cyber security Crossword Puzzles
cyber bullying 2021-09-17
Across
- we ALL have experience with this event hint covid
- it is the thing we are doing this about
- showing still things to imbrues people
- giving people soping that means they can take your stuff or look trough their history
Down
- a game with toxic people that will cus at u and they have a ninja
- places with people faking there appearance
- a mobile divice that people use for cyberbulling that can fit in your pocket
- jack has had an experience on it
- it is a popular social media with a toxic environment start with a t t
9 Clues: jack has had an experience on it • showing still things to imbrues people • it is the thing we are doing this about • places with people faking there appearance • we ALL have experience with this event hint covid • a game with toxic people that will cus at u and they have a ninja • it is a popular social media with a toxic environment start with a t t • ...
Cyber Crimes 2017-04-16
Across
- The largest social network in the world, founded by Mark Zuckerberg
- conditional word or set of characters
- breaking the law (adjective)
- type of malicious software that can make copies of itself and infect other programs code
Down
- place where information on the Internet is lokated
- specialist in programming
- machine Automatic machine for receiving cash on a credit plastic card
- type of address on which content is located
- computer burglar
9 Clues: computer burglar • specialist in programming • breaking the law (adjective) • conditional word or set of characters • type of address on which content is located • place where information on the Internet is lokated • The largest social network in the world, founded by Mark Zuckerberg • machine Automatic machine for receiving cash on a credit plastic card • ...
cyber bullying 2019-07-12
9 Clues: a media • a group • not offline • seek to harm • not very well • opposite to kind • killing yourself • always texting you • makes you go red and want to cry
CYBER HYGΙΕΝΕ 2023-12-09
Across
- Έλεγχος .....δύο παραγόντων
- Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing)
- ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ
- Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης
Down
- Μπορεί να είναι και ηλεκτρονική
- Τι σημαίνει cyber hygiene?
- Λογισμικό για να είναι ασφαλής ο υπολογιστής μας
- ...(virus)ένα πρόγραμμα που εισβάλλει στον υπολογιστή μας με ανεπιθύμητες παρενέργειες
- Προσπάθεια για .... κωδικών πρόσβασης
9 Clues: Τι σημαίνει cyber hygiene? • Έλεγχος .....δύο παραγόντων • Μπορεί να είναι και ηλεκτρονική • Προσπάθεια για .... κωδικών πρόσβασης • Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing) • Λογισμικό για να είναι ασφαλής ο υπολογιστής μας • ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ • Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης • ...
Cyber Crime 2024-03-22
Across
- Sending nasty messages online to get a reaction
- Repeatedly bothering or scaring someone online
- Using internet, devices, electronics to bully someone.
Down
- Software that can harm your computer
- Prenteding to be a genuine website/ source in an email to steal information
- Stealing someone's personal information online
- Trying to trick someone out of money
- Breaking into a computer system
- Pretending o be someone else online to trick you.
9 Clues: Breaking into a computer system • Software that can harm your computer • Trying to trick someone out of money • Stealing someone's personal information online • Repeatedly bothering or scaring someone online • Sending nasty messages online to get a reaction • Pretending o be someone else online to trick you. • Using internet, devices, electronics to bully someone. • ...
Cyber Crosswords 2024-06-19
Across
- A secret word or phrase used to gain access to a computer system (8 letters)
- A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- Software that is designed to detect and destroy computer viruses (9 letters)
- The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- Unsolicited email, often used for advertising or phishing (4 letters)
9 Clues: Unsolicited email, often used for advertising or phishing (4 letters) • Software that is designed to detect and destroy computer viruses (9 letters) • A secret word or phrase used to gain access to a computer system (8 letters) • The practice of protecting systems, networks, and programs from digital attacks (10 letters) • ...
Cyber Quiz 2024-08-29
Across
- Attack involving the use of Malicious Software
- Process of Verifying Identity
- Secure connection Protocol
- Communicating devices in a network
Down
- Software that protects against malware
- Method use to protect/Hide information
- A method use to protect integrity of a data
- A network security devices
- Threat that involves fraudulent emails
9 Clues: A network security devices • Secure connection Protocol • Process of Verifying Identity • Communicating devices in a network • Software that protects against malware • Method use to protect/Hide information • Threat that involves fraudulent emails • A method use to protect integrity of a data • Attack involving the use of Malicious Software
Cyber Safety 2024-10-03
Across
- a type of malicious software that finds weak spots in different apps and slides its way into your information
- a device similar to number 4 that you can play mobile games on
- an app the has the symbol of a ghost on its logo
- a device I can do my homework on
- a type of computer malicious software that takes over a device potentially locking yourself out of your device
Down
- a device where you can call your friends on facetime
- malicious software
- an app that has the letter F on its logo (this app has had a cyber attack before)
- sending emails with links hoping to gain peoples passwords
9 Clues: malicious software • a device I can do my homework on • an app the has the symbol of a ghost on its logo • a device where you can call your friends on facetime • sending emails with links hoping to gain peoples passwords • a device similar to number 4 that you can play mobile games on • ...
Cyber monday 2024-11-28
9 Clues: THE COST OF AN ITEM • TO BUY SOMETHING ONLINE • ITEMS AVAILABLE FOR SALE • WHAT YOU BUY FOR SOMEONE ELSE • A COLLECTION OF THINGS TO BUY • WHAT YOU DO TO LOOK FOR ITEMS • WHAT YOU DO WITH MONEY ONLINE • WHERE YOU RECEIVE PROMO CODES • A SHORTENED TERM FOR PROMOTION
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Cyber Hunt 2025-09-30
Across
- A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
- MALICIOUS SOFTWARE
- WEAKNESS OF A SYSTEM
- A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW
- THE STATE OF KEEPING SECRET
Down
- THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT
- VERIFYING SOMEONE'S IDENTITY IS VALID
- POTENTIAL RISK
- A TYPE OF MALWARE THAT SPREADS BY ITSELF
9 Clues: POTENTIAL RISK • MALICIOUS SOFTWARE • WEAKNESS OF A SYSTEM • THE STATE OF KEEPING SECRET • VERIFYING SOMEONE'S IDENTITY IS VALID • A TYPE OF MALWARE THAT SPREADS BY ITSELF • A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW • THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT • A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
psychomotoricke zrucnosti 2021-02-24
Across
- Name of a modification that is not performed via the application business user interface
- Strategic Access Management tool
- Second goal of IT security
- Third goal of IT security
- Corporate .... Deviation (CDD)
- The second step in risk management process
- Chapter 8 of ASCA Procedure Manual
- What document helps you to check whether you are compliant with our security standard
- Opposite of DAST
- Corporate instruction covering IBM Worldwide records management
- Name of the tool that replaced WST
- Standard describing requirements on IT Business Continuity
- Standard that describes therisk severity guidelines
- To what data types LEG116 applies
- The first step in risk management process
Down
- What is CHS162 applied for
- What does ASCA stand for
- First element of risk
- Where the deviations are maintained
- Other word for separation in Separation of duties
- Where can you read through BPBC127? Where is it located?
- Third element of risk
- Standard that ASCA is driven by
- Where the DSR requests are handled
- California .... Privacy Act
- Name of the new privacy tool
- Who do you need confirmation from whether your application processes crown jewel data
- Corporate instruction for registration criteria
28 Clues: Opposite of DAST • First element of risk • Third element of risk • What does ASCA stand for • Third goal of IT security • What is CHS162 applied for • Second goal of IT security • California .... Privacy Act • Name of the new privacy tool • Corporate .... Deviation (CDD) • Standard that ASCA is driven by • Strategic Access Management tool • To what data types LEG116 applies • ...
Crossword 2024-06-27
Across
- Extortion software locking access until a ransom is paid.
- Notification signaling an impending or current security threat.
- Control Mechanism governing resource visibility and usage permissions.
- Sniffing Analysis technique for capturing and inspecting network traffic.
- Exit or departure point from a system or network.
- Entity opposing or competing against one's security measures.
- Detection Systematic monitoring for suspicious network activities indicating potential threats.
