 Contexto 1 2017-04-30

Espanol 4: Unidad 4 Contexto 1 crossword puzzle
Across
  1. together
  2. quality
  3. retire
  4. apprenticeship
  5. scatter
  6. interview
  7. scholarship
  8. security
  9. check
  10. application
  11. rest
Down
  1. value
  2. relieve
  3. anxiety
  4. unsatisfied
  5. prestige
  6. hobby
  7. leisure
  8. relax
  9. dedicate
  10. choose

21 Clues: restvaluehobbyrelaxcheckretirechooserelievequalityanxietyleisurescattertogetherprestigededicatesecurityinterviewunsatisfiedscholarshipapplicationapprenticeship

Crossword Englisch 2015-10-19

Crossword Englisch crossword puzzle
Across
  1. beveiliging
  2. kostbaar
  3. ingang
  4. boet
  5. bestemming
  6. schade
  7. verval
  8. zichtbaar
  9. verzekering
  10. BTW
Down
  1. apart
  2. met-zorg
  3. weegbrug
  4. kentekenplaat
  5. bederfbare
  6. overstroming
  7. versnelling
  8. herkomst
  9. omleiding
  10. koppeling

20 Clues: BTWboetapartingangschadevervalmet-zorgweegbrugkostbaarherkomstomleidingzichtbaarkoppelingbederfbarebestemmingbeveiligingversnellingverzekeringoverstromingkentekenplaat

The outbreak of the Cold War 2015-02-22

The outbreak of the Cold War crossword puzzle
Across
  1. e
  2. j
  3. i
  4. q
  5. a
  6. k
  7. r
  8. s
  9. b
  10. f
Down
  1. p
  2. g
  3. t
  4. u
  5. n
  6. h
  7. c
  8. o
  9. m
  10. d
  11. l

21 Clues: pgetjuniqhcoamdklrsbf

Kintahdi Diné Binidaanishígíí Opal Mohs-6th 2023-03-06

Kintahdi Diné Binidaanishígíí Opal Mohs-6th crossword puzzle
Across
  1. barber
  2. shop worker
  3. baker
  4. photographer
  5. plumber
  6. butcher
  7. mechanic
  8. architect
  9. florist
  10. weather forecaster
  11. janitor
Down
  1. carpenter
  2. pharmacist
  3. doorman
  4. writer
  5. electrician
  6. painter
  7. security guard
  8. salesperson
  9. gardener

20 Clues: bakerbarberwriterdoormanplumberbutcherpainterfloristjanitormechanicgardenercarpenterarchitectpharmacistelectricianshop workersalespersonphotographersecurity guardweather forecaster

viajes felizes 2022-10-13

viajes felizes crossword puzzle
Across
  1. confirm
  2. security
  3. assistant
  4. to board
  5. gate
  6. agent
  7. passport
  8. agency
  9. screen
  10. line
Down
  1. to travel
  2. departure
  3. passenger
  4. itinerary
  5. check
  6. to call
  7. suitcase
  8. ticket
  9. luggage
  10. flight

20 Clues: gatelinecheckagentticketflightagencyscreenconfirmto callluggagesecuritysuitcaseto boardpassportto traveldeparturepassengeritineraryassistant

Human Rights 2025-07-26

Human Rights crossword puzzle
Across
  1. – sog‘liqni saqlash
  2. – adolat
  3. – xavfsizlik
  4. – zo‘ravonlik
  5. – qadr-qimmat
  6. – insonparvarlik
  7. – ozodlik
  8. – himoya
Down
  1. – qo‘llab-quvvatlash
  2. – ta’lim
  3. – demokratiya
  4. – qadriyatlar
  5. – kamsitish
  6. – erkinlik
  7. – tenglik
  8. – buzilish
  9. – qonun
  10. – hurmat
  11. – qonuniy
  12. – huquqlar

20 Clues: – qonun– ta’lim– adolat– hurmat– himoya– tenglik– qonuniy– ozodlik– erkinlik– buzilish– huquqlar– kamsitish– xavfsizlik– demokratiya– qadriyatlar– zo‘ravonlik– qadr-qimmat– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash

tourism 2019-07-16

tourism crossword puzzle
Across
  1. Z in the phonetic alphabet
  2. Y in the phonetic alphabet
  3. S in the phonetic alphabet
  4. Where is Qantas based
  5. NZ's low cost carrier
  6. the area before departing through security
  7. The capital of New Zealand
  8. Charles De Gaulle airport is situated where
  9. World's busiest airport
  10. Japans busiest airport
  11. Q in the phonetic alphabet
Down
  1. Hamilton's three letter code
  2. F in the phonetic alphabet
  3. Another word for baggage
  4. Busiest country in the world in regards to airports
  5. NZ's full service carrier
  6. where you go through security and hand over your passport
  7. ROT stands for
  8. 1900 Is what in the 12 hour clock
  9. Hokitika's three letter code

20 Clues: ROT stands forWhere is Qantas basedNZ's low cost carrierJapans busiest airportWorld's busiest airportAnother word for baggageNZ's full service carrierF in the phonetic alphabetZ in the phonetic alphabetY in the phonetic alphabetS in the phonetic alphabetThe capital of New ZealandQ in the phonetic alphabetHamilton's three letter code...

CIS 120 Cybersecurity Crossword Puzzle 2023-02-21

CIS 120 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. software that is constantly updating
  2. software/hardware keep intruders out
  3. text read by human eye
  4. transform ciphertext into original plaintext
  5. test distinguishes between human/robot
  6. security mechanism determining who's authorized
  7. intent to cause mischief/theft
  8. code imbedded into computer hardware
  9. technique to click bad url
  10. physical parts of a computer
  11. core of computers operating system
Down
  1. trap or decoy for attackers
  2. coding used to protect information
  3. connect computers to encrypted network
  4. attempt to violate security perimeter
  5. language to create/control website content
  6. shield users against computer damage
  7. term for unauthorized computer attacker
  8. malicious software to damage systems
  9. an error in computer program

20 Clues: text read by human eyetechnique to click bad urltrap or decoy for attackersan error in computer programphysical parts of a computerintent to cause mischief/theftcoding used to protect informationcore of computers operating systemsoftware that is constantly updatingsoftware/hardware keep intruders outshield users against computer damage...

Cybersecurity 2024-08-31

Cybersecurity crossword puzzle
Across
  1. bring your own computer
  2. coding used to protect information
  3. a method of gaining access to a network
  4. protects users from fraudulent websites
  5. a string used to identify user
  6. a program that is run without installation
  7. malicious software
  8. bring your own device
  9. items that are temporarily blocked
  10. process of identifying someone
  11. taking advantage of a vulnerability in a network
Down
  1. combination of robot and network
  2. individual with intent to hack maliciously
  3. network security system
  4. a kind of spyware
  5. a denial of service
  6. computer security system trap
  7. casting a reel in water
  8. intrusive software
  9. someone with knowledge of exploits
  10. misuse of devices to corrupt

21 Clues: a kind of spywaremalicious softwareintrusive softwarea denial of servicebring your own devicebring your own computernetwork security systemcasting a reel in watermisuse of devices to corruptcomputer security system trapprocess of identifying someonea string used to identify usercombination of robot and networkcoding used to protect information...

Social Security and Medicare Taxes 2023-09-11

Social Security and Medicare Taxes crossword puzzle
Across
  1. Gross Income: $13,100 Find amount withheld for Social Security. Round to the nearest dollar.
  2. Gross Income: $50,100 Find amount withheld for Social Security. Round to the nearest dollar.
  3. Gross Income: $3,100 Find amount withheld for Social Security. Round to the nearest dollar.
  4. Gross Income: $53,100 Find amount withheld for Medicare. Round to the nearest dollar.
Down
  1. Gross Income: $73,100 Find amount withheld for Social Security. Round to the nearest dollar.
  2. Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar.
  3. Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar.
  4. Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar.
  5. Gross Income: $10,100 Find amount withheld for Social Security. Round to the nearest dollar.
  6. Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar.

10 Clues: Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar.Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar.Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar.Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar....

