cyber security Crossword Puzzles

Crossword 1 2014-12-26

Crossword 1 crossword puzzle
Across
  1. Designing the environment to reduce the possibility of crime is called?
  2. Type D fires are fueled by __________ metals.
  3. We can protect information by protecting computer screens from __________ eyes.
  4. The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
  5. The basic security role is to protect people, property and __________.
  6. You will need a security licence to work in loss __________.
  7. When securing a crime scene, make note of any __________ conditions.
  8. When taking a witness statement, the facts should be in __________ order.
  9. A positive attitude and being respectful are __________ qualities.
  10. Post orders are often called __________ orders.
  11. The basic security role is implemented by observing, reporting, __________ and deterring.
  12. Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
  13. “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
  14. When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
Down
  1. Only the __________ government can create indictable offences.
  2. When handling evidence, you should wear gloves to avoid __________.
  3. It is the responsibility of every security guard to be aware of __________ materials on the work site.
  4. Type B fires are fueled by __________ liquids.
  5. One reason that we patrol is to deter people from __________ acts.
  6. An arrest is defined as getting control of someone with intent to __________.
  7. One of the recommendations from the Patrick Shand case was __________ licensing.
  8. Every province has its own human rights __________.
  9. Patrick Shand was arrested for __________ baby food.
  10. If a crowd seems to be getting out of control, __________ from any communication.
  11. CDT means __________, direction and take down.

25 Clues: Type D fires are fueled by __________ metals.Type B fires are fueled by __________ liquids.CDT means __________, direction and take down.Post orders are often called __________ orders.Every province has its own human rights __________.Patrick Shand was arrested for __________ baby food.You will need a security licence to work in loss __________....

Trading 2023-10-10

Trading crossword puzzle
Across
  1. A graphical representation of price movements in a specified timeframe.
  2. The final price of a security in a specific trading session.
  3. The potential gain in an investment or trade.
  4. A forex pair representing the Euro and the British pound.
  5. An order that becomes a market order once a certain price level is reached.
  6. An order placed to close a position when a certain loss threshold is reached.
  7. The ability to control a large position with a relatively small amount of money.
  8. Subject to rapid and unpredictable price movements.
  9. The beginning price of a security in a specific trading session.
  10. A forex pair between the US and Japan.
  11. An order to purchase a security at or below a specific price.
  12. A benchmark index for the top 30 blue-chip stocks in the U.S.
Down
  1. A series of numbers often used in technical analysis to predict potential support and resistance levels.
  2. The difference between the bid and ask price of a security or currency pair.
  3. The potential for loss in an investment or trade.
  4. An individual or firm that facilitates trading for investors.
  5. A type of market order that increases in value as the chart goes down.
  6. A forex pair representing the British pound and the US dollar.
  7. An order placed to close a position when a certain profit threshold is reached.
  8. The official currency of the United States.
  9. The official currency of Japan.
  10. The completion of a buy or sell order.
  11. A unit of currency for the United Kingdom.
  12. A forex pair representing the Euro and the US dollar.

24 Clues: The official currency of Japan.The completion of a buy or sell order.A forex pair between the US and Japan.A unit of currency for the United Kingdom.The official currency of the United States.The potential gain in an investment or trade.The potential for loss in an investment or trade.Subject to rapid and unpredictable price movements....

Operating Systems Module 11 Crossword (Miguel Melendez - 12/9/24 Quiz) 2024-12-08

Operating Systems Module 11 Crossword (Miguel Melendez - 12/9/24 Quiz) crossword puzzle
Across
  1. A security enhancement. Good for servers that aren't physically secure and for mobile devices like laptops.
  2. A key that is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
  3. The acronym of the update management system of Windows Server.
  4. A built-in firewall that Linux distributions have.
  5. The hat of a hacker who is paid by companies to test their systems and report vulnerabilities.
  6. An authentication credential category of what the user is. Examples: fingerprint, retina scan, voice pattern.
  7. What companies must buy if they want to have secure communication sessions across public networks.
  8. Windows Defender Firewall uses these to affect the behavior of protocols and applications. They can be inbound or outbound.
  9. This allows an administrator to specify the maximum amount of disk space a user's files can occupy on a volume or share.
  10. The most widely used method for encrypting data.
  11. This creates a barrier between two entities.
Down
  1. A type of file you must edit in Fedora Linux to change password options.
  2. You use this command on the Linux command line to view files.
  3. The minimum number of characters Fedora 30 requires for a password. This is by default.
  4. A security feature that allows administrators to control who has access to their network.
  5. A type of authentication that requires a user to give two or more types of authentication.
  6. This is used in a Windows domain environment to provide mutual authentication.
  7. Security policies should be easy for ordinary users to understand and they should also be?
  8. Operating Systems require periodic updates and "this" to maintain security, reliability, and performance levels.
  9. This is a common tool used by Linux administrators. A command-line program.

20 Clues: This creates a barrier between two entities.The most widely used method for encrypting data.A built-in firewall that Linux distributions have.You use this command on the Linux command line to view files.The acronym of the update management system of Windows Server.A type of file you must edit in Fedora Linux to change password options....

Don't Bully!!! 2013-05-23

Don't Bully!!! crossword puzzle
Across
  1. the improper use of something
  2. talking about people in a bad way
  3. bulling that takes place online
  4. someone who sees a person be bullied
  5. a person who is an object of bullying
Down
  1. a feeling of intense annoyance caused by being tormented
  2. something that hurts someone physically or mentally
  3. someone who is bullied
  4. someone who bullies
  5. offending someone in words

10 Clues: someone who bulliessomeone who is bulliedoffending someone in wordsthe improper use of somethingbulling that takes place onlinetalking about people in a bad waysomeone who sees a person be bullieda person who is an object of bullyingsomething that hurts someone physically or mentallya feeling of intense annoyance caused by being tormented

Dzień Bezpiecznego Internetu iga.czajkowska8@gmail.com 2018-01-29

Dzień Bezpiecznego Internetu iga.czajkowska8@gmail.com crossword puzzle
Across
  1. sposób zabezpieczenia konta przed włamaniem
  2. nielegalne rozpowszechnianie gier
  3. Miesiąc w którym obchodzimy Dzień Bezpiecznego Internetu
  4. konsekwencja zbyt częstego korzystania z internetu
  5. złośliwy program, który można pobrać z internetu nieświadomie
Down
  1. nękanie w Cyber przestrzeni
  2. Najpopularniejsza wyszukiwarka internetowa
  3. osoba próbująca włamać się do systemu informacyjnego
  4. nazwa dzięki której nikt się nie dowie o prawdziwych danych
  5. słowo dzięki któremu możemy zapisać jakiś plik

10 Clues: nękanie w Cyber przestrzeninielegalne rozpowszechnianie gierNajpopularniejsza wyszukiwarka internetowasposób zabezpieczenia konta przed włamaniemsłowo dzięki któremu możemy zapisać jakiś plikkonsekwencja zbyt częstego korzystania z internetuosoba próbująca włamać się do systemu informacyjnegoMiesiąc w którym obchodzimy Dzień Bezpiecznego Internetu...

Unit16 2020-04-16

Unit16 crossword puzzle
Across
  1. / sissekäik
  2. / ajakirjandus
  3. / kohver
  4. / reisiterminal
  5. / sihtkoht
  6. / padi
  7. / registreerimine
  8. / kirurg
  9. / kohane
  10. / turvalisus
Down
  1. / sadam
  2. / mehaanik
  3. / karistus
  4. / trahv
  5. / ürgne loodus
  6. / rabav, jahmatav
  7. / vahekäik
  8. / sadam
  9. / kandik
  10. / ilmnema

20 Clues: / padi/ sadam/ trahv/ sadam/ kohver/ kandik/ kirurg/ kohane/ ilmnema/ mehaanik/ karistus/ sihtkoht/ vahekäik/ sissekäik/ turvalisus/ ajakirjandus/ ürgne loodus/ reisiterminal/ rabav, jahmatav/ registreerimine

PeopleTec Engineering Week 2024-02-12

PeopleTec Engineering Week crossword puzzle
Across
  1. operations security
  2. exploratory programming marathon session
  3. use of scientific discoveries for practical purposes
  4. people first, technology always
  5. cyberattack prevention measures
  6. composing instructions for a computer to follow
  7. individual that provides products or services to the government
  8. Information technology role responsible for data security
Down
  1. representation of a real-world system
  2. training algorithms to create self-learning models
  3. designing and experimenting with a model
  4. connected computer systems
  5. professional problem solver
  6. next generation...
  7. document attesting to a level of achievement

15 Clues: next generation...operations securityconnected computer systemsprofessional problem solverpeople first, technology alwayscyberattack prevention measuresrepresentation of a real-world systemexploratory programming marathon sessiondesigning and experimenting with a modeldocument attesting to a level of achievement...

Bullying 2013-08-29

Bullying crossword puzzle
Across
  1. Bulling over the internet
  2. People who you trust
  3. Bullying which is intimidating
  4. A person you can go to for help in your school
  5. Where you can go for help over the phone or internet
  6. The person engaging the bully
Down
  1. Where you can go to for confidential help
  2. Bullying which excluded people
  3. Bullying which involved unwanted contact
  4. by
  5. You can always call them on 000
  6. The person who is being bullied
  7. Bullying in which you call people names

13 Clues: byPeople who you trustBulling over the internetThe person engaging the bullyBullying which excluded peopleBullying which is intimidatingYou can always call them on 000The person who is being bulliedBullying in which you call people namesBullying which involved unwanted contactWhere you can go to for confidential help...

Total Defence Day 2023 - Digital Defence (P5/6) 2023-02-02

Total Defence Day 2023 - Digital Defence (P5/6) crossword puzzle
Across
  1. Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords (OTPs).
  2. Always practise good cyber ______________ to ensure your accounts are safe.
Down
  1. We can use ______________ as our passwords e.g. Saw Eagle At The Park.
  2. Malicious malware can cause the program to ______________.
  3. Never ______________ One-Time Passwords (OTPs) to anyone.

5 Clues: Never ______________ One-Time Passwords (OTPs) to anyone.Malicious malware can cause the program to ______________.We can use ______________ as our passwords e.g. Saw Eagle At The Park.Always practise good cyber ______________ to ensure your accounts are safe....

Criminal justice Public safety 2024-08-09

Criminal justice Public safety crossword puzzle
Across
  1. exit plans What should you always have in a worse case scenario?
  2. Who comes to record the events and the speaker?
  3. Command operation center
  4. What should be used to show everyone where they should be when the event begins?
  5. Yous should always set up a detailed 24-hour
  6. Who is the person speaking at your event?
  7. What high areas should you scout for sniper spots before the event?
  8. What is used by police and other factions to give information over the radio quickly? (hint 10-4 is one of them).
  9. Security for airports
  10. Who should be ready with medical supplies if injuries occur?
  11. What security is employed by the government?
Down
  1. Helicopter Casualty Evacuation Plan
  2. The plan of how the protectee arrives to the event.
  3. What stops metal objects from getting into a event?
  4. What is the term for controlling crowds?
  5. What is flying that is used to survey the event area from a distance?
  6. What security can be hired by the public?
  7. Should you check all the windows in an event area prior to and event begining?
  8. The secret service comes as extra defense when Presidental figures are speaking at events
  9. Do multiple police departments come together to plan events?

