cyber security Crossword Puzzles

cyber bullying 2021-09-17

cyber bullying crossword puzzle
Across
  1. we ALL have experience with this event hint covid
  2. it is the thing we are doing this about
  3. showing still things to imbrues people
  4. giving people soping that means they can take your stuff or look trough their history
Down
  1. a game with toxic people that will cus at u and they have a ninja
  2. places with people faking there appearance
  3. a mobile divice that people use for cyberbulling that can fit in your pocket
  4. jack has had an experience on it
  5. it is a popular social media with a toxic environment start with a t t

9 Clues: jack has had an experience on itshowing still things to imbrues peopleit is the thing we are doing this aboutplaces with people faking there appearancewe ALL have experience with this event hint covida game with toxic people that will cus at u and they have a ninjait is a popular social media with a toxic environment start with a t t...

Cyber Crimes 2017-04-16

Cyber Crimes crossword puzzle
Across
  1. The largest social network in the world, founded by Mark Zuckerberg
  2. conditional word or set of characters
  3. breaking the law (adjective)
  4. type of malicious software that can make copies of itself and infect other programs code
Down
  1. place where information on the Internet is lokated
  2. specialist in programming
  3. machine Automatic machine for receiving cash on a credit plastic card
  4. type of address on which content is located
  5. computer burglar

9 Clues: computer burglarspecialist in programmingbreaking the law (adjective)conditional word or set of characterstype of address on which content is locatedplace where information on the Internet is lokatedThe largest social network in the world, founded by Mark Zuckerbergmachine Automatic machine for receiving cash on a credit plastic card...

cyber bullying 2019-07-12

cyber bullying crossword puzzle
Across
  1. not offline
  2. killing yourself
  3. always texting you
  4. not very well
  5. a group
Down
  1. opposite to kind
  2. makes you go red and want to cry
  3. seek to harm
  4. a media

9 Clues: a mediaa groupnot offlineseek to harmnot very wellopposite to kindkilling yourselfalways texting youmakes you go red and want to cry

CYBER HYGΙΕΝΕ 2023-12-09

CYBER HYGΙΕΝΕ crossword puzzle
Across
  1. Έλεγχος .....δύο παραγόντων
  2. Στο διαδίκτυο υπάρχει και τέτοιο ..(phishing)
  3. ...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/Υ
  4. Δεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης
Down
  1. Μπορεί να είναι και ηλεκτρονική
  2. Τι σημαίνει cyber hygiene?
  3. Λογισμικό για να είναι ασφαλής ο υπολογιστής μας
  4. ...(virus)ένα πρόγραμμα που εισβάλλει στον υπολογιστή μας με ανεπιθύμητες παρενέργειες
  5. Προσπάθεια για .... κωδικών πρόσβασης

9 Clues: Τι σημαίνει cyber hygiene?Έλεγχος .....δύο παραγόντωνΜπορεί να είναι και ηλεκτρονικήΠροσπάθεια για .... κωδικών πρόσβασηςΣτο διαδίκτυο υπάρχει και τέτοιο ..(phishing)Λογισμικό για να είναι ασφαλής ο υπολογιστής μας...(worm)ιος που προκαλεί αλλοίωση δεδομένων Η/ΥΔεν θα πρέπει να περιέχει ένας κωδικός πρόσβασης...

Cyber Crime 2024-03-22

Cyber Crime crossword puzzle
Across
  1. Sending nasty messages online to get a reaction
  2. Repeatedly bothering or scaring someone online
  3. Using internet, devices, electronics to bully someone.
Down
  1. Software that can harm your computer
  2. Prenteding to be a genuine website/ source in an email to steal information
  3. Stealing someone's personal information online
  4. Trying to trick someone out of money
  5. Breaking into a computer system
  6. Pretending o be someone else online to trick you.

9 Clues: Breaking into a computer systemSoftware that can harm your computerTrying to trick someone out of moneyStealing someone's personal information onlineRepeatedly bothering or scaring someone onlineSending nasty messages online to get a reactionPretending o be someone else online to trick you.Using internet, devices, electronics to bully someone....

Cyber Crosswords 2024-06-19

Cyber Crosswords crossword puzzle
Across
  1. A secret word or phrase used to gain access to a computer system (8 letters)
  2. A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
  3. The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
  1. Software that is designed to detect and destroy computer viruses (9 letters)
  2. The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
  3. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
  5. An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
  6. Unsolicited email, often used for advertising or phishing (4 letters)

9 Clues: Unsolicited email, often used for advertising or phishing (4 letters)Software that is designed to detect and destroy computer viruses (9 letters)A secret word or phrase used to gain access to a computer system (8 letters)The practice of protecting systems, networks, and programs from digital attacks (10 letters)...

Cyber Quiz 2024-08-29

Cyber Quiz crossword puzzle
Across
  1. Attack involving the use of Malicious Software
  2. Process of Verifying Identity
  3. Secure connection Protocol
  4. Communicating devices in a network
Down
  1. Software that protects against malware
  2. Method use to protect/Hide information
  3. A method use to protect integrity of a data
  4. A network security devices
  5. Threat that involves fraudulent emails

9 Clues: A network security devicesSecure connection ProtocolProcess of Verifying IdentityCommunicating devices in a networkSoftware that protects against malwareMethod use to protect/Hide informationThreat that involves fraudulent emailsA method use to protect integrity of a dataAttack involving the use of Malicious Software

Cyber Safety 2024-10-03

Cyber Safety crossword puzzle
Across
  1. a type of malicious software that finds weak spots in different apps and slides its way into your information
  2. a device similar to number 4 that you can play mobile games on
  3. an app the has the symbol of a ghost on its logo
  4. a device I can do my homework on
  5. a type of computer malicious software that takes over a device potentially locking yourself out of your device
Down
  1. a device where you can call your friends on facetime
  2. malicious software
  3. an app that has the letter F on its logo (this app has had a cyber attack before)
  4. sending emails with links hoping to gain peoples passwords

9 Clues: malicious softwarea device I can do my homework onan app the has the symbol of a ghost on its logoa device where you can call your friends on facetimesending emails with links hoping to gain peoples passwordsa device similar to number 4 that you can play mobile games on...

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. A COLLECTION OF THINGS TO BUY
  2. ITEMS AVAILABLE FOR SALE
  3. WHAT YOU DO TO LOOK FOR ITEMS
  4. THE COST OF AN ITEM
Down
  1. WHAT YOU BUY FOR SOMEONE ELSE
  2. TO BUY SOMETHING ONLINE
  3. WHAT YOU DO WITH MONEY ONLINE
  4. WHERE YOU RECEIVE PROMO CODES
  5. A SHORTENED TERM FOR PROMOTION

9 Clues: THE COST OF AN ITEMTO BUY SOMETHING ONLINEITEMS AVAILABLE FOR SALEWHAT YOU BUY FOR SOMEONE ELSEA COLLECTION OF THINGS TO BUYWHAT YOU DO TO LOOK FOR ITEMSWHAT YOU DO WITH MONEY ONLINEWHERE YOU RECEIVE PROMO CODESA SHORTENED TERM FOR PROMOTION

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO WRAP ITEMS
  2. A DISCOUNT ON ITEMS
  3. WHAT YOU NEED TO MANAGE DURING SHOPPING
  4. A FAST-MOVING CROWD DURING SALES
  5. THE SYMBOL OF A BRAND
Down
  1. WHAT YOU NEED IN A WEBSITE
  2. A SCORE GIVEN BY CUSTOMERS
  3. WHAT YOU DO IF AN ITEM IS UNSUITABLE
  4. TO BROWSE AND BUY

9 Clues: TO WRAP ITEMSTO BROWSE AND BUYA DISCOUNT ON ITEMSTHE SYMBOL OF A BRANDWHAT YOU NEED IN A WEBSITEA SCORE GIVEN BY CUSTOMERSA FAST-MOVING CROWD DURING SALESWHAT YOU DO IF AN ITEM IS UNSUITABLEWHAT YOU NEED TO MANAGE DURING SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO WRAP ITEMS
  2. A DISCOUNT ON ITEMS
  3. WHAT YOU NEED TO MANAGE DURING SHOPPING
  4. A FAST-MOVING CROWD DURING SALES
  5. THE SYMBOL OF A BRAND
Down
  1. WHAT YOU NEED IN A WEBSITE
  2. A SCORE GIVEN BY CUSTOMERS
  3. WHAT YOU DO IF AN ITEM IS UNSUITABLE
  4. TO BROWSE AND BUY

9 Clues: TO WRAP ITEMSTO BROWSE AND BUYA DISCOUNT ON ITEMSTHE SYMBOL OF A BRANDWHAT YOU NEED IN A WEBSITEA SCORE GIVEN BY CUSTOMERSA FAST-MOVING CROWD DURING SALESWHAT YOU DO IF AN ITEM IS UNSUITABLEWHAT YOU NEED TO MANAGE DURING SHOPPING

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Cyber Hunt 2025-09-30

Cyber Hunt crossword puzzle
Across
  1. A TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID
  2. MALICIOUS SOFTWARE
  3. WEAKNESS OF A SYSTEM
  4. A CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAW
  5. THE STATE OF KEEPING SECRET
Down
  1. THE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMAT
  2. VERIFYING SOMEONE'S IDENTITY IS VALID
  3. POTENTIAL RISK
  4. A TYPE OF MALWARE THAT SPREADS BY ITSELF

9 Clues: POTENTIAL RISKMALICIOUS SOFTWAREWEAKNESS OF A SYSTEMTHE STATE OF KEEPING SECRETVERIFYING SOMEONE'S IDENTITY IS VALIDA TYPE OF MALWARE THAT SPREADS BY ITSELFA CODE DEVELOPED TO TAKE ADVANTAGE OF A FLAWTHE PROCESS OF CONVERTING A TEXT INTO UNREADABLE FORMATA TYPE OF MALWARE THAT BLOCKS ACCESS TO A SYSTEM UNTIL SOME MONEY IS PAID

psychomotoricke zrucnosti 2021-02-24

psychomotoricke zrucnosti crossword puzzle
Across
  1. Name of a modification that is not performed via the application business user interface
  2. Strategic Access Management tool
  3. Second goal of IT security
  4. Third goal of IT security
  5. Corporate .... Deviation (CDD)
  6. The second step in risk management process
  7. Chapter 8 of ASCA Procedure Manual
  8. What document helps you to check whether you are compliant with our security standard
  9. Opposite of DAST
  10. Corporate instruction covering IBM Worldwide records management
  11. Name of the tool that replaced WST
  12. Standard describing requirements on IT Business Continuity
  13. Standard that describes therisk severity guidelines
  14. To what data types LEG116 applies
  15. The first step in risk management process
Down
  1. What is CHS162 applied for
  2. What does ASCA stand for
  3. First element of risk
  4. Where the deviations are maintained
  5. Other word for separation in Separation of duties
  6. Where can you read through BPBC127? Where is it located?
  7. Third element of risk
  8. Standard that ASCA is driven by
  9. Where the DSR requests are handled
  10. California .... Privacy Act
  11. Name of the new privacy tool
  12. Who do you need confirmation from whether your application processes crown jewel data
  13. Corporate instruction for registration criteria

28 Clues: Opposite of DASTFirst element of riskThird element of riskWhat does ASCA stand forThird goal of IT securityWhat is CHS162 applied forSecond goal of IT securityCalifornia .... Privacy ActName of the new privacy toolCorporate .... Deviation (CDD)Standard that ASCA is driven byStrategic Access Management toolTo what data types LEG116 applies...

