cyber security Crossword Puzzles

Cyber Bullying 2023-03-16

Cyber Bullying crossword puzzle
Across
  1. discuss private matters or problems
  2. of unknown name
  3. involving, using, or relating to computers, especially the internet
Down
  1. unfitting, ill-suited
  2. self-confidence, self-respect
  3. disrespectful, insulting
  4. someone who hurts or frightens someone else
  5. very bad or unpleasant

8 Clues: of unknown nameunfitting, ill-suitedvery bad or unpleasantdisrespectful, insultingself-confidence, self-respectdiscuss private matters or problemssomeone who hurts or frightens someone elseinvolving, using, or relating to computers, especially the internet

stage 2 2018-03-27

stage 2 crossword puzzle
Across
  1. Number where we can communicate
  2. fundamental people in your life
  3. Person who teaches us
  4. word by which we identify
Down
  1. occupation where you earn money
  2. cyber contact where we send messages
  3. Civil status
  4. what we do in college

8 Clues: Civil statuswhat we do in collegePerson who teaches usword by which we identifyoccupation where you earn moneyNumber where we can communicatefundamental people in your lifecyber contact where we send messages

brainriddle 2025-02-09

brainriddle crossword puzzle
Across
  1. A cyberattack where fake QR codes trick users into visiting malicious sites.
  2. A cyberattack that tricks users into clicking hidden elements.
  3. A tool that protects a network by blocking suspicious traffic.
  4. A method used to avoid security restrictions.
  5. When private data is exposed to unauthorized people.
  6. An attack where a hacker takes control of an active user session.
  7. A weakness in software that hackers can exploit.
Down
  1. A method of guessing passwords by trying many combinations.
  2. A small software update that fixes security flaws.
  3. A cybersecurity event that may cause harm to systems.
  4. A physical or digital device used for secure authentication.
  5. Files that store records of activity on a system.
  6. A username and password used for authentication.
  7. A type of malware that bombards users with unwanted ads.
  8. A security method that requires two types of authentication.

15 Clues: A method used to avoid security restrictions.A username and password used for authentication.A weakness in software that hackers can exploit.Files that store records of activity on a system.A small software update that fixes security flaws.When private data is exposed to unauthorized people.A cybersecurity event that may cause harm to systems....

Cyber Security Awareness Month Crossword Puzzle - Week 1 2022-10-06

Cyber Security Awareness Month Crossword Puzzle - Week 1 crossword puzzle
Across
  1. What is the weakest link in cybersecurity?
  2. ___ was the first personal computer virus?
  3. A common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct the malicious or unauthorized activity.
  4. Necessary when the circumstances of an incident require more details
  5. Our company may _________ your internet usage
Down
  1. is the method where knowledge of internal and external information weaknesses of a particular organization are tested against real-world cyberattacks.
  2. What is the best way to maintain privacy between two parties?
  3. When someone sends an e-mail with a link a bogus website is called
  4. This horse can stampede your security defence for the bad guy and make you look sheepish too!
  5. What type of calls are made by social engineers

10 Clues: What is the weakest link in cybersecurity?___ was the first personal computer virus?Our company may _________ your internet usageWhat type of calls are made by social engineersWhat is the best way to maintain privacy between two parties?When someone sends an e-mail with a link a bogus website is called...

test 2019-09-21

test crossword puzzle
Across
  1. use of section 26
  2. filled out at site
  3. section 25 of criminal code
  4. Section 35 of security and related activities(control) act 1996
  5. you must wear this
  6. you need to complete this is you have an incident
  7. You cannot use this in Western Australia
Down
  1. if you are posted outside a store
  2. If you use a car for your duties
  3. Section 12 of security and related activities(control) act 1996
  4. you need one of these to work in the security industry

11 Clues: use of section 26filled out at siteyou must wear thissection 25 of criminal codeIf you use a car for your dutiesif you are posted outside a storeYou cannot use this in Western Australiayou need to complete this is you have an incidentyou need one of these to work in the security industry...

CAT theory 2025-08-20

CAT theory crossword puzzle
Across
  1. Input The process of using a person's physical characteristics for authentication.
  2. A type of malware that appears to be a legitimate program but hides malicious code.
  3. A type of network that connects devices within a person's immediate workspace.
  4. The process of making a system usable for people with disabilities.
  5. A utility program that rearranges fragmented files on a storage device.
  6. The act of sending data from a local computer to a server.
  7. A technology that allows devices to communicate when they are a few centimeters apart.
  8. of Things (IOT) The concept of a network of physical objects embedded with sensors and software.
Down
  1. The act of receiving data from a server to a local computer.
  2. Computer A type of computer that is a single-user system designed for personal or home use.
  3. Drive (SSD) A type of storage device that uses flash memory and has no moving parts.
  4. Source Software A form of software licensing that allows the software to be freely used, modified, and shared.
  5. A type of cyber-attack that hijacks your browser to redirect you to a fake website.
  6. A network that covers a small geographical area, like a home or office.
  7. Logging A program that tracks and records every keystroke made on a computer.
  8. A system that uses sound waves to communicate over the internet.
  9. Attack A type of cyber-attack where multiple compromised systems flood a target's network, causing it to crash.
  10. Theft A computer crime that involves acquiring a person's personal information for fraudulent use.

18 Clues: The act of sending data from a local computer to a server.The act of receiving data from a server to a local computer.A system that uses sound waves to communicate over the internet.The process of making a system usable for people with disabilities.A network that covers a small geographical area, like a home or office....

Security Role Check 2023-08-07

Security Role Check crossword puzzle
Across
  1. If my role is authenticated I only need to confirm my name and appointment
  2. I'm treated like an owner but I can't make changes over the phone
  3. Party Without security, you can't tell me much other than if a policy is active/inactive and why
  4. Home Claims usually helps us with most calls
  5. I just have to confirm my full name and who I report to
  6. I only have say if I'm authorized
Down
  1. I represent the deceased owner
  2. We can only discuss 5 policies once security has passed
  3. Anyone can call on my behalf, as long as they can provide my full name and the last-4 of my SSN
  4. My role is unique as there can be many and I have full autonomy once I pass security
  5. My role is significant but if I'm not the owner, I need permission
  6. I'm only authorized if I'm on a list and pass security
  7. Assignee I'm usually a bank

13 Clues: Assignee I'm usually a bankI represent the deceased ownerI only have say if I'm authorizedHome Claims usually helps us with most callsI'm only authorized if I'm on a list and pass securityWe can only discuss 5 policies once security has passedI just have to confirm my full name and who I report to...

fund - chapter 10 2020-06-28

fund - chapter 10 crossword puzzle
Across
  1. The percentages of customer deposits commercial banks must keep on reserve with a Federal Reserve Bank. 2w
  2. The body that regulates commercial banks and sets and implements the federal government’s monetary policy; commonly called “the Fed”. 3w
  3. A provision in a security instrument that gives the lender the right to accelerate the loan if the borrower transfers the property; also called a due-on-sale-clause. 2w
  4. The document the trustee gives the trustor when the debt secured by a deed of trust is paid off, releasing the property from the lien. 3w
  5. A provision giving the borrower the right to regain title to the security property when the debt is repaid. 2w
  6. A contract between a seller (vendor) and a buyer (vendee) of real estate, in which the seller retains legal title to the property while the buyer pays off the purchase price in installments. 2w
  7. A two-party security instrument that gives the lender (mortgagee) the right to foreclose on the security property by judicial process if the borrower (mortgagor) defaults.
  8. Two interest rates controlled by the Fed that have an effect on market interest rates. 6w
Down
  1. The document a mortgagee gives to the mortgagor when the mortgage debt is paid off, releasing the property from the lien. Also called a satisfaction piece. 3w
  2. The Fed’s activities in buying and selling government securities. 3w
  3. A written promise to repay a debt. 2w
  4. The local finance market, where individuals obtain loans from banks, savings and loans, and other types of mortgage lenders. 2w
  5. A three-party security instrument that includes a power of sale clause, allowing the trustee to foreclose non-judicially if the borrower (trustor) fails to pay the lender (beneficiary) or otherwise defaults. 3w
  6. The national finance market, where mortgages are bought and sold as investments. 2w
  7. A provision in loan documents that gives the lender the right to demand immediate payment in full if the borrower defaults. 2w
  8. When a borrower sells the security property to a buyer who agrees to take on personal liability for repayment of the existing mortgage or deed of trust.

16 Clues: A written promise to repay a debt. 2wThe Fed’s activities in buying and selling government securities. 3wThe national finance market, where mortgages are bought and sold as investments. 2wTwo interest rates controlled by the Fed that have an effect on market interest rates. 6w...

Standard 15.0 Vocabulary Terms 2022-05-08

Standard 15.0 Vocabulary Terms crossword puzzle
Across
  1. The steps you take to make sure you are safe before, during and after an emergency or natural disaster.
  2. A form of terrorism in which victims "within a country are targeted by a perpetrator with the same citizenship" as the victims.
  3. The organization and management of the resources and responsibilities for dealing with all humanitarian aspects of emergencies (prevention, preparedness, response, mitigation, and recovery).
  4. The action of reducing the severity, seriousness, or painfulness of something.
  5. They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste.
Down
  1. They prepare plans and procedures for responding to natural disasters and other emergencies.
  2. Provides first responders with a go-to manual to help deal with hazmat transportation accidents during the critical first 30 minutes.
  3. They establishes protocols and creates prevention and recovery systems in case of a cyber-attack or natural disaster.
  4. Department that works to improve the security of the United States. Includes customs, border, and immigration enforcement, emergency response to natural and manmade disasters, antiterrorism work, and cybersecurity.
  5. Any substance or material that is capable of posing an unreasonable risk to health, safety, and property when transported in commerce.
  6. The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
  7. The National Incident Management System guides all levels of government, nongovernmental organizations and the private sector to work together to prevent, protect against, mitigate, respond to and recover from incidents.

