cyber security Crossword Puzzles
Crossword 1 2014-12-26
Across
- Designing the environment to reduce the possibility of crime is called?
- Type D fires are fueled by __________ metals.
- We can protect information by protecting computer screens from __________ eyes.
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- The basic security role is to protect people, property and __________.
- You will need a security licence to work in loss __________.
- When securing a crime scene, make note of any __________ conditions.
- When taking a witness statement, the facts should be in __________ order.
- A positive attitude and being respectful are __________ qualities.
- Post orders are often called __________ orders.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
Down
- Only the __________ government can create indictable offences.
- When handling evidence, you should wear gloves to avoid __________.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- Type B fires are fueled by __________ liquids.
- One reason that we patrol is to deter people from __________ acts.
- An arrest is defined as getting control of someone with intent to __________.
- One of the recommendations from the Patrick Shand case was __________ licensing.
- Every province has its own human rights __________.
- Patrick Shand was arrested for __________ baby food.
- If a crowd seems to be getting out of control, __________ from any communication.
- CDT means __________, direction and take down.
25 Clues: Type D fires are fueled by __________ metals. • Type B fires are fueled by __________ liquids. • CDT means __________, direction and take down. • Post orders are often called __________ orders. • Every province has its own human rights __________. • Patrick Shand was arrested for __________ baby food. • You will need a security licence to work in loss __________. • ...
Trading 2023-10-10
Across
- A graphical representation of price movements in a specified timeframe.
- The final price of a security in a specific trading session.
- The potential gain in an investment or trade.
- A forex pair representing the Euro and the British pound.
- An order that becomes a market order once a certain price level is reached.
- An order placed to close a position when a certain loss threshold is reached.
- The ability to control a large position with a relatively small amount of money.
- Subject to rapid and unpredictable price movements.
- The beginning price of a security in a specific trading session.
- A forex pair between the US and Japan.
- An order to purchase a security at or below a specific price.
- A benchmark index for the top 30 blue-chip stocks in the U.S.
Down
- A series of numbers often used in technical analysis to predict potential support and resistance levels.
- The difference between the bid and ask price of a security or currency pair.
- The potential for loss in an investment or trade.
- An individual or firm that facilitates trading for investors.
- A type of market order that increases in value as the chart goes down.
- A forex pair representing the British pound and the US dollar.
- An order placed to close a position when a certain profit threshold is reached.
- The official currency of the United States.
- The official currency of Japan.
- The completion of a buy or sell order.
- A unit of currency for the United Kingdom.
- A forex pair representing the Euro and the US dollar.
24 Clues: The official currency of Japan. • The completion of a buy or sell order. • A forex pair between the US and Japan. • A unit of currency for the United Kingdom. • The official currency of the United States. • The potential gain in an investment or trade. • The potential for loss in an investment or trade. • Subject to rapid and unpredictable price movements. • ...
Operating Systems Module 11 Crossword (Miguel Melendez - 12/9/24 Quiz) 2024-12-08
Across
- A security enhancement. Good for servers that aren't physically secure and for mobile devices like laptops.
- A key that is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- The acronym of the update management system of Windows Server.
- A built-in firewall that Linux distributions have.
- The hat of a hacker who is paid by companies to test their systems and report vulnerabilities.
- An authentication credential category of what the user is. Examples: fingerprint, retina scan, voice pattern.
- What companies must buy if they want to have secure communication sessions across public networks.
- Windows Defender Firewall uses these to affect the behavior of protocols and applications. They can be inbound or outbound.
- This allows an administrator to specify the maximum amount of disk space a user's files can occupy on a volume or share.
- The most widely used method for encrypting data.
- This creates a barrier between two entities.
Down
- A type of file you must edit in Fedora Linux to change password options.
- You use this command on the Linux command line to view files.
- The minimum number of characters Fedora 30 requires for a password. This is by default.
- A security feature that allows administrators to control who has access to their network.
- A type of authentication that requires a user to give two or more types of authentication.
- This is used in a Windows domain environment to provide mutual authentication.
- Security policies should be easy for ordinary users to understand and they should also be?
- Operating Systems require periodic updates and "this" to maintain security, reliability, and performance levels.
- This is a common tool used by Linux administrators. A command-line program.
20 Clues: This creates a barrier between two entities. • The most widely used method for encrypting data. • A built-in firewall that Linux distributions have. • You use this command on the Linux command line to view files. • The acronym of the update management system of Windows Server. • A type of file you must edit in Fedora Linux to change password options. • ...
Don't Bully!!! 2013-05-23
Across
- the improper use of something
- talking about people in a bad way
- bulling that takes place online
- someone who sees a person be bullied
- a person who is an object of bullying
Down
- a feeling of intense annoyance caused by being tormented
- something that hurts someone physically or mentally
- someone who is bullied
- someone who bullies
- offending someone in words
10 Clues: someone who bullies • someone who is bullied • offending someone in words • the improper use of something • bulling that takes place online • talking about people in a bad way • someone who sees a person be bullied • a person who is an object of bullying • something that hurts someone physically or mentally • a feeling of intense annoyance caused by being tormented
Dzień Bezpiecznego Internetu iga.czajkowska8@gmail.com 2018-01-29
Across
- sposób zabezpieczenia konta przed włamaniem
- nielegalne rozpowszechnianie gier
- Miesiąc w którym obchodzimy Dzień Bezpiecznego Internetu
- konsekwencja zbyt częstego korzystania z internetu
- złośliwy program, który można pobrać z internetu nieświadomie
Down
- nękanie w Cyber przestrzeni
- Najpopularniejsza wyszukiwarka internetowa
- osoba próbująca włamać się do systemu informacyjnego
- nazwa dzięki której nikt się nie dowie o prawdziwych danych
- słowo dzięki któremu możemy zapisać jakiś plik
10 Clues: nękanie w Cyber przestrzeni • nielegalne rozpowszechnianie gier • Najpopularniejsza wyszukiwarka internetowa • sposób zabezpieczenia konta przed włamaniem • słowo dzięki któremu możemy zapisać jakiś plik • konsekwencja zbyt częstego korzystania z internetu • osoba próbująca włamać się do systemu informacyjnego • Miesiąc w którym obchodzimy Dzień Bezpiecznego Internetu • ...
Unit16 2020-04-16
20 Clues: / padi • / sadam • / trahv • / sadam • / kohver • / kandik • / kirurg • / kohane • / ilmnema • / mehaanik • / karistus • / sihtkoht • / vahekäik • / sissekäik • / turvalisus • / ajakirjandus • / ürgne loodus • / reisiterminal • / rabav, jahmatav • / registreerimine
PeopleTec Engineering Week 2024-02-12
Across
- operations security
- exploratory programming marathon session
- use of scientific discoveries for practical purposes
- people first, technology always
- cyberattack prevention measures
- composing instructions for a computer to follow
- individual that provides products or services to the government
- Information technology role responsible for data security
Down
- representation of a real-world system
- training algorithms to create self-learning models
- designing and experimenting with a model
- connected computer systems
- professional problem solver
- next generation...
- document attesting to a level of achievement
15 Clues: next generation... • operations security • connected computer systems • professional problem solver • people first, technology always • cyberattack prevention measures • representation of a real-world system • exploratory programming marathon session • designing and experimenting with a model • document attesting to a level of achievement • ...
Bullying 2013-08-29
Across
- Bulling over the internet
- People who you trust
- Bullying which is intimidating
- A person you can go to for help in your school
- Where you can go for help over the phone or internet
- The person engaging the bully
Down
- Where you can go to for confidential help
- Bullying which excluded people
- Bullying which involved unwanted contact
- by
- You can always call them on 000
- The person who is being bullied
- Bullying in which you call people names
13 Clues: by • People who you trust • Bulling over the internet • The person engaging the bully • Bullying which excluded people • Bullying which is intimidating • You can always call them on 000 • The person who is being bullied • Bullying in which you call people names • Bullying which involved unwanted contact • Where you can go to for confidential help • ...
Total Defence Day 2023 - Digital Defence (P5/6) 2023-02-02
Across
- Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords (OTPs).
- Always practise good cyber ______________ to ensure your accounts are safe.
Down
- We can use ______________ as our passwords e.g. Saw Eagle At The Park.
- Malicious malware can cause the program to ______________.
- Never ______________ One-Time Passwords (OTPs) to anyone.
5 Clues: Never ______________ One-Time Passwords (OTPs) to anyone. • Malicious malware can cause the program to ______________. • We can use ______________ as our passwords e.g. Saw Eagle At The Park. • Always practise good cyber ______________ to ensure your accounts are safe. • ...
Criminal justice Public safety 2024-08-09
Across
- exit plans What should you always have in a worse case scenario?