MEDIMUN Crossword 2022-03-24

MEDIMUN Crossword crossword puzzle
Across
  1. every committee has 2 … and many delegates
  2. the theme of this years MEDIMUN is Global …
  3. games that relieve tension between students before the debate
  4. GA2 focuses …, financial and economic development
  5. the annual session of MEDIMUN is also referred to as the annual …
  6. One of the themes of the … council is the situation in Afghanistan
  7. delegates make can make speeches for and …
  8. an instance of declining to vote for or against a proposal or motion.
Down
  1. the … team are the team of reporters that put this issue together
  2. the security historical … discussed the Sino-Vietnamese war this year
  3. …of information
  4. this is the 17th … of MediNews
  5. the name of the wonderful disease that caused a change in venue
  6. delegates can form … with other delegates
  7. the name of the country which is a permanent member of the UN security councils and has crepes
  8. a formal discussion on a particular matter In which opposing arguments are put forward
  9. the name of the newly formed committee on the topic of crime

17 Clues: …of informationthis is the 17th … of MediNewsdelegates can form … with other delegatesevery committee has 2 … and many delegatesdelegates make can make speeches for and …the theme of this years MEDIMUN is Global …GA2 focuses …, financial and economic developmentthe name of the newly formed committee on the topic of crime...

Unit 1, Chapter 2 Vocabulary 2017-01-25

Unit 1, Chapter 2 Vocabulary crossword puzzle
Across
  1. most of the people or things in a group
  2. restriction (n), _____ (v), restricting (adj)
  3. controversial (adj), _____ (n)
  4. contribute (v), _____ (n), contributor (n – person), contributory (adj)
  5. participate (v), _____ (n), participatory (adj.)
  6. the basic idea that a plan or system is based on
  7. to take part in an activity or event
  8. a person who is considered separately from the rest of the group or society that they live in
  9. immigrant (n), immigration (n), _____ (v)
  10. things that are done to keep a person, building, or country safe from danger or crime
Down
  1. someone who enters another country to live there permanently
  2. to help to make something happen
  3. security (n), _____ (v), security (adj)
  4. existing or happening in many places or situations, or among many people
  5. a rule or law that limits or controls what people can do
  6. causing a lot of disagreement because many people have strong opinions about the subject being discussed
  7. individual (n), individual (adj), _____ (adv)
  8. impose (v), _____ (n)
  9. to force someone to have the same ideas, beliefs, etc. as you
  10. resident (n: person), _____ (n: place), residential (adj)
  11. someone who lives or stays in a particular place

21 Clues: impose (v), _____ (n)controversial (adj), _____ (n)to help to make something happento take part in an activity or eventsecurity (n), _____ (v), security (adj)most of the people or things in a groupimmigrant (n), immigration (n), _____ (v)restriction (n), _____ (v), restricting (adj)individual (n), individual (adj), _____ (adv)...

iQuesta 2022 - Finals 2022-01-27

iQuesta 2022 - Finals crossword puzzle
Across
  1. Playing video and sound in real time
  2. malware type in which security mechanism is bypassed to access a system.
  3. The information about someone on the Internet
  4. Using material another person has created and claims it as your own
  5. acts as a security guard between the internet and a network
  6. the amount of data that can travel over an analog medium
  7. A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
  8. application for performing numerical and statistical calculations
  9. a program that can analyze and execute a program line by line.
Down
  1. The purpose of scrambling data so it can be sent securely over networks.
  2. A number assigned to any item that is connected to the Internet
  3. a method used for a security breach in wireless networks
  4. instructions programmed on a hardware
  5. Initialize the system hardware components
  6. blockchain programming
  7. Vendor-created program modifications are called
  8. To allow communication inside the organization
  9. A location that provides wireless Internet access.
  10. name of the system that manages and programs hardware resources for a computer
  11. is a layout software

20 Clues: is a layout softwareblockchain programmingPlaying video and sound in real timeinstructions programmed on a hardwareInitialize the system hardware componentsThe information about someone on the InternetTo allow communication inside the organizationVendor-created program modifications are calledA location that provides wireless Internet access....

Bengkel SOP 2024 2024-01-04

Bengkel SOP 2024 crossword puzzle
Across
  1. To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
  2. Objective ___ is to reduce the risk of fraud, error and bypassing of information security controls.
  3. To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered is objective for ___.
  4. Any devices that require wi-fi access must get authorized from ___.
  5. How many guideline do we have in JTMD
Down
  1. ___ is to preserve information security when executing changes.
  2. How many policy do we have in ISP ?
  3. Test information is To ensure relevance of testing and protection of operational information used for ___?
  4. Copyright, software license, trademarks, design rights is example of ___.
  5. Personal identifiable information should follow accordingly with ___.
  6. ___ must be implemented to ensure data security, including at the stages of data in transit, data at rest, and data in use.
  7. ___ is shortform for Information Security Policy

12 Clues: How many policy do we have in ISP ?How many guideline do we have in JTMD___ is shortform for Information Security Policy___ is to preserve information security when executing changes.Any devices that require wi-fi access must get authorized from ___.Personal identifiable information should follow accordingly with ___....

Cyber Safety 2020-02-19

Cyber Safety crossword puzzle
Across
  1. flagfeeling when something happens on digital media that makes you feeluncomfortable, worried, sad, or anxious
  2. information about you that can be used to identify you because it isunique to you (e.g. your full name or your address)
  3. an attempt to trick someone, usually with the intention of stealing moneyor private information
  4. a type of crime in which your private information is stolen and used forcriminal activity
  5. using media in a way that feels healthy and in balance with other lifeactivities (family, friends, school, hobbies, etc.)
Down
  1. information that comes to us through the internet, often through a tablet,smartphone, or laptop
  2. information about you that can be used to identify you because it is
  3. to engage in activities that don't involve devices, apps, or the internet
  4. URL:a web address that has been condensed and which could mislead anuser into going into a risky website
  5. when someone poses as an institution, like a bank or school, and sends you apersonalized message asking you to provide private information

10 Clues: information about you that can be used to identify you because it isto engage in activities that don't involve devices, apps, or the interneta type of crime in which your private information is stolen and used forcriminal activityinformation that comes to us through the internet, often through a tablet,smartphone, or laptop...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. the use of technology to harass, threaten, embarrass, or target another person.
  3. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  4. Electronic device most students own at home and is square and mostly portable.
Down
  1. An individual who causes harm or stress to another human intentionally and repetitively.
  2. A repetitive action toward another human purposely causing harm or intimidation.
  3. The act of protecting ones self or others from harm or intimidation online.
  4. Having firm belief or reliability in someone.
  5. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.The act of protecting ones self or others from harm or intimidation online.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person....

Cyber stuff 2021-09-17

Cyber stuff crossword puzzle
Across
  1. what you have to do online. one word
  2. use it do do everything online
  3. this unlocks you personal information
  4. mark Zuckerberg made this
Down
  1. when people be mean to you online. one word
  2. YOU WATCH SAM PILGRIM ON IT
  3. use this to text people
  4. instagram is one of them.two words combined
  5. is what i keep saying

9 Clues: is what i keep sayinguse this to text peoplemark Zuckerberg made thisYOU WATCH SAM PILGRIM ON ITuse it do do everything onlinewhat you have to do online. one wordthis unlocks you personal informationwhen people be mean to you online. one wordinstagram is one of them.two words combined

cyber bullying 2021-09-17

cyber bullying crossword puzzle
Across
  1. we ALL have experience with this event hint covid
  2. it is the thing we are doing this about
  3. showing still things to imbrues people
  4. giving people soping that means they can take your stuff or look trough their history
Down
  1. a game with toxic people that will cus at u and they have a ninja
  2. places with people faking there appearance
  3. a mobile divice that people use for cyberbulling that can fit in your pocket
  4. jack has had an experience on it
  5. it is a popular social media with a toxic environment start with a t t

9 Clues: jack has had an experience on itshowing still things to imbrues peopleit is the thing we are doing this aboutplaces with people faking there appearancewe ALL have experience with this event hint covida game with toxic people that will cus at u and they have a ninjait is a popular social media with a toxic environment start with a t t...