12 Clues: The action of reducing the severity, seriousness, or painfulness of something.They prepare plans and procedures for responding to natural disasters and other emergencies.They identify and dispose of harmful substances such as asbestos, lead, and radioactive waste....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. (Stalking someone online)
  2. (pretending to be someone and getting them trouble)
  3. (Offensive comments roomer and gossip)
  4. (Embarrassing someone)
  5. (Online Arguments)
Down
  1. (Repeating rude messages)
  2. (bullying someone online)
  3. (giving information)
  4. (excluding someone)

9 Clues: (Online Arguments)(excluding someone)(giving information)(Embarrassing someone)(Repeating rude messages)(Stalking someone online)(bullying someone online)(Offensive comments roomer and gossip)(pretending to be someone and getting them trouble)

CYBER SAFETY 2023-05-22

CYBER SAFETY crossword puzzle
Across
  1. (sending mean and nasty message)
  2. (stalking someone online)
  3. (bullying someone)
  4. (pretending to be someone and getting them in trouble)
  5. (online fights or argument)
Down
  1. (giving information)
  2. (sending or posting gossip or rumours about a person to damage his or her reputation or friendship)
  3. (excluding someone)
  4. (embarrassing someone)

9 Clues: (bullying someone)(excluding someone)(giving information)(embarrassing someone)(stalking someone online)(online fights or argument)(sending mean and nasty message)(pretending to be someone and getting them in trouble)(sending or posting gossip or rumours about a person to damage his or her reputation or friendship)

Cyber saftey 2021-09-16

Cyber saftey crossword puzzle
Across
  1. The logo is a blue bird
  2. Evan Spiegel and Bobby Murphy are the owners of this company
  3. photo and video sharing social networking service created by Kevin Systrom and Mike Krieger.
  4. Mark Zuckerberg is the owner of this company
Down
  1. A state in which one is not observed or disturbed by other people.
  2. A malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
  3. To help protect from unauthorized access
  4. Gaining unauthorized access to data in a system or computer.
  5. Addison Rae is famous on this app

9 Clues: The logo is a blue birdAddison Rae is famous on this appTo help protect from unauthorized accessMark Zuckerberg is the owner of this companyGaining unauthorized access to data in a system or computer.Evan Spiegel and Bobby Murphy are the owners of this companyA state in which one is not observed or disturbed by other people....

Cyber Ethics 2025-06-19

Cyber Ethics crossword puzzle
Across
  1. personal information and not engaging in activities that violate others' privacy, such as snooping or unauthorized access to data.
  2. harm:
  3. plagiarism, respecting copyright laws, and not using or distributing software or content without proper authorization.
  4. intellectual property:
  5. privacy:
  6. mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication.
Down
  1. security:
  2. responsible digital citizenship:
  3. and access:
  4. the integrity of computer systems and networks, protecting them from unauthorized access, malware, and other threats.
  5. that technology is used equitably and that everyone has access to the benefits of technology.
  6. using technology to cause physical or emotional harm to others, including spreading misinformation, harassment, or hate speech.

12 Clues: harm:privacy:security:and access:intellectual property:responsible digital citizenship:that technology is used equitably and that everyone has access to the benefits of technology.mindful of the impact of online actions, avoiding cyberbullying, and engaging in respectful communication....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Among us 2021-11-05

Among us crossword puzzle
Across
  1. wepons
  2. defeat
  3. ejection
  4. emergency
  5. cafeteria
  6. security cameras
  7. electrical
  8. navigation
  9. kill
  10. Among us
Down
  1. crewmate
  2. admin
  3. imposter
  4. report
  5. medical center
  6. victory
  7. reactor
  8. vent
  9. lights
  10. leaves

20 Clues: ventkilladminweponsdefeatreportlightsleavesvictoryreactorcrewmateejectionimposterAmong usemergencycafeteriaelectricalnavigationmedical centersecurity cameras

Texts 8A and 8B 2022-09-22

Texts 8A and 8B crossword puzzle
Across
  1. epävirallinen
  2. liittolainen
  3. istuttaa
  4. treaty
  5. prominent
  6. provide
  7. turvallisuuspolitiikka
  8. rewarding
  9. collapse
  10. neuvosto
Down
  1. toimiala
  2. yhteistyö
  3. policy
  4. predictability
  5. non-aligned
  6. pragmatic
  7. operatiivinen
  8. pursue
  9. hankkia
  10. tutkinto

20 Clues: policytreatypursuehankkiaprovidetoimialaistuttaatutkintocollapseneuvostoyhteistyöpragmaticprominentrewardingnon-alignedliittolainenepävirallinenoperatiivinenpredictabilityturvallisuuspolitiikka

Travel 2022-10-13

Travel crossword puzzle
Across
  1. itinerary
  2. arrival
  3. airplane
  4. security
  5. suitcase
  6. airport
  7. departure
  8. passenger
  9. gate
  10. ticket
Down
  1. vacation
  2. customs
  3. screen
  4. to travel
  5. luggage
  6. to board
  7. flight
  8. passport
  9. line
  10. bus

20 Clues: buslinegatescreenflightticketarrivalcustomsluggageairportvacationairplanesecuritysuitcaseto boardpassportitineraryto traveldeparturepassenger

Vocabulario, Unidad 1.1 (El aeropuerto) 2018-02-12

Vocabulario, Unidad 1.1 (El aeropuerto) crossword puzzle
Across
  1. suitcase
  2. departure
  3. security
  4. travel agent
  5. passenger
  6. airline
  7. aisle
  8. pilot
  9. trip
Down
  1. female flight attendant
  2. customs
  3. seat
  4. flight
  5. luggage
  6. window
  7. sign
  8. arrival
  9. passport
  10. counter
  11. ticket

20 Clues: seatsigntripaislepilotflightwindowticketcustomsluggagearrivalcounterairlinesuitcasesecuritypassportdeparturepassengertravel agentfemale flight attendant

PERSONALITY nouns and adjectives 2019-11-06

PERSONALITY nouns and adjectives crossword puzzle
Across
  1. čustvo
  2. pustolovščina
  3. občutljivost
  4. odgovoren
  5. zgovoren
  6. družaben
  7. radodarnost
  8. spoštovanje
  9. zvest
  10. iskren
Down
  1. potrpežljivost
  2. samozavesten
  3. pomemben
  4. sebičen
  5. samostojnost
  6. veselje
  7. prijaznost
  8. pozoren
  9. varnost
  10. sproščen
  11. skrivnost

21 Clues: zvestčustvoiskrensebičenveseljepozorenvarnostpomembenzgovorendružabensproščenodgovorenskrivnostprijaznostradodarnostspoštovanjesamozavestenobčutljivostsamostojnostpustolovščinapotrpežljivost

Tatiana 2024-04-21

Tatiana crossword puzzle
Across
  1. спутник
  2. доступ
  3. безопасность
  4. порождать, создавать
  5. цифровой
  6. знание
  7. поддерживать
  8. наблюдение
  9. распознать
  10. almost
  11. защита
Down
  1. прикрепить
  2. общий, распространенный
  3. привычка
  4. существенный
  5. анализировать
  6. рекламный
  7. общество
  8. среднестатистический
  9. удобство

20 Clues: доступзнаниеalmostзащитаспутникпривычкацифровойобществоудобстворекламныйприкрепитьнаблюдениераспознатьсущественныйбезопасностьподдерживатьанализироватьпорождать, создаватьсреднестатистическийобщий, распространенный

Drew Hunts A Clue! 2024-03-07

Drew Hunts A Clue! crossword puzzle
Across
  1. To describe a person
  2. Science, Technology, Engineering and Math
  3. Person harmed as a result of a crime
  4. Piece of evidence and information
  5. A Data displayed on a screen of a phone
  6. A person who has committed a crime
  7. Seek to harm
Down
  1. The process of observing
  2. Final Result
  3. A small digital image to describe an emotion
  4. Facts collected for reference or analysis
  5. Troll An online bully who offends others

12 Clues: Final ResultSeek to harmTo describe a personThe process of observingPiece of evidence and informationA person who has committed a crimePerson harmed as a result of a crimeA Data displayed on a screen of a phoneScience, Technology, Engineering and MathFacts collected for reference or analysisTroll An online bully who offends others...

Fralin Fiddler - February 2026 2026-02-26

Fralin Fiddler - February 2026 crossword puzzle
Across
  1. Regulators of pain, reward, and addiction
  2. UDP emeritus and Fralin Hall resident
  3. Car or Mission or Homestuck world-ending game
  4. Ctrl,___,Del or type of music
  5. (methamphetamine-amphetamine)=?
  6. 1983 Kerry Mullis technique key to modern forensics
  7. First name of Institute namesake
Down
  1. First amino acid from asparagus juice
  2. Vital, essential
  3. Disease for which Jenner created vaccine using zoonotic virus
  4. Attack or PBS Kids show
  5. e.g., Organoids, AI, and computer modeling

12 Clues: Vital, essentialAttack or PBS Kids showCtrl,___,Del or type of music(methamphetamine-amphetamine)=?First name of Institute namesakeFirst amino acid from asparagus juiceUDP emeritus and Fralin Hall residentRegulators of pain, reward, and addictione.g., Organoids, AI, and computer modelingCar or Mission or Homestuck world-ending game...

meta stadium 2023-10-02

meta stadium crossword puzzle
Across
  1. Transportation
  2. Disability@
  3. EHS
  4. Black@
  5. Site
  6. Fitness
  7. Women@
  8. Latin@
Down
  1. Interfaith@
  2. Facilities
  3. Lap
  4. Culinary
  5. Events
  6. Security
  7. AV
  8. Pride@
  9. ITSupport
  10. Native@
  11. Ship

19 Clues: AVLapEHSSiteShipEventsPride@Black@Women@Latin@Native@FitnessCulinarySecurityITSupportFacilitiesInterfaith@Disability@Transportation

Crossword 2026-01-15

Crossword crossword puzzle
Across
  1. SECURITY – Access to sufficient and safe food
  2. – Continuous rise in general price level
  3. – Related to state-level economic independence
  4. DEBT – Total government borrowing
  5. SECURITY – Reliable access to energy resources
Down
  1. – Integration of national economies
  2. SECURITY – Protection of the national economy from internal and external threats
  3. POLICY – Central bank control of money supply
  4. BALANCE – Difference between exports and imports
  5. POLICY – Government policy on taxation and public spending

10 Clues: DEBT – Total government borrowing– Integration of national economies– Continuous rise in general price levelSECURITY – Access to sufficient and safe foodPOLICY – Central bank control of money supply– Related to state-level economic independenceSECURITY – Reliable access to energy resourcesBALANCE – Difference between exports and imports...

