cyber security Crossword Puzzles

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Global initiative to end hunger and malnutrition
  2. Sustainable farming method that mimics natural ecosystems
  3. Process of preserving food for future use
  4. Ability to access nutritious food consistently
  5. Agricultural practice to increase crop yields
Down
  1. Practice of growing crops and raising livestock on the same land
  2. Lack of access to adequate food
  3. UN agency working to achieve food security worldwide
  4. Nutrient-dense foods that can be stored long-term
  5. Economic access to sufficient food

10 Clues: Lack of access to adequate foodEconomic access to sufficient foodProcess of preserving food for future useAgricultural practice to increase crop yieldsAbility to access nutritious food consistentlyGlobal initiative to end hunger and malnutritionNutrient-dense foods that can be stored long-termUN agency working to achieve food security worldwide...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A type of farming that primarily focuses on growing food for sale, not just for local consumption.
  2. Crops grown primarily to feed livestock rather than humans.
  3. A farming method aimed at producing food without depleting natural resources.
  4. Rotation The practice of rotating different crops on the same land to improve soil health.
Down
  1. Nutrient group providing energy, often found in grains like wheat and rice.
  2. C Essential vitamin often found in fruits and vegetables that boosts the immune system.
  3. An essential mineral found in dairy products, important for bone health.
  4. The process of growing crops and raising livestock for food.
  5. A protein-rich legume commonly used to improve soil fertility.
  6. The global organization dedicated to eradicating hunger and ensuring food security.

10 Clues: The process of growing crops and raising livestock for food.A protein-rich legume commonly used to improve soil fertility.Crops grown primarily to feed livestock rather than humans.An essential mineral found in dairy products, important for bone health.Nutrient group providing energy, often found in grains like wheat and rice....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. the distress associated with lack of food
  2. the practice of growing crops or raising animals
  3. the variety of all living things and their interactions
  4. an imbalance between the nutrients your body needs to function
Down
  1. the ability to be maintained at a certain level and availability
  2. Application of ecological concepts and principals in farming
  3. the supply of water to land or crops to help growth
  4. the process of obtaining food necessary for health and growth
  5. a cultivated plant that is grown on a large scale commercially
  6. the state of being in short supply

10 Clues: the state of being in short supplythe distress associated with lack of foodthe practice of growing crops or raising animalsthe supply of water to land or crops to help growththe variety of all living things and their interactionsApplication of ecological concepts and principals in farmingthe process of obtaining food necessary for health and growth...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Source of proteins
  2. Source of vitamins and proteins
  3. Must to have for food production
  4. Source of high calories
  5. Source of iron
  6. Increases sugar harm for health
Down
  1. Food source
  2. source of vitamin D
  3. Harmful for health
  4. Nutritional drink

10 Clues: Food sourceSource of ironNutritional drinkSource of proteinsHarmful for healthsource of vitamin DSource of high caloriesSource of vitamins and proteinsIncreases sugar harm for healthMust to have for food production

food security 2024-10-17

food security crossword puzzle
Across
  1. - Protein-rich legume often used as a meat alternative.
  2. - A common grain that is a staple food in many countries.
  3. - Process of cooking and preparing food to make it safe and tasty.
  4. - A term referring to edible plants like spinach and lettuce, rich in vitamins and minerals.
  5. - A vitamin commonly found in fruits that helps prevent scurvy.
Down
  1. - A type of farming where crops are grown specifically for sale, not for local consumption.
  2. - Farming, growing crops, and raising animals for food.
  3. - A common mineral needed for strong bones, found in dairy products.
  4. - Lack of enough food to meet basic needs.
  5. - A natural resource essential for growing food.

10 Clues: - Lack of enough food to meet basic needs.- A natural resource essential for growing food.- Protein-rich legume often used as a meat alternative.- Farming, growing crops, and raising animals for food.- A common grain that is a staple food in many countries.- A vitamin commonly found in fruits that helps prevent scurvy....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Lack of resources to access food
  2. Reducing food waste and loss
  3. Promoting sustainable and resilient food systems
  4. Crops grown for human consumption
  5. Process of producing food
Down
  1. Producing food without harming the environment
  2. Preserving natural resources for future food production
  3. Practice of growing crops in urban areas
  4. Preserving traditional farming knowledge
  5. Producing food locally

10 Clues: Producing food locallyProcess of producing foodReducing food waste and lossLack of resources to access foodCrops grown for human consumptionPractice of growing crops in urban areasPreserving traditional farming knowledgeProducing food without harming the environmentPromoting sustainable and resilient food systems...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A state where people don't have enough food to meet daily energy needs.
  2. Financial aid provided by the government to support food production.
  3. A major threat to food security due to impacts on agriculture.
  4. A non-profit organization that provides aids distributes food to those in need.
  5. It supplies many vital ecosystem services, such as creating and maintaining healthy soils.
  6. A condition caused by inadequate or unbalanced diet.
Down
  1. an extreme shortage of food leading to mass.
  2. A significant barrier to access to food.
  3. meeting the needs of the present without compromising the future.
  4. A practice of farming to produce food.

10 Clues: A practice of farming to produce food.A significant barrier to access to food.an extreme shortage of food leading to mass.A condition caused by inadequate or unbalanced diet.A major threat to food security due to impacts on agriculture.meeting the needs of the present without compromising the future....

Security crossword 2023-06-27

Security crossword crossword puzzle
Across
  1. requires Outside Activity report
  2. OFMD is a ___ mission
  3. NonFrat country
  4. Access control
  5. Annual training reqt.
Down
  1. Prohibitted technology
  2. filed biennially
  3. PFT should be reported __ days before
  4. Staff like badge color
  5. ___ Act covers political participation

10 Clues: Access controlNonFrat countryfiled bienniallyOFMD is a ___ missionAnnual training reqt.Prohibitted technologyStaff like badge colorrequires Outside Activity reportPFT should be reported __ days before___ Act covers political participation

Online Security 2023-08-11

Online Security crossword puzzle
Across
  1. News that contains deliberate disinformation
  2. It is also known as digital footprint.
  3. The suppression, prohibition, or withholding of information that is considered unacceptable or dangerous, for example because it is obscene or a threat to national security
  4. websites that are not indexed by search engines and can only be accessed by some softwares
  5. Large data sets that are analysed in order to identify patterns and trends,
Down
  1. It is a process of converting data into code in order to protect information.
  2. It is a content that is considered to have the potential to corrupt.
  3. Malicious software that is designed to break into and/or harm a computer system
  4. A scam conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information
  5. A network that operates using public infrastructure but uses security mechanisms

10 Clues: It is also known as digital footprint.News that contains deliberate disinformationIt is a content that is considered to have the potential to corrupt.Large data sets that are analysed in order to identify patterns and trends,It is a process of converting data into code in order to protect information....

internet security 2022-05-31

internet security crossword puzzle
Across
  1. il simbolo del cancelletto (#) associato a una o più parole chiave per facilitare le ricerche tematiche in un blog o in un social network.
  2. connessione che ti permette di navigare su internet.
  3. in informatica, il complesso dei dati identificativi di un utente, che gli consentono l'accesso a un servizio telematico: a. di posta elettronica, nome e parola d'accesso per poter usufruire del servizio di posta elettronica.
  4. programma per navigare in Internet che inoltra la richiesta di un documento alla rete e ne consente la visualizzazione una volta arrivato.
  5. circuito di emittenti televisive, collegate o associate fra loro per la trasmissione degli stessi programmi.
  6. computer di elevate prestazioni che in una rete fornisce un servizio agli altri elaboratori collegati, detti client.
Down
  1. luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi.
  2. insieme di pagine web.
  3. in informatica, parola o sigla di riconoscimento fornita dall'utente all'elaboratore per poter accedere a un sistema operativo, a un programma o a un file.
  4. sistema che permette la condivisione di documenti iper testuali multimediali.

10 Clues: insieme di pagine web.connessione che ti permette di navigare su internet.sistema che permette la condivisione di documenti iper testuali multimediali.luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi....

Network Security 2023-05-10

Network Security crossword puzzle
Across
  1. Exposes confidential, sensitive, or protected information to an unauthorized person.
  2. The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
  3. Addresses that are associated with specific devices and assigned to them by the manufacturer.
  4. The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
  5. A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
  1. The process or action of proving or showing something to be true, genuine, or valid:
  2. Is the overall accuracy, completeness, and consistency of data.
  3. A security mechanism that identifies people by verifying their physical or behavioral characteristics.
  4. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  5. The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.

10 Clues: Is the overall accuracy, completeness, and consistency of data.The process or action of proving or showing something to be true, genuine, or valid:Exposes confidential, sensitive, or protected information to an unauthorized person.Addresses that are associated with specific devices and assigned to them by the manufacturer....

Network Security 2025-02-04

Network Security crossword puzzle
Across
  1. A type of penetration testing that mimics an external attack on the system. (5,3)
  2. This type of malware appears to be legitimate, like a game, but is actually harmful.
  3. A type of malware that locks a device and demands a fee to unlock it.
  4. A type of attack where someone monitors data traveling on a network to intercept sensitive information.
  5. A technique where cybercriminals send messages disguised as from a trusted source to steal personal data.
  6. A method to prevent unauthorized access to data by translating it into code that only someone with the correct key can access.
Down
  1. An attack that uses automated software to produce hundreds of likely passwords to gain access to accounts. (5,5)
  2. A type of malware that self-replicates and attaches to another file or program.
  3. A type of attack where a server is flooded with useless traffic, causing it to slow down or become unusable.(6,2,7)
  4. A type of social engineering attack where the attacker watches the victim over their shoulder to gain personal information.

10 Clues: A type of malware that locks a device and demands a fee to unlock it.A type of malware that self-replicates and attaches to another file or program.A type of penetration testing that mimics an external attack on the system. (5,3)This type of malware appears to be legitimate, like a game, but is actually harmful....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. - D Vitamin for free
  2. - Dry fruits
  3. - Easily available and affordable Protein
  4. - Your skin glows
Down
  1. - Good for eye sight
  2. - Source of fibre
  3. - This is where you get iron from
  4. - Maharashtra produces largest volume
  5. - We get calcium from here
  6. - Protein for Vegetarians

10 Clues: - Dry fruits- Source of fibre- Your skin glows- Good for eye sight- D Vitamin for free- Protein for Vegetarians- We get calcium from here- This is where you get iron from- Maharashtra produces largest volume- Easily available and affordable Protein

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. What fruit is yellow and monkeys love to eat? (6 letters)
  2. What green vegetable is often eaten in salads? (6 letters)
  3. What is a popular breakfast food made from grains? (4 letters)
  4. What hot drink is made from beans, often served in the morning? (6 letters)
  5. What sweet treat is made from sugar and comes in many flavors? (5 letters)
  6. What is a popular drink made from milk? (3 letters)
Down
  1. What food can be spread on bread, often made from peanuts? (8 letters)
  2. What red fruit is often used in salads or sauces? (5 letters)
  3. What citrus fruit is yellow and sour? (6 letters)
  4. What food comes from cows and is used to make cheese? (5 letters)

10 Clues: What citrus fruit is yellow and sour? (6 letters)What is a popular drink made from milk? (3 letters)What fruit is yellow and monkeys love to eat? (6 letters)What green vegetable is often eaten in salads? (6 letters)What red fruit is often used in salads or sauces? (5 letters)What is a popular breakfast food made from grains? (4 letters)...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. In the Hindu culture, the leaves of which fruit are hung at weddings to ensure fertility?
  2. Which fruit has the highest oil content?
  3. The only fruit to have seeds on the outside is:
  4. Limas and pintos are what type of vegetable?
  5. There is a fruit juice that can increase the potency of some medication, even causing an overdose. Which fruit juice is this?
  6. What color are blackberries?
Down
  1. What stick-like veggie's name comes from the Greek word for "sprout" or "shoot"?
  2. Which vegetable grows underground like a potato?
  3. Chinese Gooseberry is another name for:
  4. What fruit are monkeys known to enjoy?

10 Clues: What color are blackberries?What fruit are monkeys known to enjoy?Chinese Gooseberry is another name for:Which fruit has the highest oil content?Limas and pintos are what type of vegetable?The only fruit to have seeds on the outside is:Which vegetable grows underground like a potato?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. – A type of poultry, often grilled or fried
  2. – A crunchy fruit, often red or green
  3. – A yellow fruit, rich in potassium
  4. – A type of Italian food made from wheat flour and water
Down
  1. – A dairy product made from curdled milk
  2. cream – A sweet frozen treat made from milk, cream, and sugar
  3. – A staple food made from flour and water, often baked
  4. – A dish typically made with greens, vegetables, and dressing
  5. – Orange vegetable, good for your eyes
  6. – A popular Italian dish with cheese, sauce, and various toppings

10 Clues: – A yellow fruit, rich in potassium– A crunchy fruit, often red or green– Orange vegetable, good for your eyes– A dairy product made from curdled milk– A type of poultry, often grilled or fried– A staple food made from flour and water, often baked– A type of Italian food made from wheat flour and water...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. What purple fruit grows in bunches?
  2. Which round, red fruit is often associated with keeping the doctor away?
  3. Name a fruit rich in Vitamin C.
  4. What nutrient helps build strong bones and teeth?
  5. Food which is good for gut health.
Down
  1. Which yellow fruit is rich in potassium?
  2. Name a green vegetable rich in iron.
  3. What is a good source of protein?
  4. Vitamin A is found in which vegetable?
  5. Which food helps make our bones strong?