Cyber Crimes 2017-04-16

Cyber Crimes crossword puzzle
Across
  1. The largest social network in the world, founded by Mark Zuckerberg
  2. conditional word or set of characters
  3. breaking the law (adjective)
  4. type of malicious software that can make copies of itself and infect other programs code
Down
  1. place where information on the Internet is lokated
  2. specialist in programming
  3. machine Automatic machine for receiving cash on a credit plastic card
  4. type of address on which content is located
  5. computer burglar

9 Clues: computer burglarspecialist in programmingbreaking the law (adjective)conditional word or set of characterstype of address on which content is locatedplace where information on the Internet is lokatedThe largest social network in the world, founded by Mark Zuckerbergmachine Automatic machine for receiving cash on a credit plastic card...

cyber bullying 2019-07-12

cyber bullying crossword puzzle
Across
  1. not offline
  2. killing yourself
  3. always texting you
  4. not very well
  5. a group
Down
  1. opposite to kind
  2. makes you go red and want to cry
  3. seek to harm
  4. a media

9 Clues: a mediaa groupnot offlineseek to harmnot very wellopposite to kindkilling yourselfalways texting youmakes you go red and want to cry

CYBER HYGΙΕΝΕ 2023-12-09

CYBER HYGΙΕΝΕ crossword puzzle
Across
  1. Έλεγχος .....δύο παραγόντων
  2. Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing)
  3. ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ
  4. Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης
Down
  1. Μπορεί να είναι και ηλεκτρονική
  2. Τι σημαίνει cyber hygiene?
  3. Λογισμικό για να είναι ασφαλής ο υπολογιστής μας
  4. ...(virus)ένα πρόγραμμα που εισβάλλει στον υπολογιστή μας με ανεπιθύμητες παρενέργειες
  5. Προσπάθεια για .... κωδικών πρόσβασης

9 Clues: Τι σημαίνει cyber hygiene?Έλεγχος .....δύο παραγόντωνΜπορεί να είναι και ηλεκτρονικήΠροσπάθεια για .... κωδικών πρόσβασηςΣτο διαδίκτυο υπάρχει και τέτοιο ..(phishing)Λογισμικό για να είναι ασφαλής ο υπολογιστής μας...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/ΥΔεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης...

Cyber Crime 2024-03-22

Cyber Crime crossword puzzle
Across
  1. Sending nasty messages online to get a reaction
  2. Repeatedly bothering or scaring someone online
  3. Using internet, devices, electronics to bully someone.
Down
  1. Software that can harm your computer
  2. Prenteding to be a genuine website/ source in an email to steal information
  3. Stealing someone's personal information online
  4. Trying to trick someone out of money
  5. Breaking into a computer system
  6. Pretending o be someone else online to trick you.

9 Clues: Breaking into a computer systemSoftware that can harm your computerTrying to trick someone out of moneyStealing someone's personal information onlineRepeatedly bothering or scaring someone onlineSending nasty messages online to get a reactionPretending o be someone else online to trick you.Using internet, devices, electronics to bully someone....

Cyber Crosswords 2024-06-19

Cyber Crosswords crossword puzzle
Across
  1. A secret word or phrase used to gain access to a computer system (8 letters)
  2. A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
  3. The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
  1. Software that is designed to detect and destroy computer viruses (9 letters)
  2. The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
  3. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
  5. An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
  6. Unsolicited email, often used for advertising or phishing (4 letters)

9 Clues: Unsolicited email, often used for advertising or phishing (4 letters)Software that is designed to detect and destroy computer viruses (9 letters)A secret word or phrase used to gain access to a computer system (8 letters)The practice of protecting systems, networks, and programs from digital attacks (10 letters)...

Cyber Quiz 2024-08-29

Cyber Quiz crossword puzzle
Across
  1. Attack involving the use of Malicious Software
  2. Process of Verifying Identity
  3. Secure connection Protocol
  4. Communicating devices in a network
Down
  1. Software that protects against malware
  2. Method use to protect/Hide information
  3. A method use to protect integrity of a data
  4. A network security devices
  5. Threat that involves fraudulent emails

9 Clues: A network security devicesSecure connection ProtocolProcess of Verifying IdentityCommunicating devices in a networkSoftware that protects against malwareMethod use to protect/Hide informationThreat that involves fraudulent emailsA method use to protect integrity of a dataAttack involving the use of Malicious Software

Cyber Safety 2024-10-03

Cyber Safety crossword puzzle
Across
  1. a type of malicious software that finds weak spots in different apps and slides its way into your information
  2. a device similar to number 4 that you can play mobile games on
  3. an app the has the symbol of a ghost on its logo
  4. a device I can do my homework on
  5. a type of computer malicious software that takes over a device potentially locking yourself out of your device
Down
  1. a device where you can call your friends on facetime
  2. malicious software
  3. an app that has the letter F on its logo (this app has had a cyber attack before)
  4. sending emails with links hoping to gain peoples passwords

9 Clues: malicious softwarea device I can do my homework onan app the has the symbol of a ghost on its logoa device where you can call your friends on facetimesending emails with links hoping to gain peoples passwordsa device similar to number 4 that you can play mobile games on...

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. A COLLECTION OF THINGS TO BUY
  2. ITEMS AVAILABLE FOR SALE
  3. WHAT YOU DO TO LOOK FOR ITEMS
  4. THE COST OF AN ITEM
Down
  1. WHAT YOU BUY FOR SOMEONE ELSE
  2. TO BUY SOMETHING ONLINE
  3. WHAT YOU DO WITH MONEY ONLINE
  4. WHERE YOU RECEIVE PROMO CODES
  5. A SHORTENED TERM FOR PROMOTION

9 Clues: THE COST OF AN ITEMTO BUY SOMETHING ONLINEITEMS AVAILABLE FOR SALEWHAT YOU BUY FOR SOMEONE ELSEA COLLECTION OF THINGS TO BUYWHAT YOU DO TO LOOK FOR ITEMSWHAT YOU DO WITH MONEY ONLINEWHERE YOU RECEIVE PROMO CODESA SHORTENED TERM FOR PROMOTION

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO WRAP ITEMS
  2. A DISCOUNT ON ITEMS
  3. WHAT YOU NEED TO MANAGE DURING SHOPPING
  4. A FAST-MOVING CROWD DURING SALES
  5. THE SYMBOL OF A BRAND
Down
  1. WHAT YOU NEED IN A WEBSITE
  2. A SCORE GIVEN BY CUSTOMERS
  3. WHAT YOU DO IF AN ITEM IS UNSUITABLE
  4. TO BROWSE AND BUY

9 Clues: TO WRAP ITEMSTO BROWSE AND BUYA DISCOUNT ON ITEMSTHE SYMBOL OF A BRANDWHAT YOU NEED IN A WEBSITEA SCORE GIVEN BY CUSTOMERSA FAST-MOVING CROWD DURING SALESWHAT YOU DO IF AN ITEM IS UNSUITABLEWHAT YOU NEED TO MANAGE DURING SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO WRAP ITEMS
  2. A DISCOUNT ON ITEMS
  3. WHAT YOU NEED TO MANAGE DURING SHOPPING
  4. A FAST-MOVING CROWD DURING SALES
  5. THE SYMBOL OF A BRAND
Down
  1. WHAT YOU NEED IN A WEBSITE
  2. A SCORE GIVEN BY CUSTOMERS
  3. WHAT YOU DO IF AN ITEM IS UNSUITABLE
  4. TO BROWSE AND BUY

9 Clues: TO WRAP ITEMSTO BROWSE AND BUYA DISCOUNT ON ITEMSTHE SYMBOL OF A BRANDWHAT YOU NEED IN A WEBSITEA SCORE GIVEN BY CUSTOMERSA FAST-MOVING CROWD DURING SALESWHAT YOU DO IF AN ITEM IS UNSUITABLEWHAT YOU NEED TO MANAGE DURING SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Cyber Hunt 2025-09-30