VMWare Knowledge Check 2022-01-18

VMWare Knowledge Check crossword puzzle
Across
  1. enables hybrid and edge computing applications to be built across locations
  2. number of VMWare products
  3. the process of creating a virtual representation of something
  4. VMware's server virtualization
  5. this architecture uses one application per server
  6. tool used for storage virtualization
  7. ________ and Opex are reduced by using virtualization
  8. ______ availability
Down
  1. integration system’s management plug-in to VMware vCenter. (OMIVV)​
  2. mitigates risk
  3. Device Management Tool
  4. tool used for desktop and app provisioning
  5. A VM is a Virtual _________
  6. the whole virtualized server
  7. acronym for Hyperconverged Infrastructure
  8. allows multiple host servers to pool resources
  9. _______ end to end security
  10. VMWare turnkey appliance
  11. VSphere's hypervisor

19 Clues: mitigates risk______ availabilityVSphere's hypervisorDevice Management ToolVMWare turnkey appliancenumber of VMWare productsA VM is a Virtual ________________ end to end securitythe whole virtualized serverVMware's server virtualizationtool used for storage virtualizationacronym for Hyperconverged Infrastructure...

Chapter 15.1 created by Jordyn Charron 2024-05-09

Chapter 15.1 created by Jordyn Charron crossword puzzle
Across
  1. action taken to manage the supply of money and interest rates in an economy
  2. banks that are part of the FDR
  3. A security that matures in a year or less
  4. Anything of value that is accepted in return for goods or services
  5. Another word for money
  6. means that money is a common measure of the worth or price of a good or service
  7. To exchange one good or service for another good or service
  8. money is used in exchange for goods and services needed by individuals, businesses, and governments
  9. a plastic card that allows the holder to make credit purchases up to an authorized amount
Down
  1. means that money can be saved and used at a later date
  2. the mechanism a nation uses to provide and manage money for itself
  3. A type of financial investment issued by a corporation, government, or other organization
  4. a transfer of money from one bank account to another
  5. allows customers to pay for purchases directly from their checking account
  6. A security that pays interest over terms ranging from 2-10 years
  7. the process of transferring money from one individual or organization to another.
  8. the concept that money received today can be invested or deposited in the bank to earn interest
  9. A type of a document guaranteeing the payment of a specific amount of money (demand or set time)
  10. A security that pays interest over terms of 10-30 years

19 Clues: Another word for moneybanks that are part of the FDRA security that matures in a year or lessa transfer of money from one bank account to anothermeans that money can be saved and used at a later dateA security that pays interest over terms of 10-30 yearsTo exchange one good or service for another good or service...

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell and ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell and ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

Test Crossword 2023-01-25

Test Crossword crossword puzzle
Across
  1. adujeevitham set
  2. Value in Latin
  3. one of the indigenous groups of Washington, waterfall
  4. To Shun
Down
  1. all things computer and information technology
  2. Greek temple,Smitha mol’s old apartment
  3. “Soul of Seattle”
  4. Leavenworth, German State
  5. a homonym that could either mean “be angry” or refers to a famous religious symbol

9 Clues: To ShunValue in Latinadujeevitham set“Soul of Seattle”Leavenworth, German StateGreek temple,Smitha mol’s old apartmentall things computer and information technologyone of the indigenous groups of Washington, waterfalla homonym that could either mean “be angry” or refers to a famous religious symbol

Fourteen Points 2015-01-11

Fourteen Points crossword puzzle
Across
  1. ทำลาย
  2. นำทาง
  3. การทูต
  4. รวบรวม
  5. ในอุดมคติ
  6. ชายแดน
  7. วางเค้าโครง
  8. การพูด
  9. อย่างไม่เต็มใจ
  10. ความปลอดภัย
Down
  1. อพยพ
  2. การแก้แค้น
  3. การลดลง
  4. การซ่อมแซม
  5. อิสระ
  6. ยืนยัน
  7. สร้าง
  8. บทลงโทษ
  9. ความมุ่งหมาย

19 Clues: อพยพทำลายนำทางอิสระสร้างการทูตรวบรวมยืนยันชายแดนการพูดการลดลงบทลงโทษในอุดมคติการแก้แค้นการซ่อมแซมวางเค้าโครงความปลอดภัยความมุ่งหมายอย่างไม่เต็มใจ

UBCV 2019-09-22

UBCV crossword puzzle
Across
  1. , DGHWDFAER
  2. , ASDASD
  3. , FBHSFGSDF
  4. , ASDFAGSDGHGA
  5. , ADFADGWHWRT
  6. , AFASDFAS
  7. , WRNHJEFSGSD
  8. , SFHGSFGS
  9. , ADSFASDF
  10. , SDGSFDSD
  11. , SDASDASD
  12. , DASFRADSFA
Down
  1. , ASDFADFG
  2. ,ADFSDFDF
  3. , ASDASD
  4. , DGSDCFSD
  5. , ADFGADFAS
  6. , SDGSDFSDF
  7. , FDGSFDGSDF
  8. , ASDGSADF

20 Clues: , ASDASD, ASDASD,ADFSDFDF, ASDFADFG, DGSDCFSD, ASDGSADF, AFASDFAS, SFHGSFGS, ADSFASDF, SDGSFDSD, SDASDASD, DGHWDFAER, ADFGADFAS, FBHSFGSDF, SDGSDFSDF, FDGSFDGSDF, DASFRADSFA, ADFADGWHWRT, WRNHJEFSGSD, ASDFAGSDGHGA

KAJKA 2024-03-25

KAJKA crossword puzzle
Across
  1. zrelý
  2. očakávanie
  3. súhlas
  4. dospelosť
  5. úzkostlivý
  6. etapa
  7. tehotenstvo
  8. úplný
Down
  1. posadnutosť
  2. zodpovedný
  3. bezpečnosť
  4. nedočkavý
  5. trpiaci
  6. záležitosť
  7. vrstovník
  8. pochybnosť
  9. sposobilý
  10. bok
  11. viazaný

19 Clues: bokzrelýetapaúplnýsúhlastrpiaciviazanýnedočkavývrstovníkdospelosťsposobilýzodpovednýbezpečnosťočakávaniezáležitosťpochybnosťúzkostlivýposadnutosťtehotenstvo

Cyber Test 2023-09-13

Cyber Test crossword puzzle
Across
  1. A type of malware
  2. The most well-known malware attack in the past few years
Down
  1. The world's number one password
  2. The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center
  3. This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

5 Clues: A type of malwareThe world's number one passwordThe most well-known malware attack in the past few yearsThe number one type of cyber incident reported to the FBI's Internet Crime Complaint CenterThis includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

Social Media 2015-05-20

Social Media crossword puzzle
Across
  1. secutity
  2. a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
  3. unsecured computer
  4. a short description of someone's life, work, character, etc
  5. everybody wants it
  6. you can watch films there
  7. risk
  8. danger for children
  9. everybody does it every day
  10. chances
  11. consequense of someone annoy you
  12. a huge group with common interests
  13. receive and send from...
Down
  1. a other word for data security
  2. a green,framed telephone
  3. opportunities
  4. 1,44 billions User
  5. a accumulation of persons you know
  6. platform
  7. you can post
  8. an informal name for someone or something

21 Clues: riskchancessecutityplatformyou can postopportunitiesunsecured computer1,44 billions Usereverybody wants itdanger for childrena green,framed telephonereceive and send from...you can watch films thereeverybody does it every daya other word for data securityconsequense of someone annoy youa accumulation of persons you know...

social media 2015-05-20

social media crossword puzzle
Across
  1. an informal name for someone or something
  2. secutity
  3. 1,44 billions User
  4. a short description of someone's life, work, character, etc
  5. unsecured computer
  6. everybody wants it
  7. you can watch films there
  8. you can post
  9. a other word for data security
  10. platform
  11. a green,framed telephone
  12. everybody does it every day
  13. chances
Down
  1. a accumulation of persons you know
  2. consequense of someone annoy you
  3. opportunities
  4. a huge group with common interests
  5. danger for children
  6. risk
  7. a regular record of your thoughts, opinions, or experiences that you put on the internet for other people to read
  8. receive and send from...

21 Clues: riskchancessecutityplatformyou can postopportunities1,44 billions Userunsecured computereverybody wants itdanger for childrena green,framed telephonereceive and send from...you can watch films thereeverybody does it every daya other word for data securityconsequense of someone annoy youa accumulation of persons you know...

Rubrik 2024-11-06

Rubrik crossword puzzle
Across
  1. Sucks according to reddit
  2. He's him
  3. Dad
  4. SLED team name for October
  5. OCD
  6. Ancient
  7. Backups that cannot be deleted or changed
  8. Sparty
  9. Feature that scans for sensitive data
  10. Rubrik HQ
  11. Approach to security that trusts no system or person
  12. Worst city in the USA - see xxxxx
Down
  1. Concussed
  2. Hates onions
  3. Worst team in the NFL
  4. Just married
  5. The ability to restore with a single button press
  6. Father of 9
  7. Your social security number is classified as this data type
  8. Badger
  9. Rubrik partner that has a shared responsibility model
  10. Company featured in Rubrik's most famous customer story
  11. Can be logical or physical

23 Clues: DadOCDBadgerSpartyAncientHe's himConcussedRubrik HQFather of 9Hates onionsJust marriedWorst team in the NFLSucks according to redditSLED team name for OctoberCan be logical or physicalWorst city in the USA - see xxxxxFeature that scans for sensitive dataBackups that cannot be deleted or changedThe ability to restore with a single button press...