10 Clues: Name a fruit rich in Vitamin C.What is a good source of protein?Food which is good for gut health.What purple fruit grows in bunches?Name a green vegetable rich in iron.Vitamin A is found in which vegetable?Which yellow fruit is rich in potassium?Which food helps make our bones strong?What nutrient helps build strong bones and teeth?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The process of providing or obtaining the food necessary for health and growth.
  2. This powerful vehicle is essential for many farming tasks, including plowing and harvesting.
  3. This physical sensation of desiring food can become chronic in food-insecure populations.
  4. Animals raised on a farm for profit or subsistence, these can include cattle, pigs, and sheep.
  5. The process of gathering ripe crops from the fields, this is often the busiest time of year for farmers.
  6. This chemical substance is used to control or eliminate harmful insects and other pests in crops.
Down
  1. The amount of crop produced per unit of land area is referred to by this term.
  2. Farming without synthetic pesticides or fertilizers, this method aims to be more environmentally friendly.
  3. The variety of plant and animal life in ecosystems is crucial for resilient food systems.
  4. This financial support from governments can help farmers produce food at lower costs.

10 Clues: The amount of crop produced per unit of land area is referred to by this term.The process of providing or obtaining the food necessary for health and growth.This financial support from governments can help farmers produce food at lower costs.The variety of plant and animal life in ecosystems is crucial for resilient food systems....

AVIATION SECURITY 2025-09-17

AVIATION SECURITY crossword puzzle
Across
  1. CCMs can submit security reports by using the ….reporting tool
  2. following a red bomb threat and if the bomb is found we execute the …..article drill checklist
  3. a passenger is found smoking in the lavatory and does not comply. We had over the …..warning
  4. a security search is required after passenger disembarkation and / or cargo holds unloading in ……airport
  5. the unlawful, violent or by threat of violence, seizure of an aircraft
Down
  1. normal access in the cockpit is done by saying position and assigned……
  2. no person is allowed to enter the aircraft without showing his/ her …..
  3. a category of bomb and sabotage threat
  4. the cabin …..checklist is to be carried out when there has been a RED threat against the airplane or service
  5. a security search is required before departure from ….despite the aircraft’s previous destination

10 Clues: a category of bomb and sabotage threatCCMs can submit security reports by using the ….reporting toolnormal access in the cockpit is done by saying position and assigned……the unlawful, violent or by threat of violence, seizure of an aircraftno person is allowed to enter the aircraft without showing his/ her ….....

Mental Health Terms 2022-09-29

Mental  Health Terms crossword puzzle
Across
  1. Has to do with People.
  2. To accomplish something.
  3. Basic Things of Life.
  4. How you feel about something.
  5. to get someone to do something they don't want to.
  6. Things that you wish for.
  7. To say something hurtfully.
  8. A Feeling of Resentment.
  9. To intentionally do Without.
  10. To Be Pleased at your effort.
Down
  1. Happy, Sad and Excited.
  2. To put fourth Effort.
  3. To harm Someone Intentionally.
  4. deals with the Mind.
  5. Having Respect for all.
  6. anything dealing with the internet.
  7. A Place of Peace and Quiet.
  8. a Notice of everything and body.
  9. An emotion showing Strong Feelings. 18Trafficking To abuse and sell someone.

19 Clues: To put fourth Effort.deals with the Mind.Has to do with People.Happy, Sad and Excited.Basic Things of Life.To accomplish something.Having Respect for all.A Feeling of Resentment.Things that you wish for.To intentionally do Without.To harm Someone Intentionally.A Place of Peace and Quiet.To say something hurtfully....

Crossword 1 2014-12-26

Crossword 1 crossword puzzle
Across
  1. When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
  2. The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
  3. Only the __________ government can create indictable offences.
  4. You will need a security licence to work in loss __________.
  5. We can protect information by protecting computer screens from __________ eyes.
  6. “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
  7. When handling evidence, you should wear gloves to avoid __________.
  8. Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
  9. When securing a crime scene, make note of any __________ conditions.
  10. A positive attitude and being respectful are __________ qualities.
  11. One of the recommendations from the Patrick Shand case was __________ licensing.
  12. If a crowd seems to be getting out of control, __________ from any communication.
Down
  1. CDT means __________, direction and take down.
  2. Type B fires are fueled by __________ liquids.
  3. Every province has its own human rights __________.
  4. When taking a witness statement, the facts should be in __________ order.
  5. The basic security role is to protect people, property and __________.
  6. The basic security role is implemented by observing, reporting, __________ and deterring.
  7. Post orders are often called __________ orders.
  8. One reason that we patrol is to deter people from __________ acts.
  9. An arrest is defined as getting control of someone with intent to __________.
  10. It is the responsibility of every security guard to be aware of __________ materials on the work site.
  11. Type D fires are fueled by __________ metals.
  12. Patrick Shand was arrested for __________ baby food.
  13. Designing the environment to reduce the possibility of crime is called?

25 Clues: Type D fires are fueled by __________ metals.CDT means __________, direction and take down.Type B fires are fueled by __________ liquids.Post orders are often called __________ orders.Every province has its own human rights __________.Patrick Shand was arrested for __________ baby food.You will need a security licence to work in loss __________....

Plural Policing 2018-10-29

Plural Policing crossword puzzle
Across
  1. 22% of G4S employees are employed in this continent
  2. Missing word – MI6 is the =common name for the Secret “?” Service
  3. 8% of G4S employees are employed in this continent
  4. Missing word - SEPA is the Scottish Environmental “?” Agency
  5. Missing word - MI5 is the common name for the UK “?” Service
  6. The first Neighbourhood Watch scheme - then known as Home Watch - was set up in the UK in in which Chesire town in 1982?
  7. Surname of “Johnathon” on NCA most wanted list
  8. Acronym for British Security Industry Authority
  9. The article ‘Pluralisation of policing in England & Wales and the Netherlands: exploring similarity and difference’ (2009) was written by Jones, van Steden and which other author (surname)?
  10. Surname of the current Chief of the Secret Intelligence Service
  11. Acronym for Scottish Environmental Protection Agency
Down
  1. NCA Board Meeting on 23 August 2018 met in this city
  2. According to Atkinson (2018) beyond the ‘key operational partners’ how many other agencies have a presence at the Scottish Crime Campus?
  3. Surname of the current Director General of the Security Service
  4. In their 2002 article Mark Button and Tim John considered the plural policing of what kind of protest?
  5. G4S had a contract to deliver security at this event in London in 2012
  6. The first Neighbourhood Watch schemes were set up in New York in 1964 as a response to a murder. What was the surname of the victim?
  7. Missing word - The NCA stands for the National “?" Agency
  8. Missing word - HMRC is Her Majesty’s Revenue and “?”
  9. The Scottish Crime Campus is located in this town
  10. According to Atkinson (2018) how many ‘key operational partners’ are based at the Scottish Crime Campus?

21 Clues: Surname of “Johnathon” on NCA most wanted listAcronym for British Security Industry AuthorityThe Scottish Crime Campus is located in this town8% of G4S employees are employed in this continent22% of G4S employees are employed in this continentNCA Board Meeting on 23 August 2018 met in this cityMissing word - HMRC is Her Majesty’s Revenue and “?”...

June 12 - InfoSec 2024-06-12

June 12 - InfoSec crossword puzzle
Across
  1. Protecting systems and data from threats
  2. Computer equipment which protects your network from hackers gaining remote access
  3. Keeping personal information secure
  4. What needs to be kept private and secure
  5. Files that may contain sensitive information
  6. Person who gains unauthorized access to a computer system
  7. Program that deletes files and/or programs
  8. Group of connected computers
  9. Ensuring data remains unaltered and trustworthy
  10. Permissions granted to view or use data/systems
  11. Rules and policies governing cybersecurity practices
  12. Digital information that needs safeguarding
  13. Being alert to potential cybersecurity risks
Down
  1. The protection of computers, networks and data from malware and hackers
  2. Where a person lies to another to trick them into giving over money or information
  3. Sending fake emails telling victims to log onto a fake website which steals their password and login details
  4. Malware which gives a hacker admin powers to control your computer
  5. Malware which completes small repetitive tasks (used in DDoS attacks)
  6. Someone who might visit offices to teach workers about cybersecurity
  7. Obligation to follow security best practices
  8. Program which appears useful, but hides malicious software inside
  9. Causing a website to crash by directing millions of computers to simultaneously request data from it (4 letter acronym)
  10. Preventing unauthorized disclosure of information
  11. A flaw in a program or network which makes it vulnerable to hacking
  12. Potential danger that could breach security
  13. Measures to limit access and maintain security
  14. Plan to maintain cybersecurity defenses
  15. Another name for a software engineer
  16. String of letters, numbers and characters entered along with a user ID to log in
  17. Umbrella term for various programs that cause problems, including viruses, ransomware and trojans

30 Clues: Group of connected computersKeeping personal information secureAnother name for a software engineerPlan to maintain cybersecurity defensesProtecting systems and data from threatsWhat needs to be kept private and secureProgram that deletes files and/or programsPotential danger that could breach securityDigital information that needs safeguarding...

Aviation Workplace - Safety & Security - Lachlan 2023-11-17

Aviation Workplace - Safety & Security - Lachlan crossword puzzle
Across
  1. selling or trading in goods that are exempt from payment of duty
  2. service operator PSA
  3. the place at an airport or country's border where government officials check the documents of people entering that country
  4. procedures followed or measures taken to ensure the security of a state or organization
  5. plays a significant role in managing the movements of aircraft
  6. the end of a railway or other transport route, or a station at such a point
  7. oad, unload and move baggage and cargo around an airport, both landside and airside (before and after the security boundary)
  8. the flying or operating of an aircraft
  9. the side of an airport terminal beyond passport and customs control
  10. aviation security
Down
  1. the side of an airport terminal to which the general public has unrestricted access
  2. help identify issues such as cracks, potholes, debris, or other surface irregularities that could pose a risk to aircraft during takeoff, landing, or taxiing
  3. direct, control, and monitor aircraft traffic at an airport to ensure safety and compliance with federal and local regulations
  4. all aircraft operations in which the aircraft is used for the carriage of passengers or goods for hire or reward.
  5. goods carried on a ship, aircraft or motor vehicle
  6. a method of measuring the time based on the full 24 hours of the day rather than dividing it into two groups of 12 hours
  7. an organization providing a regular public service of air transport on one or more routes
  8. the official department that administers and collects the duties levied by a government levied by a government on imported goods/the place
  9. a complex of runways and buildings for the takeoff, landing and maintenance of civil aircrafts with facilities for passengers
  10. Delta's catering company

20 Clues: aviation securityservice operator PSADelta's catering companythe flying or operating of an aircraftgoods carried on a ship, aircraft or motor vehicleplays a significant role in managing the movements of aircraftselling or trading in goods that are exempt from payment of dutythe side of an airport terminal beyond passport and customs control...

Understanding Money by Riley Mcdonald 2024-05-09

Understanding Money by Riley Mcdonald crossword puzzle
Across
  1. Money is also known as...
  2. A plastic card that allows the holder to make credit purchases up to an authorized amount
  3. A security that pays interest over terms ranging from two to ten years
  4. Banks that are part of The Fed are known as...
  5. A security that pays interest over terms of ten to thirty years
  6. To exchange one good or service for another good or service
  7. A bank-issued card that allows customers to pay for purchases directly from their checking account
  8. A type of financial investment issued by a corporation, government, or other organization
  9. Money received today is worth more than the same amount received in the future because money received today can be invested or deposited in the bank for interest; this concept is called...
  10. Money is a common measure of the worth or price of a good or service
  11. Action taken to manage the supply of money and interest rates in an economy
Down
  1. A type of a document guaranteeing the payment of a specific amount of money
  2. The process of transferring money from one individual or organization to another
  3. A security that matures in a year or less
  4. Money can be saved and used at a later date
  5. The mechanism a nation uses to provide and manager money for itself
  6. The Federal Reserve System, often called... was created by the U.S. Congress in 1913 as our nation's central bank
  7. Money is used in exchange for goods and services needed by individuals, businesses, and governments
  8. A transfer of money from one bank account to another
  9. Anything of value that is accepted in return for goods and services

20 Clues: Money is also known as...A security that matures in a year or lessMoney can be saved and used at a later dateBanks that are part of The Fed are known as...A transfer of money from one bank account to anotherTo exchange one good or service for another good or serviceA security that pays interest over terms of ten to thirty years...

IT - Crossword 2024-11-25

IT - Crossword crossword puzzle
Across
  1. Any action derived from intelligent threats to violate the security of the
  2. Involves actions that supplement the precautionary measures
  3. An act or instance of using or closely imitating the language and thoughts of another author without authorization
  4. A common type of online fraud
  5. A weakness, design, or implementation error
  6. A crime in which a computer is the object of the crime
  7. Ensuring that the information is accessible to authorized persons when required without delay.
  8. The exclusive legal right, given to an originator
  9. Use computer technology to access personal information,
  10. The identification and assurance of the origin of information
  11. Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or
Down
  1. Any action of stealing information from a users’ system.
  2. Action taken in advance to protect the system against potential threats or
  3. Information/data can be accessed only by those authorized
  4. An assurance for which someone cannot deny something
  5. Ending information out and collecting it from unsuspecting people
  6. A defined method of breaching the security of an IT system through
  7. Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  8. User security allows the system to set security rules to determine what is displayed to which user.
  9. Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  10. Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

21 Clues: A common type of online fraudA weakness, design, or implementation errorThe exclusive legal right, given to an originatorAn assurance for which someone cannot deny somethingA crime in which a computer is the object of the crimeUse computer technology to access personal information,Any action of stealing information from a users’ system....

