cyber security Crossword Puzzles

Touring Eco System 2024-01-22

Touring Eco System crossword puzzle
Across
  1. department to hand all video
  2. artist party
  3. office set up and break down
  4. Oversee and guide every aspect of artist career
  5. oversees the touring entity
  6. department to hand all lighting
  7. crew party
  8. department to hand all special effects
Down
  1. handles all elements flown overhead
  2. band party
  3. handles all travel and logistic bookings for the tour
  4. techs all instruments on stage
  5. department to handle sound
  6. in charge of tour/artist logistics
  7. Responsible for booking performances
  8. oversees all security for the tour
  9. oversees all production to the tour

17 Clues: band partycrew partyartist partydepartment to handle soundoversees the touring entitydepartment to hand all videooffice set up and break downtechs all instruments on stagedepartment to hand all lightingin charge of tour/artist logisticsoversees all security for the tourhandles all elements flown overheadoversees all production to the tour...

Digital Citizenship 2024-05-07

Digital Citizenship crossword puzzle
Across
  1. ____before you type
  2. the digital ____ includes texts,social media, and video games
  3. always get this before posting online
  4. type of bullying that happens online
Down
  1. if you see bullying online, you should ____ it
  2. ____ citizen
  3. ___ your time on and offline
  4. ____ yourself and others online
  5. the K in THINK

9 Clues: ____ citizenthe K in THINK____before you type___ your time on and offline____ yourself and others onlinetype of bullying that happens onlinealways get this before posting onlineif you see bullying online, you should ____ itthe digital ____ includes texts,social media, and video games

Billionaires 2025-01-10

Billionaires crossword puzzle
Across
  1. The Gulf of America
  2. "Beyonce had one of the best videos of all time"
  3. "Hes wired in" "My Prada's at the cleaners"
  4. In her billionaire era
Down
  1. Other word for fence
  2. Lip Kit queen
  3. Cyber truck inventor
  4. Prime members get "it" quick
  5. NBAs shark in the tank"

9 Clues: Lip Kit queenThe Gulf of AmericaOther word for fenceCyber truck inventorIn her billionaire eraNBAs shark in the tank"Prime members get "it" quick"Hes wired in" "My Prada's at the cleaners""Beyonce had one of the best videos of all time"

BIMBINGAN KONSELING 2023-03-08

BIMBINGAN KONSELING crossword puzzle
Across
  1. Nama lain dari empati
  2. Gangguan kesehatan mental akibat tindakan bullying
  3. Gangguan kesehatan fisik akibat tindakan bullying
  4. Korban jebakan pemikiran orang yang berbeda
  5. Penindasan berupa julukan nama, celaan atau fitnah
  6. Penindasan dengan menggunakan kekerasan seperti memukul
Down
  1. Pelaku bullying
  2. Nama lain dari tindakan bullying
  3. Salah satu faktor penyebab terjadinya bullying
  4. Kemampuan memahami secara emosional perasaan orang lain
  5. Penindasan lewat jagat maya
  6. Reaksi fisik dalam menanggapi apa yang dialami orang lain
  7. Korban tindakan pembullian

13 Clues: Pelaku bullyingNama lain dari empatiKorban tindakan pembullianPenindasan lewat jagat mayaNama lain dari tindakan bullyingKorban jebakan pemikiran orang yang berbedaSalah satu faktor penyebab terjadinya bullyingGangguan kesehatan fisik akibat tindakan bullyingGangguan kesehatan mental akibat tindakan bullying...

IT Application and Emerging Technologies - crossword Puzzel 2025-09-15

IT Application and Emerging Technologies - crossword Puzzel crossword puzzle
Across
  1. Virtual environment for immersive experience
  2. A decentralized digital currency
  3. Machines simulating human intelligence
  4. Computers designed to mimic the human brain
  5. Smart devices connected via the internet (3)
  6. Technology enabling virtual meetings
  7. Protects against cyber threats
  8. Collection and analysis of huge data sets
  9. Ability of machines to learn from data
Down
  1. Tracking technology used in logistics and shopping
  2. Replacing paper-based systems with computers (11)
  3. Sharing resources over the internet
  4. 3D _________, used in manufacturing

13 Clues: Protects against cyber threatsA decentralized digital currencySharing resources over the internet3D _________, used in manufacturingTechnology enabling virtual meetingsMachines simulating human intelligenceAbility of machines to learn from dataCollection and analysis of huge data setsComputers designed to mimic the human brain...

Elle Severt- Types of bullying 2022-05-17

Elle Severt- Types of bullying crossword puzzle
Across
  1. Cyber bullying can be someone texting or posting something __ photos of people.
  2. Jake threatened to beat up Marc after school, what is this?
  3. Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
  4. Social bullying is spreading rumors,__ people from games and groups
Down
  1. Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
  2. Layla spits on Jenny and laughs at her outfit, what is this?
  3. Verbal bullying contains someone ___ someone to do some kind of harm to them.

7 Clues: Jake threatened to beat up Marc after school, what is this?Layla spits on Jenny and laughs at her outfit, what is this?Social bullying is spreading rumors,__ people from games and groupsVerbal bullying contains someone ___ someone to do some kind of harm to them.Cyber bullying can be someone texting or posting something __ photos of people....

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. buy
  2. screen
  3. passenger
  4. arrive
  5. airport
  6. security
  7. vacation
  8. customs
  9. confirm
Down
  1. flight
  2. call
  3. passport
  4. train
  5. suitcase
  6. board
  7. luggage
  8. station
  9. reclaim
  10. ticket
  11. to travel

20 Clues: buycalltrainboardflightscreenarriveticketairportluggagestationreclaimcustomsconfirmpassportsuitcasesecurityvacationpassengerto travel

Ir De Vacaciones 2022-10-13

Ir De Vacaciones crossword puzzle
Across
  1. luggage
  2. gate
  3. suitcase
  4. confirm
  5. departure
  6. travel
  7. itinerary
  8. ticket
  9. passport
  10. arrival
  11. board
  12. screen
Down
  1. flight
  2. ID
  3. agent
  4. Line
  5. airport
  6. passenger
  7. security
  8. call

20 Clues: IDgateLinecallagentboardflighttravelticketscreenluggageairportconfirmarrivalsuitcasepassportsecuritydeparturepassengeritinerary

profesions 2019-10-30

profesions crossword puzzle
Across
  1. ārsts
  2. skolotāja
  3. maiznieks
  4. inženieris
  5. agronoms
  6. grāmatvedis
  7. analītiķis
  8. audiologopēds
  9. arborists
Down
  1. policists
  2. medmāsa
  3. apsardze
  4. vetārsts
  5. mehatroniķis
  6. pilots
  7. kinologs
  8. kosmētiķis
  9. taksists
  10. mežcirtējs
  11. ugunsdzēsējs

20 Clues: ārstspilotsmedmāsaapsardzevetārstsagronomskinologstaksistspolicistsskolotājamaiznieksarboristsinženieriskosmētiķisanalītiķismežcirtējsgrāmatvedismehatroniķisugunsdzēsējsaudiologopēds

crossword 2017-04-21

crossword crossword puzzle
Across
  1. peaceful
  2. many_islands
  3. disorder
  4. misery
  5. control
  6. anger
  7. anticipate
  8. naval
  9. trembling
  10. threatening
  11. island
Down
  1. brave
  2. ordinary
  3. delay
  4. safety
  5. cry
  6. a_war_ship
  7. beam
  8. deep
  9. storm

20 Clues: crybeamdeepbravedelayangernavalstormsafetymiseryislandcontrolordinarypeacefuldisordertremblinga_war_shipanticipatethreateningmany_islands

Spanish Vocab 1.1 - Kyle McCormick 2018-09-13

Spanish Vocab 1.1 - Kyle McCormick crossword puzzle
Across
  1. trip
  2. pilot
  3. passenger
  4. identification
  5. security
  6. passport
  7. sign
  8. airline
  9. suitcase
  10. aisle
  11. arrival
Down
  1. ticket
  2. to board
  3. counter
  4. window
  5. customs
  6. flight
  7. seat
  8. luggage
  9. departure

20 Clues: tripseatsignpilotaisleticketwindowflightcountercustomsairlineluggagearrivalto boardsecuritypassportsuitcasepassengerdepartureidentification

NULL 2023-11-07

NULL crossword puzzle
Across
  1. e
  2. b
  3. p
  4. c
  5. q
  6. f
  7. o
  8. m
  9. h
  10. i
  11. j
Down
  1. d
  2. a
  3. k
  4. s
  5. n
  6. g
  7. r
  8. l
  9. t

20 Clues: dakebpsngrlcqftomhij

Sjdb 2025-10-01

Sjdb crossword puzzle
Across
  1. departure
  2. passenger
  3. suitcase
  4. itinerary
  5. ToGoOnVacasion
  6. GoThroughCustoms
  7. ToBoard
  8. arrival
  9. ToGetInLine
  10. airport
  11. passport
Down
  1. boardingpass
  2. ToCallSomeone
  3. TravelAgency
  4. security
  5. ticket
  6. moniter
  7. gate
  8. luggage
  9. Flight

20 Clues: gateticketFlightmoniterToBoardarrivalluggageairportsuitcasesecuritypassportdeparturepassengeritineraryToGetInLineboardingpassTravelAgencyToCallSomeoneToGoOnVacasionGoThroughCustoms

Cyber - safety Thomas 2016-06-06

Cyber - safety Thomas crossword puzzle
Across
  1. - don't tell anyone your p.......
  2. - don't spend too much .... online (hint hours, and minutes)
  3. - to take care of your personal information
  4. - something mean people do to you online
  5. - bad language that you shouldn't use on the internet
  6. - types of bad emails that you get, that ask you to forward them on
  7. - don't play too many of these online
Down
  1. - types of sites that we are allowed to visit
  2. - sites on the Internet you visit
  3. - if you .... something is wrong, then tell mum or dad
  4. - to dob on someone to mum or dad if you think something isn't right
  5. - always ask your parents when it asks to spend money and ... Something
  6. - only talk to these people online, they are your .......
  7. - you go ...... To connect to the internet

14 Clues: - don't tell anyone your p.......- sites on the Internet you visit- don't play too many of these online- something mean people do to you online- to take care of your personal information- you go ...... To connect to the internet- types of sites that we are allowed to visit- bad language that you shouldn't use on the internet...

Cyber-bullying vocabulary 2019-07-23

Cyber-bullying vocabulary crossword puzzle
Across
  1. Publishing or making available personally-identifying information about another.
  2. The practice of forcing someone to do something, particularly to perform sexual acts, by threatening to publish naked pictures of them or sexual information about them
  3. When a person anonymously sends himself/herself instructions to self-harm or self-injure.
  4. Posting or publishing embarrassing or damaging photos or videos.
  5. A collection of behavioral suggestions and/or rules to make online interaction more pleasant for everyone
  6. Gossiping or spreading rumors about a person.
  7. Revealing private or embarrassing information about a person.
Down
  1. When a person sends electronic messages with angry and vulgar language.
  2. Or 'imping'. It means pretending to be someone else.
  3. Monitoring a person's activities or placing a person under surveillance to instill fear. Adult contact and attempt to meet with young people for sexual purposes.
  4. Repeatedly sending offensive messages to cause a person to fear for their safety.
  5. When somebody logs into your social networking account and impersonates you by posting inappropriate content in your name.
  6. Engaging in activities intentionally to exclude someone from a formal or informal group.
  7. Persuading a person to reveal secret or embarrassing information they would not otherwise reveal. The cyberbully then shares it publicly online.