Innovation AWL Page34 2019-05-01

Innovation AWL Page34 crossword puzzle
Across
  1. ancillary/ subordinate
  2. techniques
  3. choose
  4. limited
  5. questionnaire/ research
  6. change
  7. characteristic
  8. location
  9. safety
Down
  1. service
  2. manners
  3. replacement
  4. because/ considering
  5. income
  6. shown
  7. direction
  8. steadiness
  9. form
  10. goal
  11. extent

20 Clues: formgoalshownincomechoosechangeextentsafetyservicemannerslimitedlocationdirectiontechniquessteadinessreplacementcharacteristicbecause/ consideringancillary/ subordinatequestionnaire/ research

African Crossword - Chad 2024-05-01

African Crossword - Chad crossword puzzle
Across
  1. violence
  2. fire/weapon
  3. evacuation
  4. general
  5. torture
  6. ration
  7. officer
  8. security
  9. oppression
  10. massacre
Down
  1. dictator
  2. flood
  3. refuge
  4. tension
  5. liberte
  6. rebelle
  7. terroriste
  8. vote
  9. atrocity
  10. blood

20 Clues: votefloodbloodrefugerationtensionliberterebellegeneraltortureofficerdictatorviolenceatrocitysecuritymassacreevacuationterroristeoppressionfire/weapon

Unit 15-16 2023-03-13

Unit 15-16 crossword puzzle
Across
  1. toll
  2. ooper
  3. tšello
  4. padi
  5. rabav
  6. kirurg
  7. tegelik
  8. deklareerima
  9. fuajee
  10. turvalisus
Down
  1. vahekäik
  2. kandik
  3. kellegi kallal norima
  4. tankla
  5. aksessuaar
  6. trahv
  7. karistus
  8. lomp
  9. sadam
  10. pardapääse

20 Clues: tollpadilompoopertrahvsadamrabavkandiktanklatšellokirurgfuajeetegelikvahekäikkaristusaksessuaarpardapääseturvalisusdeklareerimakellegi kallal norima

Aeropuerto/Viaje 2023-02-17

Aeropuerto/Viaje crossword puzzle
Across
  1. To board
  2. sign
  3. passenger
  4. flight
  5. customs
  6. suitcase
  7. aisle
  8. security
  9. window
  10. screen
Down
  1. airline
  2. ticket
  3. passport
  4. departure
  5. luggage
  6. arrival´
  7. counter
  8. flight attendant
  9. seat
  10. trip

20 Clues: signseattripaisleticketflightwindowscreenairlineluggagecustomscounterTo boardpassportarrival´suitcasesecuritydeparturepassengerflight attendant

Spanish Airport Vocabulary 2022-10-13

Spanish Airport Vocabulary crossword puzzle
Across
  1. agent
  2. itinerary
  3. customs
  4. reclaim
  5. passenger
  6. screen
  7. gate
  8. train
  9. line
  10. ticket
  11. security
Down
  1. departure
  2. confirm
  3. flight
  4. to travel
  5. airport
  6. airplane
  7. passport
  8. suitcase
  9. arrival
  10. bus

21 Clues: busgatelineagenttrainflightscreenticketconfirmairportcustomsreclaimarrivalairplanepassportsuitcasesecuritydepartureto travelitinerarypassenger

Brexit_A.Murges 2022-02-08

Brexit_A.Murges crossword puzzle
Across
  1. result
  2. vot.area
  3. strateg.
  4. to.take.part.in
  5. cause.fear
  6. security
  7. voting.amount
  8. break.apart
  9. dist.
  10. landmark
Down
  1. direct/lead.sth.
  2. break
  3. trust
  4. body.of.laws
  5. interval
  6. collect.o.opinion
  7. talks.w/.polit.
  8. exceed.sth.
  9. econom.agreem.
  10. topic.problem

20 Clues: breaktrustdist.resultvot.areastrateg.intervalsecuritylandmarkcause.fearexceed.sth.break.apartbody.of.lawsvoting.amounttopic.problemeconom.agreem.talks.w/.polit.to.take.part.indirect/lead.sth.collect.o.opinion

International Data Protection Day 2026 Crossword 2026-01-16

International Data Protection Day 2026 Crossword crossword puzzle
Across
  1. Clear permission given for personal data to be used.
  2. Safe disposal of confidential paper records.
  3. The theme: data protection embedded into everything we do.
  4. Core principle ensuring information is handled with respect and protection.
  5. Building data protection in from the very start, not as an afterthought.
  6. Protecting data so only authorised parties can read it.
  7. A deceptive attempt to trick staff into revealing sensitive information.
  8. Protects your device when you step away from your desk.
  9. A security or data breach that must be reported quickly.
  10. Access rights based on job responsibilities.
Down
  1. Collecting only the data that is necessary for the task.
  2. DESK Good office behaviour to prevent unauthorised access to data.
  3. Understanding how information moves through systems and teams.
  4. How staff learn to handle personal data safely.
  5. A basic but vital security control that should never be shared.
  6. Only giving systems and data to those who genuinely need them.
  7. Choices staff make every day that affect data security.

17 Clues: Safe disposal of confidential paper records.Access rights based on job responsibilities.How staff learn to handle personal data safely.Clear permission given for personal data to be used.Protecting data so only authorised parties can read it.Choices staff make every day that affect data security....

Crossword Puzzle On Records Security 2012-10-31

Crossword Puzzle On Records Security crossword puzzle
Across
  1. Measures, policies and procedures used to protect a covered entity electronic systems.
  2. Second step in records security programme.
  3. Electronic..........
  4. To protect records from unauthorized users.
Down
  1. A type of responsibility.
  2. To protect records from physical hazards.
  3. To protect records from computer.........
  4. First step in records security.
  5. Access......

9 Clues: Access......Electronic..........A type of responsibility.First step in records security.To protect records from physical hazards.To protect records from computer.........Second step in records security programme.To protect records from unauthorized users.Measures, policies and procedures used to protect a covered entity electronic systems.

Juniper Networks for Healthcare 2021-11-12

Juniper Networks for Healthcare crossword puzzle
Across
  1. Juniper Mist upholds "___"-first networking.
  2. Our EX "___" devices forward data to the destination device.
  3. A place to care for the NHS' patients.
  4. Where is the sphygmomanometer? "___" services allow you to track users easily.
  5. The Wi-Fi here is rubbish, I can't "___".
  6. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  7. The patients, staff, and IoT devices that you're responsible for on the network.
Down
  1. This strategy is vital to protecting patient and hospital data records.
  2. Juniper Mist's cloud microservices ensures network updates without this.
  3. What's the "___" password? I can't connect.
  4. The NHS provides this exceptionally.
  5. The people that the NHS looks after.
  6. Technology that uses machine learning to proactively process data and tasks.
  7. This connects directly to a wired LAN.
  8. This device forwards packets between networks.

15 Clues: The NHS provides this exceptionally.The people that the NHS looks after.A place to care for the NHS' patients.This connects directly to a wired LAN.The Wi-Fi here is rubbish, I can't "___".What's the "___" password? I can't connect.Juniper Mist upholds "___"-first networking.This device forwards packets between networks....

Developing Network Security Strategies and Network Management Strategies 2021-12-18

Developing Network Security Strategies and Network Management Strategies crossword puzzle
Across
  1. A protocol that identify devices and monitor their performance
  2. There is how many network management components?
  3. Management process that keep track of the network used by department
  4. Is asset important in network security?
  5. Protocol used for remote authentication
Down
  1. How many components of security policies exist ?
  2. Encryption often used for vpn
  3. Performance metric
  4. Short form of remote monitoring
  5. Enforces security policies at the boundary between networks

10 Clues: Performance metricEncryption often used for vpnShort form of remote monitoringIs asset important in network security?Protocol used for remote authenticationHow many components of security policies exist ?There is how many network management components?Enforces security policies at the boundary between networks...

MOSCO RP 2023-01-25

MOSCO RP crossword puzzle
Across
  1. - cannot be brought inside the Operation or the security zone
  2. alarm - what the UK test each tuesday
  3. - Best RPO
  4. request - form to send when you have visitors
  5. - what we do
  6. - where you find the security rules
Down
  1. - what MPSS give out
  2. - must be read and followed for travel
  3. - must not be worn outside of the embassy perimeter
  4. - must be locked when away from your computer

10 Clues: - Best RPO- what we do- what MPSS give out- where you find the security rulesalarm - what the UK test each tuesday- must be read and followed for travel- must be locked when away from your computerrequest - form to send when you have visitors- must not be worn outside of the embassy perimeter...

Digital Safety 2024-10-09

Digital Safety crossword puzzle
Across
  1. Bullying
  2. Art
Down
  1. bad
  2. Jessie
  3. Prescott

5 Clues: badArtJessieBullyingPrescott

Bullying 2022-10-24

Bullying crossword puzzle
Across
  1. Gossiping about someone then spreading it
  2. self harm
  3. saying something mean about someone
  4. a person who does nothing about a bullying.
  5. for example touching peoples private areas
Down
  1. writing mean things online, etc
  2. bullying to hurt someones feelings
  3. a person who helps the victim stand up.
  4. not a real form of bullying friends often do.
  5. bullying through words

10 Clues: self harmbullying through wordswriting mean things online, etcbullying to hurt someones feelingssaying something mean about someonea person who helps the victim stand up.Gossiping about someone then spreading itfor example touching peoples private areasa person who does nothing about a bullying.not a real form of bullying friends often do.