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. A destructive computer program that bores its way through a computer's files or through a computer's network.
  2. Malware that allows a cyber-security attacker to take control of an infected computer.
  3. A type of Malware that locates and saves data from users without them knowing about it.
  4. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  5. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  6. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include
  8. Collection of captured bot computers
Down
  1. When someone deceives by pretending to be someone else in order to get personal data.
  2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  3. Criminals make a promise of goods in return for details, such as offering a free music download.
  4. horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  5. Software that encrypts programs and data until a ransom is paid to remove it.
  6. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  7. An error in a program that prevents the program from running as expected

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expectedSoftware that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

HUman rights 2018-01-15

HUman rights crossword puzzle
Across
  1. / p
  2. / s
  3. / c
  4. / d
  5. / i
  6. / r
  7. / j
  8. / b
  9. / m
  10. / l
Down
  1. / o
  2. / k
  3. / a
  4. / h
  5. / e
  6. / q
  7. / n
  8. / g
  9. / f

19 Clues: / p/ o/ k/ a/ h/ s/ e/ q/ c/ n/ d/ i/ r/ g/ f/ j/ b/ m/ l

personal finance 2021-02-24

personal finance crossword puzzle
Across
  1. fjieowanf
  2. zcjvziofd
  3. jaiofna
  4. nfapjcz
  5. fialf;mkzl
  6. fajiosnjcz
  7. fanofna
  8. aiofpna
  9. nfiopfz
Down
  1. fnizsf
  2. fjioeanfo
  3. roiahweng
  4. fnakopzjfd
  5. jfdiaofj
  6. jfoienafo
  7. ajofneonf
  8. naiofnoa
  9. fjizopfjz
  10. fjeioawnf

19 Clues: fnizsfjaiofnanfapjczfanofnaaiofpnanfiopfzjfdiaofjnaiofnoafjioeanforoiahwengfjieowanfzcjvziofdjfoienafoajofneonffjizopfjzfjeioawnffnakopzjfdfialf;mkzlfajiosnjcz

Past Dannedd Vocab 2025-07-06

Past Dannedd Vocab crossword puzzle
Across
  1. mean
  2. steal
  3. guard
  4. phone
  5. gossip
  6. innocent
  7. bully
  8. makeup
  9. fake
  10. security
Down
  1. noisy
  2. computer
  3. parents
  4. post
  5. dull
  6. delete
  7. angry
  8. story

18 Clues: meanpostdullfakenoisystealguardphonebullyangrystorygossipdeletemakeupparentscomputerinnocentsecurity

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. When someone deceives by pretending to be someone else in order to get personal data.
  3. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  4. Software that encrypts programs and data until a ransom is paid to remove it.
  5. Collection of captured bot computers
  6. An error in a program that prevents the program from running as expected.
  7. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  8. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  9. Criminals make a promise of goods in return for details, such as offering a free music download.
Down
  1. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  2. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
  3. A type of Malware that locates and saves data from users without them knowing about it.
  4. Malware that allows a cyber-security attacker to take control of an infected computer.
  5. A destructive computer program that bores its way through a computer's files or through a computer's network.
  6. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  2. Malware that allows a cyber-security attacker to take control of an infected computer.
  3. A destructive computer program that bores its way through a computer's files or through a computer's network.
  4. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
  7. Collection of captured bot computers
  8. When someone deceives by pretending to be someone else in order to get personal data.
Down
  1. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  2. Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  3. Criminals make a promise of goods in return for details, such as offering a free music download.
  4. An error in a program that prevents the program from running as expected.
  5. Software that encrypts programs and data until a ransom is paid to remove it.
  6. A type of Malware that locates and saves data from users without them knowing about it.
  7. Program that hides in a computer and allows someone from a remote location to take full control of the computer

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expected.Software that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

8th History Review 2021-04-07

8th History Review crossword puzzle
Across
  1. Non-permanent UN Security Council member in Southeast Asia
  2. Typical weather in an area over an extended time
  3. Number of official languages of the United Nations
  4. Current Secretary-General of the UN
  5. Headquarters of the UN
  6. Locating a place using North, South, east, or West
  7. Changes in elevation in an area
  8. Organization that preceded the UN
  9. Non permanent UN Security Council member located on the Mediterranean Sea
  10. Landform characterized by low elevation and low relief
Down
  1. Height above or below sea level
  2. A strong way to claim that people are tied to their environment would be, "Geography is ..."
  3. The UN was established after this event
  4. Term for an area where countries are grouped together such as Scandanavia, New England, Tornado Alley
  5. Kind of map that shows geographic features, and shades elevation by color
  6. The part of the UN organization in which all countries have a voting representative
  7. Sea in which St. Vincent & the Grenadines are located.
  8. Identifying where the White House is with 39N/77W or 1600 Pennsylvania Ave. Washington DC
  9. Permanent member of the UN Security Council in Europe
  10. An area of land with high elevation and low relief

20 Clues: Headquarters of the UNHeight above or below sea levelChanges in elevation in an areaOrganization that preceded the UNCurrent Secretary-General of the UNThe UN was established after this eventTypical weather in an area over an extended timeNumber of official languages of the United NationsLocating a place using North, South, east, or West...

iQuesta 2022 - Finals 2022-01-27

iQuesta 2022 - Finals crossword puzzle
Across
  1. acts as a security guard between the internet and a network
  2. Using material another person has created and claims it as your own
  3. application for performing numerical and statistical calculations
  4. is a layout software
  5. malware type in which security mechanism is bypassed to access a system.
  6. The purpose of scrambling data so it can be sent securely over networks.
  7. A location that provides wireless Internet access.
  8. A number assigned to any item that is connected to the Internet
  9. To allow communication inside the organization
  10. Vendor-created program modifications are called
  11. A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
  12. a method used for a security breach in wireless networks
Down
  1. instructions programmed on a hardware
  2. a program that can analyze and execute a program line by line.
  3. blockchain programming
  4. The information about someone on the Internet
  5. Initialize the system hardware components
  6. name of the system that manages and programs hardware resources for a computer
  7. the amount of data that can travel over an analog medium
  8. Playing video and sound in real time

20 Clues: is a layout softwareblockchain programmingPlaying video and sound in real timeinstructions programmed on a hardwareInitialize the system hardware componentsThe information about someone on the InternetTo allow communication inside the organizationVendor-created program modifications are calledA location that provides wireless Internet access....

Wraiths & Words: A Haunted Mansion Challenge 2023-09-21

Wraiths & Words: A Haunted Mansion Challenge crossword puzzle
Across
  1. Found in the graveyard
  2. Creepy statues
  3. Deceptive email pr@ctice
  4. Cybersecurity measure
  5. Malicious software
  6. Network of infected computers
  7. Mansion staff member
  8. En7ry k3y
  9. Mansion's signature tune (3 wds)
  10. Home of 999 happy haunts
  11. KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
  12. Extra layer of security
  13. Voiced of several characters in the Haunted Mansion
  14. Haunted Mansion's musical instrument
  15. Changing image in Haunted Mansion
  16. What three ghosts do
  17. Protection software
  18. To take advantage of a security flaw
  19. Mansion decor
  20. Unauthorized computer user
Down
  1. Taunt at the Haunted Mansion (2wds)
  2. 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
  3. Where portraits lengthen (2 wds)
  4. Unauthorized access
  5. 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
  6. Boo!
  7. U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
  8. Digital offensive
  9. Mansion's grand
  10. Mansion finale
  11. S3lf-r3plicating
  12. Haunted Mansion newspaper column
  13. Security weak point
  14. Malicious software demanding payment
  15. Mansion ride vehicle
  16. To fix a flaw
  17. Authentication via physical traits
  18. Contacting the dead
  19. Web tracking item
  20. Haunted Mansion location with a bride

40 Clues: Boo!En7ry k3yTo fix a flawMansion decorCreepy statuesMansion finaleMansion's grandS3lf-r3plicatingDigital offensiveWeb tracking itemMalicious softwareUnauthorized accessSecurity weak pointContacting the deadProtection softwareMansion staff memberMansion ride vehicleWhat three ghosts doCybersecurity measureFound in the graveyard...

Cyber Test 2023-09-13

Cyber Test crossword puzzle
Across
  1. A type of malware
  2. The most well-known malware attack in the past few years
Down
  1. The world's number one password
  2. The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center
  3. This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

5 Clues: A type of malwareThe world's number one passwordThe most well-known malware attack in the past few yearsThe number one type of cyber incident reported to the FBI's Internet Crime Complaint CenterThis includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.

Games 2025-01-09

Games crossword puzzle
Across
  1. 3 in a row and you're good to go
  2. cyber sleuth
  3. a game that needs 4 players or more
  4. card game that old people play
  5. what people know you for
Down
  1. 7th color of the rainbow dragon
  2. game of
  3. what this is
  4. what you are doing right now

9 Clues: game ofwhat this iscyber sleuthwhat people know you forwhat you are doing right nowcard game that old people play7th color of the rainbow dragon3 in a row and you're good to goa game that needs 4 players or more