14 Clues: Gossiping or spreading rumors about a person.Or 'imping'. It means pretending to be someone else.Revealing private or embarrassing information about a person.Posting or publishing embarrassing or damaging photos or videos.When a person sends electronic messages with angry and vulgar language....

Cyber Week 2025 2025-12-03

Cyber Week 2025 crossword puzzle
Across
  1. A covering used for warmth on a bed
  2. Get your photos printed on this
  3. A day for online shopping
  4. A fried pastry filled with ingredients like egg and tuna
  5. A celebratory public march
  6. Falls in flakes and is white
  7. Customer Love Team
  8. Our favorite place to work
Down
  1. What you do when a customer wants a promo honored
  2. The fourth product under Photo Gifts on ECP
  3. Busiest day of the year for retail
  4. What Texas is known for, a popular NFL team
  5. The colors of the flag is black, green, and gold
  6. Originally the 10th month, this is now the modern 12th month

14 Clues: Customer Love TeamA day for online shoppingA celebratory public marchOur favorite place to workFalls in flakes and is whiteGet your photos printed on thisBusiest day of the year for retailA covering used for warmth on a bedThe fourth product under Photo Gifts on ECPWhat Texas is known for, a popular NFL team...

safer internet day 2023-02-06

safer internet day crossword puzzle
Across
  1. _______ are not your friends
  2. ____ fun be nice
  3. internet
Down
  1. _____ police
  2. _____ internet day
  3. is
  4. ______ sharing is not allowed

7 Clues: isinternet_____ police____ fun be nice_____ internet day_______ are not your friends______ sharing is not allowed

It's a quiz!!! 2024-04-25

It's a quiz!!! crossword puzzle
Across
  1. A client needs to renew their ADAP coverage, who do you connect them to?
  2. What is the extension for the testing room?
  3. True or False, clients are welcome to use our phones
  4. The password for the cyber center
  5. How long may a client use the cyber center each day?
  6. Our outgoing mail is kept in the drawer with these small, commonly requested items?
  7. How many minutes does a client need to wait to for their HIV test results?
  8. You answered a call, where do you log that call?
  9. Which day of the week does Senior Drop in happen?
  10. What we do for every client who enters the building?
Down
  1. A client has been a victim of a hate crime, which staff do we connect them with?
  2. Which room do most Senior Services events happen in?
  3. How do we identify clients here for testing appointments?
  4. The only department with a paper calendar
  5. What is the code to the testing bathroom?
  6. How many snack packs may a client have per day?
  7. The Crisis Team can be reached at this extension
  8. Are we currently accepting book donations?
  9. A client asks if we have bus passes, which department do you contact?
  10. What is the code to the dumpster?
  11. A client walks in and you don't know why they are here, what do you do?
  12. A package has arrived, who do you email?
  13. The keys are kept in the large drawer with what common office item?
  14. On the 2nd and 4th day of this month we have a food in the parking lot
  15. Who is the Manager of Youth Housing Services?

25 Clues: The password for the cyber centerWhat is the code to the dumpster?A package has arrived, who do you email?The only department with a paper calendarWhat is the code to the testing bathroom?Are we currently accepting book donations?What is the extension for the testing room?Who is the Manager of Youth Housing Services?...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  3. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. pencurian hak cipta (11 huruf)
  7. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  10. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  11. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  12. aturan dan normal berperilaku baik di media sosial (11 huruf)
  13. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  14. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. perbuatan melanggar hukum didunia maya (10 huruf)
  3. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  4. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  5. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. peraturan yang melindungi data pribadi (16 huruf)
  8. penyebaran informasi palsu yang luas (4 huruf)
  9. program kecil yang dapat merusak sistem komputer (5 huruf)
  10. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  11. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

What are Friends For? 2023-10-06

What are Friends For? crossword puzzle
Across
  1. something that is the same for people or things
  2. a brave and strong person who saves people
  3. someone you don't like
  4. thinking about other people's feelings and being kind
  5. related to the internet and computers
  6. feels cozy or nice
  7. someone you don't know
  8. something that can hurt you
Down
  1. things you do often
  2. apps and websites used to share information
  3. ask someone to join
  4. someone who listens will
  5. being comfortable, healthy and happy
  6. feeling sad because you're all by myself
  7. things you don't tell
  8. being truthful in what you say and do
  9. to disagree with someone
  10. people in one place together

18 Clues: feels cozy or nicethings you do oftenask someone to jointhings you don't tellsomeone you don't likesomeone you don't knowsomeone who listens willto disagree with someonesomething that can hurt youpeople in one place togetherbeing comfortable, healthy and happybeing truthful in what you say and dorelated to the internet and computers...

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Do not provide your _______ email account to social networks.
  3. _______ your computer when left unattended.
  4. This can slow down your computer and watch everywhere you go on the Internet.
  5. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  6. Always use _______ factor authentication where available.
  7. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  8. Use a _______ password different from the passwords you use to access other sites.
Down
  1. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  2. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  3. You should always keep your software and anti-virus definitions up-to-_______.
  4. Cybersecurity is _______'s responsibility.
  5. Information Security is a _______ issue.
  6. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  7. _______ before you click or forward.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

9 krossvord 2025-02-20

9 krossvord crossword puzzle
Across
  1. Ma’lumotlarning nusxasini yaratish
  2. Ma’lumotlarni saqlovchi markaziy qurilma
  3. Internet bilan bog‘liq texnologiyalar
Down
  1. Dastur yoki tizimni yangilash jarayoni
  2. Klaviatura bosishlarini kuzatuvchi dastur
  3. Foydalanuvchini aldash orqali ma’lumot olish usuli
  4. Tizimga zarar yetkazadigan dasturiy tahdid
  5. Axborot xavfsizligiga tahdid soluvchi omil

8 Clues: Ma’lumotlarning nusxasini yaratishInternet bilan bog‘liq texnologiyalarDastur yoki tizimni yangilash jarayoniMa’lumotlarni saqlovchi markaziy qurilmaKlaviatura bosishlarini kuzatuvchi dasturTizimga zarar yetkazadigan dasturiy tahdidAxborot xavfsizligiga tahdid soluvchi omilFoydalanuvchini aldash orqali ma’lumot olish usuli

Investing Cassie Marquis 2025-03-25

Investing Cassie Marquis crossword puzzle
Across
  1. The increase in value of an asset (2 words)
  2. A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
  3. When a private company offers shares to the public in a new stock issuance
  4. A collection of stocks, bonds or other assets that trades on a stock exchange
  5. Age you must be to invest
  6. The availability of cash or the ease in which an asset can be converted into cash
  7. A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
  8. The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
  9. Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
  10. Age that you can delay collecting social security security benefits to get more benefits
  11. Digital money generated by computers. It’s value comes from its limited supply
  12. A system of recording information in a way that makes it difficult to change, hack or cheat the system
  13. A plan managed by your employer that you, the state (sometimes) and your employer put money into.
  14. A type of bond issued by the government (2 words)
Down
  1. How much you’re paying for each dollar of the company’s earnings (2 words)
  2. Federal payroll tax deducted from each paycheck to pay for social security and medicare
  3. Currencies backed by the government that aren’t tied to a commodity (2 words)
  4. Companies that have shares typically less than 5 dollars (2 words)
  5. A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
  6. The total value of a company’s stock (2 words)
  7. CEO of Berkshire Hathaway (2 words)
  8. 3-4 letters that represent a publicly traded company (2 words)
  9. Age where you can collect full social security benefits
  10. A type of bond issued by a company
  11. A security that represents ownership of a portion of a company

25 Clues: Age you must be to investA type of bond issued by a companyCEO of Berkshire Hathaway (2 words)The increase in value of an asset (2 words)The total value of a company’s stock (2 words)A type of bond issued by the government (2 words)Age where you can collect full social security benefits3-4 letters that represent a publicly traded company (2 words)...

Investing - Dylan Abellera 2025-03-24

Investing - Dylan Abellera crossword puzzle
Across
  1. A unique series of letters or a combination of letters and numbers.
  2. Nationally or Internationally recognized, Financially Sound Company.
  3. An individual who buys and sells with the intention of profiting from short-term price fluctuations.
  4. A portion of a company’s earnings distributed to shareholders as a return on their investment, usually in cash.
  5. The profit realized from the sale of a capital asset like stocks or real estate.
  6. Taxes that fund Social Security and Medicare.
  7. A regular guaranteed payment to a person when they retire.
  8. Investing all the money you have available at that given time, and putting it into the market.
  9. CEO of Berkshire Hathaway. One of the greatest investors of all time.
  10. A collection of stocks, bonds, or other assets that trades on a stock exchange.
  11. The ease with which an asset or security can be converted into cash.
  12. A financial marketplace where investors can buy and sell shares of companies.
  13. A type of mutual fund, or ETF that follows a benchmark index, portion of the market.
  14. A type of security representing ownership in a company.
  15. Putting funds into a new investment account after leaving a company.
Down
  1. A unit of ownership in a company, dividing its ownership into equal parts.
  2. Pools money from a large group of investors to purchase a portfolio of stocks.
  3. Can contribute up to seven-thousand dollars in these kinds of retirement accounts each year.
  4. Spreading investments across different assets to reduce risk exposure.
  5. A market in which prices are falling and a pessimistic outlook overall.
  6. An individual who allocates capital into various financial assets with the expectation of generating long-term returns.
  7. the process of offering shares of a private corporation to the public in a new stock issuance.
  8. Worked for a certain amount of time with a company, to own all of the matched money from your employer.
  9. The age you can receive full social security retirement benefits.
  10. Security Provides retirement, survivor, and disability benefits to millions of Americans.

25 Clues: Taxes that fund Social Security and Medicare.A type of security representing ownership in a company.A regular guaranteed payment to a person when they retire.The age you can receive full social security retirement benefits.A unique series of letters or a combination of letters and numbers....

Spanish Vacation Vocabulary 2024-07-16

Spanish Vacation Vocabulary crossword puzzle
Across
  1. viaje
  2. vuelo
  3. puerta
  4. identificación
  5. aeropuerto
  6. llamar
  7. pasajero(a)
  8. salida
  9. maleta
  10. pantalla
Down
  1. llegada
  2. aduana
  3. equipaje
  4. vacaciones
  5. turismo
  6. seguridad
  7. abordar
  8. itinerario
  9. boleto
  10. pasaporte

20 Clues: viajevueloaduanapuertaboletollamarsalidamaletallegadaturismoabordarequipajepantallaseguridadpasaportevacacionesitinerarioaeropuertopasajero(a)identificación

Laki ja yhteiskunta 2023-06-06

Laki ja yhteiskunta crossword puzzle
Across
  1. oikeudenkäynti
  2. tuomio
  3. todistaa
  4. syyttäjä
  5. syyttää
  6. ehdonalainen
  7. turvallisuus
  8. sakkorangaistus
Down
  1. pidättää
  2. varas
  3. todistaja
  4. varkaus
  5. taskuvaras
  6. murtovarkaus
  7. asianajaja
  8. tuomari
  9. salakuljettaa
  10. valamiehistö
  11. väärennös
  12. armahdus

20 Clues: varastuomiovarkaustuomarisyyttääpidättäätodistaasyyttäjäarmahdustodistajaväärennöstaskuvarasasianajajamurtovarkausvalamiehistöehdonalainenturvallisuussalakuljettaaoikeudenkäyntisakkorangaistus