Crossword 2024-06-27

Crossword crossword puzzle
Across
  1. Extortion software locking access until a ransom is paid.
  2. Notification signaling an impending or current security threat.
  3. Control Mechanism governing resource visibility and usage permissions.
  4. Sniffing Analysis technique for capturing and inspecting network traffic.
  5. Exit or departure point from a system or network.
  6. Entity opposing or competing against one's security measures.
  7. Detection Systematic monitoring for suspicious network activities indicating potential threats.
  8. Unpermitted access gained by following an authorized individual into a secure area.
  9. Decoy system designed to lure and trap attackers.
  10. Deviation from standard norms indicating potential security issues.
  11. Covert surveillance software used to secretly monitor another user's digital activities.
Down
  1. Deceptive program masquerading as beneficial software to compromise systems.
  2. Interconnected ensemble of computers facilitating communication.
  3. Distributed attack aimed at overwhelming network resources to cause service disruption.
  4. Elevation of privileges typically exploited in unauthorized access.
  5. Process of encoding data to prevent unauthorized access.
  6. Software tool leveraging system vulnerabilities for unauthorized advantage.
  7. Successful breach resulting in unauthorized system control.
  8. Unauthorized disclosure of internal data to external entities.
  9. Malicious software disguised as legitimate to breach defenses.
  10. Test Probing examination simulating cyberattacks to identify vulnerabilities.
  11. Secure service ensuring private internet connectivity.
  12. Security Safeguarding measures to prevent unauthorized network intrusions.
  13. Team Group conducting simulated adversary attacks to test defensive capabilities.

24 Clues: Exit or departure point from a system or network.Decoy system designed to lure and trap attackers.Secure service ensuring private internet connectivity.Process of encoding data to prevent unauthorized access.Extortion software locking access until a ransom is paid.Successful breach resulting in unauthorized system control....

The United Nations 2013-06-17

The United Nations crossword puzzle
Across
  1. What is needed for a motion to be passed.
  2. Number of permanent members on the Security Council
  3. General Secretary of the United Nations
  4. Largest financial contributor to the United Nations.
  5. Charitable agency that particularly helps women and children
  6. One of the founding countries of the United Nations
Down
  1. Eight goals that the United Nations established.
  2. A proposal to be debated in the General Assembly.
  3. Personnel that attempt to keep peace in an area of conflict
  4. What the United Nations is trying to promote
  5. The colour that peacekeepers wear
  6. Document outlining the rules and role of the United Nations
  7. The world-wide event that prompted the formation of the United Nations.
  8. Number of members on the Security Council
  9. How long a non-permanent member of the Security council can keep their seat.

15 Clues: The colour that peacekeepers wearGeneral Secretary of the United NationsWhat is needed for a motion to be passed.Number of members on the Security CouncilWhat the United Nations is trying to promoteEight goals that the United Nations established.A proposal to be debated in the General Assembly.Number of permanent members on the Security Council...

BIDEN'S BORDER CRISIS 2022-07-07

BIDEN'S BORDER CRISIS crossword puzzle
Across
  1. number of times V.P. Harris has been to the border
  2. "________ Border Crisis"
  3. number of times Rep. Cammack has been to the border
  4. Homeland Security Secretary
  5. "______ 42"
  6. agents who deport illegal immigrants
  7. "Build The ______"
  8. nickname for those who smuggle immigrants across the border
  9. acronym for 'Remain In Mexico' Policy
Down
  1. "Every town is a _______ town."
  2. type of drug smuggled across border
  3. "__________ in Chief"
  4. the 'Border Czar'
  5. Department of _________ Security
  6. primary border control organization

15 Clues: "______ 42"the 'Border Czar'"Build The ______""__________ in Chief""________ Border Crisis"Homeland Security Secretary"Every town is a _______ town."Department of _________ Securitytype of drug smuggled across borderprimary border control organizationagents who deport illegal immigrantsacronym for 'Remain In Mexico' Policy...

CSC Crossword 2021-06-09

CSC Crossword crossword puzzle
Across
  1. If you hear it, _____ it
  2. Anaheim Angels _____
  3. Color of pen a security guard uses
  4. Used to protect your skin from the sun
  5. Common hair color abbreviation
  6. Someone leaving with a subject who is being evicted
  7. Observe and _____
  8. Verbal or physical
  9. OC's branch manager
  10. Non-guard carded staff is _____ staff
  11. See something, _____ something
Down
  1. Wash your _____frequently
  2. What does CP stand for
  3. Text _____ to 474747 to place a contactless concessions order
  4. _____ items include weapons, alcohol and large bags
  5. Required to wear a security shirt
  6. Common eye color abbreviation
  7. 7th _____ stretch
  8. Guests are not allowed to re-_____ the stadium
  9. What day is payday?
  10. _____board
  11. A13's first name

22 Clues: _____boardA13's first name7th _____ stretchObserve and _____Verbal or physicalWhat day is payday?OC's branch managerAnaheim Angels _____What does CP stand forIf you hear it, _____ itWash your _____frequentlyCommon eye color abbreviationCommon hair color abbreviationSee something, _____ somethingRequired to wear a security shirt...

Digital Fortress Crossword 2012-11-19

Digital Fortress Crossword crossword puzzle
Across
  1. NSA failure
  2. NSA motto: Everything is _________
  3. National Security Agency
  4. Outranked Strathmore; Director of NSA
  5. The late Tankado's father
  6. _______ 3; working area for the cryptographers
  7. Star Wars reference
  8. English meaning of Rocío
  9. Code-breaker
  10. Suspected murder
  11. Without wax
  12. Anagram
  13. Quis custodiet ipsos ________
  14. Late Strathmore
  15. Assassin
  16. City where Hulohot died
  17. What David wanted
Down
  1. What NSA wanted
  2. Elevator password
  3. Protagonist
  4. Hulohot is _____ ; disability
  5. Pass-key
  6. What would happen is Digital Fortress was released
  7. Midge's security
  8. Rotating ________ ; computer theory
  9. Iceberg-like machine, hacks into personal things
  10. Strathmore's natural trait
  11. The new type of virus
  12. TRANSLTR's safety net

29 Clues: AnagramPass-keyAssassinNSA failureProtagonistWithout waxCode-breakerWhat NSA wantedLate StrathmoreMidge's securitySuspected murderElevator passwordWhat David wantedStar Wars referenceThe new type of virusTRANSLTR's safety netCity where Hulohot diedNational Security AgencyEnglish meaning of RocíoThe late Tankado's fatherStrathmore's natural trait...

Impact of computing Vocabulary 2025-03-04

Impact of computing Vocabulary crossword puzzle
Across
  1. Rules for online behavior
  2. Unintended data use
  3. The result of encryption.
  4. Used to encrypt and decrypt data.
  5. Software that damages computers
  6. Data collected about you
  7. Unwanted email
  8. To convert encrypted data back to its original form.
  9. Code that scrambles data
  10. The goal of encryption.
  11. Automated decision making
Down
  1. Illegal access to computer systems
  2. Online identity theft
  3. between those who have and don't have tech access
  4. Protecting computer systems
  5. Study of ethical choices in computing
  6. A process used in encryption.
  7. The process of encoding data.
  8. A system or way of doing something, like encryption.
  9. What is protected by encryption.
  10. To convert data into a code.

21 Clues: Unwanted emailUnintended data useOnline identity theftThe goal of encryption.Data collected about youCode that scrambles dataRules for online behaviorThe result of encryption.Automated decision makingProtecting computer systemsTo convert data into a code.A process used in encryption.The process of encoding data.Software that damages computers...

Cybersecurity CIS178 2024-07-12

Cybersecurity CIS178 crossword puzzle
Across
  1. Portable chip storing cellular connection
  2. Network Defense against unauthorized access
  3. Deceptive scheme to trick victims
  4. Fraudulent attempts to steal your data
  5. File or document sent electronically
  6. Cybercriminal skilled in breaching security
  7. Online content displayed in a browser
  8. Bad software directed at computers
  9. Digital Crimes committed using technology
  10. Developer updates to fix vulnerabilities
  11. Essential access code for security
Down
  1. Identifies you using something you are
  2. Affects system displaying unwanted ads
  3. Virus that disguises as legitimate software
  4. Holds data hostage for money
  5. Records users keystrokes to steal information
  6. Physical object used for authentication
  7. Detects and removes viruses
  8. Unauthorized software that gathers information
  9. Way to secure data trough coded algorithms

20 Clues: Detects and removes virusesHolds data hostage for moneyDeceptive scheme to trick victimsBad software directed at computersEssential access code for securityFile or document sent electronicallyOnline content displayed in a browserIdentifies you using something you areAffects system displaying unwanted adsFraudulent attempts to steal your data...