20 Clues: Security for airportsCommand operation centerHelicopter Casualty Evacuation PlanWhat is the term for controlling crowds?What security can be hired by the public?Who is the person speaking at your event?Yous should always set up a detailed 24-hourWhat security is employed by the government?Who comes to record the events and the speaker?...

Unit16 2020-04-16

Unit16 crossword puzzle
Across
  1. / sissekäik
  2. / ajakirjandus
  3. / kohver
  4. / reisiterminal
  5. / sihtkoht
  6. / padi
  7. / registreerimine
  8. / kirurg
  9. / kohane
  10. / turvalisus
Down
  1. / sadam
  2. / mehaanik
  3. / karistus
  4. / trahv
  5. / ürgne loodus
  6. / rabav, jahmatav
  7. / vahekäik
  8. / sadam
  9. / kandik
  10. / ilmnema

20 Clues: / padi/ sadam/ trahv/ sadam/ kohver/ kandik/ kirurg/ kohane/ ilmnema/ mehaanik/ karistus/ sihtkoht/ vahekäik/ sissekäik/ turvalisus/ ajakirjandus/ ürgne loodus/ reisiterminal/ rabav, jahmatav/ registreerimine

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. separate low-level system software running on the host machine to perform visualization.
  2. synchronous condition that results from a particularly undesirable situation.
  3. Linux uses this technique to define the priority of processes
  4. a real-time operating system used in mission-critical applications
  5. an asynchronous event that can occur at any time irrespective of what the processor is doing
  6. processes running in the background, started by the kernel itself.
Down
  1. a connection used to exchange data between the processes.
  2. one method to block buffer overflow attacks
  3. helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. the process responsible for secure logon.

10 Clues: the process responsible for secure logon.one method to block buffer overflow attacksa connection used to exchange data between the processes.Linux uses this technique to define the priority of processesa real-time operating system used in mission-critical applicationsprocesses running in the background, started by the kernel itself....

Human Security 2020-09-25

Human Security crossword puzzle
Across
  1. type of human security about freedom from any violence
  2. a place in Mindanao mentioned in the material
  3. country
  4. a state of lack of financial resources
  5. something that is proposed by the government
  6. old
Down
  1. governing body of the state
  2. type of human security about clean resources
  3. authority
  4. armed forces

10 Clues: oldcountryauthorityarmed forcesgoverning body of the statea state of lack of financial resourcestype of human security about clean resourcessomething that is proposed by the governmenta place in Mindanao mentioned in the materialtype of human security about freedom from any violence

IT security 2022-03-02

IT security crossword puzzle
Across
  1. software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
  2. software that automatically puts advertisements onto a computer screen when a person is using the internet
  3. a device or program that stops people from seeing or using information on a computer without permission while it is connected to the internet
  4. a harmful computer program that can copy itself and spread across a number of connected computers
  5. a computer program that has been deliberately designed to destroy information, or allow someone to steal it
Down
  1. an examination of a system or data
  2. a name or other word that you sometimes need to type in along with a password before you are allowed to use a computer or a website
  3. the process of converting data to an unrecognizable or "secret" form to protect sensitive information so that only authorized parties can view it.
  4. verb used to express possibility
  5. someone who gets into other people's computer systems without permission in order to find out information or to do something illegal

10 Clues: verb used to express possibilityan examination of a system or dataa harmful computer program that can copy itself and spread across a number of connected computerssoftware that automatically puts advertisements onto a computer screen when a person is using the internet...

Security Question 2022-04-07

Security Question crossword puzzle
Across
  1. English word for the Greek "sauros"
  2. The communication skills of the Parasaurolophus rival those of what animal?
  3. Friendliest dinosaur in the park
  4. The T-Rex prefers to _______ the remains of dead meat rather than hunting for fresh prey.
  5. Dilophosaurus place of origin
Down
  1. Greek word for "ruler"
  2. The Brachiosaurus is able to "_______" its meals from the grassy plains, tearing the foliage from the soil with its clawed hind legs.
  3. The Gallimimus is similar in shape to the _______
  4. This dinosaur was originally intended as dinner for the more popular Tyrannosaur
  5. There have been some reports of lost _______ in the Toluca Lake area.

10 Clues: Greek word for "ruler"Dilophosaurus place of originFriendliest dinosaur in the parkEnglish word for the Greek "sauros"The Gallimimus is similar in shape to the _______There have been some reports of lost _______ in the Toluca Lake area.The communication skills of the Parasaurolophus rival those of what animal?...

Mich Security 2013-05-01

Mich Security crossword puzzle
Across
  1. Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  2. tool Programming language that allows applets to run within a web browser.
  3. Technology created by Microsoft to control interactivity on web pages.
  4. Is a program written with malicious intent and sent out by attackers.
  5. Is a software program that displays advertising on your computer.
Down
  1. Also known as junk mail, is unsolicited e-mail.
  2. A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
  3. Gains access to resources on devices by pretending to be a trusted computer.
  4. Or malware is a file or program other then a virus that is potentially harmful.
  5. Is a self-replicating program that is harmful to networks.

10 Clues: Also known as junk mail, is unsolicited e-mail.Is a self-replicating program that is harmful to networks.Is a software program that displays advertising on your computer.Is a program written with malicious intent and sent out by attackers.Technology created by Microsoft to control interactivity on web pages....

IT-Security 2016-01-29

IT-Security crossword puzzle
Across
  1. Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
  2. Wie wird das Chatten in Echtzeit genannt?
  3. Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
  4. Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
  5. Wie werden unerwünschte Werbemails genannt?
  6. Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
Down
  1. Was versteckt sich hinter einem scheinbar nützlichem Programm?
  2. Welche Programme, protokollieren die Tastatureingabe mit?
  3. Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
  4. Wie lautet der Überbegriff für unerwünschte, schädliche Software?

10 Clues: Wie wird das Chatten in Echtzeit genannt?Wie werden unerwünschte Werbemails genannt?Welche Programme, protokollieren die Tastatureingabe mit?Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?Was versteckt sich hinter einem scheinbar nützlichem Programm?Wie lautet der Überbegriff für unerwünschte, schädliche Software?...

Infant Security 2023-01-31

Infant Security crossword puzzle
Across
  1. Newborns cannot be transported by someone walking while held in ____ All newborns will be individually transported in a bassinet, incubator or infant transport or via the mother/s arms in a wheelchair or gurney.
  2. If the Hugs tag has been _____ for a procedure, a MCH staff member must remain with the baby.
  3. Code that called for infant abduction
  4. removal of hugs tag is completed immediately prior to ______
  5. All visitors should check in with _____ before going to room
  6. Tag applied to infant as part of infant security.
Down
  1. All new mothers should be ______ regarding infant security measures.
  2. Mode hugs tag must be put in prior to transferring off the unit (such as going to peds).
  3. In the event of code pink MCH staff will monitor hallways and _____.
  4. Nurse that reconciles the KPHC census with the Hugs system.

10 Clues: Code that called for infant abductionTag applied to infant as part of infant security.Nurse that reconciles the KPHC census with the Hugs system.removal of hugs tag is completed immediately prior to ______All visitors should check in with _____ before going to roomAll new mothers should be ______ regarding infant security measures....

security&crime 2023-02-24

security&crime crossword puzzle
Across
  1. the crime of steling
  2. a device that is only opened with a key; used to prevent someone from using something
  3. access that has no permission is ..
  4. a piece of equipment that allows someone to watch over a particular place
  5. personal identification number
  6. a word with a similar meaning to steal
Down
  1. a secret word or number to get access to something
  2. a synonym of protect
  3. someone who enters a building illegally to steal things
  4. to regularly check or watch someone or something

10 Clues: a synonym of protectthe crime of stelingpersonal identification numberaccess that has no permission is ..a word with a similar meaning to stealto regularly check or watch someone or somethinga secret word or number to get access to somethingsomeone who enters a building illegally to steal things...

Information Security 2020-03-02

Information Security crossword puzzle
Across
  1. A form of Encryption where keys come in pairs.
  2. The process of encoding information in such a way that only authorized parties can access it
  3. A guarantee of reliable access to the information by authorized people.
  4. A standard set of rules that allow electronic devices to communicate with each other.
  5. A set of rules that limits access to information
  6. The process of securing a system by reducing its surface of vulnerability
Down
  1. An encryption methodology that uses a single key to encrypt and decrypt data.
  2. The process of determining whether someone or something is, in fact, who or what it declares
  3. The assurance that the information is trustworthy and accurate
  4. A network communication endpoint

10 Clues: A network communication endpointA form of Encryption where keys come in pairs.A set of rules that limits access to informationThe assurance that the information is trustworthy and accurateA guarantee of reliable access to the information by authorized people.The process of securing a system by reducing its surface of vulnerability...

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. software used to delete viruses on a computer.
  3. when you post, you have to use it careful to avoid offending people.
  4. never send it to people meet online.
  5. when you download something, make sure it's a...
  6. you use it to keep your internet connection secure.
Down
  1. you have to keep them safe.
  2. you use them to keep private your information. they have to be strong.
  3. option to keep your profile private.
  4. before you post somenthing, you have to ask your...

10 Clues: you do it to avoid virus.you have to keep them safe.option to keep your profile private.never send it to people meet online.software used to delete viruses on a computer.when you download something, make sure it's a...before you post somenthing, you have to ask your...you use it to keep your internet connection secure....

Food Security 2021-07-15

Food Security crossword puzzle
Across
  1. massive starvation
  2. Might lead to food insecurity.
  3. A reserve of commodities.
  4. Seasonal activity/occupation.
  5. Allowing someone to only have a fixed quantity.
Down
  1. Payment made by the government to a producer to supplement the market price of a commodity.
  2. Cause and effect of Hunger
  3. A place used to store grains.
  4. Ability to pay
  5. Lack of proper nutrition.

10 Clues: Ability to paymassive starvationLack of proper nutrition.A reserve of commodities.Cause and effect of HungerA place used to store grains.Seasonal activity/occupation.Might lead to food insecurity.Allowing someone to only have a fixed quantity.Payment made by the government to a producer to supplement the market price of a commodity.