Selfie Horror Story 2022-12-12

Selfie Horror Story crossword puzzle
Across
  1. ladda upp
  2. anonym
  3. säkerhet
  4. konto
  5. livlina
  6. allvarligt
  7. försök
  8. orolig
  9. omedelbart
Down
  1. kränkt
  2. spår
  3. lösenord
  4. direkt
  5. störa
  6. nyligen
  7. radera
  8. anta
  9. formulär
  10. trösta
  11. förbryllad

20 Clues: spårantastörakontokränktanonymdirektraderatröstaförsökorolignyligenlivlinalösenordsäkerhetformulärladda uppallvarligtförbrylladomedelbart

Jonathan M crssword 2023-09-07

Jonathan M crssword crossword puzzle
Across
  1. techsupport
  2. email
  3. investigating
  4. repair
  5. encryption
  6. strongpassword
  7. password
  8. databreach
  9. router
  10. alerting
Down
  1. access
  2. data breach
  3. systemlocation
  4. userleaked
  5. virtualprivatenetwork
  6. protection
  7. typeofmalware
  8. infectswithmalware
  9. securing
  10. copieddata

20 Clues: emailaccessrepairroutersecuringpasswordalertinguserleakedprotectionencryptioncopieddatadatabreachtechsupportdata breachinvestigatingtypeofmalwaresystemlocationstrongpasswordinfectswithmalwarevirtualprivatenetwork

UN 2023-05-04

UN crossword puzzle
Across
  1. 11
  2. 12
  3. 2
  4. 8
  5. 9
  6. 15
  7. 14
  8. 4
  9. 7
  10. 16
Down
  1. 1
  2. 18
  3. 19
  4. 5
  5. 3
  6. 13
  7. 17
  8. 6
  9. 10
  10. 20

20 Clues: 1258396471118191213171015201416

New Theme 2023-03-05

New Theme crossword puzzle
Across
  1. the application of scientific knowledge for practical purposes
  2. antonym of ineffective
  3. the exchange of information by speaking or writing or through another medium
  4. a condition that makes something better
Down
  1. antonym of advantages
  2. facts provided about something or someone
  3. the acquisition of knowledge
  4. an electronic device for storing and processing data
  5. relating to the present
  6. ready to give help
  7. relating to the culture of computers
  8. the means to enter a place

12 Clues: ready to give helpantonym of advantagesantonym of ineffectiverelating to the presentthe means to enter a placethe acquisition of knowledgerelating to the culture of computersa condition that makes something betterfacts provided about something or someonean electronic device for storing and processing data...

Investing Cassie Marquis 2025-03-25

Investing Cassie Marquis crossword puzzle
Across
  1. The increase in value of an asset (2 words)
  2. A major cryptocurrency exchange that crashed in 2022 due to fund mismanagement and lack of liquidity
  3. When a private company offers shares to the public in a new stock issuance
  4. A collection of stocks, bonds or other assets that trades on a stock exchange
  5. Age you must be to invest
  6. The availability of cash or the ease in which an asset can be converted into cash
  7. A pool of money from a large group of investors to purchase a diverse portfolio of stocks, bonds and other securities (2 words)
  8. The distribution of some of a company’s earnings to a class of its shareholders as determined by the company’s board of directors
  9. Provides retirement, survivor and disability benefits. Predicted to collapse in the mid 2030’s. (2 words)
  10. Age that you can delay collecting social security security benefits to get more benefits
  11. Digital money generated by computers. It’s value comes from its limited supply
  12. A system of recording information in a way that makes it difficult to change, hack or cheat the system
  13. A plan managed by your employer that you, the state (sometimes) and your employer put money into.
  14. A type of bond issued by the government (2 words)
Down
  1. How much you’re paying for each dollar of a company’s earnings (2 words)
  2. Federal payroll tax deducted from each paycheck to pay for social security and medicare
  3. Currencies backed by the government that aren’t tied to a commodity (2 words)
  4. Companies that have shares typically less than 5 dollars (2 words)
  5. A type of mutual fund or ETF that follows a benchmark index or a particular segment of the market
  6. The total value of a company’s stock (2 words)
  7. CEO of Berkshire Hathaway (2 words)
  8. 3-4 letters that represent a publicly traded company
  9. Age where you can collect full social security benefits
  10. A type of bond issued by a company
  11. A security that represents ownership of a portion of a company

25 Clues: Age you must be to investA type of bond issued by a companyCEO of Berkshire Hathaway (2 words)The increase in value of an asset (2 words)The total value of a company’s stock (2 words)A type of bond issued by the government (2 words)3-4 letters that represent a publicly traded companyAge where you can collect full social security benefits...

chapter 10 2020-09-05

chapter 10 crossword puzzle
Across
  1. The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank.2w
  2. A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments.2w
  3. The Fed’s activities in buying and selling government securities.3w
  4. The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece.3w
  5. A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
  6. A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults.2w
  7. Two interest rates controlled by the Fed that have an effect on market interest rates.
  8. The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders.2w
  9. The national finance market, where mortgages are bought and sold as investments.2w
  10. A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause.2w
  11. The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien.3w
Down
  1. A provision giving the borrower the right to regain title to the security property when the debt is repaid.2w
  2. A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults.3w
  3. A written promise to repay a debt.2w
  4. The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”.3w
  5. When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.

16 Clues: A written promise to repay a debt.2wThe Fed’s activities in buying and selling government securities.3wThe national finance market, where mortgages are bought and sold as investments.2wTwo interest rates controlled by the Fed that have an effect on market interest rates....

AVSEC QC Crossword #2 2025-04-09

AVSEC QC Crossword #2 crossword puzzle
Across
  1. The auditor should display __________ while conducting an interview
  2. _____________ consists of repeating in simple terms the answers provided by the interviewee. It is a method for clarifying information and a means of verifying what has been stated by the person
  3. Security _________ is an inquiry into any act or attempted act of unlawful interference against civil aviation and/or any alleged or suspected instance of non-compliance with a State’s National Civil Aviation Security Programme
  4. The Interim Findings Report will serve as a basis for the presentation during the post inspection debriefing and the final _________
  5. Any enforcement action taken by a State would require ________ Authority
  6. For practical purposes a __________ is a smaller document, one that is easy to handle, would make the inspectors’ job efficient. This kind of document will be complementary to the inspection guide
Down
  1. the _____________ Authority determines the categories of compliance to be used during inspections
  2. The pre-inspection _____________ is a document, which is sent to the airport authority or inspected entity prior to the inspection to collect current information
  3. Security ___________ evaluation of security needs including the identification of vulnerabilities which could be exploited to carry out an act of unlawful interference, and the recommendation of corrective actions.
  4. __________ is a phenomenon that will translate into a passive situation whereby the persons questioned withhold information; mask information; block communication
  5. Security ________ is a covert or overt trial of an aviation security measure, which simulates an attempt to commit an unlawful act
  6. Benchmark, _________ and auditor are the three components of the inspection concept
  7. The auditee must be provided with __________ regarding inspection findings during the post-inspection meeting

13 Clues: The auditor should display __________ while conducting an interviewAny enforcement action taken by a State would require ________ AuthorityBenchmark, _________ and auditor are the three components of the inspection conceptthe _____________ Authority determines the categories of compliance to be used during inspections...

mass media 2022-10-26

mass media crossword puzzle
Across
  1. УНИЖЕНИЕ
  2. РЕКЛАМИРОВАТЬ
  3. ПЕРЕДАЧА, ТРАНСЛЯЦИЯ
  4. КАНАЛ
  5. СЕТЬ
  6. СООБЩЕНИЕ
  7. ОБСУЖДЕНИЕ
  8. УГРОЖАТЬ
  9. ГРУБЫЙ
  10. АКТУАЛЬНЫЙ
Down
  1. ГРАЖДАНИН
  2. ОБМЕНИВАТЬСЯ
  3. ИНФОРМАЦИЯ
  4. ОБЩАТЬСЯ
  5. СОЗДАВАТЬ
  6. НОВОСТИ
  7. ВМЕСТО
  8. ПОРТИТЬ
  9. СТЫД
  10. БЕЗОПАСНОСТЬ

20 Clues: СЕТЬСТЫДКАНАЛВМЕСТОГРУБЫЙНОВОСТИПОРТИТЬУНИЖЕНИЕОБЩАТЬСЯУГРОЖАТЬГРАЖДАНИНСОЗДАВАТЬСООБЩЕНИЕИНФОРМАЦИЯОБСУЖДЕНИЕАКТУАЛЬНЫЙОБМЕНИВАТЬСЯБЕЗОПАСНОСТЬРЕКЛАМИРОВАТЬПЕРЕДАЧА, ТРАНСЛЯЦИЯ

Ir De Vacaciones 2022-10-13

Ir De Vacaciones crossword puzzle
Across
  1. luggage
  2. gate
  3. suitcase
  4. confirm
  5. departure
  6. travel
  7. itinerary
  8. ticket
  9. passport
  10. arrival
  11. board
  12. screen
Down
  1. flight
  2. ID
  3. agent
  4. Line
  5. airport
  6. passenger
  7. security
  8. call

20 Clues: IDgateLinecallagentboardflighttravelticketscreenluggageairportconfirmarrivalsuitcasepassportsecuritydeparturepassengeritinerary

Selfie Horror Story 2024-11-25

Selfie Horror Story crossword puzzle
Across
  1. anonym
  2. livlina
  3. formulär
  4. direkt
  5. lösenord
  6. anta
  7. omedelbart
  8. nyligen
  9. förbryllad
  10. ladda upp
  11. störa
Down
  1. trösta
  2. orolig
  3. konto
  4. allvarligt
  5. spår
  6. kränkt
  7. radera
  8. försök
  9. säkerhet

20 Clues: spårantakontostöratröstaoroliganonymdirektkränktraderaförsöklivlinanyligenformulärlösenordsäkerhetladda uppallvarligtomedelbartförbryllad

Internet Safety, Cyber Security and Encryption: Digital Footprint 2024-01-16

Internet Safety, Cyber Security and Encryption: Digital Footprint crossword puzzle
Across
  1. is when you tricking someone into giving their password.
  2. is when a hacker uses a program that tries every possible combination to identify your password.
  3. the email if you are not sure whether the email is genuine.
  4. is the term use for unauthorize access
Down
  1. is the common method to login to your account
  2. greeting is one of the common features of phishing email
  3. is an example of social media
  4. is used to navigate user to another page.
  5. is a term call for a profile picture
  6. surfing is when someone look over your shoulder as you enter password.

10 Clues: is an example of social mediais a term call for a profile pictureis the term use for unauthorize accessis used to navigate user to another page.is the common method to login to your accountis when you tricking someone into giving their password.greeting is one of the common features of phishing email...

EATSS Crossword 2023-06-29

EATSS Crossword crossword puzzle
Across
  1. To request an ______ press F4 on the keyboard while on the TPQY screen.
  2. ______ of all accounts must be on file prior to completing a determination.
  3. Records that include all zeros on the screen.
  4. Supplemental Security Income (SSI) page.
  5. Used when making determination for coverage.
  6. 4 levels of an SSA ______.
  7. SSA Disability shows SSA payment status of "_____ payment".
Down
  1. Screen divided into SSA information and SSI information.
  2. A rep ______ is person/organization appointed to receive SS or SSI benefits for individuals.
  3. Error message: "Do not have _____ to access SSN."
  4. Screen listing information specific to SSA Benefits.
  5. Abbreviation for Electronic Access To Social Security.
  6. F12 is used to ______ the system.
  7. ______ began date. Date Social Security determined the consumer's _____ began.