Rubrik 2024-11-06

Rubrik crossword puzzle
Across
  1. Sucks according to reddit
  2. He's him
  3. Dad
  4. SLED team name for October
  5. OCD
  6. Ancient
  7. Backups that cannot be deleted or changed
  8. Sparty
  9. Feature that scans for sensitive data
  10. Rubrik HQ
  11. Approach to security that trusts no system or person
  12. Worst city in the USA - see 4 down
Down
  1. Concussed
  2. Hates onions
  3. Worst team in the NFL
  4. Just married
  5. The ability to restore with a single button press
  6. Father of 9
  7. Your social security number is classified as this data type
  8. Badger
  9. Rubrik partner that has a shared responsibility model
  10. Company featured in Rubrik's most famous customer story
  11. Can be logical or physical

23 Clues: DadOCDBadgerSpartyAncientHe's himConcussedRubrik HQFather of 9Hates onionsJust marriedWorst team in the NFLSucks according to redditSLED team name for OctoberCan be logical or physicalWorst city in the USA - see 4 downFeature that scans for sensitive dataBackups that cannot be deleted or changedThe ability to restore with a single button press...

Root Word List 2 Crossword Puzzle 2016-09-21

Root Word List 2 Crossword Puzzle crossword puzzle
Across
  1. Someone that carries bags
  2. In charge, has the final say on anything
  3. Easily liked by a lot of people
  4. A machine used in farming
  5. Easily moved from place to place
Down
  1. shows a moving picture than can be saved in cyber space
  2. Grabbing a hold onto something
  3. A form of connection
  4. A person walking along a road
  5. A specific style
  6. A unit of measurement
  7. To turn from one thing into another

12 Clues: A specific styleA form of connectionA unit of measurementSomeone that carries bagsA machine used in farmingA person walking along a roadGrabbing a hold onto somethingEasily liked by a lot of peopleEasily moved from place to placeTo turn from one thing into anotherIn charge, has the final say on anything...

COMPUTER SCIENCE KEY WORDS 2025-10-09

COMPUTER SCIENCE KEY WORDS crossword puzzle
Across
  1. a network built of networks
  2. portable computer
  3. facility allowing portable devices to connect to the internet
  4. a software application for looking at websites
  5. a service on the internet
  6. fake Wi-Fi network used to steal data
Down
  1. the way data is transferred through devices
  2. devices connected for communication
  3. a set of rules on how to communicate
  4. a website that will show links
  5. a remote computer that has a website
  6. a cyber crime

12 Clues: a cyber crimeportable computera service on the interneta network built of networksa website that will show linksdevices connected for communicationa set of rules on how to communicatea remote computer that has a websitefake Wi-Fi network used to steal datathe way data is transferred through devicesa software application for looking at websites...

Human rights 2022-11-07

Human rights crossword puzzle
Across
  1. privatliv
  2. realationer
  3. liv
  4. alder
  5. bevægelse
  6. tortur
  7. nationalitet
  8. lov
  9. lighed
  10. tale
  11. slaveri
  12. sikkerhed
  13. skyldig
Down
  1. forskellsbehandling
  2. religion
  3. køn
  4. lighed
  5. frihed
  6. tro
  7. menneske
  8. rettigheder
  9. udtagelse
  10. sikkerhed

23 Clues: kønlivtrolovtalealderlighedfrihedtorturlighedslaveriskyldigreligionmenneskeprivatlivbevægelseudtagelsesikkerhedsikkerhedrealationerrettighedernationalitetforskellsbehandling

Ch. 9 (Plazas) viajar en avion 2019-01-22

Ch. 9 (Plazas) viajar en avion crossword puzzle
Across
  1. to travel
  2. departure
  3. agency
  4. pasillo
  5. passenger
  6. asistente
  7. flight
  8. aerolínea
  9. arrival
Down
  1. sin _______ (stop)
  2. equipaje
  3. seat
  4. aduana
  5. airplane window
  6. ticket
  7. security
  8. schedule
  9. trip
  10. suitcase
  11. plane

20 Clues: seattripplaneagencyaduanaticketflightpasilloarrivalequipajesecurityschedulesuitcaseto traveldeparturepassengerasistenteaerolíneaairplane windowsin _______ (stop)

Spanish Vocabulary 2023-04-26

Spanish Vocabulary crossword puzzle
Across
  1. gum
  2. cloud
  3. butterfly
  4. boat
  5. train
  6. sun
  7. energy
  8. suitcase
  9. plain
  10. to fish
Down
  1. avocado
  2. candy
  3. airport
  4. baggage
  5. to board
  6. security
  7. weather
  8. skier
  9. snorkle
  10. shade

20 Clues: gumsunboatcandycloudtrainskiershadeplainenergyavocadoairportbaggageweathersnorkleto fishto boardsecuritysuitcasebutterfly

CHS 2017-02-08

CHS crossword puzzle
Across
  1. eighteen
  2. thirteen
  3. sixteen
  4. fifteen
  5. nineteen
  6. eight
  7. one
  8. twenty
  9. ten
  10. six
Down
  1. nine
  2. fourteen
  3. four
  4. seventeen
  5. five
  6. twelve
  7. seven
  8. three
  9. eleven
  10. two

20 Clues: onetwotensixninefourfiveseventhreeeighttwelveeleventwentysixteenfifteenfourteeneighteenthirteennineteenseventeen

At the airport 2023-08-15

At the airport crossword puzzle
Across
  1. säten
  2. personal
  3. passagerare
  4. mittgång
  5. bagagevagn
  6. pilot
  7. förarkabin
  8. resväska
  9. ankomst
  10. Nödutgång
Down
  1. bagage
  2. flygkabin
  3. bording
  4. Flygplats
  5. avgång
  6. säkerhetsbälte
  7. tull
  8. pass
  9. flygplan
  10. säkerhet

20 Clues: tullpasssätenpilotbagageavgångbordingankomstpersonalmittgångresväskaflygplansäkerhetflygkabinFlygplatsNödutgångbagagevagnförarkabinpassageraresäkerhetsbälte

Human Rights 2025-07-17

Human Rights crossword puzzle
Across
  1. – buzilish
  2. – huquqlar
  3. – ta’lim
  4. – adolat
  5. – qonuniy
  6. – sog‘liqni saqlash
  7. – kamsitish
  8. – tenglik
  9. – ozodlik
  10. – erkinlik
  11. – qadriyatlar
Down
  1. – qo‘llab-quvvatlash
  2. – zo‘ravonlik
  3. – demokratiya
  4. – insonparvarlik
  5. – qadr-qimmat
  6. – xavfsizlik
  7. – himoya
  8. – hurmat
  9. – qonun

20 Clues: – qonun– ta’lim– himoya– adolat– hurmat– qonuniy– tenglik– ozodlik– buzilish– huquqlar– erkinlik– kamsitish– xavfsizlik– zo‘ravonlik– demokratiya– qadr-qimmat– qadriyatlar– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash

Human Rights 2025-07-26

Human Rights crossword puzzle
Across
  1. – demokratiya
  2. – adolat
  3. – himoya
  4. – tenglik
  5. – sog‘liqni saqlash
  6. – xavfsizlik
  7. – ta’lim
  8. – qadriyatlar
Down
  1. – kamsitish
  2. – zo‘ravonlik
  3. – ozodlik
  4. – qonuniy
  5. – qadr-qimmat
  6. – qo‘llab-quvvatlash
  7. – qonun
  8. – hurmat
  9. – insonparvarlik
  10. – erkinlik
  11. – huquqlar
  12. – buzilish

20 Clues: – qonun– adolat– himoya– hurmat– ta’lim– ozodlik– qonuniy– tenglik– erkinlik– huquqlar– buzilish– kamsitish– xavfsizlik– demokratiya– zo‘ravonlik– qadr-qimmat– qadriyatlar– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash

Series 63 - Chapter 3 2024-05-02

Series 63 - Chapter 3 crossword puzzle
Across
  1. kept on file for 6 years, detailed record of trading activity
  2. quick build up of interest in a security, followed by disposition of security, and typically price decline
  3. maximum prison sentence for willful violation of the USA
  4. block trades immediately as the market opens
  5. making market decisions for a portfolio with NPI
  6. winner of crossword two
  7. administrator does NOT have authority to
Down
  1. first name of your 63 coach (Hint: it's not Hunter, and you can find this information independently)
  2. Administrator may do this when they are investigating potential violations
  3. trading ahead of large pending orders
  4. block trades immediately before market close
  5. winner of crossword one
  6. willful deceit of client
  7. excessive trades in the account for commission
  8. typically rectified by way of payment of fees & covering cost of litigation never prison time
  9. buy and sale of security repeatedly to create illusion of activity
  10. placing fake orders to move prices up or down

17 Clues: winner of crossword onewinner of crossword twowillful deceit of clienttrading ahead of large pending ordersadministrator does NOT have authority toblock trades immediately before market closeblock trades immediately as the market opensplacing fake orders to move prices up or downexcessive trades in the account for commission...

Secure the Grid: Security Control Families Crossword 2024-12-04

Secure the Grid: Security Control Families Crossword crossword puzzle
Across
  1. Evaluation of systems to ensure compliance with security policies.
  2. Tracking activities to detect unauthorized access or misuse.
  3. The process of verifying a user's identity before access.
  4. Regular updates and repairs to keep systems secure.
  5. Procedures for restoring data and systems after an incident.
  6. Plans for continuity during an unexpected disruption.
Down
  1. Organized methods for securing and managing resources.
  2. Potential for a threat to exploit a vulnerability.
  3. Baseline settings to protect systems and reduce vulnerabilities.
  4. An event that compromises the security of information.
  5. Training to help users recognize and prevent security threats.
  6. Control mechanisms for who can enter or use resources.

12 Clues: Potential for a threat to exploit a vulnerability.Regular updates and repairs to keep systems secure.Plans for continuity during an unexpected disruption.Organized methods for securing and managing resources.An event that compromises the security of information.Control mechanisms for who can enter or use resources....

Secure the Grid: Security Control Families Crossword 2024-12-05

Secure the Grid: Security Control Families Crossword crossword puzzle
Across
  1. Tracking activities to detect unauthorized access or misuse.
  2. The process of verifying a user's identity before access.
  3. Potential for a threat to exploit a vulnerability.
  4. Baseline settings to protect systems and reduce vulnerabilities.
  5. Organized methods for securing and managing resources.
Down
  1. Evaluation of systems to ensure compliance with security policies.
  2. Training to help users recognize and prevent security threats.
  3. Plans for continuity during an unexpected disruption.
  4. Regular updates and repairs to keep systems secure.
  5. An event that compromises the security of information.
  6. Control mechanisms for who can enter or use resources.
  7. Procedures for restoring data and systems after an incident.