claudio 2025-06-23

claudio crossword puzzle
Across
  1. A method of threat detection that monitors and scrutinizes processes, file system, registry, and network activities on an endpoint for suspicious patterns, often leveraging machine learning models.
  2. An advanced policy setting in Nebula that tightens the threshold for flagging suspicious processes, increasing vigilance against unknown threats at the risk of more false positives.
  3. A type of malware disguised as legitimate software, tricking users into installing it, after which it can gain unauthorized access or perform malicious actions.
  4. Regular downloads containing the latest threat definitions, behavioral rules, and detection heuristics, essential for keeping endpoint agents up-to-date against emerging threats.
  5. Configurable alerts within the Nebula console that inform administrators via email or other channels about critical security events or system status changes.
  6. Acronym for Potentially Unwanted Program, software that may include adware, spyware, or other intrusive features, often bundled with legitimate downloads, as categorized by ThreatDown.
  7. Logical collections of endpoints within Nebula that allow administrators to apply policies, schedules, and exclusions uniformly to a subset of devices.
  8. A feature within Nebula that allows administrators to prevent the execution of specific unauthorized or unwanted applications on managed endpoints.
  9. Network settings on an endpoint or within Nebula that direct outbound communications through an intermediary server, often requiring specific allowances for agent connectivity.
  10. A latent weakness or flaw within a software application, operating system, or network configuration that could be leveraged by an attacker to compromise system integrity or confidentiality.
  11. Software that, while not inherently malicious, may pose a security risk due to its functionality, such as remote administration tools that could be misused.
  12. Specific numerical addresses used in network communication, which must often be explicitly opened or configured in firewalls to allow ThreatDown agents to communicate with the cloud console.
  13. A statistically significant deviation from established baseline behavior patterns on an endpoint, frequently signaling potential stealthy compromise or advanced persistent threat activity.
  14. A protection feature within Nebula that defends against repeated, systematic attempts to guess login credentials, often associated with Remote Desktop Protocol attacks.
  15. A ThreatDown service or component primarily responsible for validating product licensing and subscription entitlements for deployed endpoint agents.
  16. A ThreatDown backend server component or service responsible for checking and distributing updates for both product versions and protection databases to endpoint agents.
  17. A specific rule configured within Nebula to bypass security scrutiny for a particular file, folder, process, or website, often used to prevent false positives or accommodate legitimate applications.
  18. A module that intercepts and evaluates domain name system queries to block access to malicious websites, enforce content policies, and prevent communication with command-and-control servers.
  19. The systematic process of orchestrating the installation and configuration of endpoint protection agents across a diverse organizational digital infrastructure.
  20. An advanced endpoint security technology that provides continuous monitoring, deep visibility, and proactive response capabilities to detect and contain sophisticated threats that evade traditional prevention.
  21. A specialized cybersecurity service providing 24/7 human-led threat hunting, monitoring, and incident response, extending an organization's security capabilities without requiring in-house staffing.
  22. The proprietary cloud-native platform serving as the centralized command and control for ThreatDown's comprehensive suite of endpoint security solutions.
  23. A module that systematically scans endpoints to identify software weaknesses and misconfigurations, often using CVSS scoring to prioritize discovered flaws.
  24. An erroneous detection where legitimate activity or software is incorrectly identified as malicious, requiring administrative intervention or the creation of an exclusion.
  25. An enhanced security measure that requires users to provide two different forms of verification to log into the Nebula console, beyond just a password.
  26. Acronym for Content Delivery Network, a distributed network of servers used by ThreatDown to efficiently deliver product updates and protection definitions to global endpoints.
  27. A type of malicious software that encrypts a victim's files and demands payment, typically cryptocurrency, in exchange for the decryption key, often with a time limit.
  28. A sophisticated threat detection methodology employed by endpoint protection, which identifies unknown malicious activity by analyzing behavior patterns rather than relying solely on known signatures.
  29. A stealthy type of malware designed to conceal its presence and activities on a compromised system, often by modifying operating system processes or kernel functions.
  30. The lightweight client software component deployed on an endpoint, facilitating continuous telemetry and policy enforcement from the Nebula console.
Down
  1. A category of potentially unwanted software that aggressively displays advertisements, often collecting user data without explicit consent.
  2. A chronological sequence of records in the Detection Log, providing an unalterable history of security events, administrative actions, and system changes within the Nebula platform.
  3. A core security feature of the endpoint agent that creates a "safe zone" to prevent unauthorized termination or manipulation of the ThreatDown application itself by other processes.
  4. A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units.
  5. A security policy setting that requires a password or specific credentials to prevent unauthorized removal of the ThreatDown agent from an endpoint.
  6. A specific piece of code or a meticulously crafted sequence of commands designed to capitalize on a known software vulnerability, often leading to privilege escalation or remote code execution.
  7. A specific action taken on a compromised endpoint to prevent it from communicating with other devices on the internal network, containing the spread of threats.
  8. A discrete cybersecurity event, potentially signifying a breach or compromise, requiring immediate investigation, containment, and root cause analysis.
  9. A module that enables centralized control over endpoint firewall rules, augmenting network security by regulating incoming and outgoing traffic.
  10. A broad category encompassing any software intentionally designed to cause disruption, damage, or unauthorized access to a computer system, including viruses, worms, and Trojans.
  11. An alphanumeric string or digital credential required to activate and validate the legitimate use of ThreatDown products and services, defining features and expiration.
  12. A comprehensive cybersecurity service that integrates and correlates security telemetry across multiple domains—including endpoints, networks, cloud, and email—with human expertise for proactive threat hunting and rapid incident response.
  13. The strategic linking of the Nebula platform with external security orchestration, automation, and response (SOAR) or Security Information and Event Management (SIEM) systems for a unified security posture.
  14. A report within Nebula providing a consolidated view of all initiated actions, such as scans or remediations, along with their current status and completion details.
  15. The lowest access level within the Nebula console, allowing users to view data and generate reports but without the ability to make any system changes.
  16. A configuration option for forwarding Nebula's event and detection data to an external security information and event management (SIEM) system for centralized logging and analysis.
  17. A security feature focusing on preventing threats like phishing, malware, and spam that are delivered via electronic messages, often through attachment scanning and link analysis.
  18. The highest-level user role in the Nebula console, possessing unrestricted access to platform configurations, user management, and sensitive policy data.
  19. A granular set of configurable rules within Nebula, dictating the precise operational parameters and security responses of endpoint agents across various organizational groups.
  20. Malicious software designed to secretly gather information about a user's activities and transmit it to an external entity, often without their knowledge.
  21. A forensic capability within Nebula that collects and stores extensive endpoint event data, enabling administrators to investigate past activities and reconstruct attack sequences. (Abbr. FRS)
  22. A historical name for a previous generation of ThreatDown's cloud-based management console, now largely superseded by Nebula but still referenced in documentation for network access.
  23. Specialized data files generated by the endpoint agent or console, essential for technical support to troubleshoot complex issues like connectivity problems or unexpected behaviors.
  24. A self-replicating standalone malware that spreads via network connections to infect other computers, often without human interaction.
  25. A security feature of the endpoint agent designed to prevent unauthorized modification, disablement, or uninstallation of the ThreatDown software by malicious actors or unprivileged users.
  26. An isolated, virtualized environment utilized for detonating and meticulously observing suspicious files or code in a controlled manner, preventing any impact on the live operating system.
  27. A powerful command-line interface feature within Nebula that allows administrators to remotely execute commands on isolated endpoints for forensic investigation and advanced remediation.
  28. Granular system data continuously streamed from protected endpoints, crucial for advanced threat hunting and behavioral anomaly detection within the platform.
  29. An isolation protocol for detected malicious executables or processes, designed to neutralize immediate threat by preventing further interaction with the host system.
  30. A Nebula user role providing view access and limited editing capabilities, typically restricted to managing specific sites or entities within a larger organizational structure.
  31. An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session.
  32. A feature, often browser-based, specifically designed to identify and block access to fraudulent websites that attempt to steal sensitive user information through deceptive means.
  33. The precise sequence of automated or manual actions executed to eradicate or neutralize a detected threat, often involving deletion, isolation, or rollback of malicious changes.
  34. An indicator, often monitored during troubleshooting, reflecting the operational state of the MBEndpointAgent or other core ThreatDown processes on a managed device.
  35. A module designed to automate the deployment of software updates and security fixes across operating systems and third-party applications, thereby addressing identified vulnerabilities.
  36. A critical remediation capability in ThreatDown EDR that reverses malicious changes caused by ransomware, restoring affected files to their pre-infection state.
  37. A deceptive application or program designed to trick users into believing their system has problems, often for financial gain or to install further malicious software.
  38. A product module extending ThreatDown protection to mobile devices, safeguarding them against malware, risky apps, and network threats.
  39. A policy-driven feature that regulates the use of removable media and peripheral devices on endpoints to prevent data exfiltration and malware introduction.
  40. A security directive comprising a pre-approved inventory of applications, executables, or network connections permitted to operate, thereby bypassing standard security checks.

70 Clues: An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session.A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units....

Security Awareness 2015-01-21

Security Awareness crossword puzzle
Across
  1. Request Is a request for access to personal information under the Act.
  2. Directorate who you contact regarding assistance for a privacy breach
  3. Refers to a systematic approach for watching over, tracking or monitoring physical and logical spaces, individuals or individuals' activities, whereabouts, behaviour or interests.
  4. Abbreciation for a process used to determine how a program or service could affect the privacy of an individual.
  5. race, ethnic origin, religion, age & marital status are considered this kind of information.
  6. A privacy breach occurs when there is improper or unauthorized access to or collection, use, disclosure, and/or retention of personal information as defined in the Privacy Act.
Down
  1. personal information is legislated under sections 4 to 8 of the Privacy Act. It is a priority of the CRA, and a broad arrangement of measures is in place to ensure personal information remains secure at all times.
  2. abbreviation for your personal identification number that should be confidential at all times.
  3. Is a mandatory or discretionary provision under the Act that authorizes the head of the government institution to refuse to disclose information in response to a request received under the Act.
  4. the act of verifying (i) the validity of the identity of an individual or an Entity, or (ii) the integrity of data in electronic form.
  5. Notice A privacy notice is a statement presented to an individual or group of individuals to communicate the purpose of a collection, including the authority of the government institution to collect, use, and disclose the personal information for a given program or activity.

11 Clues: Directorate who you contact regarding assistance for a privacy breachRequest Is a request for access to personal information under the Act.race, ethnic origin, religion, age & marital status are considered this kind of information.abbreviation for your personal identification number that should be confidential at all times....

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
  2. Was versteckt sich hinter einem scheinbar nützlichem Programm?
  3. Welche Programme, protokollieren die Tastatureingabe mit?
  4. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
  5. Wie werden unerwünschte Werbemails genannt?
Down
  1. Wie wird das Chatten in Echtzeit genannt?
  2. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  3. Wie lautet der Überbegriff für unerwünschte, schädliche Software?
  4. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
  5. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie wird das Chatten in Echtzeit genannt?
  2. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
  3. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  4. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
  5. Was versteckt sich hinter einem scheinbar nützlichem Programm?
  6. Wie lautet der Überbegriff für unerwünschte, schädliche Software?
Down
  1. Welche Programme, protokollieren die Tastatureingabe mit?
  2. Wie werden unerwünschte Werbemails genannt?
  3. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
  4. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
  2. Welche Programme, protokollieren die Tastatureingabe mit?
  3. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
  4. Wie lautet der Überbegriff für unerwünschte, schädliche Software?
  5. Wie werden unerwünschte Werbemails genannt?
  6. Was versteckt sich hinter einem scheinbar nützlichem Programm?
Down
  1. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
  2. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  3. Wie wird das Chatten in Echtzeit genannt?
  4. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

Internet Security 2018-04-17

Internet Security crossword puzzle
Across
  1. A clever but dishonest way to get money.
  2. An electronic way for proving your identity.
  3. Malicious software created to damage or alter computer data.
  4. A kind of program designed to remove viruses from a computer system.
  5. Criminal activity intended to trick someone into giving away personal information.
Down
  1. Computer criminal who breaks into a computer system to steal information or to stop the system from working properly.
  2. Self-copying program moving from one computer to another by exploiting security flaws.
  3. Malicious programs disguised as innocent-looking files and making damage in a computer system.
  4. Online harassment or abuse in chat rooms.
  5. A program designed to prevent spyware from gaining access to the internal network.

10 Clues: A clever but dishonest way to get money.Online harassment or abuse in chat rooms.An electronic way for proving your identity.Malicious software created to damage or alter computer data.A kind of program designed to remove viruses from a computer system.A program designed to prevent spyware from gaining access to the internal network....

National Security 2021-03-04

National Security crossword puzzle
Across
  1. a person who secretly collects and reports information about the activities of another country or organization
  2. secret action taken by a country to prevent another country from discovering its military, industrial, or political secrets
  3. a government department or other group that gathers information about other countries or enemies, or the information that is gathered.
  4. a statement that someone will be hurt or harmed
Down
  1. the careful watching of a person, especially by the police or army, because of a crime that has happened or is expected
  2. a country that has agreed officially to give help and support to another one
  3. the protection of people, organizations, countries, etc. against a possible attack or other crime
  4. a verb which means to win against someone in a fight, war
  5. a law enforcement and domestic intelligence agency which protects the US from terrorist attacks and investigate federal crimes
  6. this agency is focused on human espionage

10 Clues: this agency is focused on human espionagea statement that someone will be hurt or harmeda verb which means to win against someone in a fight, wara country that has agreed officially to give help and support to another onethe protection of people, organizations, countries, etc. against a possible attack or other crime...

Internet Security 2017-05-08

Internet Security crossword puzzle
Across
  1. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
  2. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
  3. Where a public and private key are used to encrypt and decrypt data.
  4. Where the sender and receiver both use the same key to encrypt and decrypt data.
  5. Key A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
  1. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
  2. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
  3. A trusted organisation that provides digital certificates and signatures
  4. Hardware and software for protecting against unauthorised access to a network.
  5. Key A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.

10 Clues: Where a public and private key are used to encrypt and decrypt data.A trusted organisation that provides digital certificates and signaturesHardware and software for protecting against unauthorised access to a network.Where the sender and receiver both use the same key to encrypt and decrypt data....

Improving Security 2021-04-14

Improving Security crossword puzzle
Across
  1. His salary is ___________ to meet his needs.
  2. Fake designer watches are sold at a fraction of the price of the __________ article.
  3. SniffPass can __________ passwords on any 32-bit Windows operating system.
  4. The amount of carbon __________ trapped in our atmosphere causes global warming.
  5. For Credentials, choose or add guest OS credentials that are __________ to run the script.
Down
  1. Their dialect is __________ to most speakers of Standard English.
  2. A __________ is a weakness, flaw, or error found within a security system.
  3. The data will be automatically __________ from one part of the system to another.
  4. A __________ is a sequence of numbers and letters used to check data for errors.
  5. __________ is encrypted text transformed from plaintext using an encryption algorithm.

10 Clues: His salary is ___________ to meet his needs.Their dialect is __________ to most speakers of Standard English.A __________ is a weakness, flaw, or error found within a security system.SniffPass can __________ passwords on any 32-bit Windows operating system.A __________ is a sequence of numbers and letters used to check data for errors....

security plan 2021-04-14

security plan crossword puzzle
Across
  1. ___ allows for many conflicts in a diverse society to be settled locally. It avoids attempting to impose a single, one-size-fits-all policy uniformly without regard to local differences. It also provides locals with the ability to pursue favored policies within their states and communities.
  2. The Founders believed that federalism, along with separation of powers—with power ____among the legislative, executive, and judicial branches—would control government and prevent tyranny.
  3. State and local government authorities share power with national ____whereby no one centralized leader dictates policy. These state and local officials also contribute to party competition and act as channels for recruitment to higher offices.
  4. Many federal officials are still expected to solve political problems and are not likely to _____their own power.
  5. Decentralization contributes to making ____more efficient and manageable at local levels. It also softens the rigidity of law.
  6. ___ are viewed as “laboratories of democracy,” as they are better equipped to experiment with social and economic policy innovations. Competition among governments provides additional incentives for inventiveness and innovation in public policy.
Down
  1. ___ also encourages governments to be responsive to citizen preferences and public policy concerns.
  2. In 1996, Democratic President Bill Clinton, with a Republican Congress, gave much of the responsibility for administering ___programs to the states.
  3. ___ is the passing down of responsibilities from the national government to the states.
  4. Decentralization provides the opportunity for more people to _____in politics, thereby contributing to a popular sense of political effectiveness.

10 Clues: ___ is the passing down of responsibilities from the national government to the states.___ also encourages governments to be responsive to citizen preferences and public policy concerns.Many federal officials are still expected to solve political problems and are not likely to _____their own power....

Information Security 2024-06-21

Information Security crossword puzzle
Across
  1. Copies from one computer to the next to deplete memory and overwhelm network traffic
  2. A program to convert data prior to and after transmission
  3. Use of a software to eavesdrop on information sent and received by user
  4. Formal standards that have been assessed and approved
  5. Information Security goal to ensure data accuracy
Down
  1. The unauthorized intrusion of the computer network for tempering
  2. To delete data and application without physical access
  3. The objective is to separate internal and external network and prevent passage of specific types of traffic
  4. To ensure that a policy is being followed
  5. Type of encryption that requires two keys

10 Clues: To ensure that a policy is being followedType of encryption that requires two keysInformation Security goal to ensure data accuracyFormal standards that have been assessed and approvedTo delete data and application without physical accessA program to convert data prior to and after transmission...

Digital Security 2021-05-11

Digital Security crossword puzzle
Across
  1. when a random person online tries to talk to you, you should _____ them.
  2. You should never add random ______ to your friend's list on social media.
  3. You should never ____ an online friend in person.
  4. Be careful with what you _____ on the internet.
  5. When you bully someone online.
  6. If you ever find out someone is getting Cyberbullied you should always tell the _______.
  7. who should you contact if someone random is trying to talk to you online.
Down
  1. You should never share your _______ ______ online.
  2. when someone sees you in a bad situation but doesn't tell anyone or helps you.
  3. What should you never share with anyone.