14 Clues: 4 levels of an SSA ______.F12 is used to ______ the system.Supplemental Security Income (SSI) page.Used when making determination for coverage.Records that include all zeros on the screen.Error message: "Do not have _____ to access SSN."Screen listing information specific to SSA Benefits.Abbreviation for Electronic Access To Social Security....

Industrial Security Trivia 2024-04-24

Industrial Security Trivia crossword puzzle
Across
  1. Access to classified information requires Eligibility, Access and ________________
  2. who must have a Scale-related purpose for entering workspaces
  3. what must be displayed at all times while inside Scale workspaces
  4. what does CUI stand for
Down
  1. who must you inform regarding a potential or actual security incident
  2. a person with authorized access to any organization or government resource who uses their access wittingly or unwittingly to do harm
  3. Never take __________ and save sensitive task imagery on your computers
  4. _______ is everyone's responsibility
  5. _______ emails must be forwarded/reported to security@scale.com
  6. Unauthorized disclosure of this information would cause SERIOUS DAMAGE to national security

10 Clues: what does CUI stand for_______ is everyone's responsibilitywho must have a Scale-related purpose for entering workspaces_______ emails must be forwarded/reported to security@scale.comwhat must be displayed at all times while inside Scale workspaceswho must you inform regarding a potential or actual security incident...

Digital citizenship 2021-06-03

Digital citizenship crossword puzzle
Across
  1. being on a device
  2. someone witnessing a conflict
  3. everything you do online is you're .....
  4. treat people the way you want to be treated
  5. being mean to someone repeatedly online
Down
  1. a place you can go if being cyber bullied
  2. behaving
  3. pretending to be someone you're not
  4. being safe

9 Clues: behavingbeing safebeing on a devicesomeone witnessing a conflictpretending to be someone you're notbeing mean to someone repeatedly onlineeverything you do online is you're .....a place you can go if being cyber bulliedtreat people the way you want to be treated

AI and Cybersecurity 2025-03-02

AI and Cybersecurity crossword puzzle
Across
  1. A technique that identifies anomalies by learning normal system behavior.
  2. A strategy that uses decoy systems to mislead potential attackers.
  3. A method that detects patterns without pre‐labelled data.
  4. A general term for software designed to damage or exploit systems.
  5. The process of converting unstructured text into structured threat intelligence.
  6. An algorithm that groups similar data points without prior labels.
  7. A process of embedding hidden messages within non-secret data.
  8. A generative model used in adversarial defense strategies.
  9. A decentralized ledger technology that records transactions securely.
  10. A deceptive email tactic aiming to steal sensitive information.
  11. A vulnerability exploited before any patch becomes available.
  12. A method used to scramble data so only authorised parties can read it.
  13. A process that identifies deviations from normal system behavior.
  14. A simulated attack conducted to assess a system’s security.
  15. An attack strategy that manipulates inputs to avoid detection.
  16. A computing paradigm with the potential to break current cryptographic systems.
  17. A short-lived digital key that grants temporary access to a system.
  18. The process of integrating security measures early in the development cycle.
  19. An autoencoder variant adept at detecting long-term attack patterns.
  20. A security barrier that filters incoming and outgoing network traffic.
  21. A security model that denies trust by default.
  22. A learning technique that uses labelled training data.
  23. Short abbreviation for a cyberattack that persists undetected.
  24. A technique that examines user actions to detect irregular behavior.
  25. A systematic method for testing systems to uncover vulnerabilities.
Down
  1. The standard established for normal system behavior to flag outliers.
  2. A type of malware that locks files until a ransom is paid.
  3. A learning approach where systems adapt through trial and error.
  4. A GAN-based framework that sanitizes adversarial inputs.
  5. A decoy system designed to lure attackers away from real assets.
  6. Coordinated automation of multi-step incident response workflows.
  7. Neural networks that automatically extract complex features from data.
  8. An approach combining CNN and RNN for enhanced threat detection.
  9. A neural network variant particularly effective at visual data analysis.
  10. The process of confirming a user’s or device’s identity.
  11. A practice that limits user rights to only what is necessary.
  12. A technique for extracting actionable intelligence from text.
  13. The practice of quantifying and managing potential security risks.
  14. A technique that maps adversarial inputs to a learned data manifold.
  15. The security centre challenged by overwhelming daily alerts.
  16. A sequence of operations used to process or secure data.
  17. A model that integrates spatial and temporal data for threat detection.
  18. A framework that maps tactics and techniques in cyberattacks.
  19. A tool that suggests security-focused improvements during code writing.
  20. The process of cleansing inputs by projecting them onto benign data.
  21. A software solution that detects and removes malicious programs.
  22. A network model that captures sequential dependencies in data.
  23. A device that directs data between networks while managing traffic.
  24. Abbreviation for analytics that monitor user behavior for anomalies.
  25. A system designed to monitor network traffic for suspicious activities.

50 Clues: A security model that denies trust by default.A learning technique that uses labelled training data.A GAN-based framework that sanitizes adversarial inputs.The process of confirming a user’s or device’s identity.A sequence of operations used to process or secure data.A method that detects patterns without pre‐labelled data....

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  2. aturan dan normal berperilaku baik di media sosial (11 huruf)
  3. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  4. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  5. program kecil yang dapat merusak sistem komputer (5 huruf)
  6. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  7. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  8. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  9. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  10. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  11. perbuatan melanggar hukum didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  14. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
Down
  1. penyebaran informasi palsu yang luas (4 huruf)
  2. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  3. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  4. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  5. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  8. peraturan yang melindungi data pribadi (16 huruf)
  9. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  10. pencurian hak cipta (11 huruf)
  11. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  12. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  2. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  3. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  4. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. pencurian hak cipta (11 huruf)
  7. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  10. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  11. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  12. aturan dan normal berperilaku baik di media sosial (11 huruf)
  13. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  14. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
Down
  1. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  2. perbuatan melanggar hukum didunia maya (10 huruf)
  3. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  4. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  5. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  6. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  7. peraturan yang melindungi data pribadi (16 huruf)
  8. penyebaran informasi palsu yang luas (4 huruf)
  9. program kecil yang dapat merusak sistem komputer (5 huruf)
  10. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  11. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  12. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  13. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  14. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  15. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  2. perilaku tidak atau kasar di dunia maya (10 huruf)
  3. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  4. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  5. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  6. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  7. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  8. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  9. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  10. peraturan yang melindungi data pribadi (16 huruf)
  11. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  12. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  13. perbuatan melanggar hukum didunia maya (10 huruf)
Down
  1. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  2. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  3. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  4. aturan dan normal berperilaku baik di media sosial (11 huruf)
  5. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  6. pencurian hak cipta (11 huruf)
  7. program kecil yang dapat merusak sistem komputer (5 huruf)
  8. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  9. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  10. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  11. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  12. penyebaran informasi palsu yang luas (4 huruf)
  13. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  14. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  15. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
  16. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)peraturan yang melindungi data pribadi (16 huruf)perbuatan melanggar hukum didunia maya (10 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

Cyber-bullying -Support 2014-11-05

Cyber-bullying -Support crossword puzzle
Across
  1. Governed by a country
  2. Bring to a standstill
  3. Provide assistance to someone to help them feel better
  4. Defender
  5. Therapy
  6. Pay no attention to
  7. Avoid doing
  8. keep track of something
Down
  1. Lend a help in hand
  2. Avoidance
  3. Supervise
  4. Honesty
  5. Give a statement of something
  6. Make Improvements

14 Clues: TherapyHonestyDefenderAvoidanceSuperviseAvoid doingMake ImprovementsLend a help in handPay no attention toGoverned by a countryBring to a standstillkeep track of somethingGive a statement of somethingProvide assistance to someone to help them feel better

Computer Vocabularies 2022-11-15

Computer Vocabularies crossword puzzle
Across
  1. faster, quieter, and more expensive than HDD
  2. copy others’ work
  3. it makes sure that no information will be lost
  4. a network that interconnects with other computers in a large area
  5. go into other’s personal data
  6. rules for the internet
  7. allows information when you search it
  8. Drive it contains memory for data storage
Down
  1. large, slow, and expensive
  2. intellectual property
  3. unwanted communication
  4. parts of a large item
  5. computer memory
  6. a security system
  7. powerhouse of a computer
  8. a network that interconnects with other computers in a certain area
  9. surface
  10. Security protection for networks
  11. used to connect computers

19 Clues: surfacecomputer memorya security systemcopy others’ workintellectual propertyparts of a large itemunwanted communicationrules for the internetpowerhouse of a computerused to connect computerslarge, slow, and expensivego into other’s personal dataSecurity protection for networksallows information when you search it...

Cyber Safety-Archie webb 2016-05-24

Cyber Safety-Archie webb crossword puzzle
Across
  1. to protect your computer from viruses
  2. way to check if your computer has a virus
  3. instruction
  4. this person about cyber safety
  5. to connect
  6. virus
  7. who breaks into your computer
  8. machine that allows you to use the Internet
  9. group of computers that are connected
Down
  1. search engine
  2. for device
  3. you securely connect to a network or program
  4. Apple tablet
  5. a hacker tries to steal
  6. small device
  7. program you can stall on your device
  8. thing that protects your device
  9. you a virus
  10. large device

19 Clues: virusfor deviceto connectinstructionyou a virusApple tabletsmall devicelarge devicesearch enginea hacker tries to stealwho breaks into your computerthis person about cyber safetything that protects your deviceprogram you can stall on your deviceto protect your computer from virusesgroup of computers that are connected...

Positions and Order Status 2026-02-05

Positions and Order Status crossword puzzle
Across
  1. Instructions determining when and at what price a security is bought or sold, including market orders, limit orders, and stop-loss orders.
  2. Part of your order was filled. The remaining part was canceled.
  3. Is the price at which the security traded. A footnote will indicate whether this is real-time or delayed.
  4. Is the security's price increase or decrease since the previous market close.
  5. The lifespan of a trading order, specifying how long it remains active before execution or expiration
  6. Displays the value of the holding or your account.
  7. Part of the order has been filled; part is still open.
  8. Your order was completed in full.
Down
  1. Your order was rescinded at your request.
  2. The page to view current and recent trades.
  3. For stocks or mutual funds, this reflects the number of shares you currently hold. For fixed income securities, this field reflects the face value of the securities. For options, this field reflects the number of option contracts purchased or sold.
  4. The title of the security is displayed in this field.
  5. Your order cancellation request has been submitted.
  6. The total original cost of acquiring an asset—including purchase price, commissions, and fees.
  7. Is the one to five characters used to represent the security. This is defined by the different markets or exchanges.
  8. Your order ended without being filled or canceled.
  9. Your order is waiting to be completed.

17 Clues: Your order was completed in full.Your order is waiting to be completed.Your order was rescinded at your request.The page to view current and recent trades.Displays the value of the holding or your account.Your order ended without being filled or canceled.Your order cancellation request has been submitted....

Disaster Preparedness 2022-02-07

Disaster Preparedness crossword puzzle
Across
  1. Security Device Review
  2. Where AED is Located
  3. What to do in Even of Power Outage
  4. What to do in Event of Live Shooter
  5. Secondary Evacuation Point
  6. Give to Members During Internet Outage
  7. Call Question for All Clear
  8. Head of Security
Down
  1. Who to Inform When There's a Threat
  2. Shelter in Place
  3. How to Prevent Spread of Disease/Chemicals
  4. Report Unethical Behavior
  5. Used for Heart Attacks
  6. Form for Suspicious Incidents
  7. February Distress Signal
  8. What to Do During Robbery/Hostage
  9. First Evacuation Point
  10. What to do During Bomb Threat

18 Clues: Shelter in PlaceHead of SecurityWhere AED is LocatedSecurity Device ReviewUsed for Heart AttacksFirst Evacuation PointFebruary Distress SignalReport Unethical BehaviorSecondary Evacuation PointCall Question for All ClearForm for Suspicious IncidentsWhat to do During Bomb ThreatWhat to Do During Robbery/HostageWhat to do in Even of Power Outage...