12 Clues: Potential for a threat to exploit a vulnerability.Regular updates and repairs to keep systems secure.Plans for continuity during an unexpected disruption.An event that compromises the security of information.Control mechanisms for who can enter or use resources.Organized methods for securing and managing resources....

Today’s Adventure 2025-12-25

Today’s Adventure crossword puzzle
Across
  1. Intelligent
  2. The energizer bunny
  3. Thomas Edison
  4. richest person
Down
  1. something you take to see how much you know
  2. you have to get a permit to do this
  3. Relating to computers/technology
  4. it has a bed but you don’t sleep in it

8 Clues: IntelligentThomas Edisonrichest personThe energizer bunnyRelating to computers/technologyyou have to get a permit to do thisit has a bed but you don’t sleep in itsomething you take to see how much you know

Cyber - safety Thomas 2016-06-06

Cyber - safety Thomas crossword puzzle
Across
  1. online - connect to the internet
  2. - don't tell anyone your password
  3. - something mean people do to get you online
  4. - don't spend too much time online
  5. - protect personal information
  6. - if you feel something is wrong, then tell mum or dad
  7. - always ask your parents when it asks to spend money
Down
  1. - types of sites that we are allowed to visit
  2. - bad language that you shouldn't use on the internet
  3. - sites on the Internet you visit
  4. - dob on someone to mum or dad if you think something isn't right
  5. Email - types of emails that you get, that ask you to forward them on, but you shouldn't.
  6. - don't play too many games online
  7. - only talk to people you know online

14 Clues: - protect personal informationonline - connect to the internet- sites on the Internet you visit- don't tell anyone your password- don't play too many games online- don't spend too much time online- only talk to people you know online- something mean people do to get you online- types of sites that we are allowed to visit...

Cyber Bezpieczna Krzyżówka 2025-02-02

Cyber Bezpieczna Krzyżówka crossword puzzle
Across
  1. Program, który instaluje się, żeby zabezpieczyć komputer.
  2. Program na telefonie lub tablecie np. Do nauki, gier albo rozmów.
  3. To złośliwy program, który może zniszczyć twój komputer.
  4. Miejsce, gdzie możesz szukać informacji.
  5. Tworzysz je w grze lub na stronie internetowej, aby móc się później zalogować i korzystać z różnych funkcji.
  6. Coś co chronisz w internecie, nie podając sowich danych.
Down
  1. Klikasz go, by przejść na inną stronę internetową, ale musisz uważać, żeby nie był fałszywy.
  2. Kiedy ktoś obraża, straszy lub wyśmiewa innych internecie.
  3. Wykorzystanie czyjejś pracy jako swojej.
  4. To tajny kod, który chroni twoje konto w internecie.
  5. Informacje o tobie, takie jak imię, nazwisko, adres e-mail, które należy chronić w internecie.
  6. Miejsce w internecie, gdzie możesz rozmawiać z innymi ludźmi. Może być to w grze lub na stronie.
  7. Możesz ją wysłać do kogoś przez e-mail, komunikator lub SMS.
  8. Osoba, która potrafi włamać się do systemów komputerowych i może ukraść dane.

14 Clues: Wykorzystanie czyjejś pracy jako swojej.Miejsce, gdzie możesz szukać informacji.To tajny kod, który chroni twoje konto w internecie.To złośliwy program, który może zniszczyć twój komputer.Coś co chronisz w internecie, nie podając sowich danych.Program, który instaluje się, żeby zabezpieczyć komputer....

MountainOne 2021-06-16

MountainOne crossword puzzle
Across
  1. President and CEO
  2. Manager in Rockland
  3. Manager in Pittsfield
  4. Manager in Scituate
  5. VP and Sr. regional manager
  6. Security and facilities officer
  7. SVP IT director and information security officer
Down
  1. SVP, Senior Human Resources officer
  2. COO, EVP, CFO and Treasurer
  3. Manager in Quincy
  4. Manager in North Adams
  5. SVP of com. Banking and pres. of MTN1 investments
  6. Manager in Williamstown
  7. AVP Electronic banking and Deposit OPS

14 Clues: President and CEOManager in QuincyManager in RocklandManager in ScituateManager in PittsfieldManager in North AdamsManager in WilliamstownCOO, EVP, CFO and TreasurerVP and Sr. regional managerSecurity and facilities officerSVP, Senior Human Resources officerAVP Electronic banking and Deposit OPSSVP IT director and information security officer...

J808 4.1 Types of Threats 2019-01-09

J808 4.1 Types of Threats crossword puzzle
Across
  1. A destructive computer program that bores its way through a computer's files or through a computer's network.
  2. Malware that allows a cyber-security attacker to take control of an infected computer.
  3. A type of Malware that locates and saves data from users without them knowing about it.
  4. Program that hides in a computer and allows someone from a remote location to take full control of the computer
  5. pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
  6. An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
  7. Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include
  8. Collection of captured bot computers
Down
  1. When someone deceives by pretending to be someone else in order to get personal data.
  2. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
  3. Criminals make a promise of goods in return for details, such as offering a free music download.
  4. horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
  5. Software that encrypts programs and data until a ransom is paid to remove it.
  6. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  7. An error in a program that prevents the program from running as expected

15 Clues: Collection of captured bot computersAn error in a program that prevents the program from running as expectedSoftware that encrypts programs and data until a ransom is paid to remove it.When someone deceives by pretending to be someone else in order to get personal data....

Trend Micro Mobile Security 4 2024-05-07

Trend Micro Mobile Security 4 crossword puzzle
Across
  1. Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)
  2. Trend Micro Mobile Security optimizes ____ usage to ensure minimal disruption to device performance. (Starts with r)
  3. Trend Micro Mobile Security regularly releases ____ for its mobile security products to address new threats and vulnerabilities. (Starts with u)
  4. Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)
Down
  1. Trend Micro Mobile Security provides ____ security protection. (Starts with c)
  2. Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)
  3. Users are encouraged to keep their Trend Micro Mobile Security app ____ to ensure they have the latest security features and protections.

7 Clues: Trend Micro Mobile Security uses ____ scanning techniques. (Starts with e)Trend Micro Mobile Security provides ____ security protection. (Starts with c)Trend Micro regular updates help to enhance ____ capabilities. (Starts with p)Trend Micro Mobile Security aims to minimize ____ on device performance. (Starts with i)...

Cyber tools 2023-01-09

Cyber tools crossword puzzle
Across
  1. best social networking site to chat
  2. best social networking site to watch videos
  3. a form of blogging using short posts without titles.
  4. an American social networking service based in San Francisco, California
Down
  1. to
  2. best way to connect with friends, work colleagues or random people
  3. apps GPS
  4. Similar to Microsoft OneDrive
  5. best way to find a job

9 Clues: toapps GPSbest way to find a jobSimilar to Microsoft OneDrivebest social networking site to chatbest social networking site to watch videosa form of blogging using short posts without titles.best way to connect with friends, work colleagues or random peoplean American social networking service based in San Francisco, California

Cyber-Mobbing 2019-05-07

Cyber-Mobbing crossword puzzle
Across
  1. Eine Plattform wo Videos hochgeladen und angeschaut werden können
  2. Ein Messenger wo wir tagtäglich damit schreiben
  3. Das Thema welches hier behandelt wird
  4. Ein tragbarer Computer
Down
  1. Eine Taste auf der Tastatur mit der man zum Beispiel ein Programm schließen kann
  2. Ein Spiel welches virtuell
  3. Wenn jemand gehasst wird
  4. Gerät welches viele Jugendliche verwenden
  5. Ein Profil das nicht echt ist

9 Clues: Ein tragbarer ComputerWenn jemand gehasst wirdEin Spiel welches virtuellEin Profil das nicht echt istDas Thema welches hier behandelt wirdGerät welches viele Jugendliche verwendenEin Messenger wo wir tagtäglich damit schreibenEine Plattform wo Videos hochgeladen und angeschaut werden können...

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. [giving information]
  2. [Pretending to be someone and getting them in Trouble]
  3. [Repeating rude messages]
  4. [excluding someone]
Down
  1. [offensive comments roomers and gossiping]
  2. [Online Arguments]
  3. [Stalking someone]
  4. [embarrassing someone]
  5. [bullying someone online]

9 Clues: [Online Arguments][Stalking someone][excluding someone][giving information][embarrassing someone][bullying someone online][Repeating rude messages][offensive comments roomers and gossiping][Pretending to be someone and getting them in Trouble]

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. (Stalking someone online)
  2. (pretending to be someone and getting them trouble)
  3. (Offensive comments roomer and gossip)
  4. (Embarrassing someone)
  5. (Online Arguments)
Down
  1. (Repeating rude messages)
  2. (bullying someone online)
  3. (giving information)
  4. (excluding someone)

9 Clues: (Online Arguments)(excluding someone)(giving information)(Embarrassing someone)(Repeating rude messages)(Stalking someone online)(bullying someone online)(Offensive comments roomer and gossip)(pretending to be someone and getting them trouble)

Cyber Safety 2013-08-12

Cyber Safety crossword puzzle
Across
  1. How often do you change your password?
  2. Who do you share your password with?
  3. What is the name of the setting to block unwanted messages?
Down
  1. You should never keep online _____.
  2. What do you do before posting?
  3. What is the name of someone who hassles you online?
  4. Information on the internet is available for how long?
  5. Never give your friends your online or phone____.
  6. When someone sends you inappropriate texts you ____ them.

9 Clues: What do you do before posting?You should never keep online _____.Who do you share your password with?How often do you change your password?Never give your friends your online or phone____.What is the name of someone who hassles you online?Information on the internet is available for how long?When someone sends you inappropriate texts you ____ them....

Cyber Smart 2024-01-18

Cyber Smart crossword puzzle
Across
  1. Measures taken to discourage or prevent unwanted actions or behaviors.
  2. A mode in web browsers that allows users to browse privately, leaving no trace in the browsing history.
  3. Alertness and watchfulness to detect and prevent potential dangers or threats.
  4. A software update designed to fix security vulnerabilities or improve functionality.
Down
  1. Authentication techniques based on unique physical or behavioral characteristics.
  2. The state of being anonymous, without revealing one's identity.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A decentralized and secure digital ledger used in cryptocurrency transactions.
  5. A security system designed to prevent unauthorized access to or from a private network.