- Unpermitted access gained by following an authorized individual into a secure area.
- Decoy system designed to lure and trap attackers.
- Deviation from standard norms indicating potential security issues.
- Covert surveillance software used to secretly monitor another user's digital activities.
Down
- Deceptive program masquerading as beneficial software to compromise systems.
- Interconnected ensemble of computers facilitating communication.
- Distributed attack aimed at overwhelming network resources to cause service disruption.
- Elevation of privileges typically exploited in unauthorized access.
- Process of encoding data to prevent unauthorized access.
- Software tool leveraging system vulnerabilities for unauthorized advantage.
- Successful breach resulting in unauthorized system control.
- Unauthorized disclosure of internal data to external entities.
- Malicious software disguised as legitimate to breach defenses.
- Test Probing examination simulating cyberattacks to identify vulnerabilities.
- Secure service ensuring private internet connectivity.
- Security Safeguarding measures to prevent unauthorized network intrusions.
- Team Group conducting simulated adversary attacks to test defensive capabilities.
24 Clues: Exit or departure point from a system or network. • Decoy system designed to lure and trap attackers. • Secure service ensuring private internet connectivity. • Process of encoding data to prevent unauthorized access. • Extortion software locking access until a ransom is paid. • Successful breach resulting in unauthorized system control. • ...
The United Nations 2013-06-17
Across
- What is needed for a motion to be passed.
- Number of permanent members on the Security Council
- General Secretary of the United Nations
- Largest financial contributor to the United Nations.
- Charitable agency that particularly helps women and children
- One of the founding countries of the United Nations
Down
- Eight goals that the United Nations established.
- A proposal to be debated in the General Assembly.
- Personnel that attempt to keep peace in an area of conflict
- What the United Nations is trying to promote
- The colour that peacekeepers wear
- Document outlining the rules and role of the United Nations
- The world-wide event that prompted the formation of the United Nations.
- Number of members on the Security Council
- How long a non-permanent member of the Security council can keep their seat.
15 Clues: The colour that peacekeepers wear • General Secretary of the United Nations • What is needed for a motion to be passed. • Number of members on the Security Council • What the United Nations is trying to promote • Eight goals that the United Nations established. • A proposal to be debated in the General Assembly. • Number of permanent members on the Security Council • ...
BIDEN'S BORDER CRISIS 2022-07-07
Across
- number of times V.P. Harris has been to the border
- "________ Border Crisis"
- number of times Rep. Cammack has been to the border
- Homeland Security Secretary
- "______ 42"
- agents who deport illegal immigrants
- "Build The ______"
- nickname for those who smuggle immigrants across the border
- acronym for 'Remain In Mexico' Policy
Down
- "Every town is a _______ town."
- type of drug smuggled across border
- "__________ in Chief"
- the 'Border Czar'
- Department of _________ Security
- primary border control organization
15 Clues: "______ 42" • the 'Border Czar' • "Build The ______" • "__________ in Chief" • "________ Border Crisis" • Homeland Security Secretary • "Every town is a _______ town." • Department of _________ Security • type of drug smuggled across border • primary border control organization • agents who deport illegal immigrants • acronym for 'Remain In Mexico' Policy • ...
CSC Crossword 2021-06-09
Across
- If you hear it, _____ it
- Anaheim Angels _____
- Color of pen a security guard uses
- Used to protect your skin from the sun
- Common hair color abbreviation
- Someone leaving with a subject who is being evicted
- Observe and _____
- Verbal or physical
- OC's branch manager
- Non-guard carded staff is _____ staff
- See something, _____ something
Down
- Wash your _____frequently
- What does CP stand for
- Text _____ to 474747 to place a contactless concessions order
- _____ items include weapons, alcohol and large bags
- Required to wear a security shirt
- Common eye color abbreviation
- 7th _____ stretch
- Guests are not allowed to re-_____ the stadium
- What day is payday?
- _____board
- A13's first name
22 Clues: _____board • A13's first name • 7th _____ stretch • Observe and _____ • Verbal or physical • What day is payday? • OC's branch manager • Anaheim Angels _____ • What does CP stand for • If you hear it, _____ it • Wash your _____frequently • Common eye color abbreviation • Common hair color abbreviation • See something, _____ something • Required to wear a security shirt • ...
Digital Fortress Crossword 2012-11-19
Across
- NSA failure
- NSA motto: Everything is _________
- National Security Agency
- Outranked Strathmore; Director of NSA
- The late Tankado's father
- _______ 3; working area for the cryptographers
- Star Wars reference
- English meaning of Rocío
- Code-breaker
- Suspected murder
- Without wax
- Anagram
- Quis custodiet ipsos ________
- Late Strathmore
- Assassin
- City where Hulohot died
- What David wanted
Down
- What NSA wanted
- Elevator password
- Protagonist
- Hulohot is _____ ; disability
- Pass-key
- What would happen is Digital Fortress was released
- Midge's security
- Rotating ________ ; computer theory
- Iceberg-like machine, hacks into personal things
- Strathmore's natural trait
- The new type of virus
- TRANSLTR's safety net
29 Clues: Anagram • Pass-key • Assassin • NSA failure • Protagonist • Without wax • Code-breaker • What NSA wanted • Late Strathmore • Midge's security • Suspected murder • Elevator password • What David wanted • Star Wars reference • The new type of virus • TRANSLTR's safety net • City where Hulohot died • National Security Agency • English meaning of Rocío • The late Tankado's father • Strathmore's natural trait • ...
Impact of computing Vocabulary 2025-03-04
Across
- Rules for online behavior
- Unintended data use
- The result of encryption.
- Used to encrypt and decrypt data.
- Software that damages computers
- Data collected about you
- Unwanted email
- To convert encrypted data back to its original form.
- Code that scrambles data
- The goal of encryption.
- Automated decision making
Down
- Illegal access to computer systems
- Online identity theft
- between those who have and don't have tech access
- Protecting computer systems
- Study of ethical choices in computing
- A process used in encryption.
- The process of encoding data.
- A system or way of doing something, like encryption.
- What is protected by encryption.
- To convert data into a code.
21 Clues: Unwanted email • Unintended data use • Online identity theft • The goal of encryption. • Data collected about you • Code that scrambles data • Rules for online behavior • The result of encryption. • Automated decision making • Protecting computer systems • To convert data into a code. • A process used in encryption. • The process of encoding data. • Software that damages computers • ...
Cybersecurity CIS178 2024-07-12
Across
- Portable chip storing cellular connection
- Network Defense against unauthorized access
- Deceptive scheme to trick victims
- Fraudulent attempts to steal your data
- File or document sent electronically
- Cybercriminal skilled in breaching security
- Online content displayed in a browser
- Bad software directed at computers
- Digital Crimes committed using technology
- Developer updates to fix vulnerabilities
- Essential access code for security
Down
- Identifies you using something you are
- Affects system displaying unwanted ads
- Virus that disguises as legitimate software
- Holds data hostage for money
- Records users keystrokes to steal information
- Physical object used for authentication
- Detects and removes viruses
- Unauthorized software that gathers information
- Way to secure data trough coded algorithms
20 Clues: Detects and removes viruses • Holds data hostage for money • Deceptive scheme to trick victims • Bad software directed at computers • Essential access code for security • File or document sent electronically • Online content displayed in a browser • Identifies you using something you are • Affects system displaying unwanted ads • Fraudulent attempts to steal your data • ...
Rubrik 2024-11-06
Across
- Sucks according to reddit
- He's him
- Dad
- SLED team name for October
- OCD
- Ancient
- Backups that cannot be deleted or changed
- Sparty
- Feature that scans for sensitive data
- Rubrik HQ
- Approach to security that trusts no system or person
- Worst city in the USA - see 4 down
Down
- Concussed
- Hates onions
- Worst team in the NFL
- Just married
- The ability to restore with a single button press
- Father of 9
- Your social security number is classified as this data type
- Badger
- Rubrik partner that has a shared responsibility model
- Company featured in Rubrik's most famous customer story
- Can be logical or physical
23 Clues: Dad • OCD • Badger • Sparty • Ancient • He's him • Concussed • Rubrik HQ • Father of 9 • Hates onions • Just married • Worst team in the NFL • Sucks according to reddit • SLED team name for October • Can be logical or physical • Worst city in the USA - see 4 down • Feature that scans for sensitive data • Backups that cannot be deleted or changed • The ability to restore with a single button press • ...