Security access 2021-10-20

Security access crossword puzzle
Across
  1. some key you use to enter
  2. identity verification service
  3. specifying access rights
  4. to undergoing procedure to gain access
  5. collection of data
  6. personal data used to verify access
Down
  1. the one who seeks access
  2. determining if you are the one you pretend to be
  3. to prove data is correct
  4. record of events

10 Clues: record of eventscollection of datathe one who seeks accessspecifying access rightsto prove data is correctsome key you use to enteridentity verification servicepersonal data used to verify accessto undergoing procedure to gain accessdetermining if you are the one you pretend to be

Harbour Security 2022-04-21

Harbour Security crossword puzzle
Across
  1. where the ships are comining
  2. things you can transport
  3. You can not break it if it's not yours
  4. you have to do it
  5. oposite of firm
  6. you can use it as a transport
Down
  1. what securtiy guards do
  2. to make a thing compleet
  3. to make sure it's good
  4. you hunt for it

10 Clues: you hunt for itoposite of firmyou have to do itto make sure it's goodwhat securtiy guards doto make a thing compleetthings you can transportwhere the ships are cominingyou can use it as a transportYou can not break it if it's not yours

Security Crosswords 2022-11-09

Security Crosswords crossword puzzle
Across
  1. Attacker sends a bogus requests to exhaust system resources.
  2. Person who uses their technical computer skill to breach computer system.
  3. Tool used for network discovery and security auditing.
  4. Test which verifies that unexpected input cannot affect the system in an unpredictable way.
Down
  1. Tool used to test network protocol implementation and other interfaces.
  2. Users require to enter multiple credentials for login.
  3. Design for security.
  4. A remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
  5. Graphical tool used for performing security testing of web applications
  6. Vulnerability scanner for containers and other artifacts.

10 Clues: Design for security.Users require to enter multiple credentials for login.Tool used for network discovery and security auditing.Vulnerability scanner for containers and other artifacts.Attacker sends a bogus requests to exhaust system resources.Tool used to test network protocol implementation and other interfaces....

Operations Security 2022-11-01

Operations Security crossword puzzle
Across
  1. See something, ___ _____ (2 words)
  2. We should never underestimate an adversary's _____ and capability to obtain our critical information
  3. Report _____ packages
  4. Operations Security (OPSEC) procedures help _____ and preserve the integrity of the USCIS Mission
Down
  1. USCIS protects the _____ information list (CIL) as sensitive but unclassified
  2. Be careful with the information you post to _____ media
  3. Be aware of your _____
  4. _____ Management
  5. _____ threats
  6. Operations Security (abbr)

10 Clues: _____ threats_____ ManagementReport _____ packagesBe aware of your _____Operations Security (abbr)See something, ___ _____ (2 words)Be careful with the information you post to _____ mediaUSCIS protects the _____ information list (CIL) as sensitive but unclassified...

Security Guide 2023-06-21

Security Guide crossword puzzle
Across
  1. A storm with a violent wind, in particular a tropical cyclone in the Caribbean
  2. Sign to let employees know branch is safe to enter
  3. Employee who watches the branch during opening
  4. Number of employees to open and close a branch
  5. How employees are to leave the branch
  6. Having the belief or impression that someone is involved in an illegal or dishonest activity
Down
  1. Employee who clears the branch during opening
  2. Door remains until branch opens
  3. Records such as cash journals and loan notes
  4. The vault will be documented

10 Clues: The vault will be documentedDoor remains until branch opensHow employees are to leave the branchRecords such as cash journals and loan notesEmployee who clears the branch during openingEmployee who watches the branch during openingNumber of employees to open and close a branchSign to let employees know branch is safe to enter...

Digital Security 2023-06-21

Digital Security crossword puzzle
Across
  1. A social media app that once sent disappears after a short period of time
  2. Sharing personal information online can lead to ........ theft.
  3. A form of online harassment involving persistent, unwanted messages
  4. A digital trail left behind by a persons online activities
Down
  1. A program that scans and removes viruses from your computer
  2. The act of harassing or intimidating someone online
  3. A technique used to gain unauthorised access to a computer system
  4. A practice of sending unsolicited emails for fraudulent purposes
  5. This protects your online accounts and information
  6. A message, image or video that spreads rapidly and widely online is known as having gone .....

10 Clues: This protects your online accounts and informationThe act of harassing or intimidating someone onlineA digital trail left behind by a persons online activitiesA program that scans and removes viruses from your computerSharing personal information online can lead to ........ theft.A practice of sending unsolicited emails for fraudulent purposes...

Security Word 2024-01-21

Security Word crossword puzzle
Across
  1. A bad person who might take away your info!
  2. Block access to your personal data unless a ransom is paid.
  3. A digital barrier that helps protect your computer or network from unauthorized access and potential threats from the internet.
  4. A new MDR platform installed in your device which do not let you download or open suspicious applications.
  5. Someone who tricks or lies to get something valuable in a dishonest way.
Down
  1. A bad software that can steal information, cause problems, or let others control your computer without permission.
  2. An unwanted messages or ads you get, usually in your email or messages, trying to sell you things or trick you.
  3. Someone who engages in deceptive practices to achieve financial or another personal gain.
  4. GP installed Data Leakage Protection (DLP) to prevent you from using ________.
  5. Suspicious mail with an URL.

10 Clues: Suspicious mail with an URL.A bad person who might take away your info!Block access to your personal data unless a ransom is paid.Someone who tricks or lies to get something valuable in a dishonest way.GP installed Data Leakage Protection (DLP) to prevent you from using ________....

MVR Security 2023-09-25

MVR Security crossword puzzle
Across
  1. The address registered to a vehicle must be located in _______.
  2. If the customer can confirm the plate number of the vehicle we can confirm if the vehicle has a _____ flag.
  3. The name and address of a ______ can be released to any person upon request.
  4. Licence/exemption expiry date information can be released if the caller can provide the ____ number.
  5. Number of odometer readings that can be provided verbally over the phone.
  6. Security required for an individual registered person to update LANDATA.
Down
  1. CSRs are able to _____ details supplied by a caller.
  2. A company must provide their Waka Kotahi customer number, company number or ____.
  3. A person calling/acting on behalf of a registered person must confirm they are _____.
  4. It is the responsibility of the CSR to always check the customer address, mobile phone number and _____ are correct.

10 Clues: CSRs are able to _____ details supplied by a caller.The address registered to a vehicle must be located in _______.Security required for an individual registered person to update LANDATA.Number of odometer readings that can be provided verbally over the phone.The name and address of a ______ can be released to any person upon request....

Internet Security 2024-03-05

Internet Security crossword puzzle
Across
  1. Software that is designed to send advertisements mostly in a form of pop-ups
  2. A piece of code that spreads itself from one computer to another without human interaction
  3. An email-based threat which presents users with different advertising materials and promotional content
  4. Secretly installed malicious sofware that is intended to monitor user's activity.
  5. A form of piracy in which a third party infringes the rights granted to the copyright such as the exclusive use of a work for a set period of time.
Down
  1. A piece of code designed to replicate itself and transfer from one computer to another
  2. A malicious software that prevents you from using your computer
  3. People who use this scheme aims to steal sensitive information such as credit card details and password
  4. This unwanted software has the ability to harm a computer system, hinder performance efficiency, or create a state of nuisance.
  5. disguises type of malware that disguise itself as a legitimate application to deceive users

10 Clues: A malicious software that prevents you from using your computerSoftware that is designed to send advertisements mostly in a form of pop-upsSecretly installed malicious sofware that is intended to monitor user's activity.A piece of code designed to replicate itself and transfer from one computer to another...

Safety & Security 2024-04-03

Safety & Security crossword puzzle
Across
  1. signal used to notify approaching employees it is OK to enter branch
  2. 4959
  3. amount of people needed to open branch
  4. This is capital one information center. What time will your reports be ready?
  5. ensure closed before leaving premises
Down
  1. call sentry, OS, ME when you have one
  2. privacy and security check at end of day
  3. lock doors and hide when you have one of these in area of bank
  4. where do you go when all clear signal is not set?
  5. frequency of all clear signal changed

10 Clues: 4959call sentry, OS, ME when you have onefrequency of all clear signal changedensure closed before leaving premisesamount of people needed to open branchprivacy and security check at end of daywhere do you go when all clear signal is not set?lock doors and hide when you have one of these in area of bank...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. Traditional Korean dish made of fermented vegetables, primarily napa cabbage
  2. An ________ a day keeps the doctor away
  3. Type of cookie that originated in France, often almond-based with a chewy texture
  4. A rich, slow-cooked French stew often made with beef
  5. Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
  6. Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
  1. A Japanese noodle soup made with a meat or fish-based broth
  2. Aromatic spice often used in Indian cooking
  3. A method of cooking meat slowly in its own fat
  4. A salad made with tomatoes, cucumbers, onions, and feta cheese

10 Clues: An ________ a day keeps the doctor awayAromatic spice often used in Indian cookingA method of cooking meat slowly in its own fatA rich, slow-cooked French stew often made with beefA Japanese noodle soup made with a meat or fish-based brothA salad made with tomatoes, cucumbers, onions, and feta cheese...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. This is the natural process used to grow plants and food?
  2. What do farmers grow to provide us with food?
  3. What is the term for food that comes from animals, such as milk or eggs?
  4. What is the word for not having enough nutritious food to eat?
  5. What nutrient found in fruits and vegetables helps with digestion?
Down
  1. What do we call food that is grown without chemicals?
  2. What is the practice of not wasting food called?
  3. This is the most important meal of the day?
  4. This nutrient in food helps our muscles grow strong?
  5. What do we call lack of enough food to meet daily needs?

10 Clues: This is the most important meal of the day?What do farmers grow to provide us with food?What is the practice of not wasting food called?This nutrient in food helps our muscles grow strong?What do we call food that is grown without chemicals?What do we call lack of enough food to meet daily needs?...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. - Macro nutrient required to build and retain muscle
  2. - Changing the quality of food by adding, removing, or replacing substances
  3. - Additional addition of micro nutrients in food
  4. - Mineral added to salt to tackle Gioter and Hypothyroidism
Down
  1. - Level of a snake in the food chain
  2. - Consumption of plants as well as meat
  3. - Macro nutrient which is called as Food for the Brain
  4. - Average percentage of water in the human body
  5. - Mineral required to build and maintain strong bones
  6. - Number of amino acids necessary for the human body to function properly

10 Clues: - Level of a snake in the food chain- Consumption of plants as well as meat- Average percentage of water in the human body- Additional addition of micro nutrients in food- Macro nutrient required to build and retain muscle- Mineral required to build and maintain strong bones- Macro nutrient which is called as Food for the Brain...

Food Security 2024-10-17

Food Security crossword puzzle
Across
  1. A popular Mexican dish made with tortillas
  2. A type of pasta shaped like little ears
  3. Spicy condiment often served with sushi
  4. The main ingredient in sushi
  5. A nut commonly used to make butter
Down
  1. A green vegetable often used in salads
  2. A tropical fruit with spiky skin
  3. A fermented dairy product often eaten with fruit
  4. A type of bread baked in a round shape
  5. Italian dish made with thinly sliced raw meat

10 Clues: The main ingredient in sushiA tropical fruit with spiky skinA nut commonly used to make butterA green vegetable often used in saladsA type of bread baked in a round shapeA type of pasta shaped like little earsSpicy condiment often served with sushiA popular Mexican dish made with tortillasItalian dish made with thinly sliced raw meat...