Digital Identity Crossword 2025-04-24

Digital Identity Crossword crossword puzzle
Across
  1. what you do to find something
  2. leaves your mark behind
  3. your online display ____
Down
  1. protects your stuff
  2. what are you on right now
  3. your teachers name
  4. your online identity
  5. something that uses the internet or a computer
  6. what are you using for to access this
  7. A word that means something happens on the internet or with computers.

10 Clues: your teachers nameprotects your stuffyour online identityleaves your mark behindyour online display ____what are you on right nowwhat you do to find somethingwhat are you using for to access thissomething that uses the internet or a computerA word that means something happens on the internet or with computers.

TTS INFORMATIKA 2025-06-09

TTS INFORMATIKA crossword puzzle
Across
  1. Tipe data untuk menyimpan teks
  2. ciri-ciri fakta
  3. bullying. Perundungan digital
  4. garis. Menampilkan Tren data dari suatu selang waktu
  5. Microsoft exel disebut juga dengan nama aplikasi
Down
  1. Ciri-ciri opini
  2. publik. Informasi yang dapat diakses oleh siapapun
  3. Tempat penyimpanan Data sementara yang dapat berubah-ubah selama program berjalan
  4. pernyataan yang dapat di buktikan kebenaranya
  5. Imformasi palsu

10 Clues: Ciri-ciri opiniciri-ciri faktaImformasi palsuTipe data untuk menyimpan teksbullying. Perundungan digitalpernyataan yang dapat di buktikan kebenaranyaMicrosoft exel disebut juga dengan nama aplikasipublik. Informasi yang dapat diakses oleh siapapungaris. Menampilkan Tren data dari suatu selang waktu...

the eye of minds crossword puzzle 2024-05-12

the eye of minds crossword puzzle crossword puzzle
Across
  1. the main character
  2. how they access the vertnet
  3. michaels best friend also knowen as the best gamer
  4. when your in the game
  5. the name of the virus
Down
  1. the cyber-terrorist in the game
  2. the main way michael gets information
  3. the name of the game
  4. the network of the game
  5. michaels friend is known for her coding.
  6. the agency trying to stop kaine

11 Clues: the main characterthe name of the gamewhen your in the gamethe name of the virusthe network of the gamehow they access the vertnetthe cyber-terrorist in the gamethe agency trying to stop kainethe main way michael gets informationmichaels friend is known for her coding.michaels best friend also knowen as the best gamer

Wipro_20697983_vinodh_Technology & Science 2026-04-05

Wipro_20697983_vinodh_Technology & Science crossword puzzle
Across
  1. A device used to input text (8)
  2. Brain of the computer (3)
  3. Converts digital signals to analog (5)
  4. Storage unit larger than GB (2)
  5. AI system that learns patterns (7)
  6. Wireless communication technology (4)
  7. error in programming (3)
  8. Smallest unit of data (3)
  9. Cyber attack that locks your data (10)
Down
  1. Temporary memory in a computer (3)
  2. Popular programming language named after a snake (6)
  3. used to move cursor (5)
  4. Displays output visually (7)
  5. A global network connecting computers (8)
  6. Software used to browse the web (7)
  7. Stores data permanently in a computer (8)

16 Clues: used to move cursor (5)error in programming (3)Brain of the computer (3)Smallest unit of data (3)Displays output visually (7)A device used to input text (8)Storage unit larger than GB (2)Temporary memory in a computer (3)AI system that learns patterns (7)Software used to browse the web (7)Wireless communication technology (4)...

It's a Disaster 2025-06-13

It's a Disaster crossword puzzle
Across
  1. The collapse of land downhill
  2. Widespread disease outbreak
  3. Oil leak in oceans or rivers
  4. Pollution from nuclear plants or bombs
  5. Overflow of water onto dry land
  6. War between countries
  7. Ice falling from the sky in a storm
  8. Sudden shaking of the ground
  9. A big wave caused by an underwater quake
  10. A long dry period without rain
Down
  1. Cold weather event with heavy snow and wind
  2. A powerful rotating storm
  3. A moving river of hot lava
  4. Fire caused by people or accidents
  5. Cyber event causing digital damage
  6. Large fire spreading fast in nature
  7. Climate issue caused by humans

17 Clues: War between countriesA powerful rotating stormA moving river of hot lavaWidespread disease outbreakOil leak in oceans or riversSudden shaking of the groundThe collapse of land downhillClimate issue caused by humansA long dry period without rainOverflow of water onto dry landFire caused by people or accidentsCyber event causing digital damage...

Airport by: Madelyn Horner 2022-10-13

Airport by: Madelyn Horner crossword puzzle
Across
  1. buy
  2. station
  3. passenger
  4. screen
  5. train
  6. suitcase
  7. airport
  8. passport
  9. customs
  10. flight
Down
  1. ticket
  2. luggage
  3. arrive
  4. security
  5. confirm
  6. board
  7. call
  8. to travel
  9. reclaim

19 Clues: buycalltrainboardticketarrivescreenflightluggagestationconfirmairportreclaimcustomssecuritysuitcasepassportpassengerto travel

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Malware that allows a cyber-security attacker to take control of an infected computer.
  2. Criminals make a promise of goods in return for details, such as offering a free music download.
  3. When someone deceives by pretending to be someone else in order to get personal data.
  4. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  5. A destructive computer program that bores its way through a computer's files or through a computer's network.
  6. Collection of captured bot computers
  7. Software that encrypts programs and data until a ransom is paid to remove it.
  8. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
  1. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  2. An error in a program that prevents the program from running as expected.
  3. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
  4. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  5. A type of Malware that locates and saves data from users without them knowing about it.
  6. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  3. Criminals make a promise of goods in return for details, such as offering a free music download.
  4. Malware that allows a cyber-security attacker to take control of an infected computer.
  5. When someone deceives by pretending to be someone else in order to get personal data.
  6. Software that encrypts programs and data until a ransom is paid to remove it.
  7. A destructive computer program that bores its way through a computer's files or through a computer's network.
  8. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  2. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  3. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  4. An error in a program that prevents the program from running as expected.
  5. Collection of captured bot computers
  6. A type of Malware that locates and saves data from users without them knowing about it.
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

Cabinet Crossword 2022-02-15

Cabinet Crossword crossword puzzle
Across
  1. Advises the President and leads the nation in foreign policy issues for example, negotiates treaties and agreements with foreign entities
  2. Manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans
  3. manages the United States' nuclear infrastructure and administers the country's energy policy
  4. Responsible for maintaining policies related to learning and improving the educational system
  5. responsible for national policy and programs that address America's home needs, that improve and develop the Nation's communities, and enforce fair home laws.
  6. provide leadership on food, agriculture, natural resources, rural development, nutrition, and related issues based on public policy, the best available science, and effective management
Down
  1. for planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation
  2. Prosecutes federal law offenders and represents the U.S. Government in court; its attorneys represent the rights and interests of the American people and enforce federal criminal and civil laws
  3. operates and maintains systems that are critical to the nation's financial infrastructure, such as the production of coin and currency
  4. responsible for occupational safety and health, wage and hour standards, unemployment benefits, reemployment services, and occasionally, economic statistics
  5. promotes job creation and economic growth by ensuring fair trade, providing the data necessary to support commerce and constitutional democracy, and fostering innovation by setting standards and conducting foundational research and development.
  6. responsible for providing vital services to America's soldiers
  7. Responsible for providing the military forces needed to deter war and protect the security of our country
  8. provide national policy direction and develop national plans, technical standards and guidelines on health
  9. has overall responsibility for protecting federal civilian executive branch systems from cyber threats, helping agencies better defend themselves, and providing response teams to assist agencies during significant incidents

15 Clues: responsible for providing vital services to America's soldiersmanages the United States' nuclear infrastructure and administers the country's energy policyResponsible for maintaining policies related to learning and improving the educational system...

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell an ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell an ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

5th pd - School People 2023-02-16

5th pd - School People crossword puzzle
Across
  1. best AP ever
  2. tallest security staff
  3. most serious security staff
  4. teacher from Mexico
  5. name of a student's favorite cat
  6. cooking teacher
  7. new office assistant
Down
  1. the voice of the school
  2. teacher from Ireland
  3. 11th grade English teacher
  4. reading teacher

11 Clues: best AP everreading teachercooking teacherteacher from Mexicoteacher from Irelandnew office assistanttallest security staffthe voice of the school11th grade English teachermost serious security staffname of a student's favorite cat

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. prevents the unauthorized use or disclosure of information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of uncertainty on objectives

16 Clues: Effect of uncertainty on objectivesprevents the unauthorized use or disclosure of informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

Information Security crossword 2021-07-05

Information Security crossword crossword puzzle
Across
  1. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  2. ______ may lead to regulatory action, financial loss, Brand and reputation damage, loss of market value and loss of customer and business partner confidence
  3. ______ of any organizational security policy can result in disciplinary actions
  4. ISMS is a set of policies and procedures for managing an organization’s _______ data
  5. Fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details
  6. A formal process for training and educating employees about IT protection
  7. Security _______ could lead to reputation, financial, intellectual property and customer confidence loss
Down
  1. An asset that is essential to an organization and must be suitably protected
  2. A security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features
  3. Prevents the unauthorized use or disclosure of information
  4. Access that at any user, program, or process should have only the bare minimum privileges necessary to perform its function
  5. A sampling exercise limited to a selection of projects/business functions and a selection of security controls
  6. Guarantee of reliable access to the information by authorized people
  7. Protecting the accuracy and completeness of information and processing methods
  8. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a _______
  9. Effect of uncertainty on objectives

16 Clues: Effect of uncertainty on objectivesPrevents the unauthorized use or disclosure of informationGuarantee of reliable access to the information by authorized peopleA formal process for training and educating employees about IT protectionAn asset that is essential to an organization and must be suitably protected...