RU ITEC11 Chapter 5 2023-12-01

RU ITEC11 Chapter 5 crossword puzzle
Across
  1. to ask questions, research questions and to know about security measures
  2. using someone else identity without being authorized and using it for criminal activities
  3. obtain sensitive information as in text messages
  4. creating a fake website to get into personal information by creating a fake url into a domain Name servers
  5. use security tools and monitor networks to avoid attacks
  6. open access was first implemented to share study materials.
  7. obtain sensitive information as in e-mail
  8. is an extremely sophisticated worm
  9. monitor and block communication from unreliable websites.
  10. prohibited use of a computer unless authorized
  11. obtain sensitive information as in voice phishing
  12. techniques on how to steal personal and financial data
Down
  1. prioritize security in their advancements
  2. involves hacking for political purposes
  3. publishers must prevent access towards other nations when it is prohibited
  4. The cost of defending an attack is included in the definition of loss under the Act
  5. traits that are specific to an individual biologically
  6. using someone else identity without being authorized and using it for criminal activities
  7. Programming's excitement
  8. is the expansion of online and mobile technologies

20 Clues: Programming's excitementis an extremely sophisticated worminvolves hacking for political purposesprioritize security in their advancementsobtain sensitive information as in e-mailprohibited use of a computer unless authorizedobtain sensitive information as in text messagesobtain sensitive information as in voice phishing...

Algo trading 2019-09-21

Algo trading crossword puzzle
Across
  1. One of the measures of central tendency
  2. a profit or loss on an investment
  3. ability and ease with which assets can be converted into cash
  4. simultaneous transactions in multiple financial markets to make profit
  5. a fixed-income security
  6. a measure of the sensitivity of the value (price) of an option
  7. a measure of minimum upward or downward movement in the price of a security
Down
  1. Difference between the value of assets and the cost of liabilities
  2. an investment strategy designed to offset a potential loss
  3. Can be American or exotic
  4. complete set of all possible observations
  5. a financial instrument
  6. measure of an investment's performance compared to a certain benchmark
  7. An instruction by an investor to the broker

14 Clues: a financial instrumenta fixed-income securityCan be American or exotica profit or loss on an investmentOne of the measures of central tendencycomplete set of all possible observationsAn instruction by an investor to the brokeran investment strategy designed to offset a potential lossability and ease with which assets can be converted into cash...

Cybersecurity Awareness month 2025-09-30

Cybersecurity Awareness month crossword puzzle
Across
  1. The process of converting information into a code for security
  2. A saved copy of data for recovery after loss or attack
  3. A software update that fixes security vulnerabilities
  4. Manipulating people into revealing confidential information
  5. Software that secretly monitors your computer activities
Down
  1. Malicious software that locks files until a payment is made
  2. A login method requiring two forms of verification
  3. A scam email or message tricking you into giving personal information
  4. A network of infected devices controlled remotely
  5. A program that detects and removes malicious software
  6. A secret string used to secure accounts
  7. Malicious software designed to damage or gain access to a system
  8. A network security system that blocks unauthorized access
  9. A service that creates a secure tunnel for internet traffic

14 Clues: A secret string used to secure accountsA network of infected devices controlled remotelyA login method requiring two forms of verificationA program that detects and removes malicious softwareA software update that fixes security vulnerabilitiesA saved copy of data for recovery after loss or attack...

LA NETIQUETTE 2021-11-11

LA NETIQUETTE crossword puzzle
Across
  1. diritto alla riservatezza delle
  2. bullismo bullismo online
  3. news informazioni false sul web
  4. o per acquisire
Down
  1. codice segreto per accedere ad un
  2. riservate
  3. violare un sistema informatico per

7 Clues: riservateo per acquisirediritto alla riservatezza dellebullismo bullismo onlinecodice segreto per accedere ad unviolare un sistema informatico pernews informazioni false sul web

Biometrics 2025-04-03

Biometrics crossword puzzle
Across
  1. basic rights
  2. safety measures taken for protection
  3. to take full advantage of and benefit from
  4. something so easy that you cant mess it up
Down
  1. software programs that protect you while online
  2. following a trend just because everyone else is
  3. weaknesses in a security system
  4. to illegally enter into someone's computer
  5. to avoid or get around
  6. a gap in security

10 Clues: basic rightsa gap in securityto avoid or get aroundweaknesses in a security systemsafety measures taken for protectionto illegally enter into someone's computerto take full advantage of and benefit fromsomething so easy that you cant mess it upsoftware programs that protect you while onlinefollowing a trend just because everyone else is

SWQuality 2024-01-17

SWQuality crossword puzzle
Across
  1. risk
  2. verify
  3. standards
  4. safety
Down
  1. SW
  2. document for sw quality
  3. traceability
  4. security
  5. rules

9 Clues: SWriskrulesverifysafetysecuritystandardstraceabilitydocument for sw quality

Topic 7 - Development of Computer Industry and Law 2024-05-02

Topic 7 - Development of Computer Industry and Law crossword puzzle
Across
  1. In Malaysia, a core legislation in governing the communications and multimedia industry is called
  2. What vendor is ranked first for the semiconductor industry in 2018
  3. Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
  4. Computer system resources and services that can be accessed over the cloud
  5. Cyber law exists to handle cybersecurity and…
  6. Digital form of value that can be used as a token for transaction electronically
  7. The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
  8. Devices of information-age products are called
  9. Law that cover all internet-related technologies and provide a legal system for controlling it is called
  10. Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
  1. Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
  2. In telecommunication industry, who manufacture and sell telecommunications equipment
  3. Design/infrastructure of information resource that can be navigated efficiently
  4. The process of protecting systems, data, and networks from cyber attacks is called
  5. In telecommunication industry, who operate and provide access to deliver services via internet
  6. Major segments of telecommunication industry besides equipment vendors and service providers
  7. The most important legislation that applies to telecoms (including internet)
  8. What is the leading computer manufacturing company that based in Taiwan
  9. What institution that serve as the telecommunications regulator in Malaysia
  10. Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…

20 Clues: Cyber law exists to handle cybersecurity and…Devices of information-age products are calledWhat vendor is ranked first for the semiconductor industry in 2018What is the leading computer manufacturing company that based in TaiwanComputer system resources and services that can be accessed over the cloud...

TEKA-TEKI SILANG INFORMATIKA 2025-06-03

TEKA-TEKI SILANG INFORMATIKA crossword puzzle
Across
  1. pelanggaran privasi yang melibatkan pengucapan informasi pribadi (18 huruf)
  2. berbuat menyebar informasi yang merugikan orang lain (14 huruf)
  3. informasi umum tentang seorang yang tidak bersifat rahasia (15 huruf)
  4. pencurian hak cipta (11 huruf)
  5. penyebaran informasi palsu untuk merusak reputasi seseorang (18 huruf)
  6. serangan Cyber yang bertujuan untuk mencari data pribadi (15 huruf)
  7. perlindungan hukum terhadap pencemaran nama baik (10 huruf)
  8. perbuatan melanggar hukum didunia maya (10 huruf)
  9. Sistem yang mengatur urutan informasi yang ditampilkan (9 huruf)
  10. aturan dan normal berperilaku baik di media sosial (11 huruf)
  11. jejak digital yang tercipta tanpa disadari penggunaan (10 huruf)
  12. tindakan menyebarkan informasi yang salah secara remaja (14 huruf)
  13. ujaran berisi kebencian atau penghinaan terhadap kelompok tertentu (15 huruf)
  14. penyebaran informasi palsu yang luas (4 huruf)
  15. pesan atau ancaman yang dikirim secara online untuk mengintimidasi (11 huruf)
  16. praktik ilegal yang bertujuaan untuk menipu penggunaan online (14 huruf)
  17. informasi yang ditinggalkan secara sengaja didunia maya (10 huruf)
Down
  1. jenis data yang hanya dapat diakses oleh pihak tertentu (11 huruf)
  2. program kecil yang dapat merusak sistem komputer (5 huruf)
  3. informasi yang mengidentifikasi seseorang secara unik (12 huruf)
  4. tindakan kriminal yang dilakukan melalui internet (17 huruf)
  5. kejahatan yang dilakukan dengan menggunakan teknologi informasi (14 huruf)
  6. perilaku online yang bertujuan untuk menganggu atau menakut nakuti(14 huruf)
  7. ancaman online yang bertujuan untuk menakut nakuti (13 huruf)
  8. jenis pinjaman yang dilakukan melalui platfrom online (14 huruf)
  9. undang-undang yang mengatur informasi dan transaksi Elektronik (5 huruf)
  10. peraturan yang melindungi data pribadi (16 huruf)
  11. serangan Cyber yang bertujuan untuk melumpuhkan sistem (13 huruf)
  12. perilaku tidak atau kasar di dunia maya (10 huruf)

29 Clues: pencurian hak cipta (11 huruf)penyebaran informasi palsu yang luas (4 huruf)perbuatan melanggar hukum didunia maya (10 huruf)peraturan yang melindungi data pribadi (16 huruf)perilaku tidak atau kasar di dunia maya (10 huruf)program kecil yang dapat merusak sistem komputer (5 huruf)perlindungan hukum terhadap pencemaran nama baik (10 huruf)...

Fam 2021-07-11

Fam crossword puzzle
Across
  1. law
  2. hper
  3. two
  4. girl
  5. three
  6. science
  7. mom
  8. engine
  9. design
  10. cop
Down
  1. car
  2. animal
  3. Chad
  4. boy
  5. coffee
  6. dad
  7. security
  8. bot
  9. drive
  10. boy

20 Clues: lawcartwoboydadbotmomboycophperChadgirlthreedriveanimalcoffeeenginedesignsciencesecurity

AI Crossword 2023-12-11

AI Crossword crossword puzzle
Across
  1. uihiuh
  2. uhiuhuih
  3. uihuihuih
  4. uhuhuh
  5. giuguigiug
  6. uiiuhui
  7. iuhuih
  8. uuhuoh
Down
  1. uhuhu
  2. uhu
  3. uhuhui
  4. iuhuhuoh
  5. uihiuhui
  6. huhuhuhuhuhuh
  7. hhih
  8. uhiuh
  9. uihhiuhui
  10. iohoihoi
  11. huuhuhuh
  12. iuhuih

20 Clues: uhuhhihuhuhuuhiuhuihiuhuhuhuiuhuhuhiuhuihiuhuihuuhuohuiiuhuiuhiuhuihiuhuhuohuihiuhuiiohoihoihuuhuhuhuihuihuihuihhiuhuigiuguigiughuhuhuhuhuhuh

Cybersecurity Terminology Puzzle (participation 3) 2023-01-27

Cybersecurity Terminology Puzzle (participation 3) crossword puzzle
Across
  1. software that is harmful
  2. software that checks for malware
  3. internet access at starbucks
  4. scrambling data in unreadable
  5. attacks seeking out personal info
  6. software that tracks you
  7. shield for data
  8. tech savy criminals stealing private information
  9. improving security tools for cloud infrastructure
  10. multiple attackers preventing legitimate users
Down
  1. tricking users to click an image
  2. altered image creating false reality
  3. malware that makes you pay
  4. malware pretending to be useful
  5. designs, builds, and tests security systems
  6. malware that displays adverts
  7. network pro learning hacking techniques
  8. online harassment that intimidates victims

18 Clues: shield for datasoftware that is harmfulsoftware that tracks youmalware that makes you payinternet access at starbucksscrambling data in unreadablemalware that displays advertsmalware pretending to be usefultricking users to click an imagesoftware that checks for malwareattacks seeking out personal infoaltered image creating false reality...