Password Security 2024-09-26

Password Security crossword puzzle
Across
  1. What is recommended to use instead of a password for better security?
  2. What term describes nearly flawless simulations of people and voices created by scammers?
  3. What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
  1. What button in Outlook helps report suspicious emails?
  2. During which month is Cybersecurity Awareness Month celebrated?
  3. What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
  4. What type of authentication is abbreviated as MFA?
  5. What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
  6. How many minutes can it take for hackers to discover a six-character password?
  7. What is the name of the company-approved, secure password manager mentioned?

10 Clues: What type of authentication is abbreviated as MFA?What button in Outlook helps report suspicious emails?During which month is Cybersecurity Awareness Month celebrated?What is recommended to use instead of a password for better security?What is the name of the company-approved, secure password manager mentioned?...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. A drink from cows
  2. Where plants grow
  3. What we eat to live
  4. Natural water for plants
  5. Essential for growing plants
Down
  1. Food eaten at one time
  2. Planted to grow crops
  3. A common crop
  4. A staple food in many countries
  5. A place where crops are grown

10 Clues: A common cropA drink from cowsWhere plants growWhat we eat to livePlanted to grow cropsFood eaten at one timeNatural water for plantsEssential for growing plantsA place where crops are grownA staple food in many countries

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. Spicy curry dish originally from Goa, often made with pork
  2. Fresh cheese commonly used in North Indian vegetarian dishes
  3. Cooking method using a clay oven popular in Indian cuisine
  4. Sweet dessert of fried dough balls soaked in sugar syrup
  5. Triangular pastry filled with spiced potatoes and sometimes peas
Down
  1. Condiment made from fruits or vegetables with spices and herbs
  2. Fragrant rice dish with meat or vegetables and aromatic spices
  3. Dish made with spinach and cubes of fresh cheese
  4. Thin, crispy fermented crepe made from rice and black lentils
  5. Yogurt-based drink that can be sweet or savory

10 Clues: Yogurt-based drink that can be sweet or savoryDish made with spinach and cubes of fresh cheeseSweet dessert of fried dough balls soaked in sugar syrupSpicy curry dish originally from Goa, often made with porkCooking method using a clay oven popular in Indian cuisineFresh cheese commonly used in North Indian vegetarian dishes...

Food Security 2024-12-18

Food Security crossword puzzle
Across
  1. - A practice of growing crops and raising animals for food
  2. - A system where food is grown without synthetic pesticides or fertilizers
  3. - The process of cultivating crops and raising animals for human use
  4. - A term for lack of sufficient nutrients in the diet
Down
  1. - The lack of enough calories or nutrients to sustain a healthy life
  2. - A natural resource critical for growing crops
  3. - The process of reducing the amount of food wasted
  4. - Food that is safe and free from contamination
  5. - The season when crops are gathered from the fields
  6. - A staple crop in many parts of the world, often grown in paddies

10 Clues: - A natural resource critical for growing crops- Food that is safe and free from contamination- The process of reducing the amount of food wasted- The season when crops are gathered from the fields- A term for lack of sufficient nutrients in the diet- A practice of growing crops and raising animals for food...

Food security 2024-12-18

Food security crossword puzzle
Across
  1. Sweet breakfast food
  2. rich in vitamin-C
  3. Popular Italian dish
  4. Popular morning beverage
Down
  1. Staple food globally
  2. Popular Japanese dish
  3. Popular Asian dish
  4. Popular sweet food
  5. Tropical fruit
  6. Popular Mexican dish

10 Clues: Tropical fruitrich in vitamin-CPopular Asian dishPopular sweet foodStaple food globallySweet breakfast foodPopular Mexican dishPopular Italian dishPopular Japanese dishPopular morning beverage

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. bad health that is the result of not having enough food or enough of the right kind of food
  2. an act or instance of making practical or profitable use of something
  3. the idea that people can coexist on Earth for a long time while meeting the needs of the present without compromising the future
  4. the average weather conditions in a specific area over a long period of time
Down
  1. the practice of growing crops and raising animals for food, fiber, and other products
  2. the feeling caused by a need to eat
  3. the quality or state of being firm, steadfast, or not easily changed
  4. the state of being available
  5. lack of financial resources to meet basic needs
  6. chemical compounds in food that are used by the body to function properly and maintain health

10 Clues: the state of being availablethe feeling caused by a need to eatlack of financial resources to meet basic needsthe quality or state of being firm, steadfast, or not easily changedan act or instance of making practical or profitable use of somethingthe average weather conditions in a specific area over a long period of time...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. A condition caused by insufficient or imbalanced diets.
  2. The variety of plant and animal species that supports resilient food systems.
  3. An extreme scarcity of food affecting large populations.
  4. A goal to meet present food needs without compromising future generations.
  5. A global challenge tackled by food security initiatives.
  6. The backbone of food production and rural livelihoods
  7. Government financial aid to support farmers and stabilize food prices.
Down
  1. A method used to supply water to crops in dry regions.
  2. The ability of food systems to recover from shocks and disruptions.
  3. Ensuring people receive the essential vitamins and minerals they need.

10 Clues: The backbone of food production and rural livelihoodsA method used to supply water to crops in dry regions.A condition caused by insufficient or imbalanced diets.An extreme scarcity of food affecting large populations.A global challenge tackled by food security initiatives.The ability of food systems to recover from shocks and disruptions....

Food security 2024-12-17

Food security crossword puzzle
Across
  1. Green leafy vegetables and apples are rich in this mineral
  2. Lack of nutrient in our diet over a long period causes these diseases
  3. What fruit contains water and has many seeds?
  4. What fruit do monkeys love?
  5. The diet that provides all the nutrients that our body needs in right quantities along width adequate amount of roughage and water.
Down
  1. Rice and potato are rich in this type of carbohydrate
  2. The term given to the useful components of food.
  3. Which fruit has an apple in it
  4. Starch and sugar in our food are rich in this type of energy giving nutrient
  5. The disease caused by deficiency of iron in diet

10 Clues: What fruit do monkeys love?Which fruit has an apple in itWhat fruit contains water and has many seeds?The term given to the useful components of food.The disease caused by deficiency of iron in dietRice and potato are rich in this type of carbohydrateGreen leafy vegetables and apples are rich in this mineral...

Food Security 2024-12-17

Food Security crossword puzzle
Across
  1. A healthy between-meal treat, like carrot sticks or an apple
  2. Healthy helpers found in fruits and veggies
  3. The best way to eat fruits and vegetables for maximum nutrition
  4. What fruits and vegetables have a lot of to keep you hydrated
  5. What fruits and vegetables help your body do
  6. What eating fruits and vegetables gives you
Down
  1. Good stuff in food that your body needs
  2. The part of plants that helps your tummy work well
  3. The many colors of fruits and vegetables you should eat
  4. A place where you can plant and grow your own fruits and vegetables

10 Clues: Good stuff in food that your body needsHealthy helpers found in fruits and veggiesWhat eating fruits and vegetables gives youWhat fruits and vegetables help your body doThe part of plants that helps your tummy work wellThe many colors of fruits and vegetables you should eatA healthy between-meal treat, like carrot sticks or an apple...

Aviation security 2025-07-17

Aviation security crossword puzzle
Across
  1. following a red bomb threat and if the bomb is found we execute the …..article drill checklist
  2. CCMs can submit security reports through the…..reporting tool
  3. a category of bomb and sabotage threat
  4. The cabin……checklist is to be carried out when there has been a “RED” threat against the aeroplane or service.
  5. a passenger is found smoking in the lavatory and does not comply. We hand over the ……warning
  6. The unlawful, violent or the threat of violence seizure of an aircraft
Down
  1. No person is allowed to enter the aircraft without showing the ….
  2. A Security Search is required before departure of a flight to……,regardless of the aircraft’s previous destination
  3. normal access in the cockpit is done by saying position and assigned….
  4. A Security Search is required after passenger disembarkation and/or cargo holds unloading in……airport

10 Clues: a category of bomb and sabotage threatCCMs can submit security reports through the…..reporting toolNo person is allowed to enter the aircraft without showing the ….normal access in the cockpit is done by saying position and assigned….The unlawful, violent or the threat of violence seizure of an aircraft...

Food Security 2025-11-18

Food Security crossword puzzle
Across
  1. The most populated continent
  2. The imaginary line that runs through the middle of the Earth
  3. The science of growing plants and animals
  4. The driest biome
  5. Asia and this continent are expected to have the largest growth in population
Down
  1. One of the four factors of food security
  2. A large area of Earth that is home to plant and animal life
  3. The food crisis in the country has been caused by a conflict that's raged since 2014
  4. The P in the acronym PQE
  5. The most water scarce country on Earth

10 Clues: The driest biomeThe P in the acronym PQEThe most populated continentThe most water scarce country on EarthOne of the four factors of food securityThe science of growing plants and animalsA large area of Earth that is home to plant and animal lifeThe imaginary line that runs through the middle of the Earth...

United Nations 2021-02-22

United Nations crossword puzzle
Across
  1. How many "organs" are in the UN
  2. A country apart of the "Big 5"
  3. How many countries are members of the UN
  4. ______ nations
  5. Human _____
  6. Economic and _______ Council
  7. Carries out administrative work of UN
  8. How many members occupy the Security Council
Down
  1. International Court of __________
  2. "organ" of UN MOST responsible for keeping peace
  3. Month UN was founded
  4. All member countries are represented
  5. Where UN is located
  6. A country not apart of security council
  7. What UN strives to achieve within countries

15 Clues: Human ___________ nationsWhere UN is locatedMonth UN was foundedEconomic and _______ CouncilA country apart of the "Big 5"How many "organs" are in the UNInternational Court of __________All member countries are representedCarries out administrative work of UNA country not apart of security councilHow many countries are members of the UN...

bmw 2023 ny food 2022-12-25

bmw 2023 ny food crossword puzzle
Across
  1. indian TV - 11
  2. Frozen flavored sugar water or a famous beverage - 5
  3. security or time-keeper? - 8
  4. Indian harley - 6
  5. beach or boat shelter? - 6
  6. 90's kids first motor vehicle - 5
  7. Drink or a movie ? - 11
  8. first music on the go - 7
Down
  1. Chicken or mutton _______ ? - 8
  2. is fence chemistry or security - 8
  3. Indian Motor cycle or key-board? - 6
  4. Laddu is made of - 8
  5. Thoothukudi european sweet - 8
  6. place for tea and snacks - 7
  7. a famous tea snack - 6

15 Clues: indian TV - 11Indian harley - 6Laddu is made of - 8a famous tea snack - 6Drink or a movie ? - 11first music on the go - 7beach or boat shelter? - 6security or time-keeper? - 8place for tea and snacks - 7Thoothukudi european sweet - 8Chicken or mutton _______ ? - 890's kids first motor vehicle - 5is fence chemistry or security - 8...