Cyber Hunt crossword puzzle
Across
  1. A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
  2. MALICIOUS SOFTWARE
  3. WEAKNESS OF A SYSTEM
  4. A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW
  5. THE STATE OF KEEPING SECRET
Down
  1. THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT
  2. VERIFYING SOMEONE'S IDENTITY IS VALID
  3. POTENTIAL RISK
  4. A TYPE OF MALWARE THAT SPREADS BY ITSELF

9 Clues: POTENTIAL RISKMALICIOUS SOFTWAREWEAKNESS OF A SYSTEMTHE STATE OF KEEPING SECRETVERIFYING SOMEONE'S IDENTITY IS VALIDA TYPE OF MALWARE THAT SPREADS BY ITSELFA CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAWTHE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMATA TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID

Cyber tools 2023-01-09

Cyber tools crossword puzzle
Across
  1. best social networking site to chat
  2. best social networking site to watch videos
  3. a form of blogging using short posts without titles.
  4. an American social networking service based in San Francisco, California
Down
  1. to
  2. best way to connect with friends, work colleagues or random people
  3. apps GPS
  4. Similar to Microsoft OneDrive
  5. best way to find a job

9 Clues: toapps GPSbest way to find a jobSimilar to Microsoft OneDrivebest social networking site to chatbest social networking site to watch videosa form of blogging using short posts without titles.best way to connect with friends, work colleagues or random peoplean American social networking service based in San Francisco, California

Cyber-Mobbing 2019-05-07

Cyber-Mobbing crossword puzzle
Across
  1. Eine Plattform wo Videos hochgeladen und angeschaut werden können
  2. Ein Messenger wo wir tagtäglich damit schreiben
  3. Das Thema welches hier behandelt wird
  4. Ein tragbarer Computer
Down
  1. Eine Taste auf der Tastatur mit der man zum Beispiel ein Programm schließen kann
  2. Ein Spiel welches virtuell
  3. Wenn jemand gehasst wird
  4. Gerät welches viele Jugendliche verwenden
  5. Ein Profil das nicht echt ist

9 Clues: Ein tragbarer ComputerWenn jemand gehasst wirdEin Spiel welches virtuellEin Profil das nicht echt istDas Thema welches hier behandelt wirdGerät welches viele Jugendliche verwendenEin Messenger wo wir tagtäglich damit schreibenEine Plattform wo Videos hochgeladen und angeschaut werden können...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. [giving information]
  2. [Pretending to be someone and getting them in Trouble]
  3. [Repeating rude messages]
  4. [excluding someone]
Down
  1. [offensive comments roomers and gossiping]
  2. [Online Arguments]
  3. [Stalking someone]
  4. [embarrassing someone]
  5. [bullying someone online]

9 Clues: [Online Arguments][Stalking someone][excluding someone][giving information][embarrassing someone][bullying someone online][Repeating rude messages][offensive comments roomers and gossiping][Pretending to be someone and getting them in Trouble]

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. (Stalking someone online)
  2. (pretending to be someone and getting them trouble)
  3. (Offensive comments roomer and gossip)
  4. (Embarrassing someone)
  5. (Online Arguments)
Down
  1. (Repeating rude messages)
  2. (bullying someone online)
  3. (giving information)
  4. (excluding someone)

9 Clues: (Online Arguments)(excluding someone)(giving information)(Embarrassing someone)(Repeating rude messages)(Stalking someone online)(bullying someone online)(Offensive comments roomer and gossip)(pretending to be someone and getting them trouble)

Cyber Safety 2013-08-12

Cyber Safety crossword puzzle
Across
  1. How often do you change your password?
  2. Who do you share your password with?
  3. What is the name of the setting to block unwanted messages?
Down
  1. You should never keep online _____.
  2. What do you do before posting?
  3. What is the name of someone who hassles you online?
  4. Information on the internet is available for how long?
  5. Never give your friends your online or phone____.
  6. When someone sends you inappropriate texts you ____ them.

9 Clues: What do you do before posting?You should never keep online _____.Who do you share your password with?How often do you change your password?Never give your friends your online or phone____.What is the name of someone who hassles you online?Information on the internet is available for how long?When someone sends you inappropriate texts you ____ them....

Cyber Smart 2024-01-18

Cyber Smart crossword puzzle
Across
  1. Measures taken to discourage or prevent unwanted actions or behaviors.
  2. A mode in web browsers that allows users to browse privately, leaving no trace in the browsing history.
  3. Alertness and watchfulness to detect and prevent potential dangers or threats.
  4. A software update designed to fix security vulnerabilities or improve functionality.
Down
  1. Authentication techniques based on unique physical or behavioral characteristics.
  2. The state of being anonymous, without revealing one's identity.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A decentralized and secure digital ledger used in cryptocurrency transactions.
  5. A security system designed to prevent unauthorized access to or from a private network.

9 Clues: The state of being anonymous, without revealing one's identity.Measures taken to discourage or prevent unwanted actions or behaviors.A decentralized and secure digital ledger used in cryptocurrency transactions.Alertness and watchfulness to detect and prevent potential dangers or threats....

Cyber Awareness 2023-10-02

Cyber Awareness crossword puzzle
Across
  1. A program that can harm your computer and steal your information.
  2. A set of characters used to access an account.
  3. The place where you can adjust your account settings.
  4. Private information you should never share online.
  5. Being disrespectful online
Down
  1. Protects your computer from viruses and malware.
  2. The practice of tricking people into giving up sensitive information.
  3. Treating others the way you want to be treated.
  4. A message or email that tries to deceive you into giving out personal information.

9 Clues: Being disrespectful onlineA set of characters used to access an account.Treating others the way you want to be treated.Protects your computer from viruses and malware.Private information you should never share online.The place where you can adjust your account settings.A program that can harm your computer and steal your information....

Cyber bullying 2024-06-11

Cyber bullying crossword puzzle
Across
  1. someone you can talk to at school
  2. helpline can be
  3. someone we can talk to at home
  4. when your device is malfunctioning you
  5. someone you can talk to at home
  6. what do you do to stop following you online
Down
  1. someone who gives good advice is
  2. what do you do when you are having problems you ask for
  3. to send out a message
  4. to get help outside

10 Clues: helpline can beto get help outsideto send out a messagesomeone we can talk to at homesomeone you can talk to at homesomeone who gives good advice issomeone you can talk to at schoolwhen your device is malfunctioning youwhat do you do to stop following you onlinewhat do you do when you are having problems you ask for

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Crossword 2025-07-14

Cyber Crossword crossword puzzle
Across
  1. Unwanted or unsolicited email often used to distribute malware.
  2. A scam where attackers impersonate senior executives.
  3. Type of malware that locks files and demands payment to unlock them.
  4. Keeping your software and operating system ________ is a key part of security.
Down
  1. Software that secretly gathers information from a computer.
  2. A common method used by cybercriminals to trick users into revealing sensitive information.
  3. A software program designed to protect against viruses and malware.
  4. A criminal who uses computers and networks to commit crimes.
  5. A secret word or phrase used to access a system.

9 Clues: A secret word or phrase used to access a system.A scam where attackers impersonate senior executives.Software that secretly gathers information from a computer.A criminal who uses computers and networks to commit crimes.Unwanted or unsolicited email often used to distribute malware.A software program designed to protect against viruses and malware....

Root Word List 2 Crossword Puzzle 2016-09-21

Root Word List 2 Crossword Puzzle crossword puzzle
Across
  1. Someone that carries bags
  2. In charge, has the final say on anything
  3. Easily liked by a lot of people
  4. A machine used in farming
  5. Easily moved from place to place
Down
  1. shows a moving picture than can be saved in cyber space
  2. Grabbing a hold onto something
  3. A form of connection
  4. A person walking along a road
  5. A specific style
  6. A unit of measurement
  7. To turn from one thing into another

12 Clues: A specific styleA form of connectionA unit of measurementSomeone that carries bagsA machine used in farmingA person walking along a roadGrabbing a hold onto somethingEasily liked by a lot of peopleEasily moved from place to placeTo turn from one thing into anotherIn charge, has the final say on anything...