Godrej Security Solutions' Highlights of 2020 2020-12-23

Godrej Security Solutions' Highlights of 2020 crossword puzzle
Across
  1. Exclusive interview with this CAT A publication on Health Security technology
  2. Best research feature (Love thy neighbor)in this leading online lifestyle publication
  3. Best Home Automation story of the year with India’s leading financial publication was done by this journalist
  4. Renowned TV journo who reviewed the UV Case
  5. Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
  6. The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
  1. Participation in maximum number of Industry stories with this publication
  2. Godrej Security Solutions ventured into the health security segment with this product
  3. Authored article on Reflecting on your child’s safety post-COVID-19 crisis
  4. The best front-page coverage (UV-based disinfectants in demand) was received in this publication
  5. Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
  6. Maximum regional coverage garnered in this city

12 Clues: Renowned TV journo who reviewed the UV CaseMaximum regional coverage garnered in this cityParticipation in maximum number of Industry stories with this publicationAuthored article on Reflecting on your child’s safety post-COVID-19 crisisExclusive interview with this CAT A publication on Health Security technology...

KPL 17 2016-03-29

KPL 17 crossword puzzle
Across
  1. tuskin
  2. kotikaupunki
  3. lopenuupunut
  4. lentokenttä
  5. turvatarkastus
  6. hauta
  7. maisemat
  8. lahja
  9. ruokala
  10. kolkko
Down
  1. saapua
  2. kohokohta
  3. tuulinen
  4. läpi
  5. luola
  6. innostunut
  7. matkustaa
  8. laskeutua

18 Clues: läpiluolahautalahjatuskinsaapuakolkkoruokalatuulinenmaisematkohokohtamatkustaalaskeutuainnostunutlentokenttäkotikaupunkilopenuupunutturvatarkastus

mass media 2024-11-05

mass media crossword puzzle
Across
  1. ноутбук
  2. безопасность
  3. персонал
  4. рекламировать
  5. транслировать
  6. общество
  7. унижать
  8. сообщение
Down
  1. флешка
  2. новости
  3. обсуждение
  4. угрожать
  5. сериал
  6. сведения
  7. портить
  8. гражданин
  9. канал
  10. сеть

18 Clues: сетьканалфлешкасериалноутбукновостипортитьунижатьперсоналугрожатьсведенияобществогражданинсообщениеобсуждениебезопасностьрекламироватьтранслировать

CJCC Crossword 2023-05-09

CJCC Crossword crossword puzzle
Across
  1. our abbreviation
  2. chairman of victims comp board
  3. who is the one who is going to send you an email on friday with admin leave
  4. how many seats are there on the council
  5. how old is cjcc
  6. where our CJCC attorney's went to school
  7. Our executive director
  8. who handles all media requests
  9. our governor
  10. historian
Down
  1. Stef's division
  2. how many NCVRW events did we hold in 2023
  3. where our office is located
  4. current council chairman
  5. First lady
  6. Our friendly neighborhood CFO
  7. what branch of government are we
  8. who is going to reminder you to do your cyber training
  9. where madeline and dannielle spend their time j-a,

19 Clues: historianFirst ladyour governorStef's divisionhow old is cjccour abbreviationOur executive directorcurrent council chairmanwhere our office is locatedOur friendly neighborhood CFOchairman of victims comp boardwho handles all media requestswhat branch of government are wehow many seats are there on the councilwhere our CJCC attorney's went to school...

Information Security 2016-05-17

Information Security crossword puzzle
Across
  1. hardware or software that helps keep hackers from using your computer to send out your personal information without your permission.
  2. Use this tool to dispose of hard copy documents that contain (stricly) confidential information.
  3. Do not __________ your password or account with anyone.
  4. ID credentials
  5. contact point in case of Information Security (near) incident.
  6. an individual whose primary aim in life is to penetrate the security defences of large, sophisticated, computer systems
Down
  1. conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
  2. form of fraud in which the attacker attempts to gather personal, financial or business confidential information.
  3. malicious software that kidnaps your data
  4. classic form of malware

10 Clues: ID credentialsclassic form of malwaremalicious software that kidnaps your dataDo not __________ your password or account with anyone.contact point in case of Information Security (near) incident.Use this tool to dispose of hard copy documents that contain (stricly) confidential information....

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie wird das Chatten in Echtzeit genannt?
  2. Wie lautet der Überbegriff für unerwünschte, schädliche Software?
  3. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
  4. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
  5. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  6. Welche Programme, protokollieren die Tastatureingabe mit?
  7. Was versteckt sich hinter einem scheinbar nützlichem Programm?
Down
  1. Wie werden unerwünschte Werbemails genannt?
  2. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
  3. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

internet security 2021-03-01

internet security crossword puzzle
Across
  1. software designed to collect information from computers for commercial or criminal purposes
  2. black-hat hackers
  3. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  4. a program designed to prevent spyware from gaining access to the internal network.
  5. horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
  1. a deceptive scheme or trick used to cheat someone out of something, especially money
  2. the illegal copying and distribution of copyrighted software, information, music and video files
  3. self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
  4. programs that spread by attaching themselves to executable files or documents
  5. certificate an electronic way of proving your identity, when you are doing business on the Internet

10 Clues: black-hat hackersprograms that spread by attaching themselves to executable files or documentsa program designed to prevent spyware from gaining access to the internal network.a deceptive scheme or trick used to cheat someone out of something, especially money...

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. Separate low-level system software running on the host machine to perform visualization.
  2. Synchronous condition that results from a particularly undesirable situation.
  3. Linux uses this technique to define the priority of processes
  4. A real-time operating system used in mission-critical applications
  5. An asynchronous event that can occur at any time irrespective of what the processor is doing
  6. Processes running in the background, started by the kernel itself.
Down
  1. A connection used to exchange data between the processes.
  2. One method to block buffer overflow attacks
  3. Helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. the process responsible for secure logon.

10 Clues: the process responsible for secure logon.One method to block buffer overflow attacksA connection used to exchange data between the processes.Linux uses this technique to define the priority of processesA real-time operating system used in mission-critical applicationsProcesses running in the background, started by the kernel itself....

Computer security 2022-07-22

Computer security crossword puzzle
Across
  1. occurs at the receivers side
  2. never save your password on a
  3. prevents unauthorised access to a network
  4. software created to infect a computer
Down
  1. the data we want to hide
  2. harming or harassing others online
  3. unwanted email
  4. converting information into secret code
  5. computer expert who does the act of hacking
  6. never share it with anyone

10 Clues: unwanted emailthe data we want to hidenever share it with anyoneoccurs at the receivers sidenever save your password on aharming or harassing others onlinesoftware created to infect a computerconverting information into secret codeprevents unauthorised access to a networkcomputer expert who does the act of hacking

Data Security 2022-06-07

Data Security crossword puzzle
Across
  1. the practice of sending emails pretending to be from reputable companies in order to cause individuals to reveal personal information, such as passwords and credit card numbers
  2. the gaining of unauthorized access to data in a system or computer
  3. This protects computers on a network from intentional hostile intrusion which could result in data corruption or denial of service
  4. downloading software and other copyrighted material illegally
  5. stealing data and information and presenting it as your own
  6. this term refers to all malicious programs, but in essence, it’s a code that attaches itself to a legitimate, piece of software and then reproduces itself when that file is run
Down
  1. the practice of using another person's name and personal information in order to obtain credit, loans, etc.
  2. this is the process of converting plain text using a cipher (an algorithm) to make it unreadable to anyone who does not have a key
  3. bullying people online
  4. this refers to characters used for validating a user on a computer system. A username along with a password is usually used

10 Clues: bullying people onlinestealing data and information and presenting it as your owndownloading software and other copyrighted material illegallythe gaining of unauthorized access to data in a system or computerthe practice of using another person's name and personal information in order to obtain credit, loans, etc....

software security 2022-11-01

software security crossword puzzle
Across
  1. πρόσφατη ορισμοί ιών
  2. οι συγγραφείς των ιών
  3. λογισμικό προστασίας από ιούς
  4. το λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή
  5. κακόβουλο πρόγραμμα
Down
  1. κακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικό
  2. κατασκοπείας κακόβουλο πρόγραμμα που προσκολλάται κρυφά σε αρχεία που κατεβάζουμε απ' το διαδίκτυο.
  3. τα ψηφιακά αποτυπώματα των ιών
  4. βλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού του
  5. τείχος προστασίας

10 Clues: τείχος προστασίαςκακόβουλο πρόγραμμαπρόσφατη ορισμοί ιώνοι συγγραφείς των ιώνλογισμικό προστασίας από ιούςτα ψηφιακά αποτυπώματα των ιώνκακόβουλο πρόγραμμα μεταμφιεσμένο σε θεμιτό λογισμικόβλαβερό πρόγραμμα που αναπαράγεται δημιουργώντας αντίγραφα του εαυτού τουτο λογισμικό το οποίο διαθέτει τις απαιτούμενες εντολές για να βλάψει έναν υπολογιστή...

security plan 2021-04-14

security plan crossword puzzle
Across
  1. State law determines how organizations qualify as political parties to get candidates on the ballot, party membership ____, the right to vote in a party’s primary, the requirements for party officials, the party nomination process, and the regulation of party finances (although such regulations have had little success).
  2. Party activists are not ____per se and tend to be people who are decidedly liberal or conservative in their issue positions.
  3. Party activists who serve on the city, county, or state party organizations, or who regularly work in campaigns constitute a(n) _____ pool for candidates for public office.
  4. State committees are headed by party _____who hail from varied backgrounds.
Down
  1. _____ committees have become service providers to candidates’ campaigns.
  2. Most local parties are an entirely _____-based operation with limited permanent resources.
  3. City and county party officers and committees are chosen ______and cannot be removed by any higher party authority.
  4. The role of local party organizations is mostly ____to that of the candidates’ own organizations.
  5. Professional campaigns develop a campaign theme to ___the essence of the campaign and help the candidate “stay on message.”
  6. Political party organizations in the U.S. are decentralized with power flowing from the bottom up, consisting of city and county _____, state committees, and national committees.