Root Word List 2 Crossword Puzzle 2016-09-21
Across
- Someone that carries bags
- In charge, has the final say on anything
- Easily liked by a lot of people
- A machine used in farming
- Easily moved from place to place
Down
- shows a moving picture than can be saved in cyber space
- Grabbing a hold onto something
- A form of connection
- A person walking along a road
- A specific style
- A unit of measurement
- To turn from one thing into another
12 Clues: A specific style • A form of connection • A unit of measurement • Someone that carries bags • A machine used in farming • A person walking along a road • Grabbing a hold onto something • Easily liked by a lot of people • Easily moved from place to place • To turn from one thing into another • In charge, has the final say on anything • ...
COMPUTER SCIENCE KEY WORDS 2025-10-09
Across
- a network built of networks
- portable computer
- facility allowing portable devices to connect to the internet
- a software application for looking at websites
- a service on the internet
- fake Wi-Fi network used to steal data
Down
- the way data is transferred through devices
- devices connected for communication
- a set of rules on how to communicate
- a website that will show links
- a remote computer that has a website
- a cyber crime
12 Clues: a cyber crime • portable computer • a service on the internet • a network built of networks • a website that will show links • devices connected for communication • a set of rules on how to communicate • a remote computer that has a website • fake Wi-Fi network used to steal data • the way data is transferred through devices • a software application for looking at websites • ...
Human rights 2022-11-07
23 Clues: køn • liv • tro • lov • tale • alder • lighed • frihed • tortur • lighed • slaveri • skyldig • religion • menneske • privatliv • bevægelse • udtagelse • sikkerhed • sikkerhed • realationer • rettigheder • nationalitet • forskellsbehandling
Ch. 9 (Plazas) viajar en avion 2019-01-22
20 Clues: seat • trip • plane • agency • aduana • ticket • flight • pasillo • arrival • equipaje • security • schedule • suitcase • to travel • departure • passenger • asistente • aerolínea • airplane window • sin _______ (stop)
Spanish Vocabulary 2023-04-26
20 Clues: gum • sun • boat • candy • cloud • train • skier • shade • plain • energy • avocado • airport • baggage • weather • snorkle • to fish • to board • security • suitcase • butterfly
CHS 2017-02-08
20 Clues: one • two • ten • six • nine • four • five • seven • three • eight • twelve • eleven • twenty • sixteen • fifteen • fourteen • eighteen • thirteen • nineteen • seventeen
At the airport 2023-08-15
20 Clues: tull • pass • säten • pilot • bagage • avgång • bording • ankomst • personal • mittgång • resväska • flygplan • säkerhet • flygkabin • Flygplats • Nödutgång • bagagevagn • förarkabin • passagerare • säkerhetsbälte
Human Rights 2025-07-17
20 Clues: – qonun • – ta’lim • – himoya • – adolat • – hurmat • – qonuniy • – tenglik • – ozodlik • – buzilish • – huquqlar • – erkinlik • – kamsitish • – xavfsizlik • – zo‘ravonlik • – demokratiya • – qadr-qimmat • – qadriyatlar • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
Human Rights 2025-07-26
20 Clues: – qonun • – adolat • – himoya • – hurmat • – ta’lim • – ozodlik • – qonuniy • – tenglik • – erkinlik • – huquqlar • – buzilish • – kamsitish • – xavfsizlik • – demokratiya • – zo‘ravonlik • – qadr-qimmat • – qadriyatlar • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
Series 63 - Chapter 3 2024-05-02
Across
- kept on file for 6 years, detailed record of trading activity
- quick build up of interest in a security, followed by disposition of security, and typically price decline
- maximum prison sentence for willful violation of the USA
- block trades immediately as the market opens
- making market decisions for a portfolio with NPI
- winner of crossword two
- administrator does NOT have authority to
Down
- first name of your 63 coach (Hint: it's not Hunter, and you can find this information independently)
- Administrator may do this when they are investigating potential violations
- trading ahead of large pending orders
- block trades immediately before market close
- winner of crossword one
- willful deceit of client
- excessive trades in the account for commission
- typically rectified by way of payment of fees & covering cost of litigation never prison time
- buy and sale of security repeatedly to create illusion of activity
- placing fake orders to move prices up or down
17 Clues: winner of crossword one • winner of crossword two • willful deceit of client • trading ahead of large pending orders • administrator does NOT have authority to • block trades immediately before market close • block trades immediately as the market opens • placing fake orders to move prices up or down • excessive trades in the account for commission • ...
Secure the Grid: Security Control Families Crossword 2024-12-04
Across
- Evaluation of systems to ensure compliance with security policies.
- Tracking activities to detect unauthorized access or misuse.
- The process of verifying a user's identity before access.
- Regular updates and repairs to keep systems secure.
- Procedures for restoring data and systems after an incident.
- Plans for continuity during an unexpected disruption.
Down
- Organized methods for securing and managing resources.
- Potential for a threat to exploit a vulnerability.
- Baseline settings to protect systems and reduce vulnerabilities.
- An event that compromises the security of information.
- Training to help users recognize and prevent security threats.
- Control mechanisms for who can enter or use resources.
12 Clues: Potential for a threat to exploit a vulnerability. • Regular updates and repairs to keep systems secure. • Plans for continuity during an unexpected disruption. • Organized methods for securing and managing resources. • An event that compromises the security of information. • Control mechanisms for who can enter or use resources. • ...
Secure the Grid: Security Control Families Crossword 2024-12-05
Across
- Tracking activities to detect unauthorized access or misuse.
- The process of verifying a user's identity before access.
- Potential for a threat to exploit a vulnerability.
- Baseline settings to protect systems and reduce vulnerabilities.
- Organized methods for securing and managing resources.
Down
- Evaluation of systems to ensure compliance with security policies.
- Training to help users recognize and prevent security threats.
- Plans for continuity during an unexpected disruption.
- Regular updates and repairs to keep systems secure.
- An event that compromises the security of information.
- Control mechanisms for who can enter or use resources.
- Procedures for restoring data and systems after an incident.
12 Clues: Potential for a threat to exploit a vulnerability. • Regular updates and repairs to keep systems secure. • Plans for continuity during an unexpected disruption. • An event that compromises the security of information. • Control mechanisms for who can enter or use resources. • Organized methods for securing and managing resources. • ...
Today’s Adventure 2025-12-25
8 Clues: Intelligent • Thomas Edison • richest person • The energizer bunny • Relating to computers/technology • you have to get a permit to do this • it has a bed but you don’t sleep in it • something you take to see how much you know
Cyber - safety Thomas 2016-06-06
Across
- online - connect to the internet
- - don't tell anyone your password
- - something mean people do to get you online
- - don't spend too much time online
- - protect personal information
- - if you feel something is wrong, then tell mum or dad
- - always ask your parents when it asks to spend money
Down
- - types of sites that we are allowed to visit
- - bad language that you shouldn't use on the internet
- - sites on the Internet you visit
- - dob on someone to mum or dad if you think something isn't right
- Email - types of emails that you get, that ask you to forward them on, but you shouldn't.
- - don't play too many games online
- - only talk to people you know online
14 Clues: - protect personal information • online - connect to the internet • - sites on the Internet you visit • - don't tell anyone your password • - don't play too many games online • - don't spend too much time online • - only talk to people you know online • - something mean people do to get you online • - types of sites that we are allowed to visit • ...
Cyber Bezpieczna Krzyżówka 2025-02-02
Across
- Program, który instaluje się, żeby zabezpieczyć komputer.
- Program na telefonie lub tablecie np. Do nauki, gier albo rozmów.
- To złośliwy program, który może zniszczyć twój komputer.
- Miejsce, gdzie możesz szukać informacji.