COMPUTER SCIENCE KEY WORDS 2025-10-09

COMPUTER SCIENCE KEY WORDS crossword puzzle
Across
  1. a network built of networks
  2. portable computer
  3. facility allowing portable devices to connect to the internet
  4. a software application for looking at websites
  5. a service on the internet
  6. fake Wi-Fi network used to steal data
Down
  1. the way data is transferred through devices
  2. devices connected for communication
  3. a set of rules on how to communicate
  4. a website that will show links
  5. a remote computer that has a website
  6. a cyber crime

12 Clues: a cyber crimeportable computera service on the interneta network built of networksa website that will show linksdevices connected for communicationa set of rules on how to communicatea remote computer that has a websitefake Wi-Fi network used to steal datathe way data is transferred through devicesa software application for looking at websites...

security crossword puzzle 2023-10-04

security crossword puzzle crossword puzzle
Across
  1. Helps to continue in disruption
  2. protection against improper modification
  3. Security is ____________'s responsibility
  4. Abbreviation for a D&B data classification
  5. 9 digit unique identifier for entities
  6. Process mandated before every new project
  7. Cybercrime to mine cryptocurrency
  8. Laptop physical fastener
  9. ____desk
Down
  1. Security is a ____________ enabler
  2. ____the franchise
  3. Helps identify machines and improve web browsing experience
  4. QR code based fraud attempts
  5. Are you a robot ?

14 Clues: ____desk____the franchiseAre you a robot ?Laptop physical fastenerQR code based fraud attemptsHelps to continue in disruptionCybercrime to mine cryptocurrencySecurity is a ____________ enabler9 digit unique identifier for entitiesprotection against improper modificationProcess mandated before every new project...

CJCC Crossword 2023-05-09

CJCC Crossword crossword puzzle
Across
  1. our abbreviation
  2. chairman of victims comp board
  3. who is the one who is going to send you an email on friday with admin leave
  4. how many seats are there on the council
  5. how old is cjcc
  6. where our CJCC attorney's went to school
  7. Our executive director
  8. who handles all media requests
  9. our governor
  10. historian
Down
  1. Stef's division
  2. how many NCVRW events did we hold in 2023
  3. where our office is located
  4. current council chairman
  5. First lady
  6. Our friendly neighborhood CFO
  7. what branch of government are we
  8. who is going to reminder you to do your cyber training
  9. where madeline and dannielle spend their time j-a,

19 Clues: historianFirst ladyour governorStef's divisionhow old is cjccour abbreviationOur executive directorcurrent council chairmanwhere our office is locatedOur friendly neighborhood CFOchairman of victims comp boardwho handles all media requestswhat branch of government are wehow many seats are there on the councilwhere our CJCC attorney's went to school...

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Malware that allows a cyber-security attacker to take control of an infected computer.
  2. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. When someone deceives by pretending to be someone else in order to get personal data.
  4. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  5. A destructive computer program that bores its way through a computer's files or through a computer's network.
  6. Collection of captured bot computers
  7. Software that encrypts programs and data until a ransom is paid to remove it.
  8. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
  1. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  2. An error in a program that prevents the program from running as expected.
  3. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  5. A type of Malware that locates and saves data from users without them knowing about it.
  6. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  3. Criminals make a promise of goods in return for details, such as offering a free music download.
  4. Malware that allows a cyber-security attacker to take control of an infected computer.
  5. When someone deceives by pretending to be someone else in order to get personal data.
  6. Software that encrypts programs and data until a ransom is paid to remove it.
  7. A destructive computer program that bores its way through a computer's files or through a computer's network.
  8. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  2. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  3. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  4. An error in a program that prevents the program from running as expected.
  5. Collection of captured bot computers
  6. A type of Malware that locates and saves data from users without them knowing about it.
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

Cabinet Crossword 2022-02-15

Cabinet Crossword crossword puzzle
Across
  1. Advises the President and leads the nation in foreign policy issues for example, negotiates treaties and agreements with foreign entities
  2. Manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans
  3. manages the United States' nuclear infrastructure and administers the country's energy policy
  4. Responsible for maintaining policies related to learning and improving the educational system
  5. responsible for national policy and programs that address America's home needs, that improve and develop the Nation's communities, and enforce fair home laws.
  6. provide leadership on food, agriculture, natural resources, rural development, nutrition, and related issues based on public policy, the best available science, and effective management
Down
  1. for planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation
  2. Prosecutes federal law offenders and represents the U.S. Government in court; its attorneys represent the rights and interests of the American people and enforce federal criminal and civil laws
  3. operates and maintains systems that are critical to the nation's financial infrastructure, such as the production of coin and currency
  4. responsible for occupational safety and health, wage and hour standards, unemployment benefits, reemployment services, and occasionally, economic statistics
  5. promotes job creation and economic growth by ensuring fair trade, providing the data necessary to support commerce and constitutional democracy, and fostering innovation by setting standards and conducting foundational research and development.
  6. responsible for providing vital services to America's soldiers
  7. Responsible for providing the military forces needed to deter war and protect the security of our country
  8. provide national policy direction and develop national plans, technical standards and guidelines on health
  9. has overall responsibility for protecting federal civilian executive branch systems from cyber threats, helping agencies better defend themselves, and providing response teams to assist agencies during significant incidents

15 Clues: responsible for providing vital services to America's soldiersmanages the United States' nuclear infrastructure and administers the country's energy policyResponsible for maintaining policies related to learning and improving the educational system...

personal finance 2021-02-24

personal finance crossword puzzle
Across
  1. fjieowanf
  2. zcjvziofd
  3. jaiofna
  4. nfapjcz
  5. fialf;mkzl
  6. fajiosnjcz
  7. fanofna
  8. aiofpna
  9. nfiopfz
Down
  1. fnizsf
  2. fjioeanfo
  3. roiahweng
  4. fnakopzjfd
  5. jfdiaofj
  6. jfoienafo
  7. ajofneonf
  8. naiofnoa
  9. fjizopfjz
  10. fjeioawnf

19 Clues: fnizsfjaiofnanfapjczfanofnaaiofpnanfiopfzjfdiaofjnaiofnoafjioeanforoiahwengfjieowanfzcjvziofdjfoienafoajofneonffjizopfjzfjeioawnffnakopzjfdfialf;mkzlfajiosnjcz

Unit 16 2020-04-16

Unit 16 crossword puzzle
Across
  1. / kirurg
  2. / meditsiiniline
  3. / aksessuaar
  4. / sissekanne
  5. / rabav
  6. / kohver
  7. / mehaanik
  8. / deklareerima
  9. / toll
Down
  1. / ürgne loodus
  2. / trahv
  3. / vahekäik
  4. / õpipoiss
  5. / sihtkoht
  6. / kandik
  7. / pagas
  8. / turvalisus
  9. / padi
  10. / reisiterminal

19 Clues: / padi/ toll/ trahv/ pagas/ rabav/ kirurg/ kandik/ kohver/ vahekäik/ õpipoiss/ sihtkoht/ mehaanik/ aksessuaar/ turvalisus/ sissekanne/ ürgne loodus/ deklareerima/ reisiterminal/ meditsiiniline

Highlights of 2020 2020-12-24

Highlights of 2020 crossword puzzle
Across
  1. Exclusive interview with this CAT A publication on Health Security technology
  2. Best research feature (Love thy neighbor)in this leading online lifestyle publication
  3. Best Home Automation story of the year with India’s leading financial publication was done by this journalist
  4. Renowned TV journo who reviewed the UV Case
  5. Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
  6. The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
  1. Participation in maximum number of Industry stories with this publication
  2. Godrej Security Solutions ventured into the health security segment with this product
  3. Authored article on Reflecting on your child’s safety post-COVID-19 crisis
  4. The best front-page coverage (UV-based disinfectants in demand) was received in this publication
  5. Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
  6. Maximum regional coverage garnered in this city

12 Clues: Renowned TV journo who reviewed the UV CaseMaximum regional coverage garnered in this cityParticipation in maximum number of Industry stories with this publicationAuthored article on Reflecting on your child’s safety post-COVID-19 crisisExclusive interview with this CAT A publication on Health Security technology...