Chapter 8 E-Commerce Security 2020-11-19

Chapter 8 E-Commerce Security crossword puzzle
Across
  1. The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
  2. People who commit crime on the Internet.
  3. Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
  4. One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
  5. Able to replicate itself and spread faster than viruses.
  6. _____ of attacks means the attackers are also improving themselves with new technologies over time.
  7. _____-of-service attempts to make a server or network resource unavailable to users.
  8. The e-commerce security battleground involves the attacks, target, and _____.
  9. The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
  10. The probability that a threat will impact an information system.
  11. ______ measures help find security breaches in a system.
Down
  1. One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
  2. _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
  3. _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
  4. Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
  5. The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
  6. _____ threat in e-commerce security includes human error and environmental hazards.
  7. _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
  8. The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
  9. Information _____ refers to activities and that protect an information systems.
  10. _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
  11. Information _____ is a measure taken to protect customer information online.
  12. _____ communication is one of the technical nature that contributes to the weakness of a system.
  13. _____ nature of e-commerce is one of the causes of security issues.
  14. A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
  15. Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.

26 Clues: People who commit crime on the Internet.Able to replicate itself and spread faster than viruses.______ measures help find security breaches in a system.The probability that a threat will impact an information system._____ nature of e-commerce is one of the causes of security issues....

The Great Depression Crossword, Colton Barrier 2023-05-23

The Great Depression Crossword, Colton Barrier crossword puzzle
Across
  1. Social security was caused by.
  2. The crop prices plummeted.
  3. Crushed by the dust bowl
  4. Called the dust bowl.
  5. Spiraled down in the great depression.
  6. Social security was signed by?
  7. The day that the stock market crashed.
  8. The soil in the dust bowl.
  9. The amount of unemployed people rose quickly.
Down
  1. Started coming in the 1930's.
  2. Only payed to the primary worker.
  3. Dropped 89% below its peak
  4. Protected people's economic status.
  5. Traded shares in 1930's
  6. Crushed the farming economy.
  7. Half of them failed in the 1930's.

16 Clues: Called the dust bowl.Traded shares in 1930'sCrushed by the dust bowlThe crop prices plummeted.Dropped 89% below its peakThe soil in the dust bowl.Crushed the farming economy.Started coming in the 1930's.Social security was caused by.Social security was signed by?Only payed to the primary worker.Half of them failed in the 1930's....

Cyber tools 2023-01-09

Cyber tools crossword puzzle
Across
  1. best social networking site to chat
  2. best social networking site to watch videos
  3. a form of blogging using short posts without titles.
  4. an American social networking service based in San Francisco, California
Down
  1. to
  2. best way to connect with friends, work colleagues or random people
  3. apps GPS
  4. Similar to Microsoft OneDrive
  5. best way to find a job

9 Clues: toapps GPSbest way to find a jobSimilar to Microsoft OneDrivebest social networking site to chatbest social networking site to watch videosa form of blogging using short posts without titles.best way to connect with friends, work colleagues or random peoplean American social networking service based in San Francisco, California

Cyber Safety 2020-02-19

Cyber Safety crossword puzzle
Across
  1. a web address that has been condensed and which could mislead an user into going into a risky website
  2. information about you that can be used to identify you because it is unique to you
  3. when someone poses as an institution, like a bank or school, and sends you a personalized message asking you to provide private information
  4. without a name or other information that identifies who you are
Down
  1. to engage in activities that don't involve devices, apps, or the internet
  2. when something happens on digital media that makes you feel uncomfortable, worried, sad, or anxious
  3. an attempt to trick someone, usually with the intention of stealing money or private information
  4. using media in a way that feels healthy and in balance with other life activities
  5. a fake Instagram account used for posting to a specific group of people or to post anonymously

9 Clues: without a name or other information that identifies who you areto engage in activities that don't involve devices, apps, or the internetusing media in a way that feels healthy and in balance with other life activitiesinformation about you that can be used to identify you because it is unique to you...

Cyber Safety 2019-09-26

Cyber Safety crossword puzzle
Across
  1. a type of criminal that steals/uses your identity.
  2. When Something happens online that makes you uncomfortable.
  3. Sending a personalized message asking for private information.
  4. To engage in activities that are not online nor on a screen.
  5. An Attempt to trick someone to with an alternative motive.
  6. Finding balance between online and offline activities.
Down
  1. Special information that is only yours.
  2. A web address that has been condensed.
  3. Information that comes to us through the internet.

9 Clues: A web address that has been condensed.Special information that is only yours.a type of criminal that steals/uses your identity.Information that comes to us through the internet.Finding balance between online and offline activities.An Attempt to trick someone to with an alternative motive.When Something happens online that makes you uncomfortable....

Cyber Safety 2023-05-22

Cyber Safety crossword puzzle
Across
  1. Gossiping and spreading rumors about someone online.
  2. Stalking someone online.
  3. Sharing private secrets of someone online.
  4. Faking an identity.
Down
  1. Aggressive and intimidating pressure.
  2. Bullying someone online.
  3. Gaining someone's trust to reveal private secrets of them online.
  4. Fighting with someone using vulgar language online.
  5. Not being included.

9 Clues: Not being included.Faking an identity.Bullying someone online.Stalking someone online.Aggressive and intimidating pressure.Sharing private secrets of someone online.Fighting with someone using vulgar language online.Gossiping and spreading rumors about someone online.Gaining someone's trust to reveal private secrets of them online.

Cyber Crossword 2023-08-29

Cyber Crossword crossword puzzle
Across
  1. Hackers with malicious intentions
  2. The process of encoding a message or information to make it unreadable and secretive
  3. Ethical hackers who use their skills to expose loopholes in security measures for organizations/companies
  4. Sometimes involves altering the header of an e-mail to make it look legit
Down
  1. A method for bypassing normal authentication procedures to access protected data or a computer system
  2. A software program designed by hackers to hijack computer systems
  3. A kind of social engineering where someone without authorization gets physically inside a strict area by tagging behind a person or group of people who have access
  4. A software robot that runs automated tasks (scripts)
  5. The act of disguising as a trustworthy entity and contacts potential victims asking them to reveal information

9 Clues: Hackers with malicious intentionsA software robot that runs automated tasks (scripts)A software program designed by hackers to hijack computer systemsSometimes involves altering the header of an e-mail to make it look legitThe process of encoding a message or information to make it unreadable and secretive...

Cyber Crime 2024-02-29

Cyber Crime crossword puzzle
Across
  1. Stealing someone's identity online
  2. Software that demands payment to unlock files
  3. Unauthorized computer access
  4. Stealing someone else's work
  5. Deceptive schemes for money
  6. Online bullying
Down
  1. Using programs for harmful tasks
  2. Tricky emails asking for personal information
  3. Software that harms computer

9 Clues: Online bullyingDeceptive schemes for moneyUnauthorized computer accessStealing someone else's workSoftware that harms computerUsing programs for harmful tasksStealing someone's identity onlineTricky emails asking for personal informationSoftware that demands payment to unlock files

cyber secruity 2024-10-04

cyber secruity crossword puzzle
Across
  1. CAN CORRUPT BIUSNESSES
  2. FORM OF ATTACK
  3. EMAILS
  4. FOR YOU ONLY
  5. WARNING
Down
  1. SKILLFUL CODING
  2. HIDDEN
  3. KICKS YOU OFF THE SERVICE
  4. DANGEROUS

9 Clues: HIDDENEMAILSWARNINGDANGEROUSFOR YOU ONLYFORM OF ATTACKSKILLFUL CODINGCAN CORRUPT BIUSNESSESKICKS YOU OFF THE SERVICE

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. A COLLECTION OF THINGS TO BUY
  2. ITEMS AVAILABLE FOR SALE
  3. WHAT YOU DO TO LOOK FOR ITEMS
  4. THE COST OF AN ITEM
Down
  1. WHAT YOU BUY FOR SOMEONE ELSE
  2. TO BUY SOMETHING ONLINE
  3. WHAT YOU DO WITH MONEY ONLINE
  4. WHERE YOU RECEIVE PROMO CODES
  5. A SHORTENED TERM FOR PROMOTION

9 Clues: THE COST OF AN ITEMTO BUY SOMETHING ONLINEITEMS AVAILABLE FOR SALEWHAT YOU BUY FOR SOMEONE ELSEA COLLECTION OF THINGS TO BUYWHAT YOU DO TO LOOK FOR ITEMSWHAT YOU DO WITH MONEY ONLINEWHERE YOU RECEIVE PROMO CODESA SHORTENED TERM FOR PROMOTION

Cyber monday 2024-11-28

Cyber monday crossword puzzle
Across
  1. TO WRAP ITEMS
  2. A DISCOUNT ON ITEMS
  3. WHAT YOU NEED TO MANAGE DURING SHOPPING
  4. A FAST-MOVING CROWD DURING SALES
  5. THE SYMBOL OF A BRAND
Down
  1. WHAT YOU NEED IN A WEBSITE
  2. A SCORE GIVEN BY CUSTOMERS
  3. WHAT YOU DO IF AN ITEM IS UNSUITABLE
  4. TO BROWSE AND BUY

9 Clues: TO WRAP ITEMSTO BROWSE AND BUYA DISCOUNT ON ITEMSTHE SYMBOL OF A BRANDWHAT YOU NEED IN A WEBSITEA SCORE GIVEN BY CUSTOMERSA FAST-MOVING CROWD DURING SALESWHAT YOU DO IF AN ITEM IS UNSUITABLEWHAT YOU NEED TO MANAGE DURING SHOPPING

Cyber Crossword 2025-03-10

Cyber Crossword crossword puzzle
Across
  1. The best defense against social engineering attacks.
  2. A cyber scam that tricks users into revealing sensitive information.
  3. A deceptive scheme used to steal information or money.
  4. Phishing attack carried out via SMS messages.
  5. Trap victims into downloading malware using tempting offer.
Down
  1. A scam where attackers create a fake identity by impersonating people in authority.
  2. Victims bombarded with false alarms and fictitious threats, forcing to install malware.
  3. A scam that uses voice calls to deceive victims.
  4. Tailor-made messages targeting specific individuals or enterprises.

9 Clues: Phishing attack carried out via SMS messages.A scam that uses voice calls to deceive victims.The best defense against social engineering attacks.A deceptive scheme used to steal information or money.Trap victims into downloading malware using tempting offer.Tailor-made messages targeting specific individuals or enterprises....

Cyber bullying 2025-06-25

Cyber bullying crossword puzzle
Across
  1. who don’t intervene (9 letters)
  2. hurtful messages or threats online
  3. space where bullying often happens
  4. someone pretends to be you online
  5. enforcement may be involved when this is broken (4 letters)
  6. to prevent bullies from contacting you (5 letters)
Down
  1. targeting someone via tech
  2. state caused by online harassment (4 letters)
  3. message board prone to anonymous bullying

9 Clues: targeting someone via techwho don’t intervene (9 letters)someone pretends to be you onlinehurtful messages or threats onlinespace where bullying often happensmessage board prone to anonymous bullyingstate caused by online harassment (4 letters)to prevent bullies from contacting you (5 letters)...