- Who comes to record the events and the speaker?
- Command operation center
- What should be used to show everyone where they should be when the event begins?
- Yous should always set up a detailed 24-hour
- Who is the person speaking at your event?
- What high areas should you scout for sniper spots before the event?
- What is used by police and other factions to give information over the radio quickly? (hint 10-4 is one of them).
- Security for airports
- Who should be ready with medical supplies if injuries occur?
- What security is employed by the government?
Down
- Helicopter Casualty Evacuation Plan
- The plan of how the protectee arrives to the event.
- What stops metal objects from getting into a event?
- What is the term for controlling crowds?
- What is flying that is used to survey the event area from a distance?
- What security can be hired by the public?
- Should you check all the windows in an event area prior to and event begining?
- The secret service comes as extra defense when Presidental figures are speaking at events
- Do multiple police departments come together to plan events?
20 Clues: Security for airports • Command operation center • Helicopter Casualty Evacuation Plan • What is the term for controlling crowds? • What security can be hired by the public? • Who is the person speaking at your event? • Yous should always set up a detailed 24-hour • What security is employed by the government? • Who comes to record the events and the speaker? • ...
Unit16 2020-04-16
20 Clues: / padi • / sadam • / trahv • / sadam • / kohver • / kandik • / kirurg • / kohane • / ilmnema • / mehaanik • / karistus • / sihtkoht • / vahekäik • / sissekäik • / turvalisus • / ajakirjandus • / ürgne loodus • / reisiterminal • / rabav, jahmatav • / registreerimine
Platform security 2021-10-23
Across
- separate low-level system software running on the host machine to perform visualization.
- synchronous condition that results from a particularly undesirable situation.
- Linux uses this technique to define the priority of processes
- a real-time operating system used in mission-critical applications
- an asynchronous event that can occur at any time irrespective of what the processor is doing
- processes running in the background, started by the kernel itself.
Down
- a connection used to exchange data between the processes.
- one method to block buffer overflow attacks
- helps to prevent unauthorized access to data on lost or stolen computers by combining
- the process responsible for secure logon.
10 Clues: the process responsible for secure logon. • one method to block buffer overflow attacks • a connection used to exchange data between the processes. • Linux uses this technique to define the priority of processes • a real-time operating system used in mission-critical applications • processes running in the background, started by the kernel itself. • ...
Human Security 2020-09-25
10 Clues: old • country • authority • armed forces • governing body of the state • a state of lack of financial resources • type of human security about clean resources • something that is proposed by the government • a place in Mindanao mentioned in the material • type of human security about freedom from any violence
IT security 2022-03-02
Across
- software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
- software that automatically puts advertisements onto a computer screen when a person is using the internet
- a device or program that stops people from seeing or using information on a computer without permission while it is connected to the internet
- a harmful computer program that can copy itself and spread across a number of connected computers
- a computer program that has been deliberately designed to destroy information, or allow someone to steal it
Down
- an examination of a system or data
- a name or other word that you sometimes need to type in along with a password before you are allowed to use a computer or a website
- the process of converting data to an unrecognizable or "secret" form to protect sensitive information so that only authorized parties can view it.
- verb used to express possibility
- someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
10 Clues: verb used to express possibility • an examination of a system or data • a harmful computer program that can copy itself and spread across a number of connected computers • software that automatically puts advertisements onto a computer screen when a person is using the internet • ...
Security Question 2022-04-07
Across
- English word for the Greek "sauros"
- The communication skills of the Parasaurolophus rival those of what animal?
- Friendliest dinosaur in the park
- The T-Rex prefers to _______ the remains of dead meat rather than hunting for fresh prey.
- Dilophosaurus place of origin
Down
- Greek word for "ruler"
- The Brachiosaurus is able to "_______" its meals from the grassy plains, tearing the foliage from the soil with its clawed hind legs.
- The Gallimimus is similar in shape to the _______
- This dinosaur was originally intended as dinner for the more popular Tyrannosaur
- There have been some reports of lost _______ in the Toluca Lake area.
10 Clues: Greek word for "ruler" • Dilophosaurus place of origin • Friendliest dinosaur in the park • English word for the Greek "sauros" • The Gallimimus is similar in shape to the _______ • There have been some reports of lost _______ in the Toluca Lake area. • The communication skills of the Parasaurolophus rival those of what animal? • ...
Mich Security 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- tool Programming language that allows applets to run within a web browser.
- Technology created by Microsoft to control interactivity on web pages.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
Down
- Also known as junk mail, is unsolicited e-mail.
- A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
- Gains access to resources on devices by pretending to be a trusted computer.
- Or malware is a file or program other then a virus that is potentially harmful.
- Is a self-replicating program that is harmful to networks.
10 Clues: Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a program written with malicious intent and sent out by attackers. • Technology created by Microsoft to control interactivity on web pages. • ...
IT-Security 2016-01-29
Across
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
- Wie wird das Chatten in Echtzeit genannt?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
- Wie werden unerwünschte Werbemails genannt?
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
Down
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
- Welche Programme, protokollieren die Tastatureingabe mit?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
Infant Security 2023-01-31
Across
- Newborns cannot be transported by someone walking while held in ____ All newborns will be individually transported in a bassinet, incubator or infant transport or via the mother/s arms in a wheelchair or gurney.
- If the Hugs tag has been _____ for a procedure, a MCH staff member must remain with the baby.
- Code that called for infant abduction
- removal of hugs tag is completed immediately prior to ______
- All visitors should check in with _____ before going to room
- Tag applied to infant as part of infant security.
Down
- All new mothers should be ______ regarding infant security measures.
- Mode hugs tag must be put in prior to transferring off the unit (such as going to peds).
- In the event of code pink MCH staff will monitor hallways and _____.
- Nurse that reconciles the KPHC census with the Hugs system.
10 Clues: Code that called for infant abduction • Tag applied to infant as part of infant security. • Nurse that reconciles the KPHC census with the Hugs system. • removal of hugs tag is completed immediately prior to ______ • All visitors should check in with _____ before going to room • All new mothers should be ______ regarding infant security measures. • ...
security&crime 2023-02-24
Across
- the crime of steling
- a device that is only opened with a key; used to prevent someone from using something
- access that has no permission is ..
- a piece of equipment that allows someone to watch over a particular place
- personal identification number
- a word with a similar meaning to steal
Down
- a secret word or number to get access to something
- a synonym of protect
- someone who enters a building illegally to steal things
- to regularly check or watch someone or something
10 Clues: a synonym of protect • the crime of steling • personal identification number • access that has no permission is .. • a word with a similar meaning to steal • to regularly check or watch someone or something • a secret word or number to get access to something • someone who enters a building illegally to steal things • ...
Information Security 2020-03-02
Across
- A form of Encryption where keys come in pairs.
- The process of encoding information in such a way that only authorized parties can access it
- A guarantee of reliable access to the information by authorized people.
- A standard set of rules that allow electronic devices to communicate with each other.
- A set of rules that limits access to information
- The process of securing a system by reducing its surface of vulnerability
Down
- An encryption methodology that uses a single key to encrypt and decrypt data.
- The process of determining whether someone or something is, in fact, who or what it declares
- The assurance that the information is trustworthy and accurate
- A network communication endpoint
10 Clues: A network communication endpoint • A form of Encryption where keys come in pairs. • A set of rules that limits access to information • The assurance that the information is trustworthy and accurate • A guarantee of reliable access to the information by authorized people. • The process of securing a system by reducing its surface of vulnerability • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
- never send it to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- option to keep your profile private.
- before you post somenthing, you have to ask your...
10 Clues: you do it to avoid virus. • you have to keep them safe. • option to keep your profile private. • never send it to people meet online. • software used to delete viruses on a computer. • when you download something, make sure it's a... • before you post somenthing, you have to ask your... • you use it to keep your internet connection secure. • ...
Food Security 2021-07-15
Across
- massive starvation
- Might lead to food insecurity.
- A reserve of commodities.
- Seasonal activity/occupation.
- Allowing someone to only have a fixed quantity.
Down
- Payment made by the government to a producer to supplement the market price of a commodity.
- Cause and effect of Hunger
- A place used to store grains.
- Ability to pay
- Lack of proper nutrition.
10 Clues: Ability to pay • massive starvation • Lack of proper nutrition. • A reserve of commodities. • Cause and effect of Hunger • A place used to store grains. • Seasonal activity/occupation. • Might lead to food insecurity. • Allowing someone to only have a fixed quantity. • Payment made by the government to a producer to supplement the market price of a commodity.