10 Clues: When you bully someone online.What should you never share with anyone.Be careful with what you _____ on the internet.You should never ____ an online friend in person.You should never share your _______ ______ online.when a random person online tries to talk to you, you should _____ them....

Security Crossword 2022-03-02

Security Crossword crossword puzzle
Across
  1. Tools used to store multiple passwords.
  2. Network security device or a software program that monitors and filters incoming & outgoing traffic.
  3. _______ generates a one-time-password (OTP) to connect to Capgemini services.​
  4. Information of strategic value that can only be shared among a few individuals is COMPANY _________
Down
  1. The process of making copies of data or files to use in the event the original data are lost or destroyed.
  2. Use ___.capgemini.com to share documents containing personal data.
  3. Practice that can reduce the risk of data leaks by protecting the confidentiality of information while it is transmitted over the internet
  4. The first thing you should do after your business laptop is stolen is to report the situation to your technical ______ team.
  5. Phishing that targets a specific group or individuals such as the company’s system administrators.
  6. ______@capgemini.com for forwarding suspicious email from an unknown sender that seems unusual to CORP.

10 Clues: Tools used to store multiple passwords.Use ___.capgemini.com to share documents containing personal data._______ generates a one-time-password (OTP) to connect to Capgemini services.​Phishing that targets a specific group or individuals such as the company’s system administrators....

Security Crossword 2022-03-02

Security Crossword crossword puzzle
Across
  1. ______@capgemini.com for forwarding suspicious email from an unknown sender that seems unusual to CORP.
  2. The process of making copies of data or files to use in the event the original data are lost or destroyed.
  3. Network security device or a software program that monitors and filters incoming & outgoing traffic.
  4. _______ generates a one-time-password (OTP) to connect to Capgemini services.​
  5. Use ___.capgemini.com to share documents containing personal data.
Down
  1. Practice that can reduce the risk of data leaks by protecting the confidentiality of information while it is transmitted over the internet
  2. Phishing that targets a specific group or individuals such as the company’s system administrators.
  3. Information of strategic value that can only be shared among a few individuals is COMPANY _________
  4. Tools used to store multiple passwords.
  5. The first thing you should do after your business laptop is stolen is to report the situation to your technical ______ team

10 Clues: Tools used to store multiple passwords.Use ___.capgemini.com to share documents containing personal data._______ generates a one-time-password (OTP) to connect to Capgemini services.​Phishing that targets a specific group or individuals such as the company’s system administrators....

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  2. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  3. Prinsip Keamanan Informasi agar akurat
Down
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Perangkat lunak yang diciptakan untuk merusak sistem computer
  3. Jenis Informasi yang merupakan informasi pengetahuan umum
  4. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  5. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
  6. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  7. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Red fruit often mistaken for a vegetable
  2. Orange vegetable that helps you see in the dark
  3. I am called as King of fruits
  4. Small green vegetables that come in a pod
  5. Red fruit that keeps the doctor away
Down
  1. Green vegetable that looks like tiny trees
  2. Yellow fruit that monkeys love to eat
  3. Round citrus fruit named after its color
  4. Red berry with seeds on the outside
  5. Leafy green that made Popeye strong

10 Clues: I am called as King of fruitsRed berry with seeds on the outsideLeafy green that made Popeye strongRed fruit that keeps the doctor awayYellow fruit that monkeys love to eatRed fruit often mistaken for a vegetableRound citrus fruit named after its colorSmall green vegetables that come in a podGreen vegetable that looks like tiny trees...

Food security 2024-12-18

Food security crossword puzzle
Across
  1. - Biggest fruit of all
  2. - Most consumed fruit in summers
  3. - Helps you to get vitamin c and its used almost daily
  4. - Fruit which leaves are used to increase platelets in body
Down
  1. and garlic - Main ingredient in biryani
  2. guard - Bitter but its good for gut cleanse
  3. – Immunity boosting green leafy vegetable that Popeye the sailor likes.
  4. - Newtons law was due to this fruit
  5. - Regular available fruit where we also use it leaves to have lunch
  6. - Sweet but doesnt have sugars in it

10 Clues: - Biggest fruit of all- Most consumed fruit in summers- Newtons law was due to this fruit- Sweet but doesnt have sugars in itand garlic - Main ingredient in biryaniguard - Bitter but its good for gut cleanse- Helps you to get vitamin c and its used almost daily- Fruit which leaves are used to increase platelets in body...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. I’m orange, crunchy, and rabbits think I’m the best snack — what am I?
  2. I’m round and make you cry when you peel my skin — what am I?
  3. I grow in bunches, and I’m small, round, and sweet — what am I?
  4. I’m small and spicy, I make your mouth burn — what am I?
Down
  1. I’m red and round, and I’m used in salad or sauce — what am I?
  2. I’m yellow and curvy, monkeys love me.
  3. I’m orange, juicy, and full of vitamin C — what am I?
  4. I’m purple and shiny, and I’m great in curry — what am I?
  5. King of fruit.
  6. I’m yellow and sour, but I make drinks taste great — what am I?

10 Clues: King of fruit.I’m yellow and curvy, monkeys love me.I’m orange, juicy, and full of vitamin C — what am I?I’m small and spicy, I make your mouth burn — what am I?I’m purple and shiny, and I’m great in curry — what am I?I’m round and make you cry when you peel my skin — what am I?I’m red and round, and I’m used in salad or sauce — what am I?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Sweet, tropical fruit with a large pit
  2. A substance that helps plants grow faster
  3. What versatile fruit provides healthy fats and extensively used in South Indian cooking?
  4. A food production system without soil (9 letters)
Down
  1. Soft, yellow fruit high in potassium
  2. Type of food that is essential for growth and repair
  3. Used for making french fries
  4. Which iron-rich leafy green vegetable is widely used in Indian cooking, known as palak?
  5. Food grown without chemicals
  6. A plant grown for food, such as wheat or maize (4 letters)

10 Clues: Used for making french friesFood grown without chemicalsSoft, yellow fruit high in potassiumSweet, tropical fruit with a large pitA substance that helps plants grow fasterA food production system without soil (9 letters)Type of food that is essential for growth and repairA plant grown for food, such as wheat or maize (4 letters)...

DATA SECURITY 2025-01-24

DATA SECURITY crossword puzzle
Across
  1. A process to verify the identity of users before granting access.
  2. Unauthorized attempts to breach a system's security.
  3. A malicious software designed to harm or exploit any programmable device.
  4. A mechanism used to monitor and log all access attempts and actions.
  5. The process of converting encrypted data back to readable form.
Down
  1. The practice of encoding data to prevent unauthorized access.
  2. Permissions granted to users to access specific resources based on their role.
  3. A unique string of characters used to authenticate a user.
  4. A method used to ensure data integrity and consistency in transactions.
  5. Breach An act where sensitive data is stolen or exposed without authorization.

10 Clues: Unauthorized attempts to breach a system's security.A unique string of characters used to authenticate a user.The practice of encoding data to prevent unauthorized access.The process of converting encrypted data back to readable form.A process to verify the identity of users before granting access....

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The practice of maintaining and preserving agricultural resources for future generations.
  2. A system of food production and distribution that is resilient and minimizes waste.
  3. A nutrient-rich, affordable staple food used in many regions, such as rice, maize, or wheat.
  4. A condition in which all people have access to sufficient, safe, and nutritious food.
  5. A global problem involving a shortage of food, often caused by conflict or natural disasters.
Down
  1. The variety of life in a particular habitat or ecosystem, which is important for food systems.
  2. The process of growing, raising, or producing food.
  3. The act of providing temporary food aid during emergencies.
  4. type of food crisis that affects a region due to drought or crop failure.
  5. The practice of cultivating land to grow crops or raising livestock in a sustainable manner.

10 Clues: The process of growing, raising, or producing food.The act of providing temporary food aid during emergencies.type of food crisis that affects a region due to drought or crop failure.A system of food production and distribution that is resilient and minimizes waste....

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. is the United Nations agency concerned with the international organization of food and agriculture.
  2. is the production of food and goods through farming.
  3. is an extreme scarcity or shortage of food.
  4. is Long period without rain that can harm crops
Down
  1. is an state of being extremely poor
  2. is to gather crops when they're ready
  3. is Where most of our food is grown
  4. is a measure of energy.
  5. is having a low weight-for-age measurement
  6. is any substance that can be metabolized by an animal

10 Clues: is a measure of energy.is Where most of our food is grownis an state of being extremely pooris to gather crops when they're readyis having a low weight-for-age measurementis an extreme scarcity or shortage of food.is Long period without rain that can harm cropsis the production of food and goods through farming....

Password Security 2023-11-09

Password Security crossword puzzle
Across
  1. how many accounts should you use the same password for?
  2. minimum characters a password should have
  3. an assault using one or more computers
  4. a security incident where sensitive information is stolen
  5. should contain a combination of numbers, special characters, uppercase and lowercase letters
Down
  1. passwords should be
  2. it is okay to share your password with colleagues, True/False
  3. the term used for cybercriminals who repeatedly enter passwords to gain unauthorized access
  4. what should you lock each time you leave your desk?
  5. all devices that connect online should be.....

10 Clues: passwords should bean assault using one or more computersminimum characters a password should haveall devices that connect online should be.....what should you lock each time you leave your desk?how many accounts should you use the same password for?a security incident where sensitive information is stolen...

FOOD SECURITY 2024-10-17

FOOD SECURITY crossword puzzle
Across
  1. - A state where people don't have enough food to meet daily energy needs.
  2. - Meeting the needs of the present without compromising the future.
  3. - A condition caused by inadequate or unbalanced diet.
  4. - A significant barrier to access to food.
Down
  1. - The practice of farming to produce food and other products.
  2. - The variety of life in the world, essential for food production.
  3. - An extreme shortage of food leading to mass starvation.
  4. Change - A major threat to food security due to impacts on agriculture.
  5. - Financial aid provided by the government to support food production.
  6. Bank - A non-profit organization that distributes food to those in need.

10 Clues: - A significant barrier to access to food.- A condition caused by inadequate or unbalanced diet.- An extreme shortage of food leading to mass starvation.- The practice of farming to produce food and other products.- The variety of life in the world, essential for food production.- Meeting the needs of the present without compromising the future....

FOOD Security 2024-10-17

FOOD Security crossword puzzle
Across
  1. something that is suitable or safe to eat a mixture of organic matter, minerals, gases, liquids, and organisms that together support the life of plants and soil organisms.
  2. a substance that is added to food in order to improve its taste or appearance
  3. the process or period of gathering in crops
  4. when an organism gets too few or too many nutrients, resulting in health problems
  5. the distress associated with lack of food
Down
  1. Bank a place where stocks of food, typically basic provisions and non-perishable items
  2. substances that are used to control pests
  3. A type of farming that uses no pesticides or Chemicals
  4. the activity or business of growing crops
  5. a cultivated plant that is grown on a large scale commercially, especially a cereal, fruit, or vegetable

10 Clues: substances that are used to control peststhe activity or business of growing cropsthe distress associated with lack of foodthe process or period of gathering in cropsA type of farming that uses no pesticides or Chemicalsa substance that is added to food in order to improve its taste or appearance...

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. An Agricultural method that avoids synthetic chemicals to ensure food safety
  2. India's largest occupation
  3. A nutrient source often associated with cereals like wheat and rice
  4. Good for Vitamin C
  5. Country which is largest producer of milk globally
  6. A climate condition that reduces crop yields due to lack of rainfall
Down
  1. A key vitamin deficiency that causes night blindness
  2. Intensive method to water plants
  3. Main staple food of more than half of the world's population
  4. A major nutrient that provides energy, found in foods like potatoes and bread

10 Clues: Good for Vitamin CIndia's largest occupationIntensive method to water plantsCountry which is largest producer of milk globallyA key vitamin deficiency that causes night blindnessMain staple food of more than half of the world's populationA nutrient source often associated with cereals like wheat and rice...

Security Features 2024-03-18

Security Features crossword puzzle
Across
  1. Designs or partial motifs which are seemingly printed at random on the recto and verso of the substrate, but they match up perfectly and form a complete new motif when viewed in transmitted light.
  2. A thin strip of plastic, metallic or other material embedded in the substrate during the paper substrate manufacturing process
  3. Lines or motifs made up of very small letters, numbers and/or images that are barely perceptible with the naked eye, but become visible at magnification
  4. An authorization in a form of a sticker which allows persons to enter, stay, exit the territory of MS
  5. - ink that changes its colour depending on the angle of observation and illumination
Down
  1. An unauthorized copy or reproduction of an authentic/genuine document
  2. They are mixed into the paper pulp during the paper manufacturing process, to serve as a security feature
  3. Motif, visible when tilted and viewed under oblique light.
  4. Security feature which show different information depending on the viewing and/or lighting conditions.
  5. A person who uses other persons documents taking advantage of their physical resemblance to the genuine holder

10 Clues: Motif, visible when tilted and viewed under oblique light.An unauthorized copy or reproduction of an authentic/genuine document- ink that changes its colour depending on the angle of observation and illuminationAn authorization in a form of a sticker which allows persons to enter, stay, exit the territory of MS...