- Tworzysz je w grze lub na stronie internetowej, aby móc się później zalogować i korzystać z różnych funkcji.
- Coś co chronisz w internecie, nie podając sowich danych.
Down
- Klikasz go, by przejść na inną stronę internetową, ale musisz uważać, żeby nie był fałszywy.
- Kiedy ktoś obraża, straszy lub wyśmiewa innych internecie.
- Wykorzystanie czyjejś pracy jako swojej.
- To tajny kod, który chroni twoje konto w internecie.
- Informacje o tobie, takie jak imię, nazwisko, adres e-mail, które należy chronić w internecie.
- Miejsce w internecie, gdzie możesz rozmawiać z innymi ludźmi. Może być to w grze lub na stronie.
- Możesz ją wysłać do kogoś przez e-mail, komunikator lub SMS.
- Osoba, która potrafi włamać się do systemów komputerowych i może ukraść dane.
14 Clues: Wykorzystanie czyjejś pracy jako swojej. • Miejsce, gdzie możesz szukać informacji. • To tajny kod, który chroni twoje konto w internecie. • To złośliwy program, który może zniszczyć twój komputer. • Coś co chronisz w internecie, nie podając sowich danych. • Program, który instaluje się, żeby zabezpieczyć komputer. • ...
MountainOne 2021-06-16
Across
- President and CEO
- Manager in Rockland
- Manager in Pittsfield
- Manager in Scituate
- VP and Sr. regional manager
- Security and facilities officer
- SVP IT director and information security officer
Down
- SVP, Senior Human Resources officer
- COO, EVP, CFO and Treasurer
- Manager in Quincy
- Manager in North Adams
- SVP of com. Banking and pres. of MTN1 investments
- Manager in Williamstown
- AVP Electronic banking and Deposit OPS
14 Clues: President and CEO • Manager in Quincy • Manager in Rockland • Manager in Scituate • Manager in Pittsfield • Manager in North Adams • Manager in Williamstown • COO, EVP, CFO and Treasurer • VP and Sr. regional manager • Security and facilities officer • SVP, Senior Human Resources officer • AVP Electronic banking and Deposit OPS • SVP IT director and information security officer • ...
J808 4.1 Types of Threats 2019-01-09
Across
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- A type of Malware that locates and saves data from users without them knowing about it.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include
- Collection of captured bot computers
Down
- When someone deceives by pretending to be someone else in order to get personal data.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Criminals make a promise of goods in return for details, such as offering a free music download.
- horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- Software that encrypts programs and data until a ransom is paid to remove it.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An error in a program that prevents the program from running as expected
15 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Trend Micro Mobile Security 4 2024-05-07
Across
- Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
- Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)
- Trend Micro Mobile Security regularly releases ____ for its mobile security products to address new threats and vulnerabilities. (Starts with u)
- Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
Down
- Trend Micro Mobile Security provides ____ security protection. (Starts with c)
- Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)
- Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.
7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e) • Trend Micro Mobile Security provides ____ security protection. (Starts with c) • Trend Micro regular updates help to enhance ____ capabilities. (Starts with p) • Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i) • ...
Cyber tools 2023-01-09
Across
- best social networking site to chat
- best social networking site to watch videos
- a form of blogging using short posts without titles.
- an American social networking service based in San Francisco, California
Down
- to
- best way to connect with friends, work colleagues or random people
- apps GPS
- Similar to Microsoft OneDrive
- best way to find a job
9 Clues: to • apps GPS • best way to find a job • Similar to Microsoft OneDrive • best social networking site to chat • best social networking site to watch videos • a form of blogging using short posts without titles. • best way to connect with friends, work colleagues or random people • an American social networking service based in San Francisco, California
Cyber-Mobbing 2019-05-07
Across
- Eine Plattform wo Videos hochgeladen und angeschaut werden können
- Ein Messenger wo wir tagtäglich damit schreiben
- Das Thema welches hier behandelt wird
- Ein tragbarer Computer
Down
- Eine Taste auf der Tastatur mit der man zum Beispiel ein Programm schließen kann
- Ein Spiel welches virtuell
- Wenn jemand gehasst wird
- Gerät welches viele Jugendliche verwenden
- Ein Profil das nicht echt ist
9 Clues: Ein tragbarer Computer • Wenn jemand gehasst wird • Ein Spiel welches virtuell • Ein Profil das nicht echt ist • Das Thema welches hier behandelt wird • Gerät welches viele Jugendliche verwenden • Ein Messenger wo wir tagtäglich damit schreiben • Eine Plattform wo Videos hochgeladen und angeschaut werden können • ...
Cyber Safety 2023-05-22
9 Clues: [Online Arguments] • [Stalking someone] • [excluding someone] • [giving information] • [embarrassing someone] • [bullying someone online] • [Repeating rude messages] • [offensive comments roomers and gossiping] • [Pretending to be someone and getting them in Trouble]
Cyber Safety 2023-05-22
9 Clues: (Online Arguments) • (excluding someone) • (giving information) • (Embarrassing someone) • (Repeating rude messages) • (Stalking someone online) • (bullying someone online) • (Offensive comments roomer and gossip) • (pretending to be someone and getting them trouble)
Cyber Safety 2013-08-12
Across
- How often do you change your password?
- Who do you share your password with?
- What is the name of the setting to block unwanted messages?
Down
- You should never keep online _____.
- What do you do before posting?
- What is the name of someone who hassles you online?
- Information on the internet is available for how long?
- Never give your friends your online or phone____.
- When someone sends you inappropriate texts you ____ them.
9 Clues: What do you do before posting? • You should never keep online _____. • Who do you share your password with? • How often do you change your password? • Never give your friends your online or phone____. • What is the name of someone who hassles you online? • Information on the internet is available for how long? • When someone sends you inappropriate texts you ____ them. • ...
Cyber Smart 2024-01-18
Across
- Measures taken to discourage or prevent unwanted actions or behaviors.
- A mode in web browsers that allows users to browse privately, leaving no trace in the browsing history.
- Alertness and watchfulness to detect and prevent potential dangers or threats.
- A software update designed to fix security vulnerabilities or improve functionality.
Down
- Authentication techniques based on unique physical or behavioral characteristics.
- The state of being anonymous, without revealing one's identity.
- The process of converting information into a code to prevent unauthorized access.
- A decentralized and secure digital ledger used in cryptocurrency transactions.
- A security system designed to prevent unauthorized access to or from a private network.
9 Clues: The state of being anonymous, without revealing one's identity. • Measures taken to discourage or prevent unwanted actions or behaviors. • A decentralized and secure digital ledger used in cryptocurrency transactions. • Alertness and watchfulness to detect and prevent potential dangers or threats. • ...
Cyber Awareness 2023-10-02
Across
- A program that can harm your computer and steal your information.
- A set of characters used to access an account.
- The place where you can adjust your account settings.
- Private information you should never share online.
- Being disrespectful online
Down
- Protects your computer from viruses and malware.
- The practice of tricking people into giving up sensitive information.
- Treating others the way you want to be treated.
- A message or email that tries to deceive you into giving out personal information.
9 Clues: Being disrespectful online • A set of characters used to access an account. • Treating others the way you want to be treated. • Protects your computer from viruses and malware. • Private information you should never share online. • The place where you can adjust your account settings. • A program that can harm your computer and steal your information. • ...
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Cyber Ethics 2025-05-24
Across
- network device that is used to connect all the computers in a network with each other
- network maintained without using wires
- networks connects two or more computers located at distant places
- simplest form of network structure in which two nodes are directly connected with each
Down
- topology uses a single communication line or one main cable to which all nodes are directly connected
- device that connects two different types of networks with each other
- topology which connected to a central computer using a point to point connection
- computer network that is mainly created for an individual person
- computers that communicate with each other
9 Clues: network maintained without using wires • computers that communicate with each other • computer network that is mainly created for an individual person • networks connects two or more computers located at distant places • device that connects two different types of networks with each other • ...
Cyber Crossword 2025-07-14
Across
- Unwanted or unsolicited email often used to distribute malware.
- A scam where attackers impersonate senior executives.