10 Clues: _____ committees have become service providers to candidates’ campaigns.State committees are headed by party _____who hail from varied backgrounds.Most local parties are an entirely _____-based operation with limited permanent resources.The role of local party organizations is mostly ____to that of the candidates’ own organizations....

Security Quiz 2022-10-24

Security Quiz crossword puzzle
Across
  1. to dump out information about things
  2. a well known term for encryption
  3. malicious piece of code
  4. Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
  5. An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
  6. The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
  1. Internet file sharing utility
  2. A worm program that flooded the apranet
  3. Sending strange packets to a system in order to gauge how it responds to determine the operating system
  4. Software to detect unprotected shares

10 Clues: malicious piece of codeInternet file sharing utilitya well known term for encryptionto dump out information about thingsSoftware to detect unprotected sharesA worm program that flooded the apranetSending strange packets to a system in order to gauge how it responds to determine the operating system...

Security Awareness 2023-09-01

Security Awareness crossword puzzle
Across
  1. The process of verifying the identity of a user or a piece of information
  2. A method for guessing a password that involves systematically trying a high volume of possible combinations of characters until the correct one is found
  3. Which month is observed as Insider Threat month?
  4. The use of AI to replace the likeness of one person with another in video or audio
  5. Abbreviation of an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
Down
  1. A weakness in the system is called --------------------
  2. Malware that uses tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus, to trick users into visiting malware-containing websites
  3. Targeted phishing attack aimed at senior executives masquerading as a legitimate email
  4. The use of electronic means, primarily messaging and social media platforms, to bully and harass a victim
  5. A kind of spyware software that records every keystroke made on a computer’s keyboard

10 Clues: Which month is observed as Insider Threat month?A weakness in the system is called --------------------The process of verifying the identity of a user or a piece of informationThe use of AI to replace the likeness of one person with another in video or audioA kind of spyware software that records every keystroke made on a computer’s keyboard...

Ιnternet Security 2024-02-12

Ιnternet Security crossword puzzle
Across
  1. Παιχνίδια στο διαδίκτyo
  2. Διαδικτυακός εκφοβισμός
  3. Κωδικού πρόσβασης
  4. Εικόνα Σώματος& κοινωνικά δίκτυα
Down
  1. Στοχευμένες Διαφημίσεις
  2. Ηλεκτρονικές Απάτες
  3. Άγνωστοι στο διαδίκτυο
  4. ψευδείς ειδήσεις
  5. Εθισμός στο διαδίκτυο
  6. Κακόβουλο λογισμικό

10 Clues: ψευδείς ειδήσειςΚωδικού πρόσβασηςΗλεκτρονικές ΑπάτεςΚακόβουλο λογισμικόΕθισμός στο διαδίκτυοΆγνωστοι στο διαδίκτυοΣτοχευμένες ΔιαφημίσειςΠαιχνίδια στο διαδίκτyoΔιαδικτυακός εκφοβισμόςΕικόνα Σώματος& κοινωνικά δίκτυα

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Internet Security 2020-07-10

Internet Security crossword puzzle
Across
  1. a business deal or action such as buying or selling something
  2. to protect information by putting it into a special code that only some people can read
  3. a system that protects a computer
  4. when two or more machines or telephones are joined together or joined to a larger system,using anelectrical connection
  5. something that protects a website from attacks
Down
  1. proof that something is true or real
  2. an attempt to cause damage or injury
  3. someone who uses computers to secretly use or change the information in another person's computer system
  4. connected to the internet, or available through the internet
  5. and prevents other people from using it or damaging it

10 Clues: a system that protects a computerproof that something is true or realan attempt to cause damage or injurysomething that protects a website from attacksand prevents other people from using it or damaging itconnected to the internet, or available through the interneta business deal or action such as buying or selling something...

Food Security 2024-05-21

Food Security crossword puzzle
Across
  1. - meeting the needs of the present generation without compromising the ability of future generations to meet their own needs.
  2. - something that is needed to survive
  3. - Access to food that is nutritious safe, and produced in environmentally sustainable ways.
  4. - a type of protection
  5. - Physical and economic access to food for all at all times.
  6. - the process of providing or obtaining the food necessary for health and growth.
Down
  1. - the rate of increase in prices over a given period of time.
  2. - enough to meet the needs of a situation or a proposed end.
  3. - Access to culturally acceptable food
  4. - Sufficient (enough) food for all people at all times.

10 Clues: - a type of protection- something that is needed to survive- Access to culturally acceptable food- Sufficient (enough) food for all people at all times.- enough to meet the needs of a situation or a proposed end.- Physical and economic access to food for all at all times.- the rate of increase in prices over a given period of time....

IT Security 2023-06-01

IT Security crossword puzzle
Across
  1. Haubtstandort des BSI(DE)
  2. Zeichenfolge für Zugang
  3. Gerät, um sich daheim mit dem Internet zu verbiden
  4. 2021 feierte das BSI sein 30-jähriges...
  5. Unautorisierter Zugriff auf IT-Systeme
  6. An einem elektronischen Ort aufbewahren(Verb)
  7. Veraltetes Speichermedium
Down
  1. Körperliches Merkmal zur Authentisierung
  2. Programm zum Darstellen von Webseiten
  3. Zusammenschaltung mehrerer Systeme

10 Clues: Zeichenfolge für ZugangHaubtstandort des BSI(DE)Veraltetes SpeichermediumZusammenschaltung mehrerer SystemeProgramm zum Darstellen von WebseitenUnautorisierter Zugriff auf IT-SystemeKörperliches Merkmal zur Authentisierung2021 feierte das BSI sein 30-jähriges...An einem elektronischen Ort aufbewahren(Verb)...

computer security 2023-08-08

computer security crossword puzzle
Across
  1. protection
  2. infector
  3. self-controlled invader
  4. attracting suckers
Down
  1. encoding
  2. program designed to disrupt
  3. take advantage of
  4. user confirmation
  5. unauthorized access
  6. greek myth

10 Clues: encodinginfectorprotectiongreek mythtake advantage ofuser confirmationattracting suckersunauthorized accessself-controlled invaderprogram designed to disrupt

Food security 2024-12-18

Food security crossword puzzle
Across
  1. cannot grow without water
  2. affect the availability of food
  3. the condition in which people lack stable access to sufficient food
  4. having enough money to be sufficient nutritious food
Down
  1. can lead to widespread famine
  2. The process of protecting food from spoilageand contamination in cold environment
  3. food being within reach of every person
  4. deficiency of enough resources
  5. the ability to consistently access enough nutritious food
  6. harmful microorganisms

10 Clues: harmful microorganismscannot grow without watercan lead to widespread faminedeficiency of enough resourcesaffect the availability of foodfood being within reach of every personhaving enough money to be sufficient nutritious foodthe ability to consistently access enough nutritious food...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Which vegetable is long, green, and rhymes with "teen"?
  2. What long, green vegetable is also called a cucumber?
  3. What vegetable is used to make french fries?
  4. What are the key nutrients essential for child growth?
  5. Which vegetable is purple and shaped like an egg?
Down
  1. Which vegetable is Popeye's favorite?
  2. Which round, red vegetable is often used in salads?
  3. What orange vegetable do rabbits like to eat?
  4. What is essential for calcium absorption, promoting strong bones and teeth
  5. What color is a carrot?

10 Clues: What color is a carrot?Which vegetable is Popeye's favorite?What vegetable is used to make french fries?What orange vegetable do rabbits like to eat?Which vegetable is purple and shaped like an egg?Which round, red vegetable is often used in salads?What long, green vegetable is also called a cucumber?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Cereal grain
  2. Vegetable with bitter taste
  3. It keeps doctor away
  4. Vegetable with golden seeds
  5. This vegetable can make you cry
Down
  1. kind of fruits
  2. looks like ginger when grown in plant
  3. Snack eat while watching movie
  4. Every kid morning drink
  5. Indian kid have to increase memory

10 Clues: Cereal grainkind of fruitsIt keeps doctor awayEvery kid morning drinkVegetable with bitter tasteVegetable with golden seedsSnack eat while watching movieThis vegetable can make you cryIndian kid have to increase memorylooks like ginger when grown in plant

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Poultry raised for eggs
  2. Man's best friend
  3. – This animal gives milk and is important in the desert
  4. Small animal raised
  5. Has a trunk
Down
  1. Large marsupial
  2. Animal raised for wool
  3. Likes to chase mice
  4. Pollinator that plays a critical role in food production
  5. Flying mammal

10 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceSmall animal raisedAnimal raised for woolPoultry raised for eggs– This animal gives milk and is important in the desertPollinator that plays a critical role in food production

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. plants grown for food
  2. place where food is grown
  3. you plant this to grow food
  4. long period without rain
  5. small area to grow vegetables
Down
  1. plants grow in this
  2. recycled plant material for soil
  3. not old or spoiled food
  4. feeling when you need to eat
  5. collecting ripe crops

10 Clues: plants grow in thisplants grown for foodcollecting ripe cropsnot old or spoiled foodlong period without rainplace where food is grownyou plant this to grow foodfeeling when you need to eatsmall area to grow vegetablesrecycled plant material for soil

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Helps to Increase Hemoglobin % in blood
  2. contains natural sugars, like glucose, fructose, and sucrose, which can quickly replenish energy levels.
  3. Rich in antioxidants and Boosts heart health
  4. Helps to gain Vitamin C
  5. contain antioxidants that may help prevent certain types of cancer
Down
  1. contain vitamin A, which helps prevent xerophthalmia, an eye disease that can lead to vision loss
  2. Contain fiber, manganese, vitamin C, vitamin K, and anthocyanins, a type of phytonutrient
  3. A good source of monounsaturated fat, vitamin E, and folate, which are all good for the heart
  4. High in potassium and vitamin K, which are good for the heart
  5. Contain prebiotic fiber, which is good for gut health, and potassium

10 Clues: Helps to gain Vitamin CHelps to Increase Hemoglobin % in bloodRich in antioxidants and Boosts heart healthHigh in potassium and vitamin K, which are good for the heartcontain antioxidants that may help prevent certain types of cancerContain prebiotic fiber, which is good for gut health, and potassium...