Security access 2021-10-20
10 Clues: record of events • collection of data • the one who seeks access • specifying access rights • to prove data is correct • some key you use to enter • identity verification service • personal data used to verify access • to undergoing procedure to gain access • determining if you are the one you pretend to be
Harbour Security 2022-04-21
10 Clues: you hunt for it • oposite of firm • you have to do it • to make sure it's good • what securtiy guards do • to make a thing compleet • things you can transport • where the ships are comining • you can use it as a transport • You can not break it if it's not yours
Security Crosswords 2022-11-09
Across
- Attacker sends a bogus requests to exhaust system resources.
- Person who uses their technical computer skill to breach computer system.
- Tool used for network discovery and security auditing.
- Test which verifies that unexpected input cannot affect the system in an unpredictable way.
Down
- Tool used to test network protocol implementation and other interfaces.
- Users require to enter multiple credentials for login.
- Design for security.
- A remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
- Graphical tool used for performing security testing of web applications
- Vulnerability scanner for containers and other artifacts.
10 Clues: Design for security. • Users require to enter multiple credentials for login. • Tool used for network discovery and security auditing. • Vulnerability scanner for containers and other artifacts. • Attacker sends a bogus requests to exhaust system resources. • Tool used to test network protocol implementation and other interfaces. • ...
Operations Security 2022-11-01
Across
- See something, ___ _____ (2 words)
- We should never underestimate an adversary's _____ and capability to obtain our critical information
- Report _____ packages
- Operations Security (OPSEC) procedures help _____ and preserve the integrity of the USCIS Mission
Down
- USCIS protects the _____ information list (CIL) as sensitive but unclassified
- Be careful with the information you post to _____ media
- Be aware of your _____
- _____ Management
- _____ threats
- Operations Security (abbr)
10 Clues: _____ threats • _____ Management • Report _____ packages • Be aware of your _____ • Operations Security (abbr) • See something, ___ _____ (2 words) • Be careful with the information you post to _____ media • USCIS protects the _____ information list (CIL) as sensitive but unclassified • ...
Security Guide 2023-06-21
Across
- A storm with a violent wind, in particular a tropical cyclone in the Caribbean
- Sign to let employees know branch is safe to enter
- Employee who watches the branch during opening
- Number of employees to open and close a branch
- How employees are to leave the branch
- Having the belief or impression that someone is involved in an illegal or dishonest activity
Down
- Employee who clears the branch during opening
- Door remains until branch opens
- Records such as cash journals and loan notes
- The vault will be documented
10 Clues: The vault will be documented • Door remains until branch opens • How employees are to leave the branch • Records such as cash journals and loan notes • Employee who clears the branch during opening • Employee who watches the branch during opening • Number of employees to open and close a branch • Sign to let employees know branch is safe to enter • ...
Digital Security 2023-06-21
Across
- A social media app that once sent disappears after a short period of time
- Sharing personal information online can lead to ........ theft.
- A form of online harassment involving persistent, unwanted messages
- A digital trail left behind by a persons online activities
Down
- A program that scans and removes viruses from your computer
- The act of harassing or intimidating someone online
- A technique used to gain unauthorised access to a computer system
- A practice of sending unsolicited emails for fraudulent purposes
- This protects your online accounts and information
- A message, image or video that spreads rapidly and widely online is known as having gone .....
10 Clues: This protects your online accounts and information • The act of harassing or intimidating someone online • A digital trail left behind by a persons online activities • A program that scans and removes viruses from your computer • Sharing personal information online can lead to ........ theft. • A practice of sending unsolicited emails for fraudulent purposes • ...
Security Word 2024-01-21
Across
- A bad person who might take away your info!
- Block access to your personal data unless a ransom is paid.
- A digital barrier that helps protect your computer or network from unauthorized access and potential threats from the internet.
- A new MDR platform installed in your device which do not let you download or open suspicious applications.
- Someone who tricks or lies to get something valuable in a dishonest way.
Down
- A bad software that can steal information, cause problems, or let others control your computer without permission.
- An unwanted messages or ads you get, usually in your email or messages, trying to sell you things or trick you.
- Someone who engages in deceptive practices to achieve financial or another personal gain.
- GP installed Data Leakage Protection (DLP) to prevent you from using ________.
- Suspicious mail with an URL.
10 Clues: Suspicious mail with an URL. • A bad person who might take away your info! • Block access to your personal data unless a ransom is paid. • Someone who tricks or lies to get something valuable in a dishonest way. • GP installed Data Leakage Protection (DLP) to prevent you from using ________. • ...
MVR Security 2023-09-25
Across
- The address registered to a vehicle must be located in _______.
- If the customer can confirm the plate number of the vehicle we can confirm if the vehicle has a _____ flag.
- The name and address of a ______ can be released to any person upon request.
- Licence/exemption expiry date information can be released if the caller can provide the ____ number.
- Number of odometer readings that can be provided verbally over the phone.
- Security required for an individual registered person to update LANDATA.
Down
- CSRs are able to _____ details supplied by a caller.
- A company must provide their Waka Kotahi customer number, company number or ____.
- A person calling/acting on behalf of a registered person must confirm they are _____.
- It is the responsibility of the CSR to always check the customer address, mobile phone number and _____ are correct.
10 Clues: CSRs are able to _____ details supplied by a caller. • The address registered to a vehicle must be located in _______. • Security required for an individual registered person to update LANDATA. • Number of odometer readings that can be provided verbally over the phone. • The name and address of a ______ can be released to any person upon request. • ...
Internet Security 2024-03-05
Across
- Software that is designed to send advertisements mostly in a form of pop-ups
- A piece of code that spreads itself from one computer to another without human interaction
- An email-based threat which presents users with different advertising materials and promotional content
- Secretly installed malicious sofware that is intended to monitor user's activity.
- A form of piracy in which a third party infringes the rights granted to the copyright such as the exclusive use of a work for a set period of time.
Down
- A piece of code designed to replicate itself and transfer from one computer to another
- A malicious software that prevents you from using your computer
- People who use this scheme aims to steal sensitive information such as credit card details and password
- This unwanted software has the ability to harm a computer system, hinder performance efficiency, or create a state of nuisance.
- disguises type of malware that disguise itself as a legitimate application to deceive users
10 Clues: A malicious software that prevents you from using your computer • Software that is designed to send advertisements mostly in a form of pop-ups • Secretly installed malicious sofware that is intended to monitor user's activity. • A piece of code designed to replicate itself and transfer from one computer to another • ...
Safety & Security 2024-04-03
Across
- signal used to notify approaching employees it is OK to enter branch
- 4959
- amount of people needed to open branch
- This is capital one information center. What time will your reports be ready?
- ensure closed before leaving premises
Down
- call sentry, OS, ME when you have one
- privacy and security check at end of day
- lock doors and hide when you have one of these in area of bank
- where do you go when all clear signal is not set?
- frequency of all clear signal changed
10 Clues: 4959 • call sentry, OS, ME when you have one • frequency of all clear signal changed • ensure closed before leaving premises • amount of people needed to open branch • privacy and security check at end of day • where do you go when all clear signal is not set? • lock doors and hide when you have one of these in area of bank • ...
Food Security 2024-10-17
Across
- Traditional Korean dish made of fermented vegetables, primarily napa cabbage
- An ________ a day keeps the doctor away
- Type of cookie that originated in France, often almond-based with a chewy texture
- A rich, slow-cooked French stew often made with beef
- Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
- Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
- A Japanese noodle soup made with a meat or fish-based broth
- Aromatic spice often used in Indian cooking
- A method of cooking meat slowly in its own fat
- A salad made with tomatoes, cucumbers, onions, and feta cheese
10 Clues: An ________ a day keeps the doctor away • Aromatic spice often used in Indian cooking • A method of cooking meat slowly in its own fat • A rich, slow-cooked French stew often made with beef • A Japanese noodle soup made with a meat or fish-based broth • A salad made with tomatoes, cucumbers, onions, and feta cheese • ...
Food Security 2024-10-17
Across
- This is the natural process used to grow plants and food?
- What do farmers grow to provide us with food?
- What is the term for food that comes from animals, such as milk or eggs?
- What is the word for not having enough nutritious food to eat?
- What nutrient found in fruits and vegetables helps with digestion?
Down
- What do we call food that is grown without chemicals?
- What is the practice of not wasting food called?
- This is the most important meal of the day?
- This nutrient in food helps our muscles grow strong?
- What do we call lack of enough food to meet daily needs?
10 Clues: This is the most important meal of the day? • What do farmers grow to provide us with food? • What is the practice of not wasting food called? • This nutrient in food helps our muscles grow strong? • What do we call food that is grown without chemicals? • What do we call lack of enough food to meet daily needs? • ...