- Type of malware that locks files and demands payment to unlock them.
- Keeping your software and operating system ________ is a key part of security.
Down
- Software that secretly gathers information from a computer.
- A common method used by cybercriminals to trick users into revealing sensitive information.
- A software program designed to protect against viruses and malware.
- A criminal who uses computers and networks to commit crimes.
- A secret word or phrase used to access a system.
9 Clues: A secret word or phrase used to access a system. • A scam where attackers impersonate senior executives. • Software that secretly gathers information from a computer. • A criminal who uses computers and networks to commit crimes. • Unwanted or unsolicited email often used to distribute malware. • A software program designed to protect against viruses and malware. • ...
Cyber Club 2026-02-11
Across
- A proactive threat-hunting exercise simulating adversarial behavior.
- Perimeter security control filtering inbound and outbound traffic based on policy.
- Attack technique exploiting excessive permissions to gain higher-level access
- Data protection technique replacing sensitive information with non-sensitive equivalents.
- Malware disguised as legitimate software to trick users into execution.
Down
- Cryptographic mechanism ensuring non-repudiation and integrity of digital communications.
- Security platform aggregating and correlating logs for real-time threat detection.
- Fraud method targeting executives or finance teams using impersonation.
- A security model that assumes breach and verifies every access request regardless of network location.
9 Clues: A proactive threat-hunting exercise simulating adversarial behavior. • Fraud method targeting executives or finance teams using impersonation. • Malware disguised as legitimate software to trick users into execution. • Attack technique exploiting excessive permissions to gain higher-level access • ...
Cyber bullying 2024-06-11
Across
- someone you can talk to at school
- helpline can be
- someone we can talk to at home
- when your device is malfunctioning you
- someone you can talk to at home
- what do you do to stop following you online
Down
- someone who gives good advice is
- what do you do when you are having problems you ask for
- to send out a message
- to get help outside
10 Clues: helpline can be • to get help outside • to send out a message • someone we can talk to at home • someone you can talk to at home • someone who gives good advice is • someone you can talk to at school • when your device is malfunctioning you • what do you do to stop following you online • what do you do when you are having problems you ask for
Cyber monday 2024-11-28
9 Clues: LARGE DISCOUNTS • WHEN SALES BEGIN • WHEN SALES FINISH • TO KEEP MONEY UNSPENT • A 24-HOUR SHOPPING EVENT • A URL TO A SHOPPING PAGE • AMOUNT TO PAY FOR AN ITEM • PRESENT BOUGHT FOR SOMEONE • AN AGREEMENT TO BUY AT A DISCOUNT
Jared's crossword 3 2014-04-29
8 Clues: a safe on line classroom • unwelcomesexual advances • a sense of common purpose • bullying through cyber meadum • teaching and learning strategy • repeted cruelty or physical harm • bring together social and academic learning • a place of learning with rules and conditions
bullying crossword :Jamie 2023-03-21
8 Clues: the person who is mean. • bullying that is online . • talk to a trusted _______. • the person getting bullied. • bullying that pushes people. • bullying that says mean words. • the person watching the bullying. • bullying that is related to the emotions.
Programming 2021-01-21
Across
- Popular object notation
- Used to update node
- Cyber Group developed this using the Heroku platform
- IDE named after smallest unit of an element
- This guides pirates to treasure
Down
- Used to manage packages in NodeJS
- Used to manage packages in .NET
- Open–source version control system
- IDE named after astronomical events
9 Clues: Used to update node • Popular object notation • Used to manage packages in .NET • This guides pirates to treasure • Used to manage packages in NodeJS • Open–source version control system • IDE named after astronomical events • IDE named after smallest unit of an element • Cyber Group developed this using the Heroku platform
Programming 2021-01-21
Across
- Popular object notation
- Used to update node
- Cyber Group developed this using the Heroku platform
- IDE named after smallest unit of an element
- This guides pirates to treasure
Down
- Used to manage packages in NodeJS
- Used to manage packages in .NET
- Open–source version control system
- IDE named after astronomical events
9 Clues: Used to update node • Popular object notation • Used to manage packages in .NET • This guides pirates to treasure • Used to manage packages in NodeJS • Open–source version control system • IDE named after astronomical events • IDE named after smallest unit of an element • Cyber Group developed this using the Heroku platform
Cyberbullying 2021-10-29
Across
- If you are bullied, tell an ......
- Cyberbullying is against the law.
- in position of power towards one or more.
- Denial of access to particular parts of
- An example of cyberbullying.
Down
- Repeated or deliberate harassment by one
- Bullying online, is called .....
- A wireless handheld device for telephone
- Many websites have reported functions for
- When bullied, stay .....
10 Clues: When bullied, stay ..... • An example of cyberbullying. • Bullying online, is called ..... • Cyberbullying is against the law. • If you are bullied, tell an ...... • Denial of access to particular parts of • Repeated or deliberate harassment by one • A wireless handheld device for telephone • Many websites have reported functions for • ...
tourism 2019-07-16
Across
- Z in the phonetic alphabet
- Y in the phonetic alphabet
- S in the phonetic alphabet
- Where is Qantas based
- NZ's low cost carrier
- the area before departing through security
- The capital of New Zealand
- Charles De Gaulle airport is situated where
- World's busiest airport
- Japans busiest airport
- Q in the phonetic alphabet
Down
- Hamilton's three letter code
- F in the phonetic alphabet
- Another word for baggage
- Busiest country in the world in regards to airports
- NZ's full service carrier
- where you go through security and hand over your passport
- ROT stands for
- 1900 Is what in the 12 hour clock
- Hokitika's three letter code
20 Clues: ROT stands for • Where is Qantas based • NZ's low cost carrier • Japans busiest airport • World's busiest airport • Another word for baggage • NZ's full service carrier • F in the phonetic alphabet • Z in the phonetic alphabet • Y in the phonetic alphabet • S in the phonetic alphabet • The capital of New Zealand • Q in the phonetic alphabet • Hamilton's three letter code • ...
CIS 120 Cybersecurity Crossword Puzzle 2023-02-21
Across
- software that is constantly updating
- software/hardware keep intruders out
- text read by human eye
- transform ciphertext into original plaintext
- test distinguishes between human/robot
- security mechanism determining who's authorized
- intent to cause mischief/theft
- code imbedded into computer hardware
- technique to click bad url
- physical parts of a computer
- core of computers operating system
Down
- trap or decoy for attackers
- coding used to protect information
- connect computers to encrypted network
- attempt to violate security perimeter
- language to create/control website content
- shield users against computer damage
- term for unauthorized computer attacker
- malicious software to damage systems
- an error in computer program
20 Clues: text read by human eye • technique to click bad url • trap or decoy for attackers • an error in computer program • physical parts of a computer • intent to cause mischief/theft • coding used to protect information • core of computers operating system • software that is constantly updating • software/hardware keep intruders out • shield users against computer damage • ...
Cybersecurity 2024-08-31
Across
- bring your own computer
- coding used to protect information
- a method of gaining access to a network
- protects users from fraudulent websites
- a string used to identify user
- a program that is run without installation
- malicious software
- bring your own device
- items that are temporarily blocked
- process of identifying someone
- taking advantage of a vulnerability in a network
Down
- combination of robot and network
- individual with intent to hack maliciously
- network security system
- a kind of spyware
- a denial of service
- computer security system trap
- casting a reel in water
- intrusive software
- someone with knowledge of exploits
- misuse of devices to corrupt
21 Clues: a kind of spyware • malicious software • intrusive software • a denial of service • bring your own device • bring your own computer • network security system • casting a reel in water • misuse of devices to corrupt • computer security system trap • process of identifying someone • a string used to identify user • combination of robot and network • coding used to protect information • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- you use it to keep your internet connection secure.
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
Down
- never send it to people meet online.
- when you download something, make sure it's a...
- before you post somenthing, you have to ask your...
- option to keep your profile private.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
10 Clues: you do it to avoid virus. • you have to keep them safe. • never send it to people meet online. • option to keep your profile private. • software used to delete viruses on a computer. • when you download something, make sure it's a... • before you post somenthing, you have to ask your... • you use it to keep your internet connection secure. • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
- never send it to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- option to keep your profile private.