Information Security 2025-03-24

Information Security crossword puzzle
Across
  1. techniques are cons (Schwindel) conducted through technology. The goal is to trick someone into giving up money, information, or valuables through manipulation and false promises.
  2. Scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as key. Even if copied or stolen.
  3. bad guys, also known as “crackers”
  4. One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files
  5. networks of infiltrated and compromised machines controlled by a central command
  6. seeks to compromise a computing system without permission. There are many forms of Malware for instance Viruses, Worms, Trojans
Down
  1. good guys, probe for weaknesses, but don’t exploit them. They share their knowledge so that holes can be found & plugged hence security improves. They are part of the company auditing & security process
  2. examines traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication
  3. hackers use psychology (exploit trust or curiosity) rather than code to trick employees into revealing information or performing other tasks that compromise a firm.
  4. effectively shutting down Websites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines.

10 Clues: bad guys, also known as “crackers”networks of infiltrated and compromised machines controlled by a central commandOne of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. The farming of fish and other aquatic animals for food production.
  2. Milk and foods made from milk, like cheese and yogurt.
  3. A severe shortage of food that can lead to starvation and death.
  4. Maintaining cleanliness to prevent the spread of illness and disease.
  5. The process of providing water to crops to help them grow.
  6. The substances in food that our bodies need to grow and stay healthy.
  7. A type of grain that is used to make bread, pasta, and other foods.
Down
  1. Helps plants grow by providing them with important nutrients.
  2. To kill bacteria by chemical process, we need to
  3. To prevent contamination,food should be kept what?

10 Clues: To kill bacteria by chemical process, we need toTo prevent contamination,food should be kept what?Milk and foods made from milk, like cheese and yogurt.The process of providing water to crops to help them grow.Helps plants grow by providing them with important nutrients.A severe shortage of food that can lead to starvation and death....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. a severe shortage of food (as through crop failure) resulting in violent hunger and starvation and death
  2. a substance that can be used or prepared for use as food
  3. a storehouse for threshed grain or animal feed
  4. of or providing nourishment
  5. any substance that can be metabolized by an animal to give energy and build tissue
Down
  1. a stock or supply of foods
  2. the act of depriving of food or subjecting to famine
  3. fuel derived immediately from living matter
  4. the act of searching for food and provisions
  5. any substance that can be used as food

10 Clues: a stock or supply of foodsof or providing nourishmentany substance that can be used as foodfuel derived immediately from living matterthe act of searching for food and provisionsa storehouse for threshed grain or animal feedthe act of depriving of food or subjecting to faminea substance that can be used or prepared for use as food...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Is the practice of growing food?
  2. Is a staple grain
  3. Are needed for healthy diet?
  4. Is necessary for irrigation?
Down
  1. Is a main source of protein?
  2. Affects crop production?
  3. Type of farming uses fewer chemicals?
  4. Can reduce soil fertility?
  5. Is essential for plant growth?
  6. Is used to store grains?

10 Clues: Is a staple grainAffects crop production?Is used to store grains?Can reduce soil fertility?Is a main source of protein?Are needed for healthy diet?Is necessary for irrigation?Is essential for plant growth?Is the practice of growing food?Type of farming uses fewer chemicals?

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Traditional Korean dish made of fermented vegetables, primarily napa cabbage
  2. An ________ a day keeps the doctor away
  3. Type of cookie that originated in France, often almond-based with a chewy texture
  4. A rich, slow-cooked French stew often made with beef
  5. Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
  6. Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
  1. A Japanese noodle soup made with a meat or fish-based broth
  2. Aromatic spice often used in Indian cooking
  3. A method of cooking meat slowly in its own fat
  4. A salad made with tomatoes, cucumbers, onions, and feta cheese

10 Clues: An ________ a day keeps the doctor awayAromatic spice often used in Indian cookingA method of cooking meat slowly in its own fatA rich, slow-cooked French stew often made with beefA Japanese noodle soup made with a meat or fish-based brothA salad made with tomatoes, cucumbers, onions, and feta cheese...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Which city is an example of a food surplus state in India
  2. The mother dairy is an important cooperative in
  3. Buffer stock is the stock of foodgrains procured by the government through
  4. The success of wheat was replicated in
  5. Which State has the highest production of rice in India
  6. Which state is associated with AMUL
Down
  1. What has been a major issue in distribution system.
  2. the sector which has about 60% plus population-dependence
  3. These are factors which can affect Food Security
  4. The land on which the crops are grown is known as

10 Clues: Which state is associated with AMULThe success of wheat was replicated inThe mother dairy is an important cooperative inThese are factors which can affect Food SecurityThe land on which the crops are grown is known asWhat has been a major issue in distribution system.Which State has the highest production of rice in India...

FOOD Security 2024-10-17

FOOD Security crossword puzzle
Across
  1. something that is suitable or safe to eat a mixture of organic matter, minerals, gases, liquids, and organisms that together support the life of plants and soil organisms.
  2. a substance that is added to food in order to improve its taste or appearance
  3. the process or period of gathering in crops
  4. when an organism gets too few or too many nutrients, resulting in health problems
  5. the distress associated with lack of food
Down
  1. Bank a place where stocks of food, typically basic provisions and non-perishable items
  2. substances that are used to control pests
  3. A type of farming that uses no pesticides or Chemicals
  4. the activity or business of growing crops
  5. a cultivated plant that is grown on a large scale commercially, especially a cereal, fruit, or vegetable

10 Clues: substances that are used to control peststhe activity or business of growing cropsthe distress associated with lack of foodthe process or period of gathering in cropsA type of farming that uses no pesticides or Chemicalsa substance that is added to food in order to improve its taste or appearance...

Information Security 2025-09-28

Information Security crossword puzzle
Across
  1. Detailed minimum specifications for compliance
  2. Unauthorized entry into the real or virtual property of another party
  3. Common theft of credit card numbers (Information extortion)
  4. This threat actually evolves to elude detection
  5. Being secure and free from danger
Down
  1. The legal obligation to compensate an injured party for wrongs doings.
  2. Raw facts collected by an organization
  3. Step-by-step instructions for compliance
  4. regulate and define socially acceptable behavior.
  5. An adverse event begins to manifest as a threat to data, it becomes an

10 Clues: Being secure and free from dangerRaw facts collected by an organizationStep-by-step instructions for complianceDetailed minimum specifications for complianceThis threat actually evolves to elude detectionregulate and define socially acceptable behavior.Common theft of credit card numbers (Information extortion)...

Food Security 2025-09-01

Food Security crossword puzzle
Across
  1. – the buying, selling or exchanging of goods and services between people, businesses, or countries.
  2. – goods or services sold to another country.
  3. – when fertile land becomes dry and turns into desert, often due to drought, deforestation or poor farming practices.
  4. insecurity – when people do not have reliable access to enough safe and nutritious food.
Down
  1. – the practice of farming, including growing crops and raising animals for food and other products.
  2. change – long-term shifts in weather patterns and temperatures caused mostly by human activities like burning fossil fuels.
  3. – a set of rules, plans or actions made by governments or organisations to guide decisions.
  4. – the amount of crops or food produced from a piece of land (e.g., how many tonnes of wheat a farm grows).
  5. – the top layer of the earth where plants grow, made up of minerals, organic matter, air and water.
  6. – goods or services brought into a country from overseas.

10 Clues: – goods or services sold to another country.– goods or services brought into a country from overseas.insecurity – when people do not have reliable access to enough safe and nutritious food.– a set of rules, plans or actions made by governments or organisations to guide decisions....

Cyber Safety 2020-02-19

Cyber Safety crossword puzzle
Across
  1. flagfeeling when something happens on digital media that makes you feeluncomfortable, worried, sad, or anxious
  2. information about you that can be used to identify you because it isunique to you (e.g. your full name or your address)
  3. an attempt to trick someone, usually with the intention of stealing moneyor private information
  4. a type of crime in which your private information is stolen and used forcriminal activity
  5. using media in a way that feels healthy and in balance with other lifeactivities (family, friends, school, hobbies, etc.)
Down
  1. information that comes to us through the internet, often through a tablet,smartphone, or laptop
  2. information about you that can be used to identify you because it is
  3. to engage in activities that don't involve devices, apps, or the internet
  4. URL:a web address that has been condensed and which could mislead anuser into going into a risky website
  5. when someone poses as an institution, like a bank or school, and sends you apersonalized message asking you to provide private information

10 Clues: information about you that can be used to identify you because it isto engage in activities that don't involve devices, apps, or the interneta type of crime in which your private information is stolen and used forcriminal activityinformation that comes to us through the internet, often through a tablet,smartphone, or laptop...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. the use of technology to harass, threaten, embarrass, or target another person.
  3. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  4. Electronic device most students own at home and is square and mostly portable.
Down
  1. An individual who causes harm or stress to another human intentionally and repetitively.
  2. A repetitive action toward another human purposely causing harm or intimidation.
  3. The act of protecting ones self or others from harm or intimidation online.
  4. Having firm belief or reliability in someone.
  5. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.The act of protecting ones self or others from harm or intimidation online.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person....

Cyber stuff 2021-09-17

Cyber stuff crossword puzzle
Across
  1. what you have to do online. one word
  2. use it do do everything online
  3. this unlocks you personal information
  4. mark Zuckerberg made this
Down
  1. when people be mean to you online. one word
  2. YOU WATCH SAM PILGRIM ON IT
  3. use this to text people
  4. instagram is one of them.two words combined
  5. is what i keep saying

9 Clues: is what i keep sayinguse this to text peoplemark Zuckerberg made thisYOU WATCH SAM PILGRIM ON ITuse it do do everything onlinewhat you have to do online. one wordthis unlocks you personal informationwhen people be mean to you online. one wordinstagram is one of them.two words combined