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

network security 2022-04-18

network security crossword puzzle
Across
  1. intrusive software created to steal data and destroy or damage computers/systems
  2. malicious software that gathers data about the user and forwards to a third party.
  3. This attack occurs when someone pretends to be something that they are not.
  4. This type of attack tries to alter system resources or affect their operations
  5. emails that are sent pretending to be from companies asking for personal information.
  6. this is used to hide the information content of data
Down
  1. prevents normal use of communication or disrupts the network
  2. a flaw or weakness used to attack a system or organization
  3. makes use of information but does not affect system resources
  4. someone who violates computer security

10 Clues: someone who violates computer securitythis is used to hide the information content of dataa flaw or weakness used to attack a system or organizationprevents normal use of communication or disrupts the networkmakes use of information but does not affect system resourcesThis attack occurs when someone pretends to be something that they are not....

IT Security 2022-04-27

IT Security crossword puzzle
Across
  1. irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  2. A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.
  3. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
  4. the practice of making computer files available to other users of a network, in particular the illicit sharing of music and video via the internet
  5. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
Down
  1. A technique used by hackers to obtain sensitive information.
  2. A term that describes all forms of malicious software
  3. a secret word or phrase that must be used to gain admission to a place
  4. A defensive technology designed to keep the bad guys out
  5. A type of malware aimed to corrupt, erase or modify information on a computer

10 Clues: A term that describes all forms of malicious softwareA defensive technology designed to keep the bad guys outA technique used by hackers to obtain sensitive information.a secret word or phrase that must be used to gain admission to a placeA type of malware aimed to corrupt, erase or modify information on a computer...

Security Lab 2025-09-16

Security Lab crossword puzzle
Across
  1. ____ attack Sending deceptive emails or websites to trick users
  2. A device allowing some packets to pass and blocking others
  3. A hidden entry point intentionally left by developers for debugging
  4. A digital signature needs a_____ Key
  5. The main component of Kerberos responsible for granting access to services is:
Down
  1. In IPsec ______ protocol provides Authentication and integrity but no encryption
  2. ___________is primarily used to Hide data within other media
  3. Eavesdropping on a network is an example of which type of attack?
  4. Which part of the CIA triad is concerned with ensuring data is accurate and has not been altered?
  5. S/MIME provides security at the ______ layer.

10 Clues: A digital signature needs a_____ KeyS/MIME provides security at the ______ layer.A device allowing some packets to pass and blocking others___________is primarily used to Hide data within other media____ attack Sending deceptive emails or websites to trick usersEavesdropping on a network is an example of which type of attack?...

iQuesta 2022 - Finals 2022-01-27

iQuesta 2022 - Finals crossword puzzle
Across
  1. Playing video and sound in real time
  2. instructions programmed on a hardware
  3. the amount of data that can travel over an analog medium
  4. a method used for a security breach in wireless networks
  5. Vendor-created program modifications are called
  6. Initialize the system hardware components
  7. A location that provides wireless Internet access.
  8. malware type in which security mechanism is bypassed to access a system.
  9. a program that can analyze and execute a program line by line.
  10. application for performing numerical and statistical calculations
  11. name of the system that manages and programs hardware resources for a computer
Down
  1. Using material another person has created and claims it as your own
  2. blockchain programming
  3. To allow communication inside the organization
  4. The purpose of scrambling data so it can be sent securely over networks.
  5. is a layout software
  6. acts as a security guard between the internet and a network
  7. A number assigned to any item that is connected to the Internet
  8. The information about someone on the Internet
  9. A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.

20 Clues: is a layout softwareblockchain programmingPlaying video and sound in real timeinstructions programmed on a hardwareInitialize the system hardware componentsThe information about someone on the InternetTo allow communication inside the organizationVendor-created program modifications are calledA location that provides wireless Internet access....

iQuesta 2022 - Finals 2022-01-27

iQuesta 2022 - Finals crossword puzzle
Across
  1. instructions programmed on a hardware
  2. acts as a security guard between the internet and a network
  3. malware type in which security mechanism is bypassed to access a system.
  4. application for performing numerical and statistical calculations
  5. Using material another person has created and claims it as your own
  6. A location that provides wireless Internet access.
  7. blockchain programming
  8. the amount of data that can travel over an analog medium
  9. Playing video and sound in real time
  10. A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
  11. a method used for a security breach in wireless networks
  12. name of the system that manages and programs hardware resources for a computer
  13. is a layout software
Down
  1. A number assigned to any item that is connected to the Internet
  2. The purpose of scrambling data so it can be sent securely over networks.
  3. Initialize the system hardware components
  4. The information about someone on the Internet
  5. To allow communication inside the organization
  6. a program that can analyze and execute a program line by line.
  7. Vendor-created program modifications are called

20 Clues: is a layout softwareblockchain programmingPlaying video and sound in real timeinstructions programmed on a hardwareInitialize the system hardware componentsThe information about someone on the InternetTo allow communication inside the organizationVendor-created program modifications are calledA location that provides wireless Internet access....

Landside and Airside 2019-02-18

Landside and Airside crossword puzzle
Across
  1. getting on the plane?
  2. is the area where you go through security and hand over you passport and your departure card for inspection?
  3. how many hours do you have to arrive before boarding on your flight?
  4. what is the short term term word for Aviation Security Service?
  5. where your carry on bags get screened?
  6. how many mls are you allowed for LEG?
  7. where you can go and get food?
  8. what is the main facility that people mostly used in both Landside and Airside?
  9. A passenger who doesn't turn up for their flight?
Down
  1. how long does the Auckland airport operates for?
  2. A flight orignating and terminating in the same country?
  3. where do you go and change your baby?
  4. you do this when you meet a passenger in a friendly manner?
  5. how many passengers and the amount of freight on board the aircraft?
  6. where do you go to have a smoke?
  7. where you get checked in counters?
  8. is the area before departing passengers pass security?
  9. have been throught controls and __________?
  10. what is Gisbournes IATA code?
  11. what is the 3 letter city code for Coolangatta?

20 Clues: getting on the plane?what is Gisbournes IATA code?where you can go and get food?where do you go to have a smoke?where you get checked in counters?where do you go and change your baby?how many mls are you allowed for LEG?where your carry on bags get screened?have been throught controls and __________?what is the 3 letter city code for Coolangatta?...

International Security 1 2021-09-23

International Security 1 crossword puzzle
Across
  1. Security for the globe, meaning “Spaceship Earth” or the planet.
  2. A place or scene of activity, debate, or conflict.
  3. An equilibrium of power sufficient to discourage or prevent one nation or party from imposing its will on or interfering with the interests of another.
  4. A legal or other formal measure intended to preserve civil liberties and rights;the action of protecting, or the state of being protected.
  5. A particular region or group of countries; the earth, together with all of its countries and peoples.
  6. A thing that is regarded as more important than others;something that is very important and must be dealt with before other things.
Down
  1. It is national security or state security in the global arena.
  2. Security for the individual.
  3. Security for the state or “nation,” in the US terminology.
  4. The state of being open to danger or threat; lack of protection,lack of confidence.
  5. The aggregate of people living together in a more or less ordered community; an organization or club formed for a particular purpose or activity.
  6. An important topic or problem for debate or discussion;the action of supplying or distributing an item for use, sale, or official purposes.

12 Clues: Security for the individual.A place or scene of activity, debate, or conflict.Security for the state or “nation,” in the US terminology.It is national security or state security in the global arena.Security for the globe, meaning “Spaceship Earth” or the planet.The state of being open to danger or threat; lack of protection,lack of confidence....

Unit 3: Securing a LAN 2025-11-07

Unit 3: Securing a LAN crossword puzzle
Across
  1. Switch feature that limits MAC addresses per port.
  2. Type of control that mitigates damage after an incident.
  3. Principle of limiting access to only what's necessary.
  4. Technique where a device impersonates another by changing its MAC address.
  5. Type of firewall that tracks active connections.
  6. CIA Triad principle that restricts data access to authorized users.
  7. A MAC address is also known as a ____ address
  8. Type control that identify when a security breach has occurred.
Down
  1. Type of firewall that only follows static rules
  2. CIA Triad principle that ensures data is accurate and unaltered.
  3. Security controls involving hardware/software like firewalls.
  4. A device or software that filters network traffic based on rules.
  5. Logical segmentation of a network to improve security and performance.
  6. CIA Triad principle ensuring data is accessible when needed.

14 Clues: A MAC address is also known as a ____ addressType of firewall that only follows static rulesType of firewall that tracks active connections.Switch feature that limits MAC addresses per port.Principle of limiting access to only what's necessary.Type of control that mitigates damage after an incident....

Bullying 2023-03-07

Bullying crossword puzzle
Across
  1. another for the body
  2. Face with emotion
  3. the opposite of love
Down
  1. talking about others
  2. It happens on Instagram
  3. another word for words (starts with v)
  4. Friendship is one of the factors

7 Clues: Face with emotiontalking about othersanother for the bodythe opposite of loveIt happens on InstagramFriendship is one of the factorsanother word for words (starts with v)

Englanti perus 1, UNIT 2-3 2024-02-01

Englanti perus 1, UNIT 2-3 crossword puzzle
Across
  1. lento
  2. kaikki
  3. loma
  4. torstai
  5. lattia
  6. vieras
  7. keskiviikko
  8. matkustajat
  9. kysymys
Down
  1. kuukausi
  2. turvatarkastus
  3. ikkunat
  4. haluta
  5. suunnitella
  6. kuntosali
  7. viikonloppu
  8. pyyhkiä pölyt
  9. tiskit

18 Clues: lomalentohalutakaikkilattiavierastiskitikkunattorstaikysymyskuukausikuntosalisuunnitellakeskiviikkoviikonloppumatkustajatpyyhkiä pölytturvatarkastus

Le cambriolage du musée du Louvre 2025-10-23

Le cambriolage du musée du Louvre crossword puzzle
Across
  1. Jewelry
  2. Evacuation
  3. Thief
  4. Heritage
  5. Witness
  6. Crown
  7. Display case
  8. Investigation
Down
  1. Guard
  2. Pyramid
  3. Security
  4. Object
  5. Burglary
  6. Alarm
  7. Galleries
  8. Museum
  9. Tool
  10. Escape

18 Clues: ToolGuardThiefAlarmCrownObjectMuseumEscapePyramidJewelryWitnessSecurityBurglaryHeritageGalleriesEvacuationDisplay caseInvestigation

Finances and money 2023-05-15

Finances and money crossword puzzle
Across
  1. trade
  2. rate
  3. credit
  4. invest
  5. quarter
  6. balance
  7. percentage
Down
  1. afford
  2. security
  3. mortgage
  4. economy
  5. withdraw
  6. deposit
  7. loan
  8. value
  9. finance
  10. yield
  11. nickel

18 Clues: rateloantradevalueyieldaffordcreditinvestnickeleconomydepositfinancequarterbalancesecuritymortgagewithdrawpercentage

Standards of the ACF Crossword 2016-01-04

Standards of the ACF Crossword crossword puzzle
Across
  1. (10) control your own actions
  2. (5) how many classifications of drugs
  3. (8) Hitting somebody
  4. (7) need this under fire for e.g.
  5. putting the group before yourself
  6. (9) hosesty
  7. (8) ACF has a zero tolerance policy on this
  8. (6) highly addictive substance
  9. (7) understanding each others wishes and beliefs
  10. (7)sticking by the group
Down
  1. (5) Online bullying
  2. (6,6) can affect anybody
  3. (10) alchohol is a .....
  4. (5) you should report any case of this
  5. (9) calling someone names
  6. (14)zero tolerance policy of this
  7. (5) who should you tell about any issues
  8. (8) is legal to be consumed from the age of ....
  9. (8) most commonly used substance
  10. (5) taking something without permission

20 Clues: (9) hosesty(5) Online bullying(8) Hitting somebody(6,6) can affect anybody(10) alchohol is a .....(7)sticking by the group(9) calling someone names(10) control your own actions(6) highly addictive substance(8) most commonly used substance(7) need this under fire for e.g.(14)zero tolerance policy of thisputting the group before yourself...

Storage Digital Sales Wednesday Crossword 2023-12-18

Storage Digital Sales Wednesday Crossword crossword puzzle
Across
  1. Where we log all of our opportunity detail
  2. The tool to help us with continuous customer/partner outreach
  3. Cyberattack that holds data hostage
  4. Site that shows street pricing
  5. Stands for commisionable revenue
  6. IBM's Cyber resilience "menu" offering
  7. Stands for Financial revenue
  8. IBM's flagship storage hardware
  9. The best team sells this
  10. IBM Funded assessment
Down
  1. Means it can't be changed
  2. We sell everything through this
  3. Our "clean Room" OEM offering
  4. Our channel program name
  5. We recognize revenue at ___
  6. Our proprietary tech that drives price to performance (acronym)
  7. Digital sales is the primary driver of these
  8. Unit of measurement for reads/writes
  9. Storage solution for containers
  10. Indicator for the only measure of success

20 Clues: IBM Funded assessmentOur channel program nameThe best team sells thisMeans it can't be changedWe recognize revenue at ___Stands for Financial revenueOur "clean Room" OEM offeringSite that shows street pricingWe sell everything through thisStorage solution for containersIBM's flagship storage hardwareStands for commisionable revenue...