Highlights of 2020 2020-12-24

Highlights of 2020 crossword puzzle
Across
  1. Participation in maximum number of Industry stories with this publication
  2. Renowned TV journo who reviewed the UV Case
  3. Godrej Security Solutions ventured into the health security segment with this product
  4. STUFF is _ baseded publication who did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners
  5. Best research feature (Love thy neighbor) in this leading online lifestyle publication
  6. Godrej Security Solutions celebrated ‘Family Safety Month’ this month
Down
  1. The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
  2. The best front-page coverage (UV-based disinfectants in demand) was received in this publication
  3. Best Home Automation story of the year with India’s leading financial publication was done by this journalist
  4. Exclusive interview with this CAT A publication on Health Security technology
  5. Authored article on Reflecting on your child’s safety post COVID-19 crisis
  6. Maximum regional coverage garnered in this city

12 Clues: Renowned TV journo who reviewed the UV CaseMaximum regional coverage garnered in this cityGodrej Security Solutions celebrated ‘Family Safety Month’ this monthParticipation in maximum number of Industry stories with this publicationAuthored article on Reflecting on your child’s safety post COVID-19 crisis...

Programming 2021-01-21

Programming crossword puzzle
Across
  1. Popular object notation
  2. Used to update node
  3. Cyber Group developed this using the Heroku platform
  4. IDE named after smallest unit of an element
  5. This guides pirates to treasure
Down
  1. Used to manage packages in NodeJS
  2. Used to manage packages in .NET
  3. Open–source version control system
  4. IDE named after astronomical events

9 Clues: Used to update nodePopular object notationUsed to manage packages in .NETThis guides pirates to treasureUsed to manage packages in NodeJSOpen–source version control systemIDE named after astronomical eventsIDE named after smallest unit of an elementCyber Group developed this using the Heroku platform

Programming 2021-01-21

Programming crossword puzzle
Across
  1. Popular object notation
  2. Used to update node
  3. Cyber Group developed this using the Heroku platform
  4. IDE named after smallest unit of an element
  5. This guides pirates to treasure
Down
  1. Used to manage packages in NodeJS
  2. Used to manage packages in .NET
  3. Open–source version control system
  4. IDE named after astronomical events

9 Clues: Used to update nodePopular object notationUsed to manage packages in .NETThis guides pirates to treasureUsed to manage packages in NodeJSOpen–source version control systemIDE named after astronomical eventsIDE named after smallest unit of an elementCyber Group developed this using the Heroku platform

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell an ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell an ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

MY SPELLING CROSSWORD PUZZLE 2013-04-03

MY SPELLING CROSSWORD PUZZLE crossword puzzle
Across
  1. bad
  2. clear
  3. special
  4. common
  5. light
  6. know
  7. costume
  8. firm
  9. sad
Down
  1. penalized
  2. community
  3. fame
  4. image
  5. money
  6. less
  7. how it is
  8. wish
  9. yes
  10. lock
  11. same

20 Clues: badyessadfamelessknowwishlockfirmsameclearimagemoneylightcommonspecialcostumepenalizedcommunityhow it is

United Nations (Worksheet 2) 2015-06-10

United Nations (Worksheet 2) crossword puzzle
Across
  1. ความสงบสุข
  2. ความสงบสุข
  3. ปัญหา
  4. ความปลอดภัย
  5. กระทบต่อ
  6. UN stands for ______________.
  7. สัญลักษณ์
  8. เอกสาร
  9. ก่อตั้ง
  10. เป็นตัวแทน
  11. เป็นทางการ
Down
  1. ป้องกัน
  2. องค์กร
  3. ปกป้อง
  4. สนับสนุน
  5. ข้อตกลง
  6. พิเศษ
  7. การประกาศ
  8. ความสัมพันธ์
  9. กิ่งมะกอก
  10. มาตรฐาน

21 Clues: ปัญหาพิเศษองค์กรปกป้องเอกสารป้องกันข้อตกลงก่อตั้งมาตรฐานสนับสนุนกระทบต่อการประกาศกิ่งมะกอกสัญลักษณ์ความสงบสุขความสงบสุขเป็นตัวแทนเป็นทางการความปลอดภัยความสัมพันธ์UN stands for ______________.

Cryptogram crossword 2023-12-12

Cryptogram crossword crossword puzzle
Across
  1. iovnkx
  2. Grmuxozns
  3. ynuxzngtj
  4. vgyycuxj
  5. Machine KtomsgSginotk
  6. kyvoutgmk
  7. ykiaxoze
  8. iujotm
  9. iussatoigzouty
  10. qkxiqnull'yVxotiovgr
  11. ixevzgtgreyoy
  12. gaznktzoigzout
Down
  1. vuregrvnghkzoi
  2. vuresgzn
  3. Vykajuxgtjus
  4. vxotiovgr
  5. Lxkwaktie
  6. jkixevzout
  7. iushotgzuxoiy
  8. jkiujotm
  9. ktixevzout

21 Clues: iovnkxiujotmvgyycuxjvuresgznjkiujotmykiaxozeGrmuxoznsynuxzngtjvxotiovgrLxkwaktiekyvoutgmkjkixevzoutktixevzoutVykajuxgtjusiushotgzuxoiyixevzgtgreyoyvuregrvnghkzoiiussatoigzoutygaznktzoigzoutqkxiqnull'yVxotiovgrMachine KtomsgSginotk

less50 2024-05-15

less50 crossword puzzle
Across
  1. required
  2. announcement
  3. security
  4. Available
  5. Control
  6. General
  7. cured
  8. wall
  9. substantial
Down
  1. flies
  2. consider
  3. limitation
  4. present
  5. agility
  6. administrator
  7. suitable
  8. flexibility
  9. distance
  10. conducted
  11. dependent
  12. confirmed

21 Clues: wallfliescuredpresentagilityControlGeneralconsiderrequiredsecuritysuitabledistanceconducteddependentAvailableconfirmedlimitationflexibilitysubstantialannouncementadministrator

Job Vacancy 2025-01-20

Job Vacancy crossword puzzle
Across
  1. kemajuan
  2. panduan
  3. memimpin
  4. domisili
  5. perumahan
  6. sebaiknya
  7. menyediakan
  8. mengkoordinasi
  9. keamanan
  10. memahami/ mampu
Down
  1. menyiapkan
  2. mengulas
  3. mengawasi
  4. synonym of supervisor
  5. memastikan
  6. jadwal
  7. penempatan
  8. akan
  9. proyek
  10. dapat

20 Clues: akandapatjadwalproyekpanduanmengulaskemajuanmemimpindomisilikeamananmengawasiperumahansebaiknyamenyiapkanmemastikanpenempatanmenyediakanmengkoordinasimemahami/ mampusynonym of supervisor

Wireless Network 2020-04-29

Wireless Network crossword puzzle
Across
  1. 802.11__ is the latest standard establish in 2019.
  2. One of the wireless security protocols that supports only 8 characters for password.
  3. One of the WLAN design that involves no network infrastructure.
  4. Mesh APs helps expanding wireless network coverage by receiving the wireless signal and ______ it.
  5. _____ allows multiple devices to connect to the internet.
  6. One of the advantages of Infrastructure WLAN.
  7. _____ is a technology that scramble the data in a sense that it will not be understandable by any network hacker.
  8. The _____ will receive the signal transmitted by the ISP.
  9. One of the disadvantages of wireless network over wired network.
  10. One type of WPA2 that is designed for a larger business setting.
  11. Devices without Ethernet ports need to connect to the internet through _____ router, creating a WLAN.
  12. The coverage of a wireless network can be expanded by adding wireless _____ points connected to the wireless router.
Down
  1. One of the purposes of password in wireless security.
  2. 802.11 is an example of the wireless ______.
  3. Wireless network is a network set up by using ______ signal frequency
  4. Device can hard-wire directly into the _____ port of the modem to connect to the internet.
  5. Modem stands for _____-Demodulator
  6. 802.11__ is the wireless standard that broadcast only at 5GHz.
  7. 5GHz transmit data in shorter range, but with higher speed and lesser _____.
  8. One of the wireless security protocols that served as a temporary solution that address the vulnerability of WEP.
  9. ISP stands for ______ Service Provider
  10. The modem is responsible to convert analog signal to _____ signal.
  11. 802.11 is established by _____ in 1997.
  12. One of the wireless security protocols that supports up to 64 characters for password.