- before you post somenthing, you have to ask yours...
10 Clues: you do it to avoid virus. • you have to keep them safe. • option to keep your profile private. • never send it to people meet online. • software used to delete viruses on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask yours... • ...
Info - security 2017-11-27
Across
- be attentive
- lure someone
- name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
- protect networks, computers, programs and data from attack
- should not be shared
- monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- designed to detect and destroy computer viruses
- exploit weaknesses to gain access
- malicious software designed to block access to a computer system until a sum of money is paid.
- protects personal data published via the Internet
10 Clues: be attentive • lure someone • should not be shared • exploit weaknesses to gain access • designed to detect and destroy computer viruses • protects personal data published via the Internet • protect networks, computers, programs and data from attack • malicious software designed to block access to a computer system until a sum of money is paid. • ...
IT Security 2018-05-22
Across
- You should not be checking your ________ email while on work computers.
- When you temporarily leave the workstation you are working at, you should ___________ the computer.
- Where should you look for a policy and instructions on what to do during downtimes?
- When you receive an email from someone you don't know, you should click on links inside the email.
- Hospital computers and programs, including email, should be used for _______________ use only.
Down
- If you don't see a program on the desktop, where can you search for it?
- When calling or emailing the help desk, the ________ details you provide, the easier it will be to solve your issue quickly.
- Installing Windows updates on computers is important because it helps ____________ vulnerabilities on the computer.
- ePHI is everyone's responsibility.
- When you are done with your shift, you should always ________ of the workstation.
10 Clues: ePHI is everyone's responsibility. • If you don't see a program on the desktop, where can you search for it? • You should not be checking your ________ email while on work computers. • When you are done with your shift, you should always ________ of the workstation. • Where should you look for a policy and instructions on what to do during downtimes? • ...
Security Quiz 2019-02-19
Across
- Pleasing to the senses
- A person who is a member of a cooperative relationship
- A son of your brother or sister
- A female human offspring
Down
- Place of business where professional duties are performed
- The state of being free from danger or injury
- The principal activity in one's life to earn money
- A human offspring (son or daughter) of any age
- A daughter of your brother or sister
- A fully developed person from maturity onward
10 Clues: Pleasing to the senses • A female human offspring • A son of your brother or sister • A daughter of your brother or sister • The state of being free from danger or injury • A fully developed person from maturity onward • A human offspring (son or daughter) of any age • The principal activity in one's life to earn money • ...
IT Security 2020-01-06
Across
- password manager mentioned in presentation
- standalone malware computer program that replicates itself in order to spread to other computers
- network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- nickname of person who stolen Morele.net database
- a good hacker
- a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
10 Clues: a good hacker • password manager mentioned in presentation • nickname of person who stolen Morele.net database • standalone malware computer program that replicates itself in order to spread to other computers • a type of malicious software designed to block access to a computer system until a sum of money is paid. • ...
security puzzle 2015-03-03
Across
- A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
- A computer overtaken by a hacker and used to perform malicious tasks.
- is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
- A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
- A form of spyware that enters your computer from an Internet download.
- A new term for spam messages being sent to instant message addresses.
- Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
- The transfer of data from one computer (or server) to another computer.
- A person who enjoys exploring the details of computers and how to stretch their capabilities.
- A violation or infraction, as of a law, a legal obligation, or a promise.
10 Clues: A new term for spam messages being sent to instant message addresses. • A computer overtaken by a hacker and used to perform malicious tasks. • A form of spyware that enters your computer from an Internet download. • The transfer of data from one computer (or server) to another computer. • ...
Security - Medium 2023-11-28
Across
- routine of applying updates to software to address vulnerabilities
- cryptographic attack involves trying all possible keys until the correct one is found
- What do hackers do on a boat?
- type of encryption which uses the same key for both encryption and decryption
- a software vulnerability discovered by attackers before the vendor has become aware of it
- the secret code that enhances the security of passwords
Down
- type of attack involves intercepting and altering communication between two parties without their knowledge
- technique that involves gaining unauthorized access by pretending to be someone else
- a device or software that captures and records keystrokes on a computer
- security measure to verify a user's identity through a unique biological or behavioral characteristic
10 Clues: What do hackers do on a boat? • the secret code that enhances the security of passwords • routine of applying updates to software to address vulnerabilities • a device or software that captures and records keystrokes on a computer • type of encryption which uses the same key for both encryption and decryption • ...
Food Security 2024-01-10
Across
- Who added a new dimension to food security and emphasised the “access” to food?
- The introduction of __________ in India dates back to the 1940s Bengal Famine.
- A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as ______
- The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is _______
- Which revolution was adopted in July 1968?
Down
- Ration shops also known as
- Amul is a cooperative established in _________.
- Which was the most devastating famine faced by India?
- The price at which food grains are distributed in the deficit areas and among the poor strata of the society.
- The PDS card for below poverty line is ________.
10 Clues: Ration shops also known as • Which revolution was adopted in July 1968? • Amul is a cooperative established in _________. • The PDS card for below poverty line is ________. • Which was the most devastating famine faced by India? • The introduction of __________ in India dates back to the 1940s Bengal Famine. • ...
Data Security 2024-04-11
Across
- Involves intentional deception for financial gain or to cause harm.
- Process of converting data into a format that cannot be easily understood by unauthorized parties.
- Refers to the malfunctioning or breakdown of physical components in computer systems or devices.
- fires, floods, earthquakes
Down
- Record of events or activities occurring within a system, network, or application.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
- Used to authenticate users and control access to computer systems, networks, or applications.
- Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
- Security system designed to monitor and control incoming and outgoing network traffic.
- inaccurate data entry, accidental deletion or changing of data)
10 Clues: fires, floods, earthquakes • inaccurate data entry, accidental deletion or changing of data) • Involves intentional deception for financial gain or to cause harm. • Record of events or activities occurring within a system, network, or application. • Security system designed to monitor and control incoming and outgoing network traffic. • ...
Food Security 2024-10-17
Across
- Global initiative to end hunger and malnutrition
- Sustainable farming method that mimics natural ecosystems
- Process of preserving food for future use
- Ability to access nutritious food consistently
- Agricultural practice to increase crop yields
Down
- Practice of growing crops and raising livestock on the same land
- Lack of access to adequate food
- UN agency working to achieve food security worldwide
- Nutrient-dense foods that can be stored long-term
- Economic access to sufficient food
10 Clues: Lack of access to adequate food • Economic access to sufficient food • Process of preserving food for future use • Agricultural practice to increase crop yields • Ability to access nutritious food consistently • Global initiative to end hunger and malnutrition • Nutrient-dense foods that can be stored long-term • UN agency working to achieve food security worldwide • ...
Food Security 2024-10-17
Across
- A type of farming that primarily focuses on growing food for sale, not just for local consumption.
- Crops grown primarily to feed livestock rather than humans.
- A farming method aimed at producing food without depleting natural resources.
- Rotation The practice of rotating different crops on the same land to improve soil health.
Down
- Nutrient group providing energy, often found in grains like wheat and rice.
- C Essential vitamin often found in fruits and vegetables that boosts the immune system.
- An essential mineral found in dairy products, important for bone health.
- The process of growing crops and raising livestock for food.
- A protein-rich legume commonly used to improve soil fertility.
- The global organization dedicated to eradicating hunger and ensuring food security.
10 Clues: The process of growing crops and raising livestock for food. • A protein-rich legume commonly used to improve soil fertility. • Crops grown primarily to feed livestock rather than humans. • An essential mineral found in dairy products, important for bone health. • Nutrient group providing energy, often found in grains like wheat and rice. • ...
Food Security 2024-10-17
Across
- the distress associated with lack of food
- the practice of growing crops or raising animals
- the variety of all living things and their interactions
- an imbalance between the nutrients your body needs to function
Down
- the ability to be maintained at a certain level and availability
- Application of ecological concepts and principals in farming
- the supply of water to land or crops to help growth
- the process of obtaining food necessary for health and growth
- a cultivated plant that is grown on a large scale commercially
- the state of being in short supply
10 Clues: the state of being in short supply • the distress associated with lack of food • the practice of growing crops or raising animals • the supply of water to land or crops to help growth • the variety of all living things and their interactions • Application of ecological concepts and principals in farming • the process of obtaining food necessary for health and growth • ...