Food Security 2024-10-17
Across
- - Macro nutrient required to build and retain muscle
- - Changing the quality of food by adding, removing, or replacing substances
- - Additional addition of micro nutrients in food
- - Mineral added to salt to tackle Gioter and Hypothyroidism
Down
- - Level of a snake in the food chain
- - Consumption of plants as well as meat
- - Macro nutrient which is called as Food for the Brain
- - Average percentage of water in the human body
- - Mineral required to build and maintain strong bones
- - Number of amino acids necessary for the human body to function properly
10 Clues: - Level of a snake in the food chain • - Consumption of plants as well as meat • - Average percentage of water in the human body • - Additional addition of micro nutrients in food • - Macro nutrient required to build and retain muscle • - Mineral required to build and maintain strong bones • - Macro nutrient which is called as Food for the Brain • ...
Food Security 2024-10-17
Across
- A popular Mexican dish made with tortillas
- A type of pasta shaped like little ears
- Spicy condiment often served with sushi
- The main ingredient in sushi
- A nut commonly used to make butter
Down
- A green vegetable often used in salads
- A tropical fruit with spiky skin
- A fermented dairy product often eaten with fruit
- A type of bread baked in a round shape
- Italian dish made with thinly sliced raw meat
10 Clues: The main ingredient in sushi • A tropical fruit with spiky skin • A nut commonly used to make butter • A green vegetable often used in salads • A type of bread baked in a round shape • A type of pasta shaped like little ears • Spicy condiment often served with sushi • A popular Mexican dish made with tortillas • Italian dish made with thinly sliced raw meat • ...
Password Security 2024-09-26
Across
- What is recommended to use instead of a password for better security?
- What term describes nearly flawless simulations of people and voices created by scammers?
- What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
- What button in Outlook helps report suspicious emails?
- During which month is Cybersecurity Awareness Month celebrated?
- What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
- What type of authentication is abbreviated as MFA?
- What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
- How many minutes can it take for hackers to discover a six-character password?
- What is the name of the company-approved, secure password manager mentioned?
10 Clues: What type of authentication is abbreviated as MFA? • What button in Outlook helps report suspicious emails? • During which month is Cybersecurity Awareness Month celebrated? • What is recommended to use instead of a password for better security? • What is the name of the company-approved, secure password manager mentioned? • ...
Food Security 2024-12-18
10 Clues: A common crop • A drink from cows • Where plants grow • What we eat to live • Planted to grow crops • Food eaten at one time • Natural water for plants • Essential for growing plants • A place where crops are grown • A staple food in many countries
Food Security 2024-12-18
Across
- Spicy curry dish originally from Goa, often made with pork
- Fresh cheese commonly used in North Indian vegetarian dishes
- Cooking method using a clay oven popular in Indian cuisine
- Sweet dessert of fried dough balls soaked in sugar syrup
- Triangular pastry filled with spiced potatoes and sometimes peas
Down
- Condiment made from fruits or vegetables with spices and herbs
- Fragrant rice dish with meat or vegetables and aromatic spices
- Dish made with spinach and cubes of fresh cheese
- Thin, crispy fermented crepe made from rice and black lentils
- Yogurt-based drink that can be sweet or savory
10 Clues: Yogurt-based drink that can be sweet or savory • Dish made with spinach and cubes of fresh cheese • Sweet dessert of fried dough balls soaked in sugar syrup • Spicy curry dish originally from Goa, often made with pork • Cooking method using a clay oven popular in Indian cuisine • Fresh cheese commonly used in North Indian vegetarian dishes • ...
Food Security 2024-12-18
Across
- - A practice of growing crops and raising animals for food
- - A system where food is grown without synthetic pesticides or fertilizers
- - The process of cultivating crops and raising animals for human use
- - A term for lack of sufficient nutrients in the diet
Down
- - The lack of enough calories or nutrients to sustain a healthy life
- - A natural resource critical for growing crops
- - The process of reducing the amount of food wasted
- - Food that is safe and free from contamination
- - The season when crops are gathered from the fields
- - A staple crop in many parts of the world, often grown in paddies
10 Clues: - A natural resource critical for growing crops • - Food that is safe and free from contamination • - The process of reducing the amount of food wasted • - The season when crops are gathered from the fields • - A term for lack of sufficient nutrients in the diet • - A practice of growing crops and raising animals for food • ...
Food security 2024-12-18
10 Clues: Tropical fruit • rich in vitamin-C • Popular Asian dish • Popular sweet food • Staple food globally • Sweet breakfast food • Popular Mexican dish • Popular Italian dish • Popular Japanese dish • Popular morning beverage
Food Security 2024-12-17
Across
- bad health that is the result of not having enough food or enough of the right kind of food
- an act or instance of making practical or profitable use of something
- the idea that people can coexist on Earth for a long time while meeting the needs of the present without compromising the future
- the average weather conditions in a specific area over a long period of time
Down
- the practice of growing crops and raising animals for food, fiber, and other products
- the feeling caused by a need to eat
- the quality or state of being firm, steadfast, or not easily changed
- the state of being available
- lack of financial resources to meet basic needs
- chemical compounds in food that are used by the body to function properly and maintain health
10 Clues: the state of being available • the feeling caused by a need to eat • lack of financial resources to meet basic needs • the quality or state of being firm, steadfast, or not easily changed • an act or instance of making practical or profitable use of something • the average weather conditions in a specific area over a long period of time • ...
Food Security 2024-12-17
Across
- A condition caused by insufficient or imbalanced diets.
- The variety of plant and animal species that supports resilient food systems.
- An extreme scarcity of food affecting large populations.
- A goal to meet present food needs without compromising future generations.
- A global challenge tackled by food security initiatives.
- The backbone of food production and rural livelihoods
- Government financial aid to support farmers and stabilize food prices.
Down
- A method used to supply water to crops in dry regions.
- The ability of food systems to recover from shocks and disruptions.
- Ensuring people receive the essential vitamins and minerals they need.
10 Clues: The backbone of food production and rural livelihoods • A method used to supply water to crops in dry regions. • A condition caused by insufficient or imbalanced diets. • An extreme scarcity of food affecting large populations. • A global challenge tackled by food security initiatives. • The ability of food systems to recover from shocks and disruptions. • ...
Food security 2024-12-17
Across
- Green leafy vegetables and apples are rich in this mineral
- Lack of nutrient in our diet over a long period causes these diseases
- What fruit contains water and has many seeds?
- What fruit do monkeys love?
- The diet that provides all the nutrients that our body needs in right quantities along width adequate amount of roughage and water.
Down
- Rice and potato are rich in this type of carbohydrate
- The term given to the useful components of food.
- Which fruit has an apple in it
- Starch and sugar in our food are rich in this type of energy giving nutrient
- The disease caused by deficiency of iron in diet
10 Clues: What fruit do monkeys love? • Which fruit has an apple in it • What fruit contains water and has many seeds? • The term given to the useful components of food. • The disease caused by deficiency of iron in diet • Rice and potato are rich in this type of carbohydrate • Green leafy vegetables and apples are rich in this mineral • ...
Food Security 2024-12-17
Across
- A healthy between-meal treat, like carrot sticks or an apple
- Healthy helpers found in fruits and veggies
- The best way to eat fruits and vegetables for maximum nutrition
- What fruits and vegetables have a lot of to keep you hydrated
- What fruits and vegetables help your body do
- What eating fruits and vegetables gives you
Down
- Good stuff in food that your body needs
- The part of plants that helps your tummy work well
- The many colors of fruits and vegetables you should eat
- A place where you can plant and grow your own fruits and vegetables
10 Clues: Good stuff in food that your body needs • Healthy helpers found in fruits and veggies • What eating fruits and vegetables gives you • What fruits and vegetables help your body do • The part of plants that helps your tummy work well • The many colors of fruits and vegetables you should eat • A healthy between-meal treat, like carrot sticks or an apple • ...
Aviation security 2025-07-17
Across
- following a red bomb threat and if the bomb is found we execute the …..article drill checklist
- CCMs can submit security reports through the…..reporting tool
- a category of bomb and sabotage threat
- The cabin……checklist is to be carried out when there has been a “RED” threat against the aeroplane or service.
- a passenger is found smoking in the lavatory and does not comply. We hand over the ……warning
- The unlawful, violent or the threat of violence seizure of an aircraft
Down
- No person is allowed to enter the aircraft without showing the ….
- A Security Search is required before departure of a flight to……,regardless of the aircraft’s previous destination
- normal access in the cockpit is done by saying position and assigned….