9 Clues: The state of being anonymous, without revealing one's identity.Measures taken to discourage or prevent unwanted actions or behaviors.A decentralized and secure digital ledger used in cryptocurrency transactions.Alertness and watchfulness to detect and prevent potential dangers or threats....

Cyber Awareness 2023-10-02

Cyber Awareness crossword puzzle
Across
  1. A program that can harm your computer and steal your information.
  2. A set of characters used to access an account.
  3. The place where you can adjust your account settings.
  4. Private information you should never share online.
  5. Being disrespectful online
Down
  1. Protects your computer from viruses and malware.
  2. The practice of tricking people into giving up sensitive information.
  3. Treating others the way you want to be treated.
  4. A message or email that tries to deceive you into giving out personal information.

9 Clues: Being disrespectful onlineA set of characters used to access an account.Treating others the way you want to be treated.Protects your computer from viruses and malware.Private information you should never share online.The place where you can adjust your account settings.A program that can harm your computer and steal your information....

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Ethics 2025-05-24

Cyber Ethics crossword puzzle
Across
  1. network device that is used to connect all the computers in a network with each other
  2. network maintained without using wires
  3. networks connects two or more computers located at distant places
  4. simplest form of network structure in which two nodes are directly connected with each
Down
  1. topology uses a single communication line or one main cable to which all nodes are directly connected
  2. device that connects two different types of networks with each other
  3. topology which connected to a central computer using a point to point connection
  4. computer network that is mainly created for an individual person
  5. computers that communicate with each other

9 Clues: network maintained without using wirescomputers that communicate with each othercomputer network that is mainly created for an individual personnetworks connects two or more computers located at distant placesdevice that connects two different types of networks with each other...

Cyber Crossword 2025-07-14

Cyber Crossword crossword puzzle
Across
  1. Unwanted or unsolicited email often used to distribute malware.
  2. A scam where attackers impersonate senior executives.
  3. Type of malware that locks files and demands payment to unlock them.
  4. Keeping your software and operating system ________ is a key part of security.
Down
  1. Software that secretly gathers information from a computer.
  2. A common method used by cybercriminals to trick users into revealing sensitive information.
  3. A software program designed to protect against viruses and malware.
  4. A criminal who uses computers and networks to commit crimes.
  5. A secret word or phrase used to access a system.

9 Clues: A secret word or phrase used to access a system.A scam where attackers impersonate senior executives.Software that secretly gathers information from a computer.A criminal who uses computers and networks to commit crimes.Unwanted or unsolicited email often used to distribute malware.A software program designed to protect against viruses and malware....

Cyber Club 2026-02-11

Cyber Club crossword puzzle
Across
  1. A proactive threat-hunting exercise simulating adversarial behavior.
  2. Perimeter security control filtering inbound and outbound traffic based on policy.
  3. Attack technique exploiting excessive permissions to gain higher-level access
  4. Data protection technique replacing sensitive information with non-sensitive equivalents.
  5. Malware disguised as legitimate software to trick users into execution.
Down
  1. Cryptographic mechanism ensuring non-repudiation and integrity of digital communications.
  2. Security platform aggregating and correlating logs for real-time threat detection.
  3. Fraud method targeting executives or finance teams using impersonation.
  4. A security model that assumes breach and verifies every access request regardless of network location.

9 Clues: A proactive threat-hunting exercise simulating adversarial behavior.Fraud method targeting executives or finance teams using impersonation.Malware disguised as legitimate software to trick users into execution.Attack technique exploiting excessive permissions to gain higher-level access...

Cyber bullying 2024-06-11

Cyber bullying crossword puzzle
Across
  1. someone you can talk to at school
  2. helpline can be
  3. someone we can talk to at home
  4. when your device is malfunctioning you
  5. someone you can talk to at home
  6. what do you do to stop following you online
Down
  1. someone who gives good advice is
  2. what do you do when you are having problems you ask for
  3. to send out a message
  4. to get help outside

10 Clues: helpline can beto get help outsideto send out a messagesomeone we can talk to at homesomeone you can talk to at homesomeone who gives good advice issomeone you can talk to at schoolwhen your device is malfunctioning youwhat do you do to stop following you onlinewhat do you do when you are having problems you ask for

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO KEEP MONEY UNSPENT
  2. PRESENT BOUGHT FOR SOMEONE
  3. A 24-HOUR SHOPPING EVENT
  4. AMOUNT TO PAY FOR AN ITEM
  5. A URL TO A SHOPPING PAGE
Down
  1. LARGE DISCOUNTS
  2. WHEN SALES BEGIN
  3. AN AGREEMENT TO BUY AT A DISCOUNT
  4. WHEN SALES FINISH

9 Clues: LARGE DISCOUNTSWHEN SALES BEGINWHEN SALES FINISHTO KEEP MONEY UNSPENTA 24-HOUR SHOPPING EVENTA URL TO A SHOPPING PAGEAMOUNT TO PAY FOR AN ITEMPRESENT BOUGHT FOR SOMEONEAN AGREEMENT TO BUY AT A DISCOUNT

Jared's crossword 3 2014-04-29

Jared's crossword 3 crossword puzzle
Across
  1. unwelcomesexual advances
  2. teaching and learning strategy
  3. bullying through cyber meadum
  4. a place of learning with rules and conditions
  5. repeted cruelty or physical harm
Down
  1. a safe on line classroom
  2. bring together social and academic learning
  3. a sense of common purpose

8 Clues: a safe on line classroomunwelcomesexual advancesa sense of common purposebullying through cyber meadumteaching and learning strategyrepeted cruelty or physical harmbring together social and academic learninga place of learning with rules and conditions

bullying crossword :Jamie 2023-03-21

bullying crossword   :Jamie crossword puzzle
Across
  1. bullying that is related to the emotions.
  2. talk to a trusted _______.
  3. bullying that says mean words.
  4. the person watching the bullying.
Down
  1. the person getting bullied.
  2. bullying that pushes people.
  3. bullying that is online .
  4. the person who is mean.

8 Clues: the person who is mean.bullying that is online .talk to a trusted _______.the person getting bullied.bullying that pushes people.bullying that says mean words.the person watching the bullying.bullying that is related to the emotions.

Programming 2021-01-21

Programming crossword puzzle
Across
  1. Popular object notation
  2. Used to update node
  3. Cyber Group developed this using the Heroku platform
  4. IDE named after smallest unit of an element
  5. This guides pirates to treasure
Down
  1. Used to manage packages in NodeJS
  2. Used to manage packages in .NET
  3. Open–source version control system
  4. IDE named after astronomical events

9 Clues: Used to update nodePopular object notationUsed to manage packages in .NETThis guides pirates to treasureUsed to manage packages in NodeJSOpen–source version control systemIDE named after astronomical eventsIDE named after smallest unit of an elementCyber Group developed this using the Heroku platform

Programming 2021-01-21

Programming crossword puzzle
Across
  1. Popular object notation
  2. Used to update node
  3. Cyber Group developed this using the Heroku platform
  4. IDE named after smallest unit of an element
  5. This guides pirates to treasure
Down
  1. Used to manage packages in NodeJS
  2. Used to manage packages in .NET
  3. Open–source version control system
  4. IDE named after astronomical events

9 Clues: Used to update nodePopular object notationUsed to manage packages in .NETThis guides pirates to treasureUsed to manage packages in NodeJSOpen–source version control systemIDE named after astronomical eventsIDE named after smallest unit of an elementCyber Group developed this using the Heroku platform

Cyberbullying 2021-10-29

Cyberbullying crossword puzzle
Across
  1. If you are bullied, tell an ......
  2. Cyberbullying is against the law.
  3. in position of power towards one or more.
  4. Denial of access to particular parts of
  5. An example of cyberbullying.
Down
  1. Repeated or deliberate harassment by one
  2. Bullying online, is called .....
  3. A wireless handheld device for telephone
  4. Many websites have reported functions for
  5. When bullied, stay .....

10 Clues: When bullied, stay .....An example of cyberbullying.Bullying online, is called .....Cyberbullying is against the law.If you are bullied, tell an ......Denial of access to particular parts ofRepeated or deliberate harassment by oneA wireless handheld device for telephoneMany websites have reported functions for...

tourism 2019-07-16

tourism crossword puzzle
Across
  1. Z in the phonetic alphabet
  2. Y in the phonetic alphabet
  3. S in the phonetic alphabet
  4. Where is Qantas based
  5. NZ's low cost carrier
  6. the area before departing through security
  7. The capital of New Zealand
  8. Charles De Gaulle airport is situated where
  9. World's busiest airport
  10. Japans busiest airport
  11. Q in the phonetic alphabet
Down
  1. Hamilton's three letter code
  2. F in the phonetic alphabet
  3. Another word for baggage
  4. Busiest country in the world in regards to airports
  5. NZ's full service carrier
  6. where you go through security and hand over your passport
  7. ROT stands for
  8. 1900 Is what in the 12 hour clock
  9. Hokitika's three letter code

20 Clues: ROT stands forWhere is Qantas basedNZ's low cost carrierJapans busiest airportWorld's busiest airportAnother word for baggageNZ's full service carrierF in the phonetic alphabetZ in the phonetic alphabetY in the phonetic alphabetS in the phonetic alphabetThe capital of New ZealandQ in the phonetic alphabetHamilton's three letter code...

CIS 120 Cybersecurity Crossword Puzzle 2023-02-21

CIS 120 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. software that is constantly updating
  2. software/hardware keep intruders out
  3. text read by human eye
  4. transform ciphertext into original plaintext
  5. test distinguishes between human/robot
  6. security mechanism determining who's authorized
  7. intent to cause mischief/theft
  8. code imbedded into computer hardware
  9. technique to click bad url
  10. physical parts of a computer
  11. core of computers operating system
Down
  1. trap or decoy for attackers
  2. coding used to protect information
  3. connect computers to encrypted network
  4. attempt to violate security perimeter
  5. language to create/control website content
  6. shield users against computer damage
  7. term for unauthorized computer attacker
  8. malicious software to damage systems
  9. an error in computer program

20 Clues: text read by human eyetechnique to click bad urltrap or decoy for attackersan error in computer programphysical parts of a computerintent to cause mischief/theftcoding used to protect informationcore of computers operating systemsoftware that is constantly updatingsoftware/hardware keep intruders outshield users against computer damage...