Food Security 2024-10-17
10 Clues: Food source • Source of iron • Nutritional drink • Source of proteins • Harmful for health • source of vitamin D • Source of high calories • Source of vitamins and proteins • Increases sugar harm for health • Must to have for food production
food security 2024-10-17
Across
- - Protein-rich legume often used as a meat alternative.
- - A common grain that is a staple food in many countries.
- - Process of cooking and preparing food to make it safe and tasty.
- - A term referring to edible plants like spinach and lettuce, rich in vitamins and minerals.
- - A vitamin commonly found in fruits that helps prevent scurvy.
Down
- - A type of farming where crops are grown specifically for sale, not for local consumption.
- - Farming, growing crops, and raising animals for food.
- - A common mineral needed for strong bones, found in dairy products.
- - Lack of enough food to meet basic needs.
- - A natural resource essential for growing food.
10 Clues: - Lack of enough food to meet basic needs. • - A natural resource essential for growing food. • - Protein-rich legume often used as a meat alternative. • - Farming, growing crops, and raising animals for food. • - A common grain that is a staple food in many countries. • - A vitamin commonly found in fruits that helps prevent scurvy. • ...
Food Security 2024-10-17
Across
- Lack of resources to access food
- Reducing food waste and loss
- Promoting sustainable and resilient food systems
- Crops grown for human consumption
- Process of producing food
Down
- Producing food without harming the environment
- Preserving natural resources for future food production
- Practice of growing crops in urban areas
- Preserving traditional farming knowledge
- Producing food locally
10 Clues: Producing food locally • Process of producing food • Reducing food waste and loss • Lack of resources to access food • Crops grown for human consumption • Practice of growing crops in urban areas • Preserving traditional farming knowledge • Producing food without harming the environment • Promoting sustainable and resilient food systems • ...
Food Security 2024-10-17
Across
- A state where people don't have enough food to meet daily energy needs.
- Financial aid provided by the government to support food production.
- A major threat to food security due to impacts on agriculture.
- A non-profit organization that provides aids distributes food to those in need.
- It supplies many vital ecosystem services, such as creating and maintaining healthy soils.
- A condition caused by inadequate or unbalanced diet.
Down
- an extreme shortage of food leading to mass.
- A significant barrier to access to food.
- meeting the needs of the present without compromising the future.
- A practice of farming to produce food.
10 Clues: A practice of farming to produce food. • A significant barrier to access to food. • an extreme shortage of food leading to mass. • A condition caused by inadequate or unbalanced diet. • A major threat to food security due to impacts on agriculture. • meeting the needs of the present without compromising the future. • ...
Security crossword 2023-06-27
10 Clues: Access control • NonFrat country • filed biennially • OFMD is a ___ mission • Annual training reqt. • Prohibitted technology • Staff like badge color • requires Outside Activity report • PFT should be reported __ days before • ___ Act covers political participation
Online Security 2023-08-11
Across
- News that contains deliberate disinformation
- It is also known as digital footprint.
- The suppression, prohibition, or withholding of information that is considered unacceptable or dangerous, for example because it is obscene or a threat to national security
- websites that are not indexed by search engines and can only be accessed by some softwares
- Large data sets that are analysed in order to identify patterns and trends,
Down
- It is a process of converting data into code in order to protect information.
- It is a content that is considered to have the potential to corrupt.
- Malicious software that is designed to break into and/or harm a computer system
- A scam conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information
- A network that operates using public infrastructure but uses security mechanisms
10 Clues: It is also known as digital footprint. • News that contains deliberate disinformation • It is a content that is considered to have the potential to corrupt. • Large data sets that are analysed in order to identify patterns and trends, • It is a process of converting data into code in order to protect information. • ...
internet security 2022-05-31
Across
- il simbolo del cancelletto (#) associato a una o più parole chiave per facilitare le ricerche tematiche in un blog o in un social network.
- connessione che ti permette di navigare su internet.
- in informatica, il complesso dei dati identificativi di un utente, che gli consentono l'accesso a un servizio telematico: a. di posta elettronica, nome e parola d'accesso per poter usufruire del servizio di posta elettronica.
- programma per navigare in Internet che inoltra la richiesta di un documento alla rete e ne consente la visualizzazione una volta arrivato.
- circuito di emittenti televisive, collegate o associate fra loro per la trasmissione degli stessi programmi.
- computer di elevate prestazioni che in una rete fornisce un servizio agli altri elaboratori collegati, detti client.
Down
- luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi.
- insieme di pagine web.
- in informatica, parola o sigla di riconoscimento fornita dall'utente all'elaboratore per poter accedere a un sistema operativo, a un programma o a un file.
- sistema che permette la condivisione di documenti iper testuali multimediali.
10 Clues: insieme di pagine web. • connessione che ti permette di navigare su internet. • sistema che permette la condivisione di documenti iper testuali multimediali. • luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi. • ...
Network Security 2023-05-10
Across
- Exposes confidential, sensitive, or protected information to an unauthorized person.
- The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
- Addresses that are associated with specific devices and assigned to them by the manufacturer.
- The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
- A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
- The process or action of proving or showing something to be true, genuine, or valid:
- Is the overall accuracy, completeness, and consistency of data.
- A security mechanism that identifies people by verifying their physical or behavioral characteristics.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.
10 Clues: Is the overall accuracy, completeness, and consistency of data. • The process or action of proving or showing something to be true, genuine, or valid: • Exposes confidential, sensitive, or protected information to an unauthorized person. • Addresses that are associated with specific devices and assigned to them by the manufacturer. • ...
Network Security 2025-02-04
Across
- A type of penetration testing that mimics an external attack on the system. (5,3)
- This type of malware appears to be legitimate, like a game, but is actually harmful.
- A type of malware that locks a device and demands a fee to unlock it.
- A type of attack where someone monitors data traveling on a network to intercept sensitive information.
- A technique where cybercriminals send messages disguised as from a trusted source to steal personal data.
- A method to prevent unauthorized access to data by translating it into code that only someone with the correct key can access.
Down
- An attack that uses automated software to produce hundreds of likely passwords to gain access to accounts. (5,5)
- A type of malware that self-replicates and attaches to another file or program.
- A type of attack where a server is flooded with useless traffic, causing it to slow down or become unusable.(6,2,7)
- A type of social engineering attack where the attacker watches the victim over their shoulder to gain personal information.
10 Clues: A type of malware that locks a device and demands a fee to unlock it. • A type of malware that self-replicates and attaches to another file or program. • A type of penetration testing that mimics an external attack on the system. (5,3) • This type of malware appears to be legitimate, like a game, but is actually harmful. • ...
Food Security 2024-11-28
10 Clues: - Dry fruits • - Source of fibre • - Your skin glows • - Good for eye sight • - D Vitamin for free • - Protein for Vegetarians • - We get calcium from here • - This is where you get iron from • - Maharashtra produces largest volume • - Easily available and affordable Protein
Food Security 2024-12-17
Across
- What fruit is yellow and monkeys love to eat? (6 letters)
- What green vegetable is often eaten in salads? (6 letters)
- What is a popular breakfast food made from grains? (4 letters)
- What hot drink is made from beans, often served in the morning? (6 letters)
- What sweet treat is made from sugar and comes in many flavors? (5 letters)
- What is a popular drink made from milk? (3 letters)
Down
- What food can be spread on bread, often made from peanuts? (8 letters)
- What red fruit is often used in salads or sauces? (5 letters)
- What citrus fruit is yellow and sour? (6 letters)
- What food comes from cows and is used to make cheese? (5 letters)
10 Clues: What citrus fruit is yellow and sour? (6 letters) • What is a popular drink made from milk? (3 letters) • What fruit is yellow and monkeys love to eat? (6 letters) • What green vegetable is often eaten in salads? (6 letters) • What red fruit is often used in salads or sauces? (5 letters) • What is a popular breakfast food made from grains? (4 letters) • ...