- A Security Search is required after passenger disembarkation and/or cargo holds unloading in……airport
10 Clues: a category of bomb and sabotage threat • CCMs can submit security reports through the…..reporting tool • No person is allowed to enter the aircraft without showing the …. • normal access in the cockpit is done by saying position and assigned…. • The unlawful, violent or the threat of violence seizure of an aircraft • ...
Food Security 2025-11-18
Across
- The most populated continent
- The imaginary line that runs through the middle of the Earth
- The science of growing plants and animals
- The driest biome
- Asia and this continent are expected to have the largest growth in population
Down
- One of the four factors of food security
- A large area of Earth that is home to plant and animal life
- The food crisis in the country has been caused by a conflict that's raged since 2014
- The P in the acronym PQE
- The most water scarce country on Earth
10 Clues: The driest biome • The P in the acronym PQE • The most populated continent • The most water scarce country on Earth • One of the four factors of food security • The science of growing plants and animals • A large area of Earth that is home to plant and animal life • The imaginary line that runs through the middle of the Earth • ...
United Nations 2021-02-22
Across
- How many "organs" are in the UN
- A country apart of the "Big 5"
- How many countries are members of the UN
- ______ nations
- Human _____
- Economic and _______ Council
- Carries out administrative work of UN
- How many members occupy the Security Council
Down
- International Court of __________
- "organ" of UN MOST responsible for keeping peace
- Month UN was founded
- All member countries are represented
- Where UN is located
- A country not apart of security council
- What UN strives to achieve within countries
15 Clues: Human _____ • ______ nations • Where UN is located • Month UN was founded • Economic and _______ Council • A country apart of the "Big 5" • How many "organs" are in the UN • International Court of __________ • All member countries are represented • Carries out administrative work of UN • A country not apart of security council • How many countries are members of the UN • ...
bmw 2023 ny food 2022-12-25
Across
- indian TV - 11
- Frozen flavored sugar water or a famous beverage - 5
- security or time-keeper? - 8
- Indian harley - 6
- beach or boat shelter? - 6
- 90's kids first motor vehicle - 5
- Drink or a movie ? - 11
- first music on the go - 7
Down
- Chicken or mutton _______ ? - 8
- is fence chemistry or security - 8
- Indian Motor cycle or key-board? - 6
- Laddu is made of - 8
- Thoothukudi european sweet - 8
- place for tea and snacks - 7
- a famous tea snack - 6
15 Clues: indian TV - 11 • Indian harley - 6 • Laddu is made of - 8 • a famous tea snack - 6 • Drink or a movie ? - 11 • first music on the go - 7 • beach or boat shelter? - 6 • security or time-keeper? - 8 • place for tea and snacks - 7 • Thoothukudi european sweet - 8 • Chicken or mutton _______ ? - 8 • 90's kids first motor vehicle - 5 • is fence chemistry or security - 8 • ...
Chapter 8 E-Commerce Security 2020-11-19
Across
- The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
- People who commit crime on the Internet.
- Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
- One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
- Able to replicate itself and spread faster than viruses.
- _____ of attacks means the attackers are also improving themselves with new technologies over time.
- _____-of-service attempts to make a server or network resource unavailable to users.
- The e-commerce security battleground involves the attacks, target, and _____.
- The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
- The probability that a threat will impact an information system.
- ______ measures help find security breaches in a system.
Down
- One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
- _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
- _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
- Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
- The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
- _____ threat in e-commerce security includes human error and environmental hazards.
- _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
- The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
- Information _____ refers to activities and that protect an information systems.
- _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
- Information _____ is a measure taken to protect customer information online.
- _____ communication is one of the technical nature that contributes to the weakness of a system.
- _____ nature of e-commerce is one of the causes of security issues.
- A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
- Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.
26 Clues: People who commit crime on the Internet. • Able to replicate itself and spread faster than viruses. • ______ measures help find security breaches in a system. • The probability that a threat will impact an information system. • _____ nature of e-commerce is one of the causes of security issues. • ...
The Great Depression Crossword, Colton Barrier 2023-05-23
Across
- Social security was caused by.
- The crop prices plummeted.
- Crushed by the dust bowl
- Called the dust bowl.
- Spiraled down in the great depression.
- Social security was signed by?
- The day that the stock market crashed.
- The soil in the dust bowl.
- The amount of unemployed people rose quickly.
Down
- Started coming in the 1930's.
- Only payed to the primary worker.
- Dropped 89% below its peak
- Protected people's economic status.
- Traded shares in 1930's
- Crushed the farming economy.
- Half of them failed in the 1930's.
16 Clues: Called the dust bowl. • Traded shares in 1930's • Crushed by the dust bowl • The crop prices plummeted. • Dropped 89% below its peak • The soil in the dust bowl. • Crushed the farming economy. • Started coming in the 1930's. • Social security was caused by. • Social security was signed by? • Only payed to the primary worker. • Half of them failed in the 1930's. • ...
Cyber tools 2023-01-09
Across
- best social networking site to chat
- best social networking site to watch videos
- a form of blogging using short posts without titles.
- an American social networking service based in San Francisco, California
Down
- to
- best way to connect with friends, work colleagues or random people
- apps GPS
- Similar to Microsoft OneDrive
- best way to find a job
9 Clues: to • apps GPS • best way to find a job • Similar to Microsoft OneDrive • best social networking site to chat • best social networking site to watch videos • a form of blogging using short posts without titles. • best way to connect with friends, work colleagues or random people • an American social networking service based in San Francisco, California
Cyber Safety 2020-02-19
Across
- a web address that has been condensed and which could mislead an user into going into a risky website
- information about you that can be used to identify you because it is unique to you
- when someone poses as an institution, like a bank or school, and sends you a personalized message asking you to provide private information
- without a name or other information that identifies who you are
Down
- to engage in activities that don't involve devices, apps, or the internet
- when something happens on digital media that makes you feel uncomfortable, worried, sad, or anxious
- an attempt to trick someone, usually with the intention of stealing money or private information
- using media in a way that feels healthy and in balance with other life activities
- a fake Instagram account used for posting to a specific group of people or to post anonymously
9 Clues: without a name or other information that identifies who you are • to engage in activities that don't involve devices, apps, or the internet • using media in a way that feels healthy and in balance with other life activities • information about you that can be used to identify you because it is unique to you • ...
Cyber Safety 2019-09-26
Across
- a type of criminal that steals/uses your identity.
- When Something happens online that makes you uncomfortable.
- Sending a personalized message asking for private information.
- To engage in activities that are not online nor on a screen.
- An Attempt to trick someone to with an alternative motive.
- Finding balance between online and offline activities.
Down
- Special information that is only yours.
- A web address that has been condensed.
- Information that comes to us through the internet.
9 Clues: A web address that has been condensed. • Special information that is only yours. • a type of criminal that steals/uses your identity. • Information that comes to us through the internet. • Finding balance between online and offline activities. • An Attempt to trick someone to with an alternative motive. • When Something happens online that makes you uncomfortable. • ...
Cyber Safety 2023-05-22
Across
- Gossiping and spreading rumors about someone online.
- Stalking someone online.
- Sharing private secrets of someone online.
- Faking an identity.
Down
- Aggressive and intimidating pressure.
- Bullying someone online.
- Gaining someone's trust to reveal private secrets of them online.
- Fighting with someone using vulgar language online.
- Not being included.
9 Clues: Not being included. • Faking an identity. • Bullying someone online. • Stalking someone online. • Aggressive and intimidating pressure. • Sharing private secrets of someone online. • Fighting with someone using vulgar language online. • Gossiping and spreading rumors about someone online. • Gaining someone's trust to reveal private secrets of them online.
Cyber Crossword 2023-08-29
Across
- Hackers with malicious intentions
- The process of encoding a message or information to make it unreadable and secretive
- Ethical hackers who use their skills to expose loopholes in security measures for organizations/companies
- Sometimes involves altering the header of an e-mail to make it look legit
Down
- A method for bypassing normal authentication procedures to access protected data or a computer system
- A software program designed by hackers to hijack computer systems
- A kind of social engineering where someone without authorization gets physically inside a strict area by tagging behind a person or group of people who have access
- A software robot that runs automated tasks (scripts)
- The act of disguising as a trustworthy entity and contacts potential victims asking them to reveal information
9 Clues: Hackers with malicious intentions • A software robot that runs automated tasks (scripts) • A software program designed by hackers to hijack computer systems • Sometimes involves altering the header of an e-mail to make it look legit • The process of encoding a message or information to make it unreadable and secretive • ...