24 Clues: Modem stands for _____-DemodulatorISP stands for ______ Service Provider802.11 is established by _____ in 1997.802.11 is an example of the wireless ______.One of the advantages of Infrastructure WLAN.802.11__ is the latest standard establish in 2019.One of the purposes of password in wireless security....

LiTe Crossword Puzzle 2024-11-20

LiTe Crossword Puzzle crossword puzzle
Across
  1. An individual who breaks into computer systems to steal, change, or destroy information.
  2. One of the more common methods of both sending information out and collecting it from unsuspecting people.
  3. Use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  4. A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
  5. Any action derived from intelligent threats to violate the security of the system.
  6. The process of detecting and preventing illegal or unauthorized use of a computerand preventing intruders from accessing any part of a computer system.
  7. A term used to describe actions taken by someone to gain unauthorized access to a computer.
  8. An act or instance of using or closely imitating the language and thoughts of another author without authorization.
  9. An unprivileged false statement of fact which tends to harm the reputation of a person or company.
  10. It is an executable file that will install itself and run automatically once it's downloaded.
  11. Any action of stealing information from a users system.
Down
  1. Ensuring that the information is accessible to authorized persons when required without delay.
  2. Refers to protecting personnel, hardware, programs, networks, and data from physical threats.
  3. One of the more common ways to infiltrate or damage of your computer.
  4. An action or event that has the potential to compromise and/or violate security.
  5. Often used by third parties to infiltrate your computer.
  6. A defined method of breaching the security of an IT system through vulnerability.
  7. The applications on the computers and operating system.
  8. A common type of online fraud.
  9. The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.

20 Clues: A common type of online fraud.The applications on the computers and operating system.Any action of stealing information from a users system.Often used by third parties to infiltrate your computer.One of the more common ways to infiltrate or damage of your computer.An action or event that has the potential to compromise and/or violate security....

Domestic and International Airports 2018-07-19

Domestic and International Airports crossword puzzle
Across
  1. 3 letter code for Kapiti Coast
  2. Used for security screening
  3. "Is this your bag?"
  4. Area of the airport where the public can access for free
  5. 3 letter code for Singapore
  6. What does the "R" represent in WCHR
  7. Adjacent to a terminal
  8. To get on the plane
  9. 2 letter code for Virgin Australia
  10. Number of runways at Auckland Airport
  11. Abbreviation for Unaccompanied Minors
Down
  1. Passenger
  2. Giving permission to enter a country for a certain time
  3. Access to an aircraft from the terminal
  4. Used for going overseas
  5. Phonetic alphabet for "V"
  6. 6th busiest airport in New Zealand
  7. 3 letter code for Coolangatta
  8. Phonetic alphabet for "B"
  9. Money dispenser

20 Clues: PassengerMoney dispenser"Is this your bag?"To get on the planeAdjacent to a terminalUsed for going overseasPhonetic alphabet for "V"Phonetic alphabet for "B"Used for security screening3 letter code for Singapore3 letter code for Coolangatta3 letter code for Kapiti Coast6th busiest airport in New Zealand2 letter code for Virgin Australia...

CSC Crossword 2021-06-09

CSC Crossword crossword puzzle
Across
  1. If you hear it, _____ it
  2. Anaheim Angels _____
  3. Color of pen a security guard uses
  4. Used to protect your skin from the sun
  5. Common hair color abbreviation
  6. Someone leaving with a subject who is being evicted
  7. Observe and _____
  8. Verbal or physical
  9. OC's branch manager
  10. Non-guard carded staff is _____ staff
  11. See something, _____ something
Down
  1. Wash your _____frequently
  2. What does CP stand for
  3. Text _____ to 474747 to place a contactless concessions order
  4. _____ items include weapons, alcohol and large bags
  5. Required to wear a security shirt
  6. Common eye color abbreviation
  7. 7th _____ stretch
  8. Guests are not allowed to re-_____ the stadium
  9. What day is payday?
  10. _____board
  11. A13's first name

22 Clues: _____boardA13's first name7th _____ stretchObserve and _____Verbal or physicalWhat day is payday?OC's branch managerAnaheim Angels _____What does CP stand forIf you hear it, _____ itWash your _____frequentlyCommon eye color abbreviationCommon hair color abbreviationSee something, _____ somethingRequired to wear a security shirt...

Jared's crossword 3 2014-04-29

Jared's crossword 3 crossword puzzle
Across
  1. unwelcomesexual advances
  2. teaching and learning strategy
  3. bullying through cyber meadum
  4. a place of learning with rules and conditions
  5. repeted cruelty or physical harm
Down
  1. a safe on line classroom
  2. bring together social and academic learning
  3. a sense of common purpose

8 Clues: a safe on line classroomunwelcomesexual advancesa sense of common purposebullying through cyber meadumteaching and learning strategyrepeted cruelty or physical harmbring together social and academic learninga place of learning with rules and conditions

bullying crossword :Jamie 2023-03-21

bullying crossword   :Jamie crossword puzzle
Across
  1. bullying that is related to the emotions.
  2. talk to a trusted _______.
  3. bullying that says mean words.
  4. the person watching the bullying.
Down
  1. the person getting bullied.
  2. bullying that pushes people.
  3. bullying that is online .
  4. the person who is mean.

8 Clues: the person who is mean.bullying that is online .talk to a trusted _______.the person getting bullied.bullying that pushes people.bullying that says mean words.the person watching the bullying.bullying that is related to the emotions.

Cyber - safety Thomas 2016-06-06

Cyber - safety Thomas crossword puzzle
Across
  1. online - connect to the internet
  2. - don't tell anyone your password
  3. - something mean people do to get you online
  4. - don't spend too much time online
  5. - protect personal information
  6. - if you feel something is wrong, then tell mum or dad
  7. - always ask your parents when it asks to spend money
Down
  1. - types of sites that we are allowed to visit
  2. - bad language that you shouldn't use on the internet
  3. - sites on the Internet you visit
  4. - dob on someone to mum or dad if you think something isn't right
  5. Email - types of emails that you get, that ask you to forward them on, but you shouldn't.
  6. - don't play too many games online
  7. - only talk to people you know online

14 Clues: - protect personal informationonline - connect to the internet- sites on the Internet you visit- don't tell anyone your password- don't play too many games online- don't spend too much time online- only talk to people you know online- something mean people do to get you online- types of sites that we are allowed to visit...

Cyber Bezpieczna Krzyżówka 2025-02-02

Cyber Bezpieczna Krzyżówka crossword puzzle
Across
  1. Program, który instaluje się, żeby zabezpieczyć komputer.
  2. Program na telefonie lub tablecie np. Do nauki, gier albo rozmów.
  3. To złośliwy program, który może zniszczyć twój komputer.
  4. Miejsce, gdzie możesz szukać informacji.
  5. Tworzysz je w grze lub na stronie internetowej, aby móc się później zalogować i korzystać z różnych funkcji.
  6. Coś co chronisz w internecie, nie podając sowich danych.
Down
  1. Klikasz go, by przejść na inną stronę internetową, ale musisz uważać, żeby nie był fałszywy.
  2. Kiedy ktoś obraża, straszy lub wyśmiewa innych internecie.
  3. Wykorzystanie czyjejś pracy jako swojej.
  4. To tajny kod, który chroni twoje konto w internecie.
  5. Informacje o tobie, takie jak imię, nazwisko, adres e-mail, które należy chronić w internecie.
  6. Miejsce w internecie, gdzie możesz rozmawiać z innymi ludźmi. Może być to w grze lub na stronie.
  7. Możesz ją wysłać do kogoś przez e-mail, komunikator lub SMS.
  8. Osoba, która potrafi włamać się do systemów komputerowych i może ukraść dane.