Cyber Safty 2025-11-21

Cyber Safty crossword puzzle
Across
  1. Keeping personal information safe
  2. Fake messages used to trick people
  3. Suspicious messages that pretend to be real
  4. A place where people share photos and posts
  5. Safety Software that protects from viruses
Down
  1. A secret word to log in securely
  2. A harmful program that damages devices
  3. Protecting your identity online
  4. Media Unwanted or harmful messages

9 Clues: Protecting your identity onlineA secret word to log in securelyKeeping personal information safeFake messages used to trick peopleMedia Unwanted or harmful messagesA harmful program that damages devicesSafety Software that protects from virusesSuspicious messages that pretend to be realA place where people share photos and posts

Something 2023-08-28

Something crossword puzzle
Across
  1. A security is a tradable financial asset.
  2. inhance or improve
  3. synonym of the lustrous
  4. that kid has__________
  5. to differ
  6. also relates to orange
Down
  1. rhymes with ability
  2. the action of forming a united whole
  3. the feeling of nervousness
  4. dogs always show ________
  5. the lice made __________ onto bobs hair
  6. relates to orange

12 Clues: to differrelates to orangeinhance or improverhymes with abilitythat kid has__________also relates to orangesynonym of the lustrousdogs always show ________the feeling of nervousnessthe action of forming a united wholethe lice made __________ onto bobs hairA security is a tradable financial asset.

Understanding Money 2024-05-09

Understanding Money crossword puzzle
Across
  1. A security that pays interest over terms of ten to thirty years
  2. Money received today is worth more than the same amount received in the future because money received today can be invested or deposited in the bank for interest; this concept is called...
  3. A plastic card that allows the holder to make credit purchases up to an authorized amount
  4. Money is also known as...
  5. A type of a document guaranteeing the payment of a specific amount of money
  6. To exchange one good or service for another good or service
  7. A bank-issued card that allows customers to pay for purchases directly from their checking account
  8. Money is used in exchange for goods and services needed by individuals, businesses, and governments
  9. A transfer of money from one bank account to another
  10. A type of financial investment issued by a corporation, government, or other organization
  11. Anything of value that is accepted in return for goods and services
  12. Action taken to manage the supply of money and interest rates in an economy
Down
  1. The process of transferring money from one individual or organization to another
  2. The Federal Reserve System, often called... was created by the U.S. Congress in 1913 as our nation's central bank
  3. The mechanism a nation uses to provide and manager money for itself
  4. Money is a common measure of the worth or price of a good or service
  5. Banks that are part of The Fed are known as...
  6. A security that matures in a year or less
  7. Money can be saved and used at a later date
  8. A security that pays interest over terms ranging from two to ten years

20 Clues: Money is also known as...A security that matures in a year or lessMoney can be saved and used at a later dateBanks that are part of The Fed are known as...A transfer of money from one bank account to anotherTo exchange one good or service for another good or serviceA security that pays interest over terms of ten to thirty years...

2024 Cybersecurity Awareness Month 2024-09-17

2024 Cybersecurity Awareness Month crossword puzzle
Across
  1. A digital document used to verify the identity of a user or device online
  2. Software used to detect, prevent, and remove malicious software
  3. A security risk that originates from within the organization, often involving employees
  4. A tool that records keystrokes on a keyboard, often used to steal sensitive information
  5. The process of verifying a user or device
  6. A person who uses technical skills to exploit systems or networks
  7. The unauthorized access and retrieval of sensitive information from a system
  8. A type of malware that locks users out of their systems until a ransom is paid
  9. A hidden way of bypassing security controls in a system
  10. A string of characters used to authenticate access to a system or account
Down
  1. A software update designed to fix vulnerabilities or bugs
  2. An attempt to damage, disrupt, or gain unauthorized access to a computer or network
  3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  5. A network security system that monitors and controls incoming and outgoing traffic
  6. A vulnerability in software that is taken advantage of by hackers to carry out attacks
  7. A virtual private network that allows secure remote access to a network over the internet
  8. The use of deception to manipulate individuals into divulging confidential information
  9. The process used by an organization to handle and recover from a cyberattack
  10. An additional security layer that requires a second form of verification beyond a password
  11. The process of converting information or data into a code to prevent unauthorized access
  12. Software that gathers information from a user's device without their knowledge

22 Clues: The process of verifying a user or deviceA hidden way of bypassing security controls in a systemA software update designed to fix vulnerabilities or bugsSoftware used to detect, prevent, and remove malicious softwareA person who uses technical skills to exploit systems or networks...

Investing Crosword (Heidi Flint) 2025-03-24

Investing Crosword (Heidi Flint) crossword puzzle
Across
  1. government medical health plan
  2. social security and medicare tax
  3. bonds Issued by companies
  4. investing all your money into stocks at once
  5. where you can put seven thousand dollars after tax
  6. individual retirement account
  7. a sum of money set aside for a specific purpose
  8. age to receive full social security benefits
  9. in a pension you pay in and your employer pays in along with one other
  10. you can put seven thousand dollars in a traditional IRA _____ taxed
  11. A collection of stocks, bonds, or other assets that trades on a stock exchange
  12. Issued by Government
  13. you get more benefits if you delay social security until this age
Down
  1. are how the government ensures you'll eventually be taxed
  2. putting a set amount of money into stocks periodically
  3. the availability of cash or the ease with which an asset can be converted to cash.
  4. someone who chooses and takes care of the investments in a mutual fund
  5. Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities.
  6. They represent a loan from the buyer
  7. what president roosevelt created that you get money from at sixty seven
  8. measures the price performance of a basket of securities
  9. you can put seven thousand dollars in a year in a roth IRA ____ taxes
  10. In a rollover If you leave your company, you can rollover your 401k funds to your new company’s 401k plan, OR rollover the funds into a new investment account. You have how many days.
  11. CEO of Berkshire Hathaway
  12. you often don't pay social security tax if you have this

25 Clues: Issued by Governmentbonds Issued by companiesCEO of Berkshire Hathawayindividual retirement accountgovernment medical health plansocial security and medicare taxThey represent a loan from the buyerinvesting all your money into stocks at onceage to receive full social security benefitsa sum of money set aside for a specific purpose...

Windows Architecture 2024-10-30

Windows Architecture crossword puzzle
Across
  1. Enables processes to execute code on a remote system.
  2. Unique security identifier for a user or group.
  3. Set of routines and tools for building software applications.
  4. The Windows NT operating system kernel.
  5. Mechanisms for ensuring mutual exclusion in threads.
  6. Endpoint for sending and receiving data across a network.
  7. Contains code and data used by multiple programs.
  8. Instance of a program in execution.
  9. Memory management scheme that eliminates the need for contiguous allocation of physical memory.
  10. Access Control List, defines permissions on resources.
  11. Amount of time a thread is allowed to run.
  12. _______ Driver Software that controls hardware attached to the computer.
  13. _____ Pipe - A mechanism for IPC, allows communication between processes.
  14. _______ Memory Memory management capability that gives an application the impression it has contiguous working memory.
  15. Signals used to manage concurrent processes.
  16. API for network communication in Windows.
  17. Security Reference Monitor, enforces security policies.
  18. Core component of an OS, manages system resources.
Down
  1. _______ Token Contains security information for a user session.
  2. Execution mode with limited privileges.
  3. A subsystems that is a primary API for Windows applications.
  4. Section of the Windows registry.
  5. Windows Subsystem for Linux, allows Linux binaries to run on Windows.
  6. Smallest unit of processing that can be scheduled.
  7. Execution mode with full privileges.
  8. ______ Manager - A Tool for monitoring applications and processes.
  9. Hierarchical database storing low-level settings for OS and applications.
  10. Signals used for process synchronization.
  11. ______ Manager - A Tool for tracking system performance.
  12. ______Monitor - Provides detailed information about hardware and software resources.
  13. Unique identifier assigned to each process.

31 Clues: Section of the Windows registry.Instance of a program in execution.Execution mode with full privileges.Execution mode with limited privileges.The Windows NT operating system kernel.Signals used for process synchronization.API for network communication in Windows.Amount of time a thread is allowed to run.Unique identifier assigned to each process....

Sustainable Biomes 2024-07-25

Sustainable Biomes crossword puzzle
Across
  1. The variety of different species in an area.
  2. The introduction of harmful substances into the environment.
  3. The protection and stability of systems or resources from threats or risks.
  4. Efforts to protect and manage natural resources.
  5. The deterioration of environmental quality.
  6. The average weather conditions over a long period.
  7. A system of living organisms interacting with their environment.
  8. Resources - Resources that can be naturally replenished.
  9. Security Measures and policies to safeguard ecosystems and natural resources from harm.
  10. The process of returning degraded ecosystems to a healthier state.
  11. Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
Down
  1. Footprint The measure of human impact on the environment.
  2. A large area with distinct climate and plant/animal life.
  3. The capacity to maintain environmental balance over time.
  4. Footprint The total amount of carbon dioxide emissions caused by human activities.
  5. The process by which soil and rock are worn away by wind or water.
  6. The natural environment where a species lives and grows.
  7. The clearing of forests for non-forest use, impacting ecosystems.

18 Clues: The deterioration of environmental quality.The variety of different species in an area.Efforts to protect and manage natural resources.The average weather conditions over a long period.The natural environment where a species lives and grows.Resources - Resources that can be naturally replenished....

Chapter 6 Security 2025-02-20

Chapter 6 Security crossword puzzle
Across
  1. malware that encrypts data allowing attackers to hold it hostage for payment
  2. anyone trying to access data they do not have authorization for
  3. guarantees that systems and information are accessible to authorized users when needed, even under challenging conditions
  4. ensures sensitive and protected data is disclosed only to authorized users
  5. (Two words)provided by Defender, quantified comparison of your security to industry standards
Down
  1. (Two words)Security model where no one is automatically trusted
  2. (Two words)outlook and strength of security
  3. tricking people into revealing sensitive information
  4. Acronym for multilayered security practice
  5. ensures that data is trustworthy, accurate, and has not been altered by unauthorized users or processes

10 Clues: Acronym for multilayered security practice(Two words)outlook and strength of securitytricking people into revealing sensitive information(Two words)Security model where no one is automatically trustedanyone trying to access data they do not have authorization forensures sensitive and protected data is disclosed only to authorized users...

HR Quarterly Quiz 2023-08-23

HR Quarterly Quiz crossword puzzle
Across
  1. This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc.
  2. Center You can apply for internal job postings and refer friends and family for referral eligible positions in ADP WFN by going to Myself> Talent >?
  3. Hennessy The newest member of our Leadership Team?
  4. Resources Who can employees reach out to if they are not receiving the mandatory Cyber Training emails?
Down
  1. Day First Monday of every September recognizes the men and women who labor to build this country?
  2. Policies Employees can access, view, read and attest Employee Handbook and policies in ADP by going to Resources > Company Information> ?.
  3. What is the name of our 401(k)-benefit administrator?
  4. How often do you receive mandatory Cyber training?
  5. If you refer a qualified candidate and they are hired, you are eligible to receive a referral bonus of $250 after successful completion of the referral’s first ? days of employment with Apotheco.
  6. Where can you go to access your paystubs and tax statements 24/7?