Cyber Crime 2024-02-29
9 Clues: Online bullying • Deceptive schemes for money • Unauthorized computer access • Stealing someone else's work • Software that harms computer • Using programs for harmful tasks • Stealing someone's identity online • Tricky emails asking for personal information • Software that demands payment to unlock files
cyber secruity 2024-10-04
Cyber monday 2024-11-28
9 Clues: THE COST OF AN ITEM • TO BUY SOMETHING ONLINE • ITEMS AVAILABLE FOR SALE • WHAT YOU BUY FOR SOMEONE ELSE • A COLLECTION OF THINGS TO BUY • WHAT YOU DO TO LOOK FOR ITEMS • WHAT YOU DO WITH MONEY ONLINE • WHERE YOU RECEIVE PROMO CODES • A SHORTENED TERM FOR PROMOTION
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber Crossword 2025-03-10
Across
- The best defense against social engineering attacks.
- A cyber scam that tricks users into revealing sensitive information.
- A deceptive scheme used to steal information or money.
- Phishing attack carried out via SMS messages.
- Trap victims into downloading malware using tempting offer.
Down
- A scam where attackers create a fake identity by impersonating people in authority.
- Victims bombarded with false alarms and fictitious threats, forcing to install malware.
- A scam that uses voice calls to deceive victims.
- Tailor-made messages targeting specific individuals or enterprises.
9 Clues: Phishing attack carried out via SMS messages. • A scam that uses voice calls to deceive victims. • The best defense against social engineering attacks. • A deceptive scheme used to steal information or money. • Trap victims into downloading malware using tempting offer. • Tailor-made messages targeting specific individuals or enterprises. • ...
Cyber bullying 2025-06-25
Across
- who don’t intervene (9 letters)
- hurtful messages or threats online
- space where bullying often happens
- someone pretends to be you online
- enforcement may be involved when this is broken (4 letters)
- to prevent bullies from contacting you (5 letters)
Down
- targeting someone via tech
- state caused by online harassment (4 letters)
- message board prone to anonymous bullying
9 Clues: targeting someone via tech • who don’t intervene (9 letters) • someone pretends to be you online • hurtful messages or threats online • space where bullying often happens • message board prone to anonymous bullying • state caused by online harassment (4 letters) • to prevent bullies from contacting you (5 letters) • ...
Cyber Safty 2025-11-21
Across
- Keeping personal information safe
- Fake messages used to trick people
- Suspicious messages that pretend to be real
- A place where people share photos and posts
- Safety Software that protects from viruses
Down
- A secret word to log in securely
- A harmful program that damages devices
- Protecting your identity online
- Media Unwanted or harmful messages
9 Clues: Protecting your identity online • A secret word to log in securely • Keeping personal information safe • Fake messages used to trick people • Media Unwanted or harmful messages • A harmful program that damages devices • Safety Software that protects from viruses • Suspicious messages that pretend to be real • A place where people share photos and posts
Something 2023-08-28
Across
- A security is a tradable financial asset.
- inhance or improve
- synonym of the lustrous
- that kid has__________
- to differ
- also relates to orange
Down
- rhymes with ability
- the action of forming a united whole
- the feeling of nervousness
- dogs always show ________
- the lice made __________ onto bobs hair
- relates to orange
12 Clues: to differ • relates to orange • inhance or improve • rhymes with ability • that kid has__________ • also relates to orange • synonym of the lustrous • dogs always show ________ • the feeling of nervousness • the action of forming a united whole • the lice made __________ onto bobs hair • A security is a tradable financial asset.
Understanding Money 2024-05-09
Across
- A security that pays interest over terms of ten to thirty years
- Money received today is worth more than the same amount received in the future because money received today can be invested or deposited in the bank for interest; this concept is called...
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- Money is also known as...
- A type of a document guaranteeing the payment of a specific amount of money
- To exchange one good or service for another good or service
- A bank-issued card that allows customers to pay for purchases directly from their checking account
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- A transfer of money from one bank account to another
- A type of financial investment issued by a corporation, government, or other organization
- Anything of value that is accepted in return for goods and services
- Action taken to manage the supply of money and interest rates in an economy
Down
- The process of transferring money from one individual or organization to another
- The Federal Reserve System, often called... was created by the U.S. Congress in 1913 as our nation's central bank
- The mechanism a nation uses to provide and manager money for itself
- Money is a common measure of the worth or price of a good or service
- Banks that are part of The Fed are known as...
- A security that matures in a year or less
- Money can be saved and used at a later date
- A security that pays interest over terms ranging from two to ten years
20 Clues: Money is also known as... • A security that matures in a year or less • Money can be saved and used at a later date • Banks that are part of The Fed are known as... • A transfer of money from one bank account to another • To exchange one good or service for another good or service • A security that pays interest over terms of ten to thirty years • ...
2024 Cybersecurity Awareness Month 2024-09-17
Across
- A digital document used to verify the identity of a user or device online
- Software used to detect, prevent, and remove malicious software
- A security risk that originates from within the organization, often involving employees
- A tool that records keystrokes on a keyboard, often used to steal sensitive information
- The process of verifying a user or device
- A person who uses technical skills to exploit systems or networks
- The unauthorized access and retrieval of sensitive information from a system
- A type of malware that locks users out of their systems until a ransom is paid
- A hidden way of bypassing security controls in a system
- A string of characters used to authenticate access to a system or account
Down
- A software update designed to fix vulnerabilities or bugs
- An attempt to damage, disrupt, or gain unauthorized access to a computer or network
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- A network security system that monitors and controls incoming and outgoing traffic
- A vulnerability in software that is taken advantage of by hackers to carry out attacks
- A virtual private network that allows secure remote access to a network over the internet
- The use of deception to manipulate individuals into divulging confidential information
- The process used by an organization to handle and recover from a cyberattack
- An additional security layer that requires a second form of verification beyond a password
- The process of converting information or data into a code to prevent unauthorized access
- Software that gathers information from a user's device without their knowledge
22 Clues: The process of verifying a user or device • A hidden way of bypassing security controls in a system • A software update designed to fix vulnerabilities or bugs • Software used to detect, prevent, and remove malicious software • A person who uses technical skills to exploit systems or networks • ...
Investing Crosword (Heidi Flint) 2025-03-24
Across
- government medical health plan
- social security and medicare tax
- bonds Issued by companies
- investing all your money into stocks at once
- where you can put seven thousand dollars after tax
- individual retirement account
- a sum of money set aside for a specific purpose
- age to receive full social security benefits
- in a pension you pay in and your employer pays in along with one other
- you can put seven thousand dollars in a traditional IRA _____ taxed
- A collection of stocks, bonds, or other assets that trades on a stock exchange
- Issued by Government
- you get more benefits if you delay social security until this age
Down
- are how the government ensures you'll eventually be taxed
- putting a set amount of money into stocks periodically
- the availability of cash or the ease with which an asset can be converted to cash.
- someone who chooses and takes care of the investments in a mutual fund
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities.
- They represent a loan from the buyer
- what president roosevelt created that you get money from at sixty seven
- measures the price performance of a basket of securities
- you can put seven thousand dollars in a year in a roth IRA ____ taxes
- In a rollover If you leave your company, you can rollover your 401k funds to your new company’s 401k plan, OR rollover the funds into a new investment account. You have how many days.
- CEO of Berkshire Hathaway
- you often don't pay social security tax if you have this
25 Clues: Issued by Government • bonds Issued by companies • CEO of Berkshire Hathaway • individual retirement account • government medical health plan • social security and medicare tax • They represent a loan from the buyer • investing all your money into stocks at once • age to receive full social security benefits • a sum of money set aside for a specific purpose • ...
Windows Architecture 2024-10-30
Across
- Enables processes to execute code on a remote system.
- Unique security identifier for a user or group.
- Set of routines and tools for building software applications.
- The Windows NT operating system kernel.
- Mechanisms for ensuring mutual exclusion in threads.
- Endpoint for sending and receiving data across a network.
- Contains code and data used by multiple programs.
- Instance of a program in execution.
- Memory management scheme that eliminates the need for contiguous allocation of physical memory.
- Access Control List, defines permissions on resources.
- Amount of time a thread is allowed to run.
- _______ Driver Software that controls hardware attached to the computer.
- _____ Pipe - A mechanism for IPC, allows communication between processes.
- _______ Memory Memory management capability that gives an application the impression it has contiguous working memory.
- Signals used to manage concurrent processes.
- API for network communication in Windows.
- Security Reference Monitor, enforces security policies.
- Core component of an OS, manages system resources.
Down
- _______ Token Contains security information for a user session.
- Execution mode with limited privileges.
- A subsystems that is a primary API for Windows applications.
- Section of the Windows registry.
- Windows Subsystem for Linux, allows Linux binaries to run on Windows.
- Smallest unit of processing that can be scheduled.
- Execution mode with full privileges.
- ______ Manager - A Tool for monitoring applications and processes.