Food Security 2024-12-17
Across
- In the Hindu culture, the leaves of which fruit are hung at weddings to ensure fertility?
- Which fruit has the highest oil content?
- The only fruit to have seeds on the outside is:
- Limas and pintos are what type of vegetable?
- There is a fruit juice that can increase the potency of some medication, even causing an overdose. Which fruit juice is this?
- What color are blackberries?
Down
- What stick-like veggie's name comes from the Greek word for "sprout" or "shoot"?
- Which vegetable grows underground like a potato?
- Chinese Gooseberry is another name for:
- What fruit are monkeys known to enjoy?
10 Clues: What color are blackberries? • What fruit are monkeys known to enjoy? • Chinese Gooseberry is another name for: • Which fruit has the highest oil content? • Limas and pintos are what type of vegetable? • The only fruit to have seeds on the outside is: • Which vegetable grows underground like a potato? • ...
Food Security 2024-12-18
Across
- – A type of poultry, often grilled or fried
- – A crunchy fruit, often red or green
- – A yellow fruit, rich in potassium
- – A type of Italian food made from wheat flour and water
Down
- – A dairy product made from curdled milk
- cream – A sweet frozen treat made from milk, cream, and sugar
- – A staple food made from flour and water, often baked
- – A dish typically made with greens, vegetables, and dressing
- – Orange vegetable, good for your eyes
- – A popular Italian dish with cheese, sauce, and various toppings
10 Clues: – A yellow fruit, rich in potassium • – A crunchy fruit, often red or green • – Orange vegetable, good for your eyes • – A dairy product made from curdled milk • – A type of poultry, often grilled or fried • – A staple food made from flour and water, often baked • – A type of Italian food made from wheat flour and water • ...
Food Security 2024-12-18
Across
- What purple fruit grows in bunches?
- Which round, red fruit is often associated with keeping the doctor away?
- Name a fruit rich in Vitamin C.
- What nutrient helps build strong bones and teeth?
- Food which is good for gut health.
Down
- Which yellow fruit is rich in potassium?
- Name a green vegetable rich in iron.
- What is a good source of protein?
- Vitamin A is found in which vegetable?
- Which food helps make our bones strong?
10 Clues: Name a fruit rich in Vitamin C. • What is a good source of protein? • Food which is good for gut health. • What purple fruit grows in bunches? • Name a green vegetable rich in iron. • Vitamin A is found in which vegetable? • Which yellow fruit is rich in potassium? • Which food helps make our bones strong? • What nutrient helps build strong bones and teeth? • ...
Food Security 2024-12-18
10 Clues: A common crop • A drink from cows • Where plants grow • What we eat to live • Planted to grow crops • Food eaten at one time • Natural water for plants • Essential for growing plants • A place where crops are grown • A staple food in many countries
Food Security 2024-12-17
Across
- The process of providing or obtaining the food necessary for health and growth.
- This powerful vehicle is essential for many farming tasks, including plowing and harvesting.
- This physical sensation of desiring food can become chronic in food-insecure populations.
- Animals raised on a farm for profit or subsistence, these can include cattle, pigs, and sheep.
- The process of gathering ripe crops from the fields, this is often the busiest time of year for farmers.
- This chemical substance is used to control or eliminate harmful insects and other pests in crops.
Down
- The amount of crop produced per unit of land area is referred to by this term.
- Farming without synthetic pesticides or fertilizers, this method aims to be more environmentally friendly.
- The variety of plant and animal life in ecosystems is crucial for resilient food systems.
- This financial support from governments can help farmers produce food at lower costs.
10 Clues: The amount of crop produced per unit of land area is referred to by this term. • The process of providing or obtaining the food necessary for health and growth. • This financial support from governments can help farmers produce food at lower costs. • The variety of plant and animal life in ecosystems is crucial for resilient food systems. • ...
AVIATION SECURITY 2025-09-17
Across
- CCMs can submit security reports by using the ….reporting tool
- following a red bomb threat and if the bomb is found we execute the …..article drill checklist
- a passenger is found smoking in the lavatory and does not comply. We had over the …..warning
- a security search is required after passenger disembarkation and / or cargo holds unloading in ……airport
- the unlawful, violent or by threat of violence, seizure of an aircraft
Down
- normal access in the cockpit is done by saying position and assigned……
- no person is allowed to enter the aircraft without showing his/ her …..
- a category of bomb and sabotage threat
- the cabin …..checklist is to be carried out when there has been a RED threat against the airplane or service
- a security search is required before departure from ….despite the aircraft’s previous destination
10 Clues: a category of bomb and sabotage threat • CCMs can submit security reports by using the ….reporting tool • normal access in the cockpit is done by saying position and assigned…… • the unlawful, violent or by threat of violence, seizure of an aircraft • no person is allowed to enter the aircraft without showing his/ her ….. • ...
Physical Security 2026-03-19
Across
- _____must sign the secure area log
- inspect daily
- designed as deep insert devices, making them difficult to detect
- remain____ after a roberry
- _____Act, set minimum requirements for security programs
- ____should remain to assist law enforcement
Down
- Verify____ authorization
- money with recorded serial numbers
- notify____ immediately if an access card, or card is lost or stolen
- helpful acronym guide to follow after robbery
10 Clues: inspect daily • Verify____ authorization • remain____ after a roberry • money with recorded serial numbers • _____must sign the secure area log • ____should remain to assist law enforcement • helpful acronym guide to follow after robbery • _____Act, set minimum requirements for security programs • designed as deep insert devices, making them difficult to detect • ...
security crossword puzzle 2023-10-04
Across
- Helps to continue in disruption
- protection against improper modification
- Security is ____________'s responsibility
- Abbreviation for a D&B data classification
- 9 digit unique identifier for entities
- Process mandated before every new project
- Cybercrime to mine cryptocurrency
- Laptop physical fastener
- ____desk
Down
- Security is a ____________ enabler
- ____the franchise
- Helps identify machines and improve web browsing experience
- QR code based fraud attempts
- Are you a robot ?
14 Clues: ____desk • ____the franchise • Are you a robot ? • Laptop physical fastener • QR code based fraud attempts • Helps to continue in disruption • Cybercrime to mine cryptocurrency • Security is a ____________ enabler • 9 digit unique identifier for entities • protection against improper modification • Process mandated before every new project • ...
Espanol 4: Unidad 4 Contexto 1 2017-04-30
21 Clues: rest • value • hobby • relax • check • retire • choose • relieve • quality • anxiety • leisure • scatter • together • prestige • dedicate • security • interview • unsatisfied • scholarship • application • apprenticeship
Crossword Englisch 2015-10-19
20 Clues: BTW • boet • apart • ingang • schade • verval • met-zorg • weegbrug • kostbaar • herkomst • omleiding • zichtbaar • koppeling • bederfbare • bestemming • beveiliging • versnelling • verzekering • overstroming • kentekenplaat
The outbreak of the Cold War 2015-02-22
Kintahdi Diné Binidaanishígíí Opal Mohs-6th 2023-03-06
20 Clues: baker • barber • writer • doorman • plumber • butcher • painter • florist • janitor • mechanic • gardener • carpenter • architect • pharmacist • electrician • shop worker • salesperson • photographer • security guard • weather forecaster
viajes felizes 2022-10-13
20 Clues: gate • line • check • agent • ticket • flight • agency • screen • confirm • to call • luggage • security • suitcase • to board • passport • to travel • departure • passenger • itinerary • assistant
Human Rights 2025-07-26
20 Clues: – qonun • – ta’lim • – adolat • – hurmat • – himoya • – tenglik • – qonuniy • – ozodlik • – erkinlik • – buzilish • – huquqlar • – kamsitish • – xavfsizlik • – demokratiya • – qadriyatlar • – zo‘ravonlik • – qadr-qimmat • – insonparvarlik • – sog‘liqni saqlash • – qo‘llab-quvvatlash