Cybersecurity 2024-08-31

Cybersecurity crossword puzzle
Across
  1. bring your own computer
  2. coding used to protect information
  3. a method of gaining access to a network
  4. protects users from fraudulent websites
  5. a string used to identify user
  6. a program that is run without installation
  7. malicious software
  8. bring your own device
  9. items that are temporarily blocked
  10. process of identifying someone
  11. taking advantage of a vulnerability in a network
Down
  1. combination of robot and network
  2. individual with intent to hack maliciously
  3. network security system
  4. a kind of spyware
  5. a denial of service
  6. computer security system trap
  7. casting a reel in water
  8. intrusive software
  9. someone with knowledge of exploits
  10. misuse of devices to corrupt

21 Clues: a kind of spywaremalicious softwareintrusive softwarea denial of servicebring your own devicebring your own computernetwork security systemcasting a reel in watermisuse of devices to corruptcomputer security system trapprocess of identifying someonea string used to identify usercombination of robot and networkcoding used to protect information...

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. you use it to keep your internet connection secure.
  3. you have to keep them safe.
  4. you use them to keep private your information. they have to be strong.
Down
  1. never send it to people meet online.
  2. when you download something, make sure it's a...
  3. before you post somenthing, you have to ask your...
  4. option to keep your profile private.
  5. software used to delete viruses on a computer.
  6. when you post, you have to use it careful to avoid offending people.

10 Clues: you do it to avoid virus.you have to keep them safe.never send it to people meet online.option to keep your profile private.software used to delete viruses on a computer.when you download something, make sure it's a...before you post somenthing, you have to ask your...you use it to keep your internet connection secure....

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. software used to delete viruses on a computer.
  3. when you post, you have to use it careful to avoid offending people.
  4. never send it to people meet online.
  5. when you download something, make sure it's a...
  6. you use it to keep your internet connection secure.
Down
  1. you have to keep them safe.
  2. you use them to keep private your information. they have to be strong.
  3. option to keep your profile private.
  4. before you post somenthing, you have to ask yours...

10 Clues: you do it to avoid virus.you have to keep them safe.option to keep your profile private.never send it to people meet online.software used to delete viruses on a computer.when you download something, make sure it's a...you use it to keep your internet connection secure.before you post somenthing, you have to ask yours......

Info - security 2017-11-27

Info - security crossword puzzle
Across
  1. be attentive
  2. lure someone
  3. name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
  4. protect networks, computers, programs and data from attack
  5. should not be shared
  6. monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. designed to detect and destroy computer viruses
  2. exploit weaknesses to gain access
  3. malicious software designed to block access to a computer system until a sum of money is paid.
  4. protects personal data published via the Internet

10 Clues: be attentivelure someoneshould not be sharedexploit weaknesses to gain accessdesigned to detect and destroy computer virusesprotects personal data published via the Internetprotect networks, computers, programs and data from attackmalicious software designed to block access to a computer system until a sum of money is paid....

IT Security 2018-05-22

IT Security crossword puzzle
Across
  1. You should not be checking your ________ email while on work computers.
  2. When you temporarily leave the workstation you are working at, you should ___________ the computer.
  3. Where should you look for a policy and instructions on what to do during downtimes?
  4. When you receive an email from someone you don't know, you should click on links inside the email.
  5. Hospital computers and programs, including email, should be used for _______________ use only.
Down
  1. If you don't see a program on the desktop, where can you search for it?
  2. When calling or emailing the help desk, the ________ details you provide, the easier it will be to solve your issue quickly.
  3. Installing Windows updates on computers is important because it helps ____________ vulnerabilities on the computer.
  4. ePHI is everyone's responsibility.
  5. When you are done with your shift, you should always ________ of the workstation.

10 Clues: ePHI is everyone's responsibility.If you don't see a program on the desktop, where can you search for it?You should not be checking your ________ email while on work computers.When you are done with your shift, you should always ________ of the workstation.Where should you look for a policy and instructions on what to do during downtimes?...

Security Quiz 2019-02-19

Security Quiz crossword puzzle
Across
  1. Pleasing to the senses
  2. A person who is a member of a cooperative relationship
  3. A son of your brother or sister
  4. A female human offspring
Down
  1. Place of business where professional duties are performed
  2. The state of being free from danger or injury
  3. The principal activity in one's life to earn money
  4. A human offspring (son or daughter) of any age
  5. A daughter of your brother or sister
  6. A fully developed person from maturity onward

10 Clues: Pleasing to the sensesA female human offspringA son of your brother or sisterA daughter of your brother or sisterThe state of being free from danger or injuryA fully developed person from maturity onwardA human offspring (son or daughter) of any ageThe principal activity in one's life to earn money...

IT Security 2020-01-06

IT Security crossword puzzle
Across
  1. password manager mentioned in presentation
  2. standalone malware computer program that replicates itself in order to spread to other computers
  3. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  4. nickname of person who stolen Morele.net database
  5. a good hacker
  6. a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
  1. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
  4. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

10 Clues: a good hackerpassword manager mentioned in presentationnickname of person who stolen Morele.net databasestandalone malware computer program that replicates itself in order to spread to other computersa type of malicious software designed to block access to a computer system until a sum of money is paid....

security puzzle 2015-03-03

security puzzle crossword puzzle
Across
  1. A course of action, guiding principle, or procedure considered expedient, prudent, or advantageous.
  2. A computer overtaken by a hacker and used to perform malicious tasks.
  3. is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.
  4. A security tool that protects an individual computer or even an entire network from unauthorized attempts to access your system.
Down
  1. A form of spyware that enters your computer from an Internet download.
  2. A new term for spam messages being sent to instant message addresses.
  3. Forging an e-mail or instant message address to make it appear as if it came from someone or somewhere other than the true source.
  4. The transfer of data from one computer (or server) to another computer.
  5. A person who enjoys exploring the details of computers and how to stretch their capabilities.
  6. A violation or infraction, as of a law, a legal obligation, or a promise.

10 Clues: A new term for spam messages being sent to instant message addresses.A computer overtaken by a hacker and used to perform malicious tasks.A form of spyware that enters your computer from an Internet download.The transfer of data from one computer (or server) to another computer....

Security - Medium 2023-11-28

Security - Medium crossword puzzle
Across
  1. routine of applying updates to software to address vulnerabilities
  2. cryptographic attack involves trying all possible keys until the correct one is found
  3. What do hackers do on a boat?
  4. type of encryption which uses the same key for both encryption and decryption
  5. a software vulnerability discovered by attackers before the vendor has become aware of it
  6. the secret code that enhances the security of passwords
Down
  1. type of attack involves intercepting and altering communication between two parties without their knowledge
  2. technique that involves gaining unauthorized access by pretending to be someone else
  3. a device or software that captures and records keystrokes on a computer
  4. security measure to verify a user's identity through a unique biological or behavioral characteristic

10 Clues: What do hackers do on a boat?the secret code that enhances the security of passwordsroutine of applying updates to software to address vulnerabilitiesa device or software that captures and records keystrokes on a computertype of encryption which uses the same key for both encryption and decryption...

Food Security 2024-01-10

Food Security crossword puzzle
Across
  1. Who added a new dimension to food security and emphasised the “access” to food?
  2. The introduction of __________ in India dates back to the 1940s Bengal Famine.
  3. A special stamp was released by Indira Gandhi, the then Prime Minister of India, in July 1968. It was entitled as ______
  4. The stock of foodgrains, namely wheat and rice, procured by the government through the food corporation of India is _______
  5. Which revolution was adopted in July 1968?
Down
  1. Ration shops also known as
  2. Amul is a cooperative established in _________.
  3. Which was the most devastating famine faced by India?
  4. The price at which food grains are distributed in the deficit areas and among the poor strata of the society.
  5. The PDS card for below poverty line is ________.

10 Clues: Ration shops also known asWhich revolution was adopted in July 1968?Amul is a cooperative established in _________.The PDS card for below poverty line is ________.Which was the most devastating famine faced by India?The introduction of __________ in India dates back to the 1940s Bengal Famine....

Data Security 2024-04-11

Data Security crossword puzzle
Across
  1. Involves intentional deception for financial gain or to cause harm.
  2. Process of converting data into a format that cannot be easily understood by unauthorized parties.
  3. Refers to the malfunctioning or breakdown of physical components in computer systems or devices.
  4. fires, floods, earthquakes
Down
  1. Record of events or activities occurring within a system, network, or application.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
  3. Used to authenticate users and control access to computer systems, networks, or applications.
  4. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  5. Security system designed to monitor and control incoming and outgoing network traffic.
  6. inaccurate data entry, accidental deletion or changing of data)

10 Clues: fires, floods, earthquakesinaccurate data entry, accidental deletion or changing of data)Involves intentional deception for financial gain or to cause harm.Record of events or activities occurring within a system, network, or application.Security system designed to monitor and control incoming and outgoing network traffic....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Global initiative to end hunger and malnutrition
  2. Sustainable farming method that mimics natural ecosystems
  3. Process of preserving food for future use
  4. Ability to access nutritious food consistently
  5. Agricultural practice to increase crop yields
Down
  1. Practice of growing crops and raising livestock on the same land
  2. Lack of access to adequate food
  3. UN agency working to achieve food security worldwide
  4. Nutrient-dense foods that can be stored long-term
  5. Economic access to sufficient food

10 Clues: Lack of access to adequate foodEconomic access to sufficient foodProcess of preserving food for future useAgricultural practice to increase crop yieldsAbility to access nutritious food consistentlyGlobal initiative to end hunger and malnutritionNutrient-dense foods that can be stored long-termUN agency working to achieve food security worldwide...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A type of farming that primarily focuses on growing food for sale, not just for local consumption.
  2. Crops grown primarily to feed livestock rather than humans.
  3. A farming method aimed at producing food without depleting natural resources.
  4. Rotation The practice of rotating different crops on the same land to improve soil health.
Down
  1. Nutrient group providing energy, often found in grains like wheat and rice.
  2. C Essential vitamin often found in fruits and vegetables that boosts the immune system.
  3. An essential mineral found in dairy products, important for bone health.
  4. The process of growing crops and raising livestock for food.
  5. A protein-rich legume commonly used to improve soil fertility.
  6. The global organization dedicated to eradicating hunger and ensuring food security.