- Hierarchical database storing low-level settings for OS and applications.
- Signals used for process synchronization.
- ______ Manager - A Tool for tracking system performance.
- ______Monitor - Provides detailed information about hardware and software resources.
- Unique identifier assigned to each process.
31 Clues: Section of the Windows registry. • Instance of a program in execution. • Execution mode with full privileges. • Execution mode with limited privileges. • The Windows NT operating system kernel. • Signals used for process synchronization. • API for network communication in Windows. • Amount of time a thread is allowed to run. • Unique identifier assigned to each process. • ...
Sustainable Biomes 2024-07-25
Across
- The variety of different species in an area.
- The introduction of harmful substances into the environment.
- The protection and stability of systems or resources from threats or risks.
- Efforts to protect and manage natural resources.
- The deterioration of environmental quality.
- The average weather conditions over a long period.
- A system of living organisms interacting with their environment.
- Resources - Resources that can be naturally replenished.
- Security Measures and policies to safeguard ecosystems and natural resources from harm.
- The process of returning degraded ecosystems to a healthier state.
- Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
Down
- Footprint The measure of human impact on the environment.
- A large area with distinct climate and plant/animal life.
- The capacity to maintain environmental balance over time.
- Footprint The total amount of carbon dioxide emissions caused by human activities.
- The process by which soil and rock are worn away by wind or water.
- The natural environment where a species lives and grows.
- The clearing of forests for non-forest use, impacting ecosystems.
18 Clues: The deterioration of environmental quality. • The variety of different species in an area. • Efforts to protect and manage natural resources. • The average weather conditions over a long period. • The natural environment where a species lives and grows. • Resources - Resources that can be naturally replenished. • ...
Chapter 6 Security 2025-02-20
Across
- malware that encrypts data allowing attackers to hold it hostage for payment
- anyone trying to access data they do not have authorization for
- guarantees that systems and information are accessible to authorized users when needed, even under challenging conditions
- ensures sensitive and protected data is disclosed only to authorized users
- (Two words)provided by Defender, quantified comparison of your security to industry standards
Down
- (Two words)Security model where no one is automatically trusted
- (Two words)outlook and strength of security
- tricking people into revealing sensitive information
- Acronym for multilayered security practice
- ensures that data is trustworthy, accurate, and has not been altered by unauthorized users or processes
10 Clues: Acronym for multilayered security practice • (Two words)outlook and strength of security • tricking people into revealing sensitive information • (Two words)Security model where no one is automatically trusted • anyone trying to access data they do not have authorization for • ensures sensitive and protected data is disclosed only to authorized users • ...
HR Quarterly Quiz 2023-08-23
Across
- This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc.
- Center You can apply for internal job postings and refer friends and family for referral eligible positions in ADP WFN by going to Myself> Talent >?
- Hennessy The newest member of our Leadership Team?
- Resources Who can employees reach out to if they are not receiving the mandatory Cyber Training emails?
Down
- Day First Monday of every September recognizes the men and women who labor to build this country?
- Policies Employees can access, view, read and attest Employee Handbook and policies in ADP by going to Resources > Company Information> ?.
- What is the name of our 401(k)-benefit administrator?
- How often do you receive mandatory Cyber training?
- If you refer a qualified candidate and they are hired, you are eligible to receive a referral bonus of $250 after successful completion of the referral’s first ? days of employment with Apotheco.
- Where can you go to access your paystubs and tax statements 24/7?
10 Clues: How often do you receive mandatory Cyber training? • Hennessy The newest member of our Leadership Team? • What is the name of our 401(k)-benefit administrator? • Where can you go to access your paystubs and tax statements 24/7? • This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc. • ...
FITDVocab.sc 2013-05-15
7 Clues: Random _______ • Example is an iphone • Information being put in • Information being put out • The way you behave online • Three types one is optical • Anything having to do with the internet
Tarea de Vocabulario 2024-09-20
20 Clues: Bus • Train • Flight • Ticket • Customs • Tourism • Airport • Arrival • Luggage • To board • Vacation • Suitcase • Passport • Security • Itinerary • To travel • Door/Gate • Departure • Screen/Monitor • Identification
U1L1 Spanish Crossword 2022-10-13
20 Clues: bus • gate • flight • ticket • screen • luggage • customs • arrival • to call • airport • to take • vacation • suitcase • to board • security • passport • to travel • itinerary • departure • identification
Black History Month 2023-01-25
22 Clues: lloydray • jameswest • johnpurdy • mariebrown • georgecrum • colinpowell • percyjulian • ThomasElkins • altheagibson • lewislatimer • alfredcralle • bessiecoleman • garrettmorgan • lonniejohnson • richardspikes • georgesampson • fredrickjones • alexandermiles • madamecjwalker • benaminbanneker • bank charlesdrew • georgewashingtoncarver
HOSPITAL = HOSPITAL 2025-10-06
21 Clues: cama • salud • baston • medico • sirena • receta • muletas • cuidado • moreton • cicatriz • paciente • medecina • seguridad • paciencia • enfermera • ambulancia • emfermedad • emergencia • fallecida(o) • discapacitado • registrar/anotar
Harper Cybersecurity Review 2024-03-05
Across
- software we use to protect your laptop
- phishing attack thorough voice or phone call
- our email filter system
- #1 threat to our security
- usual media that a phish comes to
- type of request that is weird
- tactic that a phisher uses
- social media site where phisher researches
- phishing attack through text message
- used in phishing attack called Quishing
Down
- where people write the Wifi password
- public charging station stealing your info
- used for remote access
- authentication for VPN access
- Information Security is everyone's
- 12 or more characters
- site where you can scan your own attachments
17 Clues: 12 or more characters • used for remote access • our email filter system • #1 threat to our security • tactic that a phisher uses • authentication for VPN access • type of request that is weird • usual media that a phish comes to • Information Security is everyone's • where people write the Wifi password • phishing attack through text message • ...
kader Ch.5 vocabulary 2024-06-06
18 Clues: bouw • dienst • ervaren • sociaal • timmerman • duidelijk • kwetsbaar • aanpakken • verwarrend • verstandig • tijdschema • beveiliging • bemoedigend • vooruitgang • aanmoedigen • hoeveelheid • gezondheidszorg • materiaal,uitrusting
kira 2025-12-09
TEKA-TEKI INFORMATIKA 2024-09-12
Across
- bekerja secara kelompok
- kemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil
- KOMPUTASIONAL computational thinking
- kemampuan memilah informasi yang kompleks menjadi lebih sederhana
- dunia cyber
Down
- era industri 4.0
- salah satu komponen keterapilan generik
- salah satu tujuan infografik
8 Clues: dunia cyber • era industri 4.0 • bekerja secara kelompok • salah satu tujuan infografik • KOMPUTASIONAL computational thinking • salah satu komponen keterapilan generik • kemampuan memilah informasi yang kompleks menjadi lebih sederhana • kemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil
Types of measures to counter security threats. Legal bases of information technology security. 2022-05-16
Across
- Methods based on several principles of information security management, each of which serves to solve its own problem
- Measures establishing responsibility for computer crimes, protection of copyright of programmers, improvement of criminal and civil legislation, as well as judicial proceedings.
- The principle of building an information security system, which involves focusing on preventing threats to the most valuable information
- Special mathematical and algorithmic means of protection of information transmitted over communication networks, stored and processed on computers using encryption methods.
Down
- Methods that are based on one principle of information security management
- Methods that are built on the basis of powerful automated intelligent tools with organizational management
- One of the most important methods of analyzing the state of information security
- The principle of building an information security system, which excludes acquaintance of third parties with the means and technology of information protection
- stage that analyzes the possible actions of attackers
- Information transmitted by telecommunication networks
10 Clues: stage that analyzes the possible actions of attackers • Information transmitted by telecommunication networks • Methods that are based on one principle of information security management • One of the most important methods of analyzing the state of information security • ...
Total Defence Day 2023 - Digital Defence (P3/4) 2023-02-02
Across
- Cyber criminals may use hacked or ______________ accounts to impersonate your friend.
- We should use 5 or ______________ words in our passwords.
- One of 2FA is having ______________ password.
Down
- Cyber criminals use malicious malware to ______________ your device.
- One tell-tale sign that the message on social media is a scam when they use ______________ or threatening language.
5 Clues: One of 2FA is having ______________ password. • We should use 5 or ______________ words in our passwords. • Cyber criminals use malicious malware to ______________ your device. • Cyber criminals may use hacked or ______________ accounts to impersonate your friend. • ...