10 Clues: How often do you receive mandatory Cyber training?Hennessy The newest member of our Leadership Team?What is the name of our 401(k)-benefit administrator?Where can you go to access your paystubs and tax statements 24/7?This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc....

FITDVocab.sc 2013-05-15

FITDVocab.sc crossword puzzle
Across
  1. Random _______
  2. The way you behave online
  3. Information being put in
  4. Three types one is optical
Down
  1. Example is an iphone
  2. Information being put out
  3. Anything having to do with the internet

7 Clues: Random _______Example is an iphoneInformation being put inInformation being put outThe way you behave onlineThree types one is opticalAnything having to do with the internet

Tarea de Vocabulario 2024-09-20

Tarea de Vocabulario crossword puzzle
Across
  1. To board
  2. Screen/Monitor
  3. Tourism
  4. Airport
  5. Departure
  6. Identification
  7. Security
  8. Ticket
Down
  1. Customs
  2. Itinerary
  3. To travel
  4. Vacation
  5. Door/Gate
  6. Suitcase
  7. Passport
  8. Arrival
  9. Flight
  10. Luggage
  11. Train
  12. Bus

20 Clues: BusTrainFlightTicketCustomsTourismAirportArrivalLuggageTo boardVacationSuitcasePassportSecurityItineraryTo travelDoor/GateDepartureScreen/MonitorIdentification

U1L1 Spanish Crossword 2022-10-13

U1L1 Spanish Crossword crossword puzzle
Across
  1. to travel
  2. customs
  3. identification
  4. gate
  5. bus
  6. ticket
  7. departure
  8. to call
  9. security
  10. passport
  11. screen
Down
  1. luggage
  2. vacation
  3. suitcase
  4. itinerary
  5. to board
  6. flight
  7. arrival
  8. airport
  9. to take

20 Clues: busgateflightticketscreenluggagecustomsarrivalto callairportto takevacationsuitcaseto boardsecuritypassportto travelitinerarydepartureidentification

Black History Month 2023-01-25

Black History Month crossword puzzle
Across
  1. georgewashingtoncarver
  2. lloydray
  3. jameswest
  4. mariebrown
  5. georgecrum
  6. johnpurdy
  7. altheagibson
  8. lewislatimer
  9. georgesampson
  10. percyjulian
  11. fredrickjones
Down
  1. bessiecoleman
  2. garrettmorgan
  3. lonniejohnson
  4. alexandermiles
  5. colinpowell
  6. benaminbanneker
  7. ThomasElkins
  8. madamecjwalker
  9. bank charlesdrew
  10. richardspikes
  11. alfredcralle

22 Clues: lloydrayjameswestjohnpurdymariebrowngeorgecrumcolinpowellpercyjulianThomasElkinsaltheagibsonlewislatimeralfredcrallebessiecolemangarrettmorganlonniejohnsonrichardspikesgeorgesampsonfredrickjonesalexandermilesmadamecjwalkerbenaminbannekerbank charlesdrewgeorgewashingtoncarver

HOSPITAL = HOSPITAL 2025-10-06

HOSPITAL = HOSPITAL crossword puzzle
Across
  1. muletas
  2. seguridad
  3. discapacitado
  4. fallecida(o)
  5. cuidado
  6. cama
  7. enfermera
  8. salud
  9. receta
  10. medecina
Down
  1. ambulancia
  2. registrar/anotar
  3. baston
  4. emfermedad
  5. cicatriz
  6. paciente
  7. medico
  8. sirena
  9. paciencia
  10. emergencia
  11. moreton

21 Clues: camasaludbastonmedicosirenarecetamuletascuidadomoretoncicatrizpacientemedecinaseguridadpacienciaenfermeraambulanciaemfermedademergenciafallecida(o)discapacitadoregistrar/anotar

Harper Cybersecurity Review 2024-03-05

Harper Cybersecurity Review crossword puzzle
Across
  1. software we use to protect your laptop
  2. phishing attack thorough voice or phone call
  3. our email filter system
  4. #1 threat to our security
  5. usual media that a phish comes to
  6. type of request that is weird
  7. tactic that a phisher uses
  8. social media site where phisher researches
  9. phishing attack through text message
  10. used in phishing attack called Quishing
Down
  1. where people write the Wifi password
  2. public charging station stealing your info
  3. used for remote access
  4. authentication for VPN access
  5. Information Security is everyone's
  6. 12 or more characters
  7. site where you can scan your own attachments

17 Clues: 12 or more charactersused for remote accessour email filter system#1 threat to our securitytactic that a phisher usesauthentication for VPN accesstype of request that is weirdusual media that a phish comes toInformation Security is everyone'swhere people write the Wifi passwordphishing attack through text message...

kader Ch.5 vocabulary 2024-06-06

kader Ch.5 vocabulary crossword puzzle
Across
  1. timmerman
  2. materiaal,uitrusting
  3. verstandig
  4. duidelijk
  5. bouw
  6. kwetsbaar
  7. hoeveelheid
  8. ervaren
  9. sociaal
Down
  1. beveiliging
  2. gezondheidszorg
  3. bemoedigend
  4. verwarrend
  5. tijdschema
  6. dienst
  7. vooruitgang
  8. aanmoedigen
  9. aanpakken

18 Clues: bouwdienstervarensociaaltimmermanduidelijkkwetsbaaraanpakkenverwarrendverstandigtijdschemabeveiligingbemoedigendvooruitgangaanmoedigenhoeveelheidgezondheidszorgmateriaal,uitrusting

kira 2025-12-09

kira crossword puzzle
Across
  1. cyber
  2. Santa
  3. lip
Down
  1. fingers
  2. princess

5 Clues: lipcyberSantafingersprincess

TEKA-TEKI INFORMATIKA 2024-09-12

TEKA-TEKI INFORMATIKA crossword puzzle
Across
  1. bekerja secara kelompok
  2. kemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil
  3. KOMPUTASIONAL computational thinking
  4. kemampuan memilah informasi yang kompleks menjadi lebih sederhana
  5. dunia cyber
Down
  1. era industri 4.0
  2. salah satu komponen keterapilan generik
  3. salah satu tujuan infografik

8 Clues: dunia cyberera industri 4.0bekerja secara kelompoksalah satu tujuan infografikKOMPUTASIONAL computational thinkingsalah satu komponen keterapilan generikkemampuan memilah informasi yang kompleks menjadi lebih sederhanakemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil

Types of measures to counter security threats. Legal bases of information technology security. 2022-05-16

Types of measures to counter security threats. Legal bases of information technology security. crossword puzzle
Across
  1. Methods based on several principles of information security management, each of which serves to solve its own problem
  2. Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
  3. The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
  4. Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
  1. Methods that are based on one principle of information security management
  2. Methods that are built on the basis of powerful automated intelligent tools with organizational management
  3. One of the most important methods of analyzing the state of information security
  4. The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
  5. stage that analyzes the possible actions of attackers
  6. Information transmitted by telecommunication networks

10 Clues: stage that analyzes the possible actions of attackersInformation transmitted by telecommunication networksMethods that are based on one principle of information security managementOne of the most important methods of analyzing the state of information security...

Total Defence Day 2023 - Digital Defence (P3/4) 2023-02-02

Total Defence Day 2023 - Digital Defence (P3/4) crossword puzzle
Across
  1. Cyber criminals may use hacked or ______________ accounts to impersonate your friend.
  2. We should use 5 or ______________ words in our passwords.
  3. One of 2FA is having ______________ password.
Down
  1. Cyber criminals use malicious malware to ______________ your device.
  2. One tell-tale sign that the message on social media is a scam when they use ______________ or threatening language.

5 Clues: One of 2FA is having ______________ password.We should use 5 or ______________ words in our passwords.Cyber criminals use malicious malware to ______________ your device.Cyber criminals may use hacked or ______________ accounts to impersonate your friend....

Computer security 2022-07-22

Computer security crossword puzzle
Across
  1. the data we want to hide
  2. unwanted email
  3. harming or harassing others online
  4. converting information into secret code
  5. prevents unauthorised access to a network
  6. software created to infect a computer
Down
  1. occurs at the receivers side
  2. never share it with anyone
  3. computer expert who does the act of hacking
  4. never save your password on a

10 Clues: unwanted emailthe data we want to hidenever share it with anyoneoccurs at the receivers sidenever save your password on aharming or harassing others onlinesoftware created to infect a computerconverting information into secret codeprevents unauthorised access to a networkcomputer expert who does the act of hacking

Security Quiz 2022-10-24

Security Quiz crossword puzzle
Across
  1. to dump out information about things
  2. a well known term for encryption
  3. malicious piece of code
  4. Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
  5. An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
  6. The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
  1. Internet file sharing utility
  2. A worm program that flooded the apranet
  3. Sending strange packets to a system in order to gauge how it responds to determine the operating system
  4. Software to detect unprotected shares

10 Clues: malicious piece of codeInternet file sharing utilitya well known term for encryptionto dump out information about thingsSoftware to detect unprotected sharesA worm program that flooded the apranetSending strange packets to a system in order to gauge how it responds to determine the operating system...

Information Security 2020-03-02

Information Security crossword puzzle
Across
  1. The assurance that the information is trustworthy and accurate
  2. A guarantee of reliable access to the information by authorized people.
  3. A network communication endpoint
  4. A form of Encryption where keys come in pairs.
  5. A set of rules that limits access to information
Down
  1. The process of encoding information in such a way that only authorized parties can access it
  2. An encryption methodology that uses a single key to encrypt and decrypt data.
  3. The process of determining whether someone or something is, in fact, who or what it declares
  4. A standard set of rules that allow electronic devices to communicate with each other.
  5. The process of securing a system by reducing its surface of vulnerability

10 Clues: A network communication endpointA form of Encryption where keys come in pairs.A set of rules that limits access to informationThe assurance that the information is trustworthy and accurateA guarantee of reliable access to the information by authorized people.The process of securing a system by reducing its surface of vulnerability...

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. when you post, you have to use it careful to avoid offending people.
  2. you do it to avoid virus.
  3. before you post somenthing, you have to ask your...
  4. never send it to people meet online.
Down
  1. you have to keep it safe.
  2. you use them to keep private your information. they have to be strong.
  3. you use it to keep your internet connection secure.
  4. when you download something, make sure it's a...
  5. software used to delete viruses on a computer.
  6. option to keep your profile private.

10 Clues: you have to keep it safe.you do it to avoid virus.never send it to people meet online.option to keep your profile private.software used to delete viruses on a computer.when you download something, make sure it's a...you use it to keep your internet connection secure.before you post somenthing, you have to ask your......

SECURITY ONLINE 2021-09-09

SECURITY ONLINE crossword puzzle
Across
  1. you do it to avoid virus.
  2. software used to delete virus on a computer.
  3. when you post it, you have to use them carefully to avoid offending people.
  4. never send them to people meet online.
  5. when you download something, make sure it's a...
  6. you use it to keep your internet connection secure.
Down
  1. you have to keep them safe.
  2. you use them to keep private your information. they have to be strong.
  3. the option to keep your profile private.
  4. before you post somenthing, you have to ask yours...