14 Clues: Wykorzystanie czyjejś pracy jako swojej.Miejsce, gdzie możesz szukać informacji.To tajny kod, który chroni twoje konto w internecie.To złośliwy program, który może zniszczyć twój komputer.Coś co chronisz w internecie, nie podając sowich danych.Program, który instaluje się, żeby zabezpieczyć komputer....

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. you use it to keep your internet connection secure.
  3. you have to keep them safe.
  4. you use them to keep private your information. they have to be strong.
Down
  1. never send it to people meet online.
  2. when you download something, make sure it's a...
  3. before you post somenthing, you have to ask your...
  4. option to keep your profile private.
  5. software used to delete viruses on a computer.
  6. when you post, you have to use it careful to avoid offending people.

10 Clues: you do it to avoid virus.you have to keep them safe.never send it to people meet online.option to keep your profile private.software used to delete viruses on a computer.when you download something, make sure it's a...before you post somenthing, you have to ask your...you use it to keep your internet connection secure....

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. software used to delete viruses on a computer.
  3. when you post, you have to use it careful to avoid offending people.
  4. never send it to people meet online.
  5. when you download something, make sure it's a...
  6. you use it to keep your internet connection secure.
Down
  1. you have to keep them safe.
  2. you use them to keep private your information. they have to be strong.
  3. option to keep your profile private.
  4. before you post somenthing, you have to ask yours...

10 Clues: you do it to avoid virus.you have to keep them safe.option to keep your profile private.never send it to people meet online.software used to delete viruses on a computer.when you download something, make sure it's a...you use it to keep your internet connection secure.before you post somenthing, you have to ask yours......

Info - security 2017-11-27

Info - security crossword puzzle
Across
  1. be attentive
  2. lure someone
  3. name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
  4. protect networks, computers, programs and data from attack
  5. should not be shared
  6. monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. designed to detect and destroy computer viruses
  2. exploit weaknesses to gain access
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. protects personal data published via the Internet

10 Clues: be attentivelure someoneshould not be sharedexploit weaknesses to gain accessdesigned to detect and destroy computer virusesprotects personal data published via the Internetprotect networks, computers, programs and data from attackmalicious software designed to block access to a computer system until a sum of money is paid....

IT Security 2018-05-22

IT Security crossword puzzle
Across
  1. You should not be checking your ________ email while on work computers.
  2. When you temporarily leave the workstation you are working at, you should ___________ the computer.
  3. Where should you look for a policy and instructions on what to do during downtimes?
  4. When you receive an email from someone you don't know, you should click on links inside the email.
  5. Hospital computers and programs, including email, should be used for _______________ use only.
Down
  1. If you don't see a program on the desktop, where can you search for it?
  2. When calling or emailing the help desk, the ________ details you provide, the easier it will be to solve your issue quickly.
  3. Installing Windows updates on computers is important because it helps ____________ vulnerabilities on the computer.
  4. ePHI is everyone's responsibility.
  5. When you are done with your shift, you should always ________ of the workstation.

10 Clues: ePHI is everyone's responsibility.If you don't see a program on the desktop, where can you search for it?You should not be checking your ________ email while on work computers.When you are done with your shift, you should always ________ of the workstation.Where should you look for a policy and instructions on what to do during downtimes?...

Security Quiz 2019-02-19

Security Quiz crossword puzzle
Across
  1. Pleasing to the senses
  2. A person who is a member of a cooperative relationship
  3. A son of your brother or sister
  4. A female human offspring
Down
  1. Place of business where professional duties are performed
  2. The state of being free from danger or injury
  3. The principal activity in one's life to earn money
  4. A human offspring (son or daughter) of any age
  5. A daughter of your brother or sister
  6. A fully developed person from maturity onward

10 Clues: Pleasing to the sensesA female human offspringA son of your brother or sisterA daughter of your brother or sisterThe state of being free from danger or injuryA fully developed person from maturity onwardA human offspring (son or daughter) of any ageThe principal activity in one's life to earn money...

IT Security 2020-01-06

IT Security crossword puzzle
Across
  1. password manager mentioned in presentation
  2. standalone malware computer program that replicates itself in order to spread to other computers
  3. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  4. nickname of person who stolen Morele.net database
  5. a good hacker
  6. a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
  1. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
  4. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

10 Clues: a good hackerpassword manager mentioned in presentationnickname of person who stolen Morele.net databasestandalone malware computer program that replicates itself in order to spread to other computersa type of malicious software designed to block access to a computer system until a sum of money is paid....

security puzzle 2015-03-03

security puzzle crossword puzzle
Across
  1. A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
  2. A computer overtaken by a hacker and used to perform malicious tasks.
  3. is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
  4. A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
  1. A form of spyware that enters your computer from an Internet download.
  2. A new term for spam messages being sent to instant message addresses.
  3. Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
  4. The transfer of data from one computer (or server) to another computer.
  5. A person who enjoys exploring the details of computers and how to stretch their capabilities.
  6. A violation or infraction, as of a law, a legal obligation, or a promise.

10 Clues: A new term for spam messages being sent to instant message addresses.A computer overtaken by a hacker and used to perform malicious tasks.A form of spyware that enters your computer from an Internet download.The transfer of data from one computer (or server) to another computer....

Security - Medium 2023-11-28

Security - Medium crossword puzzle
Across
  1. routine of applying updates to software to address vulnerabilities
  2. cryptographic attack involves trying all possible keys until the correct one is found
  3. What do hackers do on a boat?
  4. type of encryption which uses the same key for both encryption and decryption
  5. a software vulnerability discovered by attackers before the vendor has become aware of it
  6. the secret code that enhances the security of passwords
Down
  1. type of attack involves intercepting and altering communication between two parties without their knowledge
  2. technique that involves gaining unauthorized access by pretending to be someone else
  3. a device or software that captures and records keystrokes on a computer
  4. security measure to verify a user's identity through a unique biological or behavioral characteristic

10 Clues: What do hackers do on a boat?the secret code that enhances the security of passwordsroutine of applying updates to software to address vulnerabilitiesa device or software that captures and records keystrokes on a computertype of encryption which uses the same key for both encryption and decryption...

Food Security 2024-01-10

Food Security crossword puzzle
Across
  1. Who added a new dimension to food security and emphasised the “access” to food?
  2. The introduction of __________ in India dates back to the 1940s Bengal Famine.
  3. A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as ______
  4. The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is _______
  5. Which revolution was adopted in July 1968?
Down
  1. Ration shops also known as
  2. Amul is a cooperative established in _________.
  3. Which was the most devastating famine faced by India?
  4. The price at which food grains are distributed in the deficit areas and among the poor strata of the society.
  5. The PDS card for below poverty line is ________.

10 Clues: Ration shops also known asWhich revolution was adopted in July 1968?Amul is a cooperative established in _________.The PDS card for below poverty line is ________.Which was the most devastating famine faced by India?The introduction of __________ in India dates back to the 1940s Bengal Famine....

Data Security 2024-04-11

Data Security crossword puzzle
Across
  1. Involves intentional deception for financial gain or to cause harm.
  2. Process of converting data into a format that cannot be easily understood by unauthorized parties.
  3. Refers to the malfunctioning or breakdown of physical components in computer systems or devices.
  4. fires, floods, earthquakes
Down
  1. Record of events or activities occurring within a system, network, or application.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
  3. Used to authenticate users and control access to computer systems, networks, or applications.
  4. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  5. Security system designed to monitor and control incoming and outgoing network traffic.
  6. inaccurate data entry, accidental deletion or changing of data)

10 Clues: fires, floods, earthquakesinaccurate data entry, accidental deletion or changing of data)Involves intentional deception for financial gain or to cause harm.Record of events or activities occurring within a system, network, or application.Security system designed to monitor and control incoming and outgoing network traffic....