Matt’s Crossword 2025-03-26

Matt’s Crossword crossword puzzle
Across
  1. A cold substance that’s is often disliked.
  2. MSU and vacuums have this in common, they ___
  3. Nick’s L10 doodles topic, often.
  4. An even uglier truck.
  5. Kind of the animal that Matt shot, but less cool?
  6. Our 2025 goals, describing word.
  7. Anagram of beer improvement mineral.
  8. An ugly truck, per Matt and Haley’s standards.
  9. Nick’s favorite alcoholic beverage.
  10. Found in L10 meetings and outside.
  11. Enriching lives and providing solutions.
Down
  1. Source of fun/frustration daily.
  2. Beer improvement mineral.
  3. Throw this and make money? Or put it in beer.
  4. Distilled spirit preferred by Beckie.
  5. Wee Matt’s dream car color.
  6. The dirty in a gin and tonic.
  7. SAP’s cousin?
  8. Daily hydration frequented by Matt.
  9. Justin’s drink of choice.
  10. A useless and ugly truck.
  11. Haley’s wine preference.

22 Clues: SAP’s cousin?An even uglier truck.Haley’s wine preference.Beer improvement mineral.Justin’s drink of choice.A useless and ugly truck.Wee Matt’s dream car color.The dirty in a gin and tonic.Source of fun/frustration daily.Nick’s L10 doodles topic, often.Our 2025 goals, describing word.Found in L10 meetings and outside....

Mortal Kombat Kharacters 2025-07-15

Mortal Kombat Kharacters crossword puzzle
Across
  1. Geomancer
  2. General or Kahn
  3. Kytinn
  4. Clone of Kitana
  5. Kang Earthrealm’s Champion
  6. Ketchup
  7. God of Wind
  8. Formerly known as Tundra, now Sub Zero (Or Scorpion)
  9. Mustard
  10. Grandmaster of the Lin Kuei
  11. Hat Man
  12. Sindel’s daughter
  13. Hydromancer and Half God
Down
  1. Special Forces
  2. The ancestors of Kenshi possess this sword
  3. Cyber Lin Kuei Cryomancer
  4. Clan of Scorpion
  5. Shang Tsung’s former slave, now fights for earthrealm
  6. Cryomancer of the Lin Kuei Clan
  7. We are Many
  8. Empress of Outworld/Edenia
  9. Speedy
  10. Ninja Mime Star
  11. Where there is fire, there is…
  12. God of Thunder and Lightning
  13. Aussie
  14. Sorcerer or Souls
  15. Son of Kenshi, Raised by Hanzo (Or Kenshi’s Cousin)
  16. Netherrealm sorcerer

29 Clues: KytinnSpeedyAussieKetchupMustardHat ManGeomancerWe are ManyGod of WindSpecial ForcesGeneral or KahnClone of KitanaNinja Mime StarClan of ScorpionSorcerer or SoulsSindel’s daughterNetherrealm sorcererHydromancer and Half GodCyber Lin Kuei CryomancerKang Earthrealm’s ChampionEmpress of Outworld/EdeniaGrandmaster of the Lin Kuei...

crimes against people and property crossword 2016-11-15

crimes against people and property crossword crossword puzzle
Across
  1. lying in court
  2. punishment as a threat to deter people
  3. crime crimes happening on the internet
  4. returning stolen property to the right owner
  5. destruction of property
  6. crime a crime motivated by racial, sexual, or other prejudice, typically one involving violence.
  7. physically beating someone up
  8. killing someone
  9. taking someone's money
  10. process of helping someone
  11. theft or misappropriation of funds placed in one's trust
Down
  1. breaking into someone's house intending to commit a crime
  2. stealing property from someone
  3. punishment inflicted on a criminal
  4. unlawful killing of someone
  5. sentencing someone into jail
  6. taking money from someones with threats
  7. setting fire to someone's house
  8. stealing someone's property

19 Clues: lying in courtkilling someonetaking someone's moneydestruction of propertyprocess of helping someoneunlawful killing of someonestealing someone's propertysentencing someone into jailphysically beating someone upstealing property from someonesetting fire to someone's housepunishment inflicted on a criminalpunishment as a threat to deter people...

Reactions Summer 2019 2019-07-03

Reactions Summer 2019 crossword puzzle
Across
  1. Abbreviation for Latin America market
  2. South America’s largest insurance market
  3. AIG's top executive
  4. Bermuda's Current Premier
  5. A word for the emergence of new technologies in insurance
  6. SCOR Global P&C CEO
  7. Insures the risks of its owners
  8. Risk forecasters
  9. No. 1 domicile for healthcare captives
  10. Refreshing summer drink; insurance disruptor
  11. Insurance market that protects against online threats
Down
  1. The type of insurance that protects against natural disasters
  2. London market initiative
  3. Where an insurance business is located
  4. Leading US domicile for captives
  5. Some say this new tech is “off the chain”
  6. Consortium of US insurance regulators
  7. Cover for reinsurers, or a throwback
  8. The world’s largest specialist insurance market

19 Clues: Risk forecastersAIG's top executiveSCOR Global P&C CEOLondon market initiativeBermuda's Current PremierInsures the risks of its ownersLeading US domicile for captivesCover for reinsurers, or a throwbackAbbreviation for Latin America marketConsortium of US insurance regulatorsWhere an insurance business is located...

Legislative Authority 2015-09-17

Legislative Authority crossword puzzle
Across
  1. This section of the Charter speaks to the security against cruel and unusual treatment.
  2. As mobility of citizens may be impacted by a criminal charge, it is essential that any rights afforded under the Charter are not ____________.
  3. (2 wds) Per section 9 of the Charter, the security against __________ ________ or imprisonment applies by permitting an individual who is not under arrest/detention their right to leave.
  4. (3 wds) CEA is the acronym for ______ ________ ___.
  5. This section of the CEA provides for business records made in the ordinary course of business to be admitted as evidence.
Down
  1. (2 wds) Section 13 of the Charter speaks to the security against ____ _____________.
  2. (2wds, plural) CBSA investigators are _____ ________ for the purpose of administering and enforcing the CA and the IRPA as defined by s. 2 of the CC.
  3. When you are identifying witnesses to present evidence, you must ensure they are both competent and ___________.
  4. (an acronym) The ____ retains responsibility for investigating IRPA offences linked to human trafficking, risks to national security, and organized crime.
  5. This section of the Charter states that on arrest/detention, the person must be made aware of the reasons, be able to retain counsel (and advised of that right), and have the validity determined by courts.
  6. (2 wds) Section 11 of the CA provides authority to a justice of the peace to issue a ______ _______.
  7. (plural) Per section 7 of the Charter, life, liberty and security of person does not apply to ____________ or other artificial entities incapable of enjoying life, liberty or security of the person.

12 Clues: (3 wds) CEA is the acronym for ______ ________ ___.(2 wds) Section 13 of the Charter speaks to the security against ____ _____________.This section of the Charter speaks to the security against cruel and unusual treatment.(2 wds) Section 11 of the CA provides authority to a justice of the peace to issue a ______ _______....

test 2013-01-13

test crossword puzzle
Across
  1. / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
  2. / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
  3. / Granted permanent membership into the Security Council in 1971
  4. / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire
  5. How many months do members take turns at holding the presidency of the Security Council
Down
  1. / Number of members in the Security Council
  2. / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
  3. In 2003, the United Nations Security Council was involved in a crisis that happened in Sudan. The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
  4. / Location where the first Security Council session took place on 17 January 1946
  5. / Privilege of the permanent members: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
  6. / The country Britain and France join forces with to invade Egypt in 1956 during the Suez Canal crisis.

11 Clues: / Number of members in the Security Council/ Granted permanent membership into the Security Council in 1971/ Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire/ Location where the first Security Council session took place on 17 January 1946How many months do members take turns at holding the presidency of the Security Council...

Financial Fundamentals 2023-05-24

Financial Fundamentals crossword puzzle
Across
  1. - any additional cost charged on top of an asset's usual cost.
  2. - A ______ employee benefit that commits the employer to make regular contributions to a pool of money set aside to fund payments made to eligible employees after they retire.
  3. – insures bank deposits
  4. - the relationship between the amount received and cost of investment
  5. - A ______ union is a nonprofit financial institution that’s owned by the people who use its financial products.
  6. - A _______ market is the location where buyers and sellers of financial products meet to conduct business.
  7. - something a person or company owes, usually a sum of money.
  8. - a wide array of investments, such as stocks, bonds, and notes.
  9. - anything that has current or future economic value to a business
  10. - the total amount of money brought in by a company's operations
  11. – Regulate banks
  12. - A security representing ownership in a corporation
Down
  1. - How easy it is to turn an asset or investment into cash
  2. _ The ______ supply is the amount of money in circulation in the economy
  3. - A rise in the general level of prices
  4. - A ______ project is a long-term, capital-intensive investment to build upon, add to, or improve a capital asset
  5. - Default, Taxes, Political, and Economic change in conditions.
  6. - to get loans in exchange for collateral.
  7. - a measure of the average change in prices over time in a fixed market basket of goods and services
  8. - a spending plan for your business based on your income and expenses
  9. - A security representing a loan issued by a business or government
  10. - the failure to make required interest or principal repayments on a debt, whether that debt is a loan or a security
  11. - Regulates stock markets

23 Clues: – Regulate banks– insures bank deposits- Regulates stock markets- A rise in the general level of prices- to get loans in exchange for collateral.- A security representing ownership in a corporation- How easy it is to turn an asset or investment into cash- something a person or company owes, usually a sum of money....

Plural Policing 2018-10-29

Plural Policing crossword puzzle
Across
  1. Surname of the current Chief of the Secret Intelligence Service
  2. Acronym for Scottish Environmental Protection Agency
  3. The first Neighbourhood Watch scheme - then known as Home Watch - was set up in the UK in in which Chesire town in 1982?
  4. Surname of “Johnathon” on NCA most wanted list
  5. 8% of G4S employees are employed in this continent
  6. The article ‘Pluralisation of policing in England & Wales and the Netherlands: exploring similarity and difference’ (2009) was written by Jones, van Steden and which other author (surname)?
  7. NCA Board Meeting on 23 August 2018 met in this city
  8. In their 2002 article Mark Button and Tim John considered the plural policing of what kind of protest?
  9. According to Atkinson (2018) how many ‘key operational partners’ are based at the Scottish Crime Campus?
  10. The first Neighbourhood Watch schemes were set up in New York in 1964 as a response to a murder. What was the surname of the victim?
  11. Acronym for British Security Industry Authority
Down
  1. Missing word - MI5 is the common name for the UK “?” Service
  2. 22% of G4S employees are employed in this continent
  3. Surname of the current Director General of the Security Service
  4. Missing word – MI6 is the common name for the Secret “?” Service
  5. Missing word - SEPA is the Scottish Environmental “?” Agency
  6. G4S had a contract to deliver security at this event in London in 2012
  7. According to Atkinson (2018) beyond the ‘key operational partners’ how many other agencies have a presence at the Scottish Crime Campus?
  8. Missing word - HMRC is Her Majesty’s Revenue and “?”
  9. Missing word - The NCA stands for the National “?" Agency
  10. The Scottish Crime Campus is located in this town

21 Clues: Surname of “Johnathon” on NCA most wanted listAcronym for British Security Industry AuthorityThe Scottish Crime Campus is located in this town8% of G4S employees are employed in this continent22% of G4S employees are employed in this continentAcronym for Scottish Environmental Protection AgencyNCA Board Meeting on 23 August 2018 met in this city...

15.1 Crossword 2024-05-08

15.1 Crossword crossword puzzle
Across
  1. money is used in exchange for goods and services needed by individuals, businesses, and government
  2. concept that money received today is worth more than the same amount received in the future
  3. mechanism a nation uses to provide and manage money for itself.
  4. to make purchases people must be able to carry money with them
  5. allows customer to pay for purchases directly from their checking amount
  6. to exchange one good or service for another good or service
  7. mean that money is a common measure of the worth or price of a good or service
  8. a security that pays interest over terms ranging from two to ten years
  9. plastic card that allows the holder to make credit purchases up to an authorized amount
  10. anything of value that is accepted in return for goods or service
Down
  1. there must be a way to divide money into smaller units
  2. which means it can be saved and used at a later date
  3. is the process of transferring money from one individual or organization to another
  4. money must maintain its value over time in order for it to be widely accepted
  5. to be accepted, authentic money must be immediately recognizable
  6. a security that matures in a year or less
  7. type of financial investment issued by a corporation, government, or other organization
  8. type of a document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
  9. a security that pays interest over terms of ten to thirty years
  10. a transfer of money from one bank account to another
  11. money is handled many time by many people. It needs to be strong
  12. made up with paper money and coins

22 Clues: made up with paper money and coinsa security that matures in a year or lesswhich means it can be saved and used at a later datea transfer of money from one bank account to anotherthere must be a way to divide money into smaller unitsto exchange one good or service for another good or service...

exam 2025-11-10

exam crossword puzzle
Across
  1. The main circuit board that connects all components of a computer.
  2. The abbreviation for the security measure where more than one verification method is used to access a system.
  3. Type of software that allows the operating system to communicate with and control hardware components.
  4. This abbreviation is used for the type of highspeed, temporary memory used for processing tasks.
  5. The practice that guarantees that authorized users have access to information and systems when needed.
  6. Protection of information systems from theft, damage, or disruption.
  7. The process of converting data into a code to prevent unauthorized access.
  8. key, A cryptographic key used in asymmetric encryption that must be kept secret.
  9. An electronic device that processes data according to instructions.
  10. The study and practice of securing communication through encoding techniques.
Down
  1. Malicious software designed to damage or gain unauthorized access to systems.
  2. The practice that ensures information is secret, secure and accessible only to those authorized to have access.
  3. The abbreviation for the security measure that encrypts internet connections for secure data transmission over a public network.
  4. Type of software programmed into read-only memory to provide low-level instructions that control hardware devices.
  5. The practice that assures that data is accurate and has not been altered or tampered with.
  6. This abbreviation is used for the specialized processor that handles rendering of images, video and animation.
  7. point, A device that allows wireless devices to connect to a wired network.
  8. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  9. The physical or logical arrangement of network devices and connections.
  10. A security test used to verify that a user is human and not a bot.