10 Clues: The process of growing crops and raising livestock for food.A protein-rich legume commonly used to improve soil fertility.Crops grown primarily to feed livestock rather than humans.An essential mineral found in dairy products, important for bone health.Nutrient group providing energy, often found in grains like wheat and rice....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. the distress associated with lack of food
  2. the practice of growing crops or raising animals
  3. the variety of all living things and their interactions
  4. an imbalance between the nutrients your body needs to function
Down
  1. the ability to be maintained at a certain level and availability
  2. Application of ecological concepts and principals in farming
  3. the supply of water to land or crops to help growth
  4. the process of obtaining food necessary for health and growth
  5. a cultivated plant that is grown on a large scale commercially
  6. the state of being in short supply

10 Clues: the state of being in short supplythe distress associated with lack of foodthe practice of growing crops or raising animalsthe supply of water to land or crops to help growththe variety of all living things and their interactionsApplication of ecological concepts and principals in farmingthe process of obtaining food necessary for health and growth...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Source of proteins
  2. Source of vitamins and proteins
  3. Must to have for food production
  4. Source of high calories
  5. Source of iron
  6. Increases sugar harm for health
Down
  1. Food source
  2. source of vitamin D
  3. Harmful for health
  4. Nutritional drink

10 Clues: Food sourceSource of ironNutritional drinkSource of proteinsHarmful for healthsource of vitamin DSource of high caloriesSource of vitamins and proteinsIncreases sugar harm for healthMust to have for food production

food security 2024-10-17

food security crossword puzzle
Across
  1. - Protein-rich legume often used as a meat alternative.
  2. - A common grain that is a staple food in many countries.
  3. - Process of cooking and preparing food to make it safe and tasty.
  4. - A term referring to edible plants like spinach and lettuce, rich in vitamins and minerals.
  5. - A vitamin commonly found in fruits that helps prevent scurvy.
Down
  1. - A type of farming where crops are grown specifically for sale, not for local consumption.
  2. - Farming, growing crops, and raising animals for food.
  3. - A common mineral needed for strong bones, found in dairy products.
  4. - Lack of enough food to meet basic needs.
  5. - A natural resource essential for growing food.

10 Clues: - Lack of enough food to meet basic needs.- A natural resource essential for growing food.- Protein-rich legume often used as a meat alternative.- Farming, growing crops, and raising animals for food.- A common grain that is a staple food in many countries.- A vitamin commonly found in fruits that helps prevent scurvy....

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Lack of resources to access food
  2. Reducing food waste and loss
  3. Promoting sustainable and resilient food systems
  4. Crops grown for human consumption
  5. Process of producing food
Down
  1. Producing food without harming the environment
  2. Preserving natural resources for future food production
  3. Practice of growing crops in urban areas
  4. Preserving traditional farming knowledge
  5. Producing food locally

10 Clues: Producing food locallyProcess of producing foodReducing food waste and lossLack of resources to access foodCrops grown for human consumptionPractice of growing crops in urban areasPreserving traditional farming knowledgeProducing food without harming the environmentPromoting sustainable and resilient food systems...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A state where people don't have enough food to meet daily energy needs.
  2. Financial aid provided by the government to support food production.
  3. A major threat to food security due to impacts on agriculture.
  4. A non-profit organization that provides aids distributes food to those in need.
  5. It supplies many vital ecosystem services, such as creating and maintaining healthy soils.
  6. A condition caused by inadequate or unbalanced diet.
Down
  1. an extreme shortage of food leading to mass.
  2. A significant barrier to access to food.
  3. meeting the needs of the present without compromising the future.
  4. A practice of farming to produce food.

10 Clues: A practice of farming to produce food.A significant barrier to access to food.an extreme shortage of food leading to mass.A condition caused by inadequate or unbalanced diet.A major threat to food security due to impacts on agriculture.meeting the needs of the present without compromising the future....

Security crossword 2023-06-27

Security crossword crossword puzzle
Across
  1. requires Outside Activity report
  2. OFMD is a ___ mission
  3. NonFrat country
  4. Access control
  5. Annual training reqt.
Down
  1. Prohibitted technology
  2. filed biennially
  3. PFT should be reported __ days before
  4. Staff like badge color
  5. ___ Act covers political participation

10 Clues: Access controlNonFrat countryfiled bienniallyOFMD is a ___ missionAnnual training reqt.Prohibitted technologyStaff like badge colorrequires Outside Activity reportPFT should be reported __ days before___ Act covers political participation

Online Security 2023-08-11

Online Security crossword puzzle
Across
  1. News that contains deliberate disinformation
  2. It is also known as digital footprint.
  3. The suppression, prohibition, or withholding of information that is considered unacceptable or dangerous, for example because it is obscene or a threat to national security
  4. websites that are not indexed by search engines and can only be accessed by some softwares
  5. Large data sets that are analysed in order to identify patterns and trends,
Down
  1. It is a process of converting data into code in order to protect information.
  2. It is a content that is considered to have the potential to corrupt.
  3. Malicious software that is designed to break into and/or harm a computer system
  4. A scam conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information
  5. A network that operates using public infrastructure but uses security mechanisms

10 Clues: It is also known as digital footprint.News that contains deliberate disinformationIt is a content that is considered to have the potential to corrupt.Large data sets that are analysed in order to identify patterns and trends,It is a process of converting data into code in order to protect information....

internet security 2022-05-31

internet security crossword puzzle
Across
  1. il simbolo del cancelletto (#) associato a una o più parole chiave per facilitare le ricerche tematiche in un blog o in un social network.
  2. connessione che ti permette di navigare su internet.
  3. in informatica, il complesso dei dati identificativi di un utente, che gli consentono l'accesso a un servizio telematico: a. di posta elettronica, nome e parola d'accesso per poter usufruire del servizio di posta elettronica.
  4. programma per navigare in Internet che inoltra la richiesta di un documento alla rete e ne consente la visualizzazione una volta arrivato.
  5. circuito di emittenti televisive, collegate o associate fra loro per la trasmissione degli stessi programmi.
  6. computer di elevate prestazioni che in una rete fornisce un servizio agli altri elaboratori collegati, detti client.
Down
  1. luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi.
  2. insieme di pagine web.
  3. in informatica, parola o sigla di riconoscimento fornita dall'utente all'elaboratore per poter accedere a un sistema operativo, a un programma o a un file.
  4. sistema che permette la condivisione di documenti iper testuali multimediali.

10 Clues: insieme di pagine web.connessione che ti permette di navigare su internet.sistema che permette la condivisione di documenti iper testuali multimediali.luogo fisico in cui gli utenti possono connettere a internet in modalità wireless i loro dispositivi....

Network Security 2023-05-10

Network Security crossword puzzle
Across
  1. Exposes confidential, sensitive, or protected information to an unauthorized person.
  2. The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
  3. Addresses that are associated with specific devices and assigned to them by the manufacturer.
  4. The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
  5. A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
  1. The process or action of proving or showing something to be true, genuine, or valid:
  2. Is the overall accuracy, completeness, and consistency of data.
  3. A security mechanism that identifies people by verifying their physical or behavioral characteristics.
  4. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  5. The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.

10 Clues: Is the overall accuracy, completeness, and consistency of data.The process or action of proving or showing something to be true, genuine, or valid:Exposes confidential, sensitive, or protected information to an unauthorized person.Addresses that are associated with specific devices and assigned to them by the manufacturer....

Network Security 2025-02-04

Network Security crossword puzzle
Across
  1. A type of penetration testing that mimics an external attack on the system. (5,3)
  2. This type of malware appears to be legitimate, like a game, but is actually harmful.
  3. A type of malware that locks a device and demands a fee to unlock it.
  4. A type of attack where someone monitors data traveling on a network to intercept sensitive information.
  5. A technique where cybercriminals send messages disguised as from a trusted source to steal personal data.
  6. A method to prevent unauthorized access to data by translating it into code that only someone with the correct key can access.
Down
  1. An attack that uses automated software to produce hundreds of likely passwords to gain access to accounts. (5,5)
  2. A type of malware that self-replicates and attaches to another file or program.
  3. A type of attack where a server is flooded with useless traffic, causing it to slow down or become unusable.(6,2,7)
  4. A type of social engineering attack where the attacker watches the victim over their shoulder to gain personal information.

10 Clues: A type of malware that locks a device and demands a fee to unlock it.A type of malware that self-replicates and attaches to another file or program.A type of penetration testing that mimics an external attack on the system. (5,3)This type of malware appears to be legitimate, like a game, but is actually harmful....

Food Security 2024-11-28

Food Security crossword puzzle
Across
  1. - D Vitamin for free
  2. - Dry fruits
  3. - Easily available and affordable Protein
  4. - Your skin glows
Down
  1. - Good for eye sight
  2. - Source of fibre
  3. - This is where you get iron from
  4. - Maharashtra produces largest volume
  5. - We get calcium from here
  6. - Protein for Vegetarians

10 Clues: - Dry fruits- Source of fibre- Your skin glows- Good for eye sight- D Vitamin for free- Protein for Vegetarians- We get calcium from here- This is where you get iron from- Maharashtra produces largest volume- Easily available and affordable Protein

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. What fruit is yellow and monkeys love to eat? (6 letters)
  2. What green vegetable is often eaten in salads? (6 letters)
  3. What is a popular breakfast food made from grains? (4 letters)
  4. What hot drink is made from beans, often served in the morning? (6 letters)
  5. What sweet treat is made from sugar and comes in many flavors? (5 letters)
  6. What is a popular drink made from milk? (3 letters)
Down
  1. What food can be spread on bread, often made from peanuts? (8 letters)
  2. What red fruit is often used in salads or sauces? (5 letters)
  3. What citrus fruit is yellow and sour? (6 letters)
  4. What food comes from cows and is used to make cheese? (5 letters)

10 Clues: What citrus fruit is yellow and sour? (6 letters)What is a popular drink made from milk? (3 letters)What fruit is yellow and monkeys love to eat? (6 letters)What green vegetable is often eaten in salads? (6 letters)What red fruit is often used in salads or sauces? (5 letters)What is a popular breakfast food made from grains? (4 letters)...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. In the Hindu culture, the leaves of which fruit are hung at weddings to ensure fertility?
  2. Which fruit has the highest oil content?
  3. The only fruit to have seeds on the outside is:
  4. Limas and pintos are what type of vegetable?
  5. There is a fruit juice that can increase the potency of some medication, even causing an overdose. Which fruit juice is this?
  6. What color are blackberries?
Down
  1. What stick-like veggie's name comes from the Greek word for "sprout" or "shoot"?
  2. Which vegetable grows underground like a potato?
  3. Chinese Gooseberry is another name for:
  4. What fruit are monkeys known to enjoy?