10 Clues: you do it to avoid virus.you have to keep them safe.never send them to people meet online.the option to keep your profile private.software used to delete virus on a computer.when you download something, make sure it's a...you use it to keep your internet connection secure.before you post somenthing, you have to ask yours......

security plan 2021-04-14

security plan crossword puzzle
Across
  1. ___ allows for many conflicts in a diverse society to be settled locally. It avoids attempting to impose a single, one-size-fits-all policy uniformly without regard to local differences. It also provides locals with the ability to pursue favored policies within their states and communities.
  2. The Founders believed that federalism, along with separation of powers—with power ____among the legislative, executive, and judicial branches—would control government and prevent tyranny.
  3. State and local government authorities share power with national ____whereby no one centralized leader dictates policy. These state and local officials also contribute to party competition and act as channels for recruitment to higher offices.
  4. Many federal officials are still expected to solve political problems and are not likely to _____their own power.
  5. Decentralization contributes to making ____more efficient and manageable at local levels. It also softens the rigidity of law.
  6. ___ are viewed as “laboratories of democracy,” as they are better equipped to experiment with social and economic policy innovations. Competition among governments provides additional incentives for inventiveness and innovation in public policy.
Down
  1. ___ also encourages governments to be responsive to citizen preferences and public policy concerns.
  2. In 1996, Democratic President Bill Clinton, with a Republican Congress, gave much of the responsibility for administering ___programs to the states.
  3. ___ is the passing down of responsibilities from the national government to the states.
  4. Decentralization provides the opportunity for more people to _____in politics, thereby contributing to a popular sense of political effectiveness.

10 Clues: ___ is the passing down of responsibilities from the national government to the states.___ also encourages governments to be responsive to citizen preferences and public policy concerns.Many federal officials are still expected to solve political problems and are not likely to _____their own power....

Security access 2021-10-20

Security access crossword puzzle
Across
  1. some key you use to enter
  2. identity verification service
  3. specifying access rights
  4. to undergoing procedure to gain access
  5. collection of data
  6. personal data used to verify access
Down
  1. the one who seeks access
  2. determining if you are the one you pretend to be
  3. to prove data is correct
  4. record of events

10 Clues: record of eventscollection of datathe one who seeks accessspecifying access rightsto prove data is correctsome key you use to enteridentity verification servicepersonal data used to verify accessto undergoing procedure to gain accessdetermining if you are the one you pretend to be

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. , separate low-level system software running on the host machine to perform visualization.
  2. , synchronous condition that results from a particularly undesirable situation.
  3. , Linux uses this technique to define the priority of processes
  4. , a real-time operating system used in mission-critical applications
  5. , an asynchronous event that can occur at any time irrespective of what the processor is doing
  6. , processes running in the background, started by the kernel itself.
Down
  1. , a connection used to exchange data between the processes.
  2. , one method to block buffer overflow attacks
  3. , helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. , the process responsible for secure logon.

10 Clues: , the process responsible for secure logon., one method to block buffer overflow attacks, a connection used to exchange data between the processes., Linux uses this technique to define the priority of processes, a real-time operating system used in mission-critical applications...

Platform security 2021-10-23

Platform security crossword puzzle
Across
  1. Separate low-level system software running on the host machine to perform visualization.
  2. Synchronous condition that results from a particularly undesirable situation.
  3. Linux uses this technique to define the priority of processes
  4. A real-time operating system used in mission-critical applications
  5. An asynchronous event that can occur at any time irrespective of what the processor is doing
  6. Processes running in the background, started by the kernel itself.
Down
  1. A connection used to exchange data between the processes.
  2. One method to block buffer overflow attacks
  3. Helps to prevent unauthorized access to data on lost or stolen computers by combining
  4. the process responsible for secure logon.

10 Clues: the process responsible for secure logon.One method to block buffer overflow attacksA connection used to exchange data between the processes.Linux uses this technique to define the priority of processesA real-time operating system used in mission-critical applicationsProcesses running in the background, started by the kernel itself....

Network Security 2021-08-06

Network Security crossword puzzle
Across
  1. A group of interconnected computer systems.
  2. A handheld communication and computing device.
  3. A device that sends messages between devices in your network.
  4. Part of a computer network, either hardware or software that protects systems from unwanted access and/or intrusion.
  5. Something you apply to your computer to fix a vulnerability.
Down
  1. An electronic device for storing and process data.
  2. A type of connection that eliminates the need for wires.
  3. The device that connects your network to the internet.
  4. A social engineering attack, used to steal user data, or personal information, often conducted by email.
  5. A process where a user gains unauthorized access to a system.

10 Clues: A group of interconnected computer systems.A handheld communication and computing device.An electronic device for storing and process data.The device that connects your network to the internet.A type of connection that eliminates the need for wires.Something you apply to your computer to fix a vulnerability....

IT-Security 2023-06-01

IT-Security crossword puzzle
Across
  1. schließen infizierte Computer zu einer Gruppe zusammen
  2. schädliche Software
  3. Datendiebstahl durch gefälschte E-Mails
  4. Programm, das Viren im Betriebssystem versteckt
  5. Malware, die sich selbstständig über Netze(Internet) verbreitet
Down
  1. Textdateien, die am Computer abgespeichert werden
  2. wählen unbemerkt Mehrwertnummern - finanzieller Schaden
  3. Datensicherung
  4. Programme, die Tastatur eingaben mitprotokoliert
  5. "Hintertür" für Dritte, eines Computer fernzusteuern, auch für kriminelle Zwecke

10 Clues: Datensicherungschädliche SoftwareDatendiebstahl durch gefälschte E-MailsProgramm, das Viren im Betriebssystem verstecktProgramme, die Tastatur eingaben mitprotokoliertTextdateien, die am Computer abgespeichert werdenschließen infizierte Computer zu einer Gruppe zusammenwählen unbemerkt Mehrwertnummern - finanzieller Schaden...

Infomation Security 2015-10-06

Infomation Security crossword puzzle
Across
  1. never click on these from spam email
  2. does damage to, steals information from, or disrupts a computer system
  3. any flaw or weakness that can be exploited
  4. never provide this to anyone via email
Down
  1. assure reliability and accuracy of information and IT resources
  2. unsolicited email
  3. common target for social engineers
  4. examples include credit card fraud, spam and identity theft
  5. use this to create a unique password
  6. type of threat to information security

10 Clues: unsolicited emailcommon target for social engineersnever click on these from spam emailuse this to create a unique passwordtype of threat to information securitynever provide this to anyone via emailany flaw or weakness that can be exploitedexamples include credit card fraud, spam and identity theft...

Internet Security 2017-05-08

Internet Security crossword puzzle
Across
  1. Where the sender and receiver both use the same key to encrypt and decrypt data.
  2. A trusted organisation that provides digital certificates and signatures
  3. A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
  4. A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
  1. Where a public and private key are used to encrypt and decrypt data.
  2. A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
  3. A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
  4. A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
  5. A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
  6. Hardware and software for protecting against unauthorised access to a network.

10 Clues: Where a public and private key are used to encrypt and decrypt data.A trusted organisation that provides digital certificates and signaturesHardware and software for protecting against unauthorised access to a network.Where the sender and receiver both use the same key to encrypt and decrypt data....

Computer Security 2017-01-28

Computer Security crossword puzzle
Across
  1. He or she has granted all the privileges on a linux machine
  2. You can access someone's computer through it
  3. To take advantage of something
  4. A software to stop malicious software
Down
  1. A kind of computer virus
  2. A network made of infected computers
  3. It is a junk email
  4. A Tecnique to collect your personal data through a website
  5. Denial of service
  6. Computer security system against online attack

10 Clues: Denial of serviceIt is a junk emailA kind of computer virusTo take advantage of somethingA network made of infected computersA software to stop malicious softwareYou can access someone's computer through itComputer security system against online attackA Tecnique to collect your personal data through a website...

Security Awareness 2022-05-17

Security Awareness crossword puzzle
Across
  1. Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
  2. Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
  3. Perilaku hati-hati untuk melindungi kita terhadap ancaman
  4. Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
  1. Jenis Informasi yang merupakan informasi pengetahuan umum
  2. Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
  3. Prinsip Keamanan Informasi agar akurat
  4. Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
  5. Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
  6. Perangkat lunak yang diciptakan untuk merusak sistem computer

10 Clues: Prinsip Keamanan Informasi agar akuratJenis Informasi yang merupakan informasi pengetahuan umumPerilaku hati-hati untuk melindungi kita terhadap ancamanPerangkat lunak yang diciptakan untuk merusak sistem computerJenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan...

Security Review 2023-08-24

Security Review crossword puzzle
Across
  1. Blinds 3/4 open.
  2. how we CONNOT leave the branch.
  3. how long we give the opener to clear the branch.
  4. Our maintenance person
  5. managers distress answer.
Down
  1. Responsible for any physical or building related problem.
  2. what to say when robbed.
  3. our team is _____________.
  4. computer and drawers must be __________ when we step away.
  5. our safe place.

10 Clues: our safe place.Blinds 3/4 open.Our maintenance personwhat to say when robbed.managers distress answer.our team is _____________.how we CONNOT leave the branch.how long we give the opener to clear the branch.Responsible for any physical or building related problem.computer and drawers must be __________ when we step away.

Wireless Security 2024-02-15

Wireless Security crossword puzzle
Across
  1. A password containing both letters and numbers.
  2. Type of network used in coffee shops and airports.
  3. What technology enables wireless networking?
  4. A security protocol for wireless networks.
Down
  1. A method used to prevent unauthorized access to a mobile device.
  2. The amount of computing time spent on mobile devices compared to desktops.
  3. A device designed to mimic an authorized Wi-Fi device.
  4. The process of encoding information to make it unreadable without proper authorization.
  5. Fear of being without your mobile phone.
  6. Software designed to harm or infiltrate computer systems.

10 Clues: Fear of being without your mobile phone.A security protocol for wireless networks.What technology enables wireless networking?A password containing both letters and numbers.Type of network used in coffee shops and airports.A device designed to mimic an authorized Wi-Fi device.Software designed to harm or infiltrate computer systems....

Network security 2024-01-24

Network security crossword puzzle
Across
  1. Used to disrupt, damage or gain unauthorized access to a computer system
  2. The gap between regions and demographics that have access to modern technology
  3. Attempting to gain sensitive information using emails
  4. Used to supress ideas on the internet
  5. Monitoring of data being transferred over computer networks
Down
  1. Malware that can self-replicate causing them to spread more rapidly
  2. Malware that spreads by copying infected files and activates when opening infected files
  3. The process of converting information into a line of code
  4. Malware disguised as legitimate software
  5. Two or more computers that are connected together for the purpose of communication

10 Clues: Used to supress ideas on the internetMalware disguised as legitimate softwareAttempting to gain sensitive information using emailsThe process of converting information into a line of codeMonitoring of data being transferred over computer networksMalware that can self-replicate causing them to spread more rapidly...