IC3 Lesson 30 Vocab 2015-05-18

IC3 Lesson 30 Vocab crossword puzzle
Across
  1. a security system.
  2. Certificates for e-commerce sites, sites that process sensitive data, and sites that
  3. security feature used for larger networks that controls computers from one point.
  4. A program that hackers use to capture IDs and passwords on a network.
  5. A malicious program that records keystrokes.
  6. Using a script or program to log on to an account using hundreds of words or
  7. Encrypts the information in an SSL Certificate.
  8. privacy and security requirements.
Down
  1. information.
  2. number, and one special character.
  3. Certificates for e-commerce sites, sites that process sensitive data, and sites that
  4. Deciphers the information in an SSL Certificate.
  5. Chronic physical malady that can result when a person makes too many of the
  6. Hackers using spyware to control your browser.
  7. Complex and secure, containing at least eight characters and at least one letter,
  8. information about the user, the user's browsing habits, and other
  9. motions over a long period of time.
  10. privacy and security requirements.
  11. Invading someone else's computer, usually for personal gain or the satisfaction of
  12. Software installed surreptitiously on a personal computer with the goal of
  13. stored in a dictionary file.

21 Clues: information.a security system.stored in a dictionary file.number, and one special character.privacy and security requirements.privacy and security requirements.motions over a long period of time.A malicious program that records keystrokes.Hackers using spyware to control your browser.Encrypts the information in an SSL Certificate....

. 2014-05-30

. crossword puzzle
Across
  1. takes the 3rd place in cybercrime world ranking
  2. device used for criminal activities
  3. top target of cyber attacks
  4. to bypass internet users to fake websites for frauding their idendity
  5. protects your computer from unauthorised access
  6. computer operating system
Down
  1. malware whivh distribute itself
  2. person who want to damage or steal information
  3. manipulation
  4. successful people collect it

10 Clues: manipulationcomputer operating systemtop target of cyber attackssuccessful people collect itmalware whivh distribute itselfdevice used for criminal activitiesperson who want to damage or steal informationtakes the 3rd place in cybercrime world rankingprotects your computer from unauthorised access...

Cybercrime 2013-09-08

Cybercrime crossword puzzle
Across
  1. Testing unit for humans to be identified
  2. False website leading to identity theft.
  3. Most popular social media
  4. Destructive program diguised as a usefull application
Down
  1. Illegal access into private cyber information
  2. E-mails overcrowding from unknown sources
  3. E-mail article intended to deceive
  4. Physical apparatus in terms of computing
  5. Programmes loaded onto a computer
  6. Fake automated computers
  7. Illegal unauthorized downloads eg. music

11 Clues: Fake automated computersMost popular social mediaProgrammes loaded onto a computerE-mail article intended to deceiveTesting unit for humans to be identifiedFalse website leading to identity theft.Physical apparatus in terms of computingIllegal unauthorized downloads eg. musicE-mails overcrowding from unknown sources...

Security Awareness crossword puzzle 2018-05-07

Security Awareness crossword puzzle crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  3. _______ your data regularly and periodically check that you are able to restore them.
  4. _______ before you click or forward.
  5. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  6. Cybersecurity is _______'s responsibility.
  7. Always use _______ factor authentication where available.
  8. This can slow down your computer and watch everywhere you go on the Internet.
  9. _______ your computer when left unattended.
Down
  1. You should always keep your software and anti-virus definitions up-to-_______.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  5. Information Security is a _______ issue.
  6. Do not provide your _______ email account to social networks.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Cybersecurity Awareness Crossword (2018) 2018-07-29

Cybersecurity Awareness Crossword (2018) crossword puzzle
Across
  1. This horse can stampede your security defences for the bad guys and make you look sheepish too!
  2. Information Security is a _______ issue.
  3. When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
  4. Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  5. This can slow down your computer and watch everywhere you go on the Internet.
  6. _______ your computer when left unattended.
  7. _______ before you click or forward.
Down
  1. _______ your data regularly and periodically check that you are able to restore them.
  2. Use a _______ password different from the passwords you use to access other sites.
  3. A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  4. Cybersecurity is _______'s responsibility.
  5. You should always keep your software and anti-virus definitions up-to-_______.
  6. Do not provide your _______ email account to social networks.
  7. If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
  8. Always use _______ factor authentication where available.

15 Clues: _______ before you click or forward.Information Security is a _______ issue.Cybersecurity is _______'s responsibility._______ your computer when left unattended.Always use _______ factor authentication where available.Do not provide your _______ email account to social networks....

Banking 15.1 JC 2024-05-09

Banking 15.1 JC crossword puzzle
Across
  1. is a security that pays interest over terms ranging from 2-10 years
  2. is a security that pays interest over terms of ten to thirty years
  3. is a type of financial investment issued by a corparation
  4. is a security that matures in a year or less
  5. is the process of transferring money from one individual or organization to another
Down
  1. money is used in exchange for goods and services
  2. is anything of value that is accepted in return for goods or services
  3. can be saved and used at a later date
  4. is the mechanism a nation uses to provide and manage money for itself
  5. allows customers to pay for purchases directly from their checking account
  6. is a plastic card that allows the holder to make credit purchases up to an authorized amount
  7. means that money is a common measure of the worth or price of a good service
  8. is a transfer of moneyfrom one bank account to another

13 Clues: can be saved and used at a later dateis a security that matures in a year or lessmoney is used in exchange for goods and servicesis a transfer of moneyfrom one bank account to anotheris a type of financial investment issued by a corparationis a security that pays interest over terms of ten to thirty years...

Software Development Security 2021-02-03

Software Development Security crossword puzzle
Across
  1. A communication to or input of an object
  2. A life cycle model that allows for multiple iterations of a waterfall-style process
  3. In this type of networks the chains of computational units are used in an attempt to imitate the biological reasoning process of the human mind.
  4. Internal code that defines the actions an object performs in response to a message
  5. A level of interaction between objects.
  6. A state that allows users to bypass failed security controls, erring on the side of permissiveness.
  7. A characteristics of a database transactions that follows an “all-or-nothing” affair.
  8. Describes the strength of the relationship between the purposes of the methods within the same class.
Down
  1. The formalized processes by which trust is built into the life cycle of a system.
  2. A phase of IDEAL model, in which engineers analyze the current state of the organization and make general recommendations for change.
  3. A characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions.
  4. A preventive security mechanism that endeavors to make certain that the information stored in the database is always correct or at least has its integrity and availability protected.
  5. The ...-based methods analyze the behavior of software, looking for the telltale signs of virus activity, such as attempts to elevate privilege level, cover their electronic tracks, and alter unrelated or operating system fi les.
  6. A highly sophisticated worm widely spread in mid-2010 which uses a variety of advanced techniques to spread, including multiple previously undocumented vulnerabilities
  7. A database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type.
  8. A tool that converts the higher-level language into an executable file designed for use on a specific operating system

16 Clues: A level of interaction between objects.A communication to or input of an objectThe formalized processes by which trust is built into the life cycle of a system.Internal code that defines the actions an object performs in response to a messageA life cycle model that allows for multiple iterations of a waterfall-style process...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. A set of rules that limits access to information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of Uncertainty on objectives

16 Clues: Effect of Uncertainty on objectivesA set of rules that limits access to informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. The company that monitors our alarms
  2. ___ with all demands of the robber
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. Packet in vault room with specific instructions
  6. Great ___ is our best robbery deterrent
Down
  1. Remain _____ during a robbery
  2. To call 911 dial _-911
  3. When safe to do so press your ____ buttons
  4. ____ have more than $5k in your cash drawer
  5. Use the ____ button when you receive a 'sus'email
  6. Always leave the building in ____
  7. ___ parking lot is our Secondary Meeting Spot
  8. ____, hide, neutralize in an active shooter situation
  9. In the event of a fire, ____ mbr sensitive info
  10. Packet under the phone

16 Clues: To call 911 dial _-911Packet under the phoneRemain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

Elle Severt- Types of bullying 2022-05-17

Elle Severt- Types of bullying crossword puzzle
Across
  1. Cyber bullying can be someone texting or posting something __ photos of people.
  2. Jake threatened to beat up Marc after school, what is this?
  3. Amy spreads a rumor about Lou to make everyone hate her, what type of bullying is this?
  4. Social bullying is spreading rumors,__ people from games and groups
Down
  1. Steven gets a message from Arthur that he's weak and bad at the game they're playing, what type of bullying is this?
  2. Layla spits on Jenny and laughs at her outfit, what is this?
  3. Verbal bullying contains someone ___ someone to do some kind of harm to them.

7 Clues: Jake threatened to beat up Marc after school, what is this?Layla spits on Jenny and laughs at her outfit, what is this?Social bullying is spreading rumors,__ people from games and groupsVerbal bullying contains someone ___ someone to do some kind of harm to them.Cyber bullying can be someone texting or posting something __ photos of people....

DP-3 Crossword Puzzle 2024-07-23

DP-3 Crossword Puzzle crossword puzzle
Across
  1. DP-3 policies with minimum 3-day/2-night short-term rental must be managed through a site like ______ or VRBO
  2. 4-Point ___________are required for DP-3 risks age 20 and over
  3. These are allowed as long as the load bearing wall is not impacted and the footprint of the dwelling is not changed
Down
  1. Binding ___________ can be added to provide an average savings of 20%
  2. This optional endorsement protects against computers, home systems, cyber extortion, and online fraud
  3. This endorsement offers more robust coverage and a lower rate compared to the NFIP
  4. Tenant and _____-occupied properties are eligible for DP-3 coverage

7 Clues: 4-Point ___________are required for DP-3 risks age 20 and overTenant and _____-occupied properties are eligible for DP-3 coverageBinding ___________ can be added to provide an average savings of 20%This endorsement offers more robust coverage and a lower rate compared to the NFIP...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
  2. Electronic device most students own at home and is square and mostly portable.
  3. the use of technology to harass, threaten, embarrass, or target another person.
Down
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  3. A repetitive action toward another human purposely causing harm or intimidation.
  4. safety, The act of protecting ones self or others from harm or intimidation online.
  5. An individual who causes harm or stress to another human intentionally and repetitively.
  6. Having firm belief or reliability in someone.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person.A repetitive action toward another human purposely causing harm or intimidation....

cyber bullying 2024-02-06

cyber bullying crossword puzzle
Across
  1. /making someone feel embarrassed infront of others
  2. /communicate online
  3. / when you are left out of activities on purpose
  4. / when somebody enters into personal things online
  5. /constantly being sad
  6. / when your location gets leaked
Down
  1. /treating people bad
  2. / talk bad about you
  3. / when someone stops talking to you without reason

9 Clues: /communicate online/treating people bad/ talk bad about you/constantly being sad/ when your location gets leaked/ when you are left out of activities on purpose/making someone feel embarrassed infront of others/ when somebody enters into personal things online/ when someone stops talking to you without reason

CYBER BULLYING 2019-11-19

CYBER BULLYING crossword puzzle
Across
  1. CAN SNAP PITHURES
  2. MEAN TO DO
  3. HAS A KEYBORD
  4. KIDS HAS THIS ELETRONIC
  5. HAVE THIS APP
  6. A MOTHER BOARD OF APPS
Down
  1. TO PUT SOMETHING ON THE INTERNET
  2. A ELECTRONIC THAT TENNAGERS HAVE
  3. DONALD TRUMP HAS A ACCOUNT ON THIS APP