10 Clues: What color are blackberries?What fruit are monkeys known to enjoy?Chinese Gooseberry is another name for:Which fruit has the highest oil content?Limas and pintos are what type of vegetable?The only fruit to have seeds on the outside is:Which vegetable grows underground like a potato?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. – A type of poultry, often grilled or fried
  2. – A crunchy fruit, often red or green
  3. – A yellow fruit, rich in potassium
  4. – A type of Italian food made from wheat flour and water
Down
  1. – A dairy product made from curdled milk
  2. cream – A sweet frozen treat made from milk, cream, and sugar
  3. – A staple food made from flour and water, often baked
  4. – A dish typically made with greens, vegetables, and dressing
  5. – Orange vegetable, good for your eyes
  6. – A popular Italian dish with cheese, sauce, and various toppings

10 Clues: – A yellow fruit, rich in potassium– A crunchy fruit, often red or green– Orange vegetable, good for your eyes– A dairy product made from curdled milk– A type of poultry, often grilled or fried– A staple food made from flour and water, often baked– A type of Italian food made from wheat flour and water...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. What purple fruit grows in bunches?
  2. Which round, red fruit is often associated with keeping the doctor away?
  3. Name a fruit rich in Vitamin C.
  4. What nutrient helps build strong bones and teeth?
  5. Food which is good for gut health.
Down
  1. Which yellow fruit is rich in potassium?
  2. Name a green vegetable rich in iron.
  3. What is a good source of protein?
  4. Vitamin A is found in which vegetable?
  5. Which food helps make our bones strong?

10 Clues: Name a fruit rich in Vitamin C.What is a good source of protein?Food which is good for gut health.What purple fruit grows in bunches?Name a green vegetable rich in iron.Vitamin A is found in which vegetable?Which yellow fruit is rich in potassium?Which food helps make our bones strong?What nutrient helps build strong bones and teeth?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. The process of providing or obtaining the food necessary for health and growth.
  2. This powerful vehicle is essential for many farming tasks, including plowing and harvesting.
  3. This physical sensation of desiring food can become chronic in food-insecure populations.
  4. Animals raised on a farm for profit or subsistence, these can include cattle, pigs, and sheep.
  5. The process of gathering ripe crops from the fields, this is often the busiest time of year for farmers.
  6. This chemical substance is used to control or eliminate harmful insects and other pests in crops.
Down
  1. The amount of crop produced per unit of land area is referred to by this term.
  2. Farming without synthetic pesticides or fertilizers, this method aims to be more environmentally friendly.
  3. The variety of plant and animal life in ecosystems is crucial for resilient food systems.
  4. This financial support from governments can help farmers produce food at lower costs.

10 Clues: The amount of crop produced per unit of land area is referred to by this term.The process of providing or obtaining the food necessary for health and growth.This financial support from governments can help farmers produce food at lower costs.The variety of plant and animal life in ecosystems is crucial for resilient food systems....

AVIATION SECURITY 2025-09-17

AVIATION SECURITY crossword puzzle
Across
  1. CCMs can submit security reports by using the ….reporting tool
  2. following a red bomb threat and if the bomb is found we execute the …..article drill checklist
  3. a passenger is found smoking in the lavatory and does not comply. We had over the …..warning
  4. a security search is required after passenger disembarkation and / or cargo holds unloading in ……airport
  5. the unlawful, violent or by threat of violence, seizure of an aircraft
Down
  1. normal access in the cockpit is done by saying position and assigned……
  2. no person is allowed to enter the aircraft without showing his/ her …..
  3. a category of bomb and sabotage threat
  4. the cabin …..checklist is to be carried out when there has been a RED threat against the airplane or service
  5. a security search is required before departure from ….despite the aircraft’s previous destination

10 Clues: a category of bomb and sabotage threatCCMs can submit security reports by using the ….reporting toolnormal access in the cockpit is done by saying position and assigned……the unlawful, violent or by threat of violence, seizure of an aircraftno person is allowed to enter the aircraft without showing his/ her ….....

Physical Security 2026-03-19

Physical Security crossword puzzle
Across
  1. _____must sign the secure area log
  2. inspect daily
  3. designed as deep insert devices, making them difficult to detect
  4. remain____ after a roberry
  5. _____Act, set minimum requirements for security programs
  6. ____should remain to assist law enforcement
Down
  1. Verify____ authorization
  2. money with recorded serial numbers
  3. notify____ immediately if an access card, or card is lost or stolen
  4. helpful acronym guide to follow after robbery

10 Clues: inspect dailyVerify____ authorizationremain____ after a roberrymoney with recorded serial numbers_____must sign the secure area log____should remain to assist law enforcementhelpful acronym guide to follow after robbery_____Act, set minimum requirements for security programsdesigned as deep insert devices, making them difficult to detect...

security crossword puzzle 2023-10-04

security crossword puzzle crossword puzzle
Across
  1. Helps to continue in disruption
  2. protection against improper modification
  3. Security is ____________'s responsibility
  4. Abbreviation for a D&B data classification
  5. 9 digit unique identifier for entities
  6. Process mandated before every new project
  7. Cybercrime to mine cryptocurrency
  8. Laptop physical fastener
  9. ____desk
Down
  1. Security is a ____________ enabler
  2. ____the franchise
  3. Helps identify machines and improve web browsing experience
  4. QR code based fraud attempts
  5. Are you a robot ?

14 Clues: ____desk____the franchiseAre you a robot ?Laptop physical fastenerQR code based fraud attemptsHelps to continue in disruptionCybercrime to mine cryptocurrencySecurity is a ____________ enabler9 digit unique identifier for entitiesprotection against improper modificationProcess mandated before every new project...

Espanol 4: Unidad 4 Contexto 1 2017-04-30

Espanol 4: Unidad 4 Contexto 1 crossword puzzle
Across
  1. together
  2. quality
  3. retire
  4. apprenticeship
  5. scatter
  6. interview
  7. scholarship
  8. security
  9. check
  10. application
  11. rest
Down
  1. value
  2. relieve
  3. anxiety
  4. unsatisfied
  5. prestige
  6. hobby
  7. leisure
  8. relax
  9. dedicate
  10. choose

21 Clues: restvaluehobbyrelaxcheckretirechooserelievequalityanxietyleisurescattertogetherprestigededicatesecurityinterviewunsatisfiedscholarshipapplicationapprenticeship

Crossword Englisch 2015-10-19

Crossword Englisch crossword puzzle
Across
  1. beveiliging
  2. kostbaar
  3. ingang
  4. boet
  5. bestemming
  6. schade
  7. verval
  8. zichtbaar
  9. verzekering
  10. BTW
Down
  1. apart
  2. met-zorg
  3. weegbrug
  4. kentekenplaat
  5. bederfbare
  6. overstroming
  7. versnelling
  8. herkomst
  9. omleiding
  10. koppeling

20 Clues: BTWboetapartingangschadevervalmet-zorgweegbrugkostbaarherkomstomleidingzichtbaarkoppelingbederfbarebestemmingbeveiligingversnellingverzekeringoverstromingkentekenplaat

The outbreak of the Cold War 2015-02-22

The outbreak of the Cold War crossword puzzle
Across
  1. e
  2. j
  3. i
  4. q
  5. a
  6. k
  7. r
  8. s
  9. b
  10. f
Down
  1. p
  2. g
  3. t
  4. u
  5. n
  6. h
  7. c
  8. o
  9. m
  10. d
  11. l

21 Clues: pgetjuniqhcoamdklrsbf

Kintahdi Diné Binidaanishígíí Opal Mohs-6th 2023-03-06

Kintahdi Diné Binidaanishígíí Opal Mohs-6th crossword puzzle
Across
  1. barber
  2. shop worker
  3. baker
  4. photographer
  5. plumber
  6. butcher
  7. mechanic
  8. architect
  9. florist
  10. weather forecaster
  11. janitor
Down
  1. carpenter
  2. pharmacist
  3. doorman
  4. writer
  5. electrician
  6. painter
  7. security guard
  8. salesperson
  9. gardener

20 Clues: bakerbarberwriterdoormanplumberbutcherpainterfloristjanitormechanicgardenercarpenterarchitectpharmacistelectricianshop workersalespersonphotographersecurity guardweather forecaster

viajes felizes 2022-10-13

viajes felizes crossword puzzle
Across
  1. confirm
  2. security
  3. assistant
  4. to board
  5. gate
  6. agent
  7. passport
  8. agency
  9. screen
  10. line
Down
  1. to travel
  2. departure
  3. passenger
  4. itinerary
  5. check
  6. to call
  7. suitcase
  8. ticket
  9. luggage
  10. flight

20 Clues: gatelinecheckagentticketflightagencyscreenconfirmto callluggagesecuritysuitcaseto boardpassportto traveldeparturepassengeritineraryassistant

Human Rights 2025-07-26

Human Rights crossword puzzle
Across
  1. – sog‘liqni saqlash
  2. – adolat
  3. – xavfsizlik
  4. – zo‘ravonlik
  5. – qadr-qimmat
  6. – insonparvarlik
  7. – ozodlik
  8. – himoya
Down
  1. – qo‘llab-quvvatlash
  2. – ta’lim
  3. – demokratiya
  4. – qadriyatlar
  5. – kamsitish
  6. – erkinlik
  7. – tenglik
  8. – buzilish
  9. – qonun
  10. – hurmat
  11. – qonuniy
  12. – huquqlar

20 Clues: – qonun– ta’lim– adolat– hurmat– himoya– tenglik– qonuniy– ozodlik– erkinlik– buzilish– huquqlar– kamsitish– xavfsizlik– demokratiya– qadriyatlar– zo‘ravonlik– qadr-qimmat– insonparvarlik– sog‘liqni saqlash– qo‘llab-quvvatlash