20 Clues: The main circuit board that connects all components of a computer.A security test used to verify that a user is human and not a bot.An electronic device that processes data according to instructions.Protection of information systems from theft, damage, or disruption.The physical or logical arrangement of network devices and connections....

CISO Crossword Quiz - 2125 2025-07-10

CISO Crossword Quiz - 2125 crossword puzzle
Across
  1. Cyber fraud where scammers pretend to be from banks or government agencies make phone calls to steal personal information
  2. Term used to refers protection of devices like laptops, smartphones, and desktops from cyber threats when they connect to a network?
  3. What feature locks a device automatically after a period of inactivity to prevent unauthorized access?
  4. A malicious software designed to damage or gain unauthorized access to systems?
Down
  1. What kind of app promises quick money but ends up stealing users’ data and blackmailing them?
  2. Scam where victims receive fake calls impersonating Law Enforcement Agencies like police, CBI etc. claiming an online arrest warrant?
  3. Terms used for AI-generated fake videos or audios which are used to impersonate people for fraud or defamation?
  4. What is the term for an unofficial Android app that mimics a real one but is actually malware?
  5. What scam involves fraudsters pretending to be delivery personnel and claiming illegal items have been sent in your name?
  6. What feature allows erasing all data from a lost or stolen device remotely?

10 Clues: What feature allows erasing all data from a lost or stolen device remotely?A malicious software designed to damage or gain unauthorized access to systems?What kind of app promises quick money but ends up stealing users’ data and blackmailing them?What is the term for an unofficial Android app that mimics a real one but is actually malware?...

CISO Crossword Quiz - 2125 2025-07-10

CISO Crossword Quiz - 2125 crossword puzzle
Across
  1. Cyber fraud where scammers pretend to be from banks or government agencies make phone calls to steal personal information?
  2. A Term which refers protection of devices like laptops, smartphones, and desktops from cyber threats when they connect to a network?
  3. What feature locks a device automatically after a period of inactivity to prevent unauthorized access?
  4. A malicious software designed to damage or gain unauthorized access to systems?
Down
  1. What kind of app promises quick money but ends up stealing users’ data and blackmailing them?
  2. Scam where victims receive fake calls impersonating Law Enforcement Agencies like police, CBI etc. claiming an online arrest warrant?
  3. Terms used for AI-generated fake videos or audios which are used to impersonate people for fraud or defamation?
  4. What is the term for an unofficial Android app that mimics a real one but is actually a malware?
  5. What scam involves fraudsters pretending to be delivery personnel and claiming illegal items have been sent in your name?
  6. What feature allows erasing all data from a lost or stolen device remotely?

10 Clues: What feature allows erasing all data from a lost or stolen device remotely?A malicious software designed to damage or gain unauthorized access to systems?What kind of app promises quick money but ends up stealing users’ data and blackmailing them?What is the term for an unofficial Android app that mimics a real one but is actually a malware?...

Black Friday 2025-11-19

Black Friday crossword puzzle
Across
  1. ; A good offer or a good price.
  2. ; Full of people.
  3. ; A time when things are cheaper.
  4. ; A person who buys something.
  5. ; Something that does not cost a lot of money.
  6. ; A group of people waiting.
Down
  1. Something that costs a lot of money.
  2. ; A price reduction.
  3. ; A place where you can buy things.
  4. Monday ; The online shopping day after Black Friday.
  5. mall ; A big building with many stores.

11 Clues: ; Full of people.; A price reduction.; A group of people waiting.; A person who buys something.; A good offer or a good price.; A time when things are cheaper.; A place where you can buy things.Something that costs a lot of money.mall ; A big building with many stores.; Something that does not cost a lot of money....

Chapters 1 & 2 2014-01-30

Chapters 1 & 2 crossword puzzle
Across
  1. this type of attack can compromise the security goal of availability
  2. type of firewall that protects an individual computer
  3. allows a remote attacker to connect to your system via the network
  4. a false alert from an IDS
  5. helps achieve the security goal of confidentiality
  6. an individual computer that is part of a botnet
  7. an intrusion detection system that monitors an individual computer
  8. malware that self-replicates
  9. software used for whole disk encryption
  10. a popular RAT (remote access trojan)
Down
  1. an intrusion detection system that monitors network traffic
  2. An NIDS based on this looks for specific traffic in packet captures
  3. should be set first in the BIOS boot order
  4. This virus changes itself in order to thwart anti-virus detection
  5. software that activates malware when certain conditions occur
  6. tool that can show your computer's network connections
  7. This virus uses stealth techniques in an attempt to thwart malware analysts
  8. this malware is capable of hiding files, processes, and user accounts from system administrators
  9. a network of compromised computers controlled by an attacker
  10. helps achieve the security goal of integrity
  11. a type of canned meat or an unwanted email

21 Clues: a false alert from an IDSmalware that self-replicatesa popular RAT (remote access trojan)software used for whole disk encryptionshould be set first in the BIOS boot ordera type of canned meat or an unwanted emailhelps achieve the security goal of integrityan individual computer that is part of a botnet...

KCPC 2nd Shift 2022-07-12

KCPC 2nd Shift crossword puzzle
Across
  1. All patients are counted inside their living unit room by seeing patient's body and/or
  2. recent serious suicide attempt
  3. This shall be conducted in the same manner as above, when the Shift Supervisor orders
  4. patient remains in the defensive level
  5. Harm – the act of inflicting physical harm on one’s self
  6. patient voluntarily retreats to their room
  7. to the units relevant to updated severe weather conditions. In the event of severe
  8. staff shall accompany maintenance inmates at all times.
  9. schedule of Count
  10. mechanical device used to unlock handcuffs
Down
  1. Security assisted force treat
  2. moderate risk
  3. The 5A officer shall supervise the serving of all
  4. the following procedures shall be followed.
  5. When a patient leaves the facility for court, hospital, etc., and does not return prior to
  6. The KCPC Captains’ Office shall be responsible for listening to weather broadcasts to provide
  7. the expression of unfriendliness or aggression in action, feeling, or attitude
  8. Security count is taken by a Shift Supervisor, the Director of Security or designee
  9. time, they are placed on outcount
  10. count, or the count does not clear
  11. may be utilized only in an emergency
  12. Is an emergency requiring additional staff

22 Clues: moderate riskschedule of CountSecurity assisted force treatrecent serious suicide attempttime, they are placed on outcountcount, or the count does not clearmay be utilized only in an emergencypatient remains in the defensive levelpatient voluntarily retreats to their roomIs an emergency requiring additional staff...

investing - auroaru bosecker 2025-03-24

investing - auroaru bosecker crossword puzzle
Across
  1. investing all money at a given time
  2. social security and medicare taxes
  3. traditional or roth
  4. a system of recording information in a way that makes it difficult or impossible to hack ect
  5. never lose money
  6. never forget rule # 1
  7. the increase in value when you sell an asset for more then you bough it
  8. Take the contributions of fund investors and purchase a portfolio
  9. INVOLVES ASSETS LIKE STOCKS AND BONDS
  10. how you need to be to invest in crypto
  11. MEANT FOR SHORT TERM GOALS
  12. ownership of a fraction of a company
Down
  1. a strategy in which you invest your money in equal amounts, at regular intervals
  2. age to receive full social security benefits
  3. stock prices are raising
  4. CEO of berkshire hathaway
  5. a high risk investment
  6. the availability of cash or the ese which an asset can be converted into cash
  7. the total value of company’s stock
  8. someone who bys and sells stocks quickly
  9. security created by president roosevelt in 1935
  10. stocks prices are decline
  11. a sum of money made available for particular purpose
  12. managed by your employer
  13. someone who holds stocks for the long term

25 Clues: never lose moneytraditional or rothnever forget rule # 1a high risk investmentstock prices are raisingmanaged by your employerCEO of berkshire hathawaystocks prices are declineMEANT FOR SHORT TERM GOALSsocial security and medicare taxesthe total value of company’s stockinvesting all money at a given timeownership of a fraction of a company...

INF201 Crossword 2025-05-15

INF201 Crossword crossword puzzle
Across
  1. Understanding the cause and scope of an incident
  2. A memory overwrite caused by excessive data input
  3. Isolating affected systems to prevent spread
  4. Cross-functional groups coordinating governance activities
  5. First phase in incident response: planning and readiness
  6. VPN mode used for host-to-host connections
  7. Risk strategy that reduces impact or likelihood
  8. Identifying potential security incidents promptly
  9. Abbreviation for attack where communication is intercepted and altered
  10. Creates a secure tunnel over public networks
  11. What your business loses when public trust is damaged
Down
  1. Internal secure gateway for accessing internal systems
  2. A hardened public-facing system used for secure remote access
  3. Security device that protects web applications from attacks like XSS and SQLi
  4. Risk strategy that eliminates the source of risk entirely
  5. Risk strategy that shifts responsibility to a third party
  6. Risk strategy that takes no action because the risk is tolerable
  7. Restoring normal operations after an incident
  8. Following laws, standards, and internal policies
  9. Removing the threat and fixing vulnerabilities
  10. Database attack that exploits misconfigured input validation
  11. VPN mode used for site-to-site connections
  12. Governance structure that sets strategic security direction

23 Clues: VPN mode used for host-to-host connectionsVPN mode used for site-to-site connectionsIsolating affected systems to prevent spreadCreates a secure tunnel over public networksRestoring normal operations after an incidentRemoving the threat and fixing vulnerabilitiesRisk strategy that reduces impact or likelihood...

LOL MIS REED :D 2025-12-09

LOL MIS REED :D crossword puzzle
Across
  1. truck
  2. sled
  3. lip
Down
  1. clothes
  2. road

5 Clues: liproadsledtruckclothes

Know Your Facility 2025-12-12

Know Your Facility crossword puzzle
Across
  1. Power for the Meta Data Centers really begins here.
  2. Begins with Ultraviolet light filters and is then pumped to the outside cold water storage tanks.
  3. A highly restricted area within the DC as the servers within this location hold user financial information.
  4. Area where equipment is shipped and received.
  5. Contain the cooling systems in place for your DC that help keep the data halls cool and at the optimum temperature.
  6. A private, suite-style space provided in Meta offices for breastfeeding or pumping in comfort and privacy.
  7. A physical location where security operations are monitored and managed.
  8. A dedicated space within a building that houses the fire riser and associated fire suppression system equipment, such as valves, pipes, and sometimes nitrogen generators or compressors.
Down
  1. Has the capacity to hold up to 1,152 Rack Positions.
  2. A highly secure, restricted-access area within Meta data centers dedicated to the physical destruction and secure handling of storage media (such as hard drives and SSDs) to ensure data security.
  3. Helps to keep the DC building cool and provide the air conditioning portion of the Heating, ventilation, and Air Conditioning (HVAC) system.
  4. A designated space within a facility—such as a data center or office—where security staff gather to get pass down information from the previous shift supervisor.
  5. Where emergency backup power runs from in case of a power outage.
  6. The main entrance or reception area of a Meta office or data center, where visitors and employees check in, receive badges, and are greeted by security or reception staff.
  7. The main communications distribution center.
  8. The security checkpoint or building at the entrance of a Meta facility—especially at data centers—where all visitors and personnel must check in before being allowed further access.
  9. The access points for communications to enter and exit the data center.

17 Clues: The main communications distribution center.Area where equipment is shipped and received.Power for the Meta Data Centers really begins here.Has the capacity to hold up to 1,152 Rack Positions.Where emergency backup power runs from in case of a power outage.The access points for communications to enter and exit the data center....

Crossword 1 2014-12-26

Crossword 1 crossword puzzle
Across
  1. Type D fires are fueled by __________ metals.
  2. We can protect information by protecting computer screens from __________ eyes.
  3. CDT means __________, direction and take down.
  4. Patrick Shand was arrested for __________ baby food.
  5. Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
  6. One of the recommendations from the Patrick Shand case was __________ licensing.
  7. The basic security role is to protect people, property and __________.
  8. Post orders are often called __________ orders.
  9. When taking a witness statement, the facts should be in __________ order.
  10. An arrest is defined as getting control of someone with intent to __________.
  11. Every province has its own human rights __________.
  12. You will need a security licence to work in loss __________.
  13. The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
  14. A positive attitude and being respectful are __________ qualities.
Down
  1. Type B fires are fueled by __________ liquids.
  2. When handling evidence, you should wear gloves to avoid __________.
  3. If a crowd seems to be getting out of control, __________ from any communication.
  4. Only the __________ government can create indictable offences.
  5. “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
  6. It is the responsibility of every security guard to be aware of __________ materials on the work site.
  7. One reason that we patrol is to deter people from __________ acts.
  8. Designing the environment to reduce the possibility of crime is called?
  9. When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
  10. The basic security role is implemented by observing, reporting, __________ and deterring.
  11. When securing a crime scene, make note of any __________ conditions.

25 Clues: Type D fires are fueled by __________ metals.Type B fires are fueled by __________ liquids.CDT means __________, direction and take down.Post orders are often called __________ orders.Every province has its own human rights __________.Patrick Shand was arrested for __________ baby food.You will need a security licence to work in loss __________....