9 Clues: MEAN TO DOHAS A KEYBORDHAVE THIS APPCAN SNAP PITHURESA MOTHER BOARD OF APPSKIDS HAS THIS ELETRONICTO PUT SOMETHING ON THE INTERNETA ELECTRONIC THAT TENNAGERS HAVEDONALD TRUMP HAS A ACCOUNT ON THIS APP

Cyber Quiz17 2024-08-29

Cyber Quiz17 crossword puzzle
Across
  1. Attack involving the use of malicious software
  2. Process of verifying identity
  3. Secure connection protocol
  4. communicating device in a network is known as
Down
  1. Software that protects against malware
  2. Method used to protect/hide information
  3. A method to confirm the integrity of data
  4. A network security device
  5. Threat that involves fraudulent emails

9 Clues: A network security deviceSecure connection protocolProcess of verifying identitySoftware that protects against malwareThreat that involves fraudulent emailsMethod used to protect/hide informationA method to confirm the integrity of datacommunicating device in a network is known asAttack involving the use of malicious software

Cyber wellness 2023-02-01

Cyber wellness crossword puzzle
Across
  1. We need to respect other people's _______
  2. We should _______ our teachers and classmates
  3. We can get __________ from the Internet
  4. If we post something negative online, it
Down
  1. Something you do to let someone personal and private details to the public
  2. _______ other people's feelings
  3. Our ________ information includes our username and password
  4. We should use the _______ for the right purposes
  5. We should not ____ other people's personal information

9 Clues: _______ other people's feelingsWe can get __________ from the InternetIf we post something negative online, itWe need to respect other people's _______We should _______ our teachers and classmatesWe should use the _______ for the right purposesWe should not ____ other people's personal information...

Cyber Safety 2023-05-02

Cyber Safety crossword puzzle
Across
  1. If a stranger tries to find you on social media, you should _______ them.
  2. To keep my personal information safe, I must not share my _______.
  3. You should tell an _______ if something happens online that makes you uncomfortable.
  4. Hiding behind a fake profile to be unkind is called _______.
  5. Only accept _______ requests from people that you know.
Down
  1. Bullying online is called _______.
  2. I must _______ others when communicating online.
  3. Online _______ can be good fun with friends.
  4. Do not open unknown emails, as they may contain a _______.

9 Clues: Bullying online is called _______.Online _______ can be good fun with friends.I must _______ others when communicating online.Only accept _______ requests from people that you know.Do not open unknown emails, as they may contain a _______.Hiding behind a fake profile to be unkind is called _______....

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. A COLLECTION OF THINGS TO BUY
  2. ITEMS AVAILABLE FOR SALE
  3. WHAT YOU DO TO LOOK FOR ITEMS
  4. THE COST OF AN ITEM
Down
  1. WHAT YOU BUY FOR SOMEONE ELSE
  2. TO BUY SOMETHING ONLINE
  3. WHAT YOU DO WITH MONEY ONLINE
  4. WHERE YOU RECEIVE PROMO CODES
  5. A SHORTENED TERM FOR PROMOTION

9 Clues: THE COST OF AN ITEMTO BUY SOMETHING ONLINEITEMS AVAILABLE FOR SALEWHAT YOU BUY FOR SOMEONE ELSEA COLLECTION OF THINGS TO BUYWHAT YOU DO TO LOOK FOR ITEMSWHAT YOU DO WITH MONEY ONLINEWHERE YOU RECEIVE PROMO CODESA SHORTENED TERM FOR PROMOTION

cyber threats 2025-04-05

cyber threats crossword puzzle
Across
  1. abusive or threatening speech or writing that expresses prejudice on the basis of ethnicity, religion, sexual orientation, or similar grounds.
  2. false or misleading information (misinformation, disinformation, propaganda, and hoaxes) claiming the aesthetics and legitimacy of news.
  3. the distribution of sexually explicit images or videos of individuals without their consent,[1] with the punitive intention to create public humiliation out of revenge against the victim.
  4. a term that comes from the English words ‘vampire’ and ‘texting’ and refers to the practice, carried out mostly by teenagers, which consists in making excessive use of electronic devices such as cell phones, laptops, tablets, consoles just before going to sleep.
Down
  1. when group violence or maltreatment is recorded and then published on the Internet.
  2. sending, receiving, or forwarding sexually explicit messages, photographs, or videos, primarily between mobile phones.
  3. severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement.
  4. the act of playing videogames or betting money on games.
  5. the action or behavior used to establish an emotional connection with a vulnerable person generally a minor.

9 Clues: the act of playing videogames or betting money on games.when group violence or maltreatment is recorded and then published on the Internet.severe or total withdrawal from society and seeking extreme degrees of social isolation and confinement....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. Practices this means accessing the internet in an illegal manner
  2. this refers to the act of using or imitating the language and thoughts of other person at one's original work
  3. dossier what is digital footprint also known as
  4. this refers to an illegal intrusion into a computer system or network
  5. ethics while using the internet, we need to follow certain moral rules which includes honesty, respecting the privacy of others, and property rights. These rules are called
  6. this refers to criminal activities that involves the use of computer, networks, and the internet connection with the intend to cause harm to individual or their digital devices
Down
  1. this refer to unwanted bulk emails that come from unknown sources
  2. it refers to being aware of the ethical practices and behaving Responsibly and appropriately while using the internet
  3. footprint this is an impression or information about a person that exist on the internet because of his online activity
  4. they are highly technical people who secretly break into computer to steal important data or sometimes to destroy it

10 Clues: dossier what is digital footprint also known asPractices this means accessing the internet in an illegal mannerthis refer to unwanted bulk emails that come from unknown sourcesthis refers to an illegal intrusion into a computer system or network...

Cyber Ethics 2025-06-12

Cyber Ethics crossword puzzle
Across
  1. is the act of accessing someone’s computer system without permission
  2. is the unauthorized use of someone’s personal data
  3. Software that damages or disables a computer system
  4. is a protection method that filters incoming and outgoing traffic.
Down
  1. protects the creator’s exclusive rights over their original work
  2. is any illegal activity intended to harm people using computers or the internet
  3. refers to sending unwanted or harmful messages to harass someone online
  4. The act of watching someone’s online activity without their knowledge
  5. it is a software that protects your computer from viruses

9 Clues: is the unauthorized use of someone’s personal dataSoftware that damages or disables a computer systemit is a software that protects your computer from virusesprotects the creator’s exclusive rights over their original workis a protection method that filters incoming and outgoing traffic....

Unit 4 2022-03-02

Unit 4 crossword puzzle
Across
  1. A quick fix for a specific software problem.
  2. A fix that is more thoroughly tested than a hotfix and designed for a wider deployment.
  3. A collection of patches, hotfixes, and system enhancements that have been tested by the manufacturer for wide deployment.
  4. a standalone storage device or appliance that acts as a file server.
  5. this chain is used for packets leaving the system.
  6. a firewall command line utility for Linux operation systems that uses three policy chains to allow or block network traffic.
  7. provides no authentication, encryption, or error detection.
Down
  1. this chain controls the behavior for incoming connections.
  2. an operating system that comes hardened and validated to a specific security level as defined in the Common Criteria for Information Technology Security Evaluation (CC).
  3. The process of securing devices and software by reducing the security exposure and tightening security controls.
  4. can provide information about which operating system a computer uses.
  5. A component of a manageable network plan that indicates an action or event.
  6. A special network composed of high-speed storage that is shared by multiple servers.
  7. this chain is used for outgoing connections.

14 Clues: A quick fix for a specific software problem.this chain is used for outgoing connections.this chain is used for packets leaving the system.this chain controls the behavior for incoming connections.provides no authentication, encryption, or error detection.a standalone storage device or appliance that acts as a file server....

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. The company that monitors our alarms
  2. ___ with all demands of the robber
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. Packet in vault room with specific instructions
  6. Great ___ is our best robbery deterrent
Down
  1. Remain _____ during a robbery
  2. To call 911 dial _-911
  3. When safe to do so press your ____ buttons
  4. ____ have more than $5k in your cash drawer
  5. Use the ____ button when you receive a 'sus'email
  6. Always leave the building in ____
  7. ___ parking lot is our Secondary Meeting Spot
  8. ____, hide, neutralize in an active shooter situation
  9. In the event of a fire, ____ mbr sensitive info
  10. Packet under the phone

16 Clues: To call 911 dial _-911Packet under the phoneRemain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

2021 Q4 Security 2021-12-15

2021 Q4 Security crossword puzzle
Across
  1. Packet under the phone
  2. Use the ____ button when you receive a 'sus'email
  3. When safe to do so press your ____ buttons
  4. Remain _____ during a robbery
  5. ___ parking lot is our Secondary Meeting Spot
  6. The company that monitors our alarms
  7. Packet in vault room with specific instructions
  8. Great ___ is our best robbery deterrent
Down
  1. ___ with all demands of the robber
  2. ____ have more than $5k in your cash drawer
  3. Number of people that are emailed when we call 911
  4. Never write down or share _____
  5. In the event of a fire, ____ mbr sensitive info
  6. Always leave the building in ____
  7. ____, hide, neutralize in an active shooter situation
  8. To call 911 dial _-911

16 Clues: Packet under the phoneTo call 911 dial _-911Remain _____ during a robberyNever write down or share _____Always leave the building in _______ with all demands of the robberThe company that monitors our alarmsGreat ___ is our best robbery deterrentWhen safe to do so press your ____ buttons____ have more than $5k in your cash drawer...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. Set of rules that limits access to information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of Uncertainty on objectives

16 Clues: Effect of Uncertainty on objectivesSet of rules that limits access to informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

E safety 2019-03-04

E safety crossword puzzle
Across
  1. bullying online bullying
  2. Block people if send rude stuff
  3. Talking weird to people
  4. Sending rude pictures
Down
  1. When you send rude pictures
  2. Going on your phone with people
  3. Stay safe

7 Clues: Stay safeSending rude picturesTalking weird to peoplebullying online bullyingWhen you send rude picturesBlock people if send rude stuffGoing on your phone with people

Cyber ethics terms 2021-08-25

Cyber ethics terms crossword puzzle
Across
  1. unauthorized use or reproduction of another's work
  2. legal right, given to an originator
  3. a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law
  4. correct or acceptable way of communicating on the internet
  5. moral principles
  6. a document stipulating constraints and practices that a user must agree to for access
  7. a doctrine in the law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder
Down
  1. the philosophic study of ethics pertaining to computers
  2. all rights associated with intangible assets owned by a person or company
  3. criminal activities carried out by means of computers or the internet
  4. bullying that is cyber
  5. tricking someone on the web
  6. allows the creator protection from theft of their idea
  7. abusive message posted on the internet

14 Clues: moral principlesbullying that is cybertricking someone on the weblegal right, given to an originatorabusive message posted on the internetunauthorized use or reproduction of another's workallows the creator protection from theft of their ideathe philosophic study of ethics pertaining to computers...

cyber final crossword 2022-12-08

cyber final crossword crossword puzzle
Across
  1. known as "apps"
  2. a commercial operating system for computers
  3. smart algorithms that learn
  4. what runs applications
  5. processing machine in the computer
Down
  1. circuit board
  2. helps display image on the computer
  3. software to use for coding/debugging
  4. physical computer component
  5. intangible computer component
  6. storage device on a computer
  7. helps give the result of the input data
  8. helps enter data into the computer
  9. an open source operating system for computers

14 Clues: circuit boardknown as "apps"what runs applicationsphysical computer componentsmart algorithms that learnstorage device on a computerintangible computer componenthelps enter data into the computerprocessing machine in the computerhelps display image on the computersoftware to use for coding/debugginghelps give the result of the input data...

Understanding Money 2024-05-09

Understanding Money crossword puzzle
Across
  1. A transfer of money from one bank account to another
  2. Money is a common measure of the worth or price of a good or service
  3. A security that matures in a year or less
  4. A security that pays interest over terms of ten to thirty years
  5. A security that pays interest over terms ranging from two to ten years
  6. Anything of value that is accepted in return for goods and services
  7. Money used in exchange for goods and services needed by individuals, businesses, and governments
  8. A type of a document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payers name
  9. Money is worth more now, Money received now can be invested or deposited in the bank to earn interest
  10. A plastic card that allows the holder to make credit purchases up to an authorized amount
  11. A type of financial investment issued by a corporation, government, or other organization
Down
  1. The process of transferring money from one individual or organization to another
  2. It can be saved and used at a later date
  3. Banks that are part of the Federal Reserve System
  4. Must be accepted "for all debts, public and private."
  5. The mechanism a nation uses to provide and manage money for itself
  6. Allows customers to pay for purchases directly from their checking account
  7. An action taken to manage the supply of money and interest rates in an economy

18 Clues: It can be saved and used at a later dateA security that matures in a year or lessBanks that are part of the Federal Reserve SystemA transfer of money from one bank account to anotherMust be accepted "for all debts, public and private."A security that pays interest over terms of ten to thirty years...

1 2023-03-01

1 crossword puzzle
Across
  1. A security measure used to protect IoT devices from malicious software
  2. SENSOR A device that can measure the concentration of gases or pollutants in the environment
  3. SENSOR A device that can measure the amount of light in the environment
  4. A device that can measure the temperature and humidity of the environment
  5. A device that can control the flow of electricity to other devices
  6. A security measure used to protect IoT devices from unauthorized access
  7. SECURITY A security measure used to protect IoT devices from physical tampering
  8. A technology that allows IoT devices to operate with minimal human intervention
  9. MONITOR A device that can measure the amount of electricity being used by other devices
  10. SENSOR A device that can detect the presence of objects or people
  11. ENERGY BLUETOOTH A typical wireless transmission protocol for low-power Internet of Things devices
Down
  1. SENSOR A device that can measure the pressure of gases or liquids
  2. LEVEL SENSOR A device that can measure the level of water in a tank or container
  3. SWITCH A device that can control the lighting in a room or building
  4. A device that can control the temperature of a room or building
  5. SENSOR A device that can detect motion and trigger other devices or actions
  6. SENSOR A device that can detect the location of other devices or objects]
  7. NETWORK A technology that uses sensors to collect data about the environment and sends it to a central system for analysis
  8. MONITOR A device that can monitor the quality of air or water in a specific area

19 Clues: A device that can control the temperature of a room or buildingSENSOR A device that can measure the pressure of gases or liquidsSENSOR A device that can detect the presence of objects or peopleA device that can control the flow of electricity to other devicesSWITCH A device that can control the lighting in a room or building...

pazdan olaolczak03@gmail.com 2018-01-29

pazdan olaolczak03@gmail.com crossword puzzle
Across
  1. Osoba,która próbuje włamać się na komputer
  2. Wymyślasz go sobie, inaczej nick
  3. Najpopularniejsza wyszukiwarka internetowa
  4. Złośliwy program, który można pobrać z internetu nieświadomie
Down
  1. Nie zdradzaj go przez internet
  2. Najpopularniejszy portal społecznościowy
  3. Miesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu
  4. Nielegalnie pobiera i sprzedaje filmy lub gry
  5. Nękanie w cyber przestrzeni
  6. Powinno być ciężkie do złamania

10 Clues: Nękanie w cyber przestrzeniNie zdradzaj go przez internetPowinno być ciężkie do złamaniaWymyślasz go sobie, inaczej nickNajpopularniejszy portal społecznościowyOsoba,która próbuje włamać się na komputerNajpopularniejsza wyszukiwarka internetowaNielegalnie pobiera i sprzedaje filmy lub gryMiesiąc,w którym obchodzimy Dzień Bezpiecznego Internetu...

E-Safety 10 key words 2019-03-04

E-Safety 10 key words crossword puzzle
Across
  1. stop a computer account reaching you
  2. system which connects to a comouter
  3. numbers like a password
  4. personal website or page
  5. bullying online
Down
  1. password for account,a secret word
  2. which you download
  3. the internet by going on a link
  4. email address for an account
  5. group of people chatting

10 Clues: bullying onlinewhich you downloadnumbers like a passwordgroup of people chattingpersonal website or pageemail address for an accountthe internet by going on a linkpassword for account,a secret wordsystem which connects to a comouterstop a computer account reaching you

Health 2023-09-01

Health crossword puzzle
Across
  1. someone who gets made fun because of the color of their skin
  2. someone who leads a school
  3. someone who helps the victim
  4. person who stands around doing nothing
Down
  1. person who gets bullied
  2. a choice you make
  3. someone who teaches a large group of students
  4. the act of protection
  5. bullying someone getting bullied online
  6. mean person

10 Clues: mean persona choice you makethe act of protectionperson who gets bulliedsomeone who leads a schoolsomeone who helps the victimperson who stands around doing nothingbullying someone getting bullied onlinesomeone who teaches a large group of studentssomeone who gets made fun because of the color of their skin

kelas 75_Keisha Sunjaya 2023-05-10

kelas 75_Keisha Sunjaya crossword puzzle
Across
  1. keinginan untuk menyendiri
  2. memperoleh informasi yg tepat dan akurat merupakan dampak yg
  3. salah satu contoh pengaruh tik
  4. kartu untuk mengakses kesehatan
  5. contoh perdagangan e-commerce
Down
  1. mendapatkan jaringan nama lainnya
  2. semua kolaborasi yg diupayakan pasti dimediasi olehn proses
  3. proyek kolaborasi merupakan media sosial yg berbentuk
  4. privasi berhubungan dengan fisik seseorang
  5. cyber bullying merupakan contoh dampak yg

10 Clues: keinginan untuk menyendiricontoh perdagangan e-commercesalah satu contoh pengaruh tikkartu untuk mengakses kesehatanmendapatkan jaringan nama lainnyacyber bullying merupakan contoh dampak ygprivasi berhubungan dengan fisik seseorangproyek kolaborasi merupakan media sosial yg berbentuksemua kolaborasi yg diupayakan pasti dimediasi olehn proses...

the eye of minds crossword puzzle 2024-05-12

the eye of minds crossword puzzle crossword puzzle
Across
  1. the main character
  2. how they access the vertnet
  3. michaels best friend also knowen as the best gamer
  4. when your in the game
  5. the name of the virus
Down
  1. the cyber-terrorist in the game
  2. the main way michael gets information
  3. the name of the game
  4. the network of the game
  5. michaels friend is known for her coding.
  6. the agency trying to stop kaine

11 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamehow they access the vertnetthe cyber-terrorist in the gamethe agency trying to stop kainethe main way michael gets informationmichaels friend is known for her coding.michaels best friend also knowen as the best gamer

ICT in Home 2016-04-18

ICT in Home crossword puzzle
Across
  1. bulling Children could become depressed
  2. small portable media player
  3. Money is taken straight out of the cutomour account
  4. Take Many But only keep the ones you want
  5. Health concern caused by bad posture
  6. EFTPOS
  7. finding another person to love you
  8. Way of preventing data loss
  9. Gamble
  10. Keep in touch with others
  11. Clever Screen
Down
  1. Health concern caused by repetitive movements
  2. stating at a computer all day leads to
  3. Talk to a variety of people
  4. When people dont leave the house for days
  5. Can lead to addiction and anti social behavior

16 Clues: EFTPOSGambleClever ScreenKeep in touch with otherssmall portable media playerTalk to a variety of peopleWay of preventing data lossfinding another person to love youHealth concern caused by bad posturestating at a computer all day leads tobulling Children could become depressedTake Many But only keep the ones you want...

Cybersecurity Best Practices 2024-11-08

Cybersecurity Best Practices crossword puzzle
Across
  1. A security practice of regularly backing up important data.
  2. A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock.
  3. A security measure that protects against unauthorized access to a network.
  4. A security practice of regularly updating software and systems.
  5. A piece of audio or video that has been altered and changed to make it seem authentic or credible
Down
  1. A malicious software.
  2. A technique used to trick someone into revealing sensitive information.
  3. A security measure that prevents unauthorized access to data & systems.
  4. A security measure that hides data to make it unreadable.

9 Clues: A malicious software.A security measure that hides data to make it unreadable.A security practice of regularly backing up important data.A security practice of regularly updating software and systems.A technique used to trick someone into revealing sensitive information.A security measure that prevents unauthorized access to data & systems....

CNSSINST 4009 (2005) 2022-11-30

CNSSINST 4009 (2005) crossword puzzle
Across
  1. Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
  2. A hostile action to spread malicious code via multiple methods.
  3. A contraction of the term Binary Digit. The smallest unit of information in a binary system of notation
  4. The process of granting or denying specefic request:1) for obtaining and using information and related information processing services.
  5. Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
  6. The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.
  7. Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy.
  8. Office of a federal department or agency that keeps records of accountable COMSEC material held by elements subject to its oversight. (COR)
  9. Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels).
  10. What is the PUB CNSSINT 4009 (2015)?
Down
  1. Notification that a specific attack has been directed at an organization’s information systems.
  2. The process of the system invalidating a user ID based on the user’s inappropriate actions. A blacklisted user ID cannot be used to log on to the system, even with the correct authenticator. Blacklisting and lifting of a blacklisting are both security-relevant events. Blacklisting also applies to blocks placed against IP addresses to prevent inappropriate or unauthorized use of internet resources.
  3. Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts
  4. A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems.
  5. A category within a given security classification limiting entry or system connectivity to only authorized persons.
  6. Typically unauthorized hidden software or hardware mechanism used to circumvent security controls.
  7. The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation),organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
  8. The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals.
  9. The property of being accessible and useable upon demand by an authorized entity
  10. Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.

20 Clues: What is the PUB CNSSINT 4009 (2015)?A hostile action to spread malicious code via multiple methods.The property of being accessible and useable upon demand by an authorized entityNotification that a specific attack has been directed at an organization’s information systems....

Beware of Cyber Attacks 2025-03-13

Beware of Cyber Attacks crossword puzzle
Across
  1. software that secretly monitors users
  2. malicious software designed to harm
  3. malicious code attached to programs
  4. fakes identity to deceive targets
  5. fraudulent emails to steal information
  6. network of compromised devices remotely controlled
  7. gains unauthorized access to systems
  8. takes advantage of system vulnerabilities
  9. malware that tricks users into running
  10. testing system defenses for weaknesses
  11. secret way to bypass security
  12. converts data into secret code
Down
  1. records keystrokes for stealing data
  2. displays unwanted advertisements to users
  3. hides malicious software from detection
  4. network protection from unauthorized access
  5. self-replicating malware spreading automatically
  6. malware disguised as legitimate software
  7. demands payment to restore access
  8. fixes security vulnerabilities in software

20 Clues: secret way to bypass securityconverts data into secret codefakes identity to deceive targetsdemands payment to restore accessmalicious software designed to harmmalicious code attached to programsrecords keystrokes for stealing datagains unauthorized access to systemssoftware that secretly monitors usersfraudulent emails to steal information...