Computer security 2022-07-22
Across
- the data we want to hide
- unwanted email
- harming or harassing others online
- converting information into secret code
- prevents unauthorised access to a network
- software created to infect a computer
Down
- occurs at the receivers side
- never share it with anyone
- computer expert who does the act of hacking
- never save your password on a
10 Clues: unwanted email • the data we want to hide • never share it with anyone • occurs at the receivers side • never save your password on a • harming or harassing others online • software created to infect a computer • converting information into secret code • prevents unauthorised access to a network • computer expert who does the act of hacking
Security Quiz 2022-10-24
Across
- to dump out information about things
- a well known term for encryption
- malicious piece of code
- Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
- An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
- The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
- Internet file sharing utility
- A worm program that flooded the apranet
- Sending strange packets to a system in order to gauge how it responds to determine the operating system
- Software to detect unprotected shares
10 Clues: malicious piece of code • Internet file sharing utility • a well known term for encryption • to dump out information about things • Software to detect unprotected shares • A worm program that flooded the apranet • Sending strange packets to a system in order to gauge how it responds to determine the operating system • ...
Information Security 2020-03-02
Across
- The assurance that the information is trustworthy and accurate
- A guarantee of reliable access to the information by authorized people.
- A network communication endpoint
- A form of Encryption where keys come in pairs.
- A set of rules that limits access to information
Down
- The process of encoding information in such a way that only authorized parties can access it
- An encryption methodology that uses a single key to encrypt and decrypt data.
- The process of determining whether someone or something is, in fact, who or what it declares
- A standard set of rules that allow electronic devices to communicate with each other.
- The process of securing a system by reducing its surface of vulnerability
10 Clues: A network communication endpoint • A form of Encryption where keys come in pairs. • A set of rules that limits access to information • The assurance that the information is trustworthy and accurate • A guarantee of reliable access to the information by authorized people. • The process of securing a system by reducing its surface of vulnerability • ...
SECURITY ONLINE 2021-09-09
Across
- when you post, you have to use it careful to avoid offending people.
- you do it to avoid virus.
- before you post somenthing, you have to ask your...
- never send it to people meet online.
Down
- you have to keep it safe.
- you use them to keep private your information. they have to be strong.
- you use it to keep your internet connection secure.
- when you download something, make sure it's a...
- software used to delete viruses on a computer.
- option to keep your profile private.
10 Clues: you have to keep it safe. • you do it to avoid virus. • never send it to people meet online. • option to keep your profile private. • software used to delete viruses on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask your... • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete virus on a computer.
- when you post it, you have to use them carefully to avoid offending people.
- never send them to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- the option to keep your profile private.
- before you post somenthing, you have to ask yours...
10 Clues: you do it to avoid virus. • you have to keep them safe. • never send them to people meet online. • the option to keep your profile private. • software used to delete virus on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask yours... • ...
security plan 2021-04-14
Across
- ___ allows for many conflicts in a diverse society to be settled locally. It avoids attempting to impose a single, one-size-fits-all policy uniformly without regard to local differences. It also provides locals with the ability to pursue favored policies within their states and communities.
- The Founders believed that federalism, along with separation of powers—with power ____among the legislative, executive, and judicial branches—would control government and prevent tyranny.
- State and local government authorities share power with national ____whereby no one centralized leader dictates policy. These state and local officials also contribute to party competition and act as channels for recruitment to higher offices.
- Many federal officials are still expected to solve political problems and are not likely to _____their own power.
- Decentralization contributes to making ____more efficient and manageable at local levels. It also softens the rigidity of law.
- ___ are viewed as “laboratories of democracy,” as they are better equipped to experiment with social and economic policy innovations. Competition among governments provides additional incentives for inventiveness and innovation in public policy.
Down
- ___ also encourages governments to be responsive to citizen preferences and public policy concerns.
- In 1996, Democratic President Bill Clinton, with a Republican Congress, gave much of the responsibility for administering ___programs to the states.
- ___ is the passing down of responsibilities from the national government to the states.
- Decentralization provides the opportunity for more people to _____in politics, thereby contributing to a popular sense of political effectiveness.
10 Clues: ___ is the passing down of responsibilities from the national government to the states. • ___ also encourages governments to be responsive to citizen preferences and public policy concerns. • Many federal officials are still expected to solve political problems and are not likely to _____their own power. • ...
Security access 2021-10-20
10 Clues: record of events • collection of data • the one who seeks access • specifying access rights • to prove data is correct • some key you use to enter • identity verification service • personal data used to verify access • to undergoing procedure to gain access • determining if you are the one you pretend to be
Platform security 2021-10-23
Across
- , separate low-level system software running on the host machine to perform visualization.
- , synchronous condition that results from a particularly undesirable situation.
- , Linux uses this technique to define the priority of processes
- , a real-time operating system used in mission-critical applications
- , an asynchronous event that can occur at any time irrespective of what the processor is doing
- , processes running in the background, started by the kernel itself.
Down
- , a connection used to exchange data between the processes.
- , one method to block buffer overflow attacks
- , helps to prevent unauthorized access to data on lost or stolen computers by combining
- , the process responsible for secure logon.
10 Clues: , the process responsible for secure logon. • , one method to block buffer overflow attacks • , a connection used to exchange data between the processes. • , Linux uses this technique to define the priority of processes • , a real-time operating system used in mission-critical applications • ...
Platform security 2021-10-23
Across
- Separate low-level system software running on the host machine to perform visualization.
- Synchronous condition that results from a particularly undesirable situation.
- Linux uses this technique to define the priority of processes
- A real-time operating system used in mission-critical applications
- An asynchronous event that can occur at any time irrespective of what the processor is doing
- Processes running in the background, started by the kernel itself.
Down
- A connection used to exchange data between the processes.
- One method to block buffer overflow attacks
- Helps to prevent unauthorized access to data on lost or stolen computers by combining
- the process responsible for secure logon.
10 Clues: the process responsible for secure logon. • One method to block buffer overflow attacks • A connection used to exchange data between the processes. • Linux uses this technique to define the priority of processes • A real-time operating system used in mission-critical applications • Processes running in the background, started by the kernel itself. • ...
Network Security 2021-08-06
Across
- A group of interconnected computer systems.
- A handheld communication and computing device.
- A device that sends messages between devices in your network.
- Part of a computer network, either hardware or software that protects systems from unwanted access and/or intrusion.
- Something you apply to your computer to fix a vulnerability.
Down
- An electronic device for storing and process data.
- A type of connection that eliminates the need for wires.
- The device that connects your network to the internet.
- A social engineering attack, used to steal user data, or personal information, often conducted by email.
- A process where a user gains unauthorized access to a system.
10 Clues: A group of interconnected computer systems. • A handheld communication and computing device. • An electronic device for storing and process data. • The device that connects your network to the internet. • A type of connection that eliminates the need for wires. • Something you apply to your computer to fix a vulnerability. • ...
IT-Security 2023-06-01
Across
- schließen infizierte Computer zu einer Gruppe zusammen
- schädliche Software
- Datendiebstahl durch gefälschte E-Mails
- Programm, das Viren im Betriebssystem versteckt
- Malware, die sich selbstständig über Netze(Internet) verbreitet
Down
- Textdateien, die am Computer abgespeichert werden
- wählen unbemerkt Mehrwertnummern - finanzieller Schaden
- Datensicherung
- Programme, die Tastatur eingaben mitprotokoliert
- "Hintertür" für Dritte, eines Computer fernzusteuern, auch für kriminelle Zwecke
10 Clues: Datensicherung • schädliche Software • Datendiebstahl durch gefälschte E-Mails • Programm, das Viren im Betriebssystem versteckt • Programme, die Tastatur eingaben mitprotokoliert • Textdateien, die am Computer abgespeichert werden • schließen infizierte Computer zu einer Gruppe zusammen • wählen unbemerkt Mehrwertnummern - finanzieller Schaden • ...
Infomation Security 2015-10-06
Across
- never click on these from spam email
- does damage to, steals information from, or disrupts a computer system
- any flaw or weakness that can be exploited
- never provide this to anyone via email
Down
- assure reliability and accuracy of information and IT resources
- unsolicited email
- common target for social engineers
- examples include credit card fraud, spam and identity theft
- use this to create a unique password
- type of threat to information security
10 Clues: unsolicited email • common target for social engineers • never click on these from spam email • use this to create a unique password • type of threat to information security • never provide this to anyone via email • any flaw or weakness that can be exploited • examples include credit card fraud, spam and identity theft • ...
Internet Security 2017-05-08
Across
- Where the sender and receiver both use the same key to encrypt and decrypt data.
- A trusted organisation that provides digital certificates and signatures
- A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
- A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
- Where a public and private key are used to encrypt and decrypt data.
- A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
- A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
- A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
- A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
- Hardware and software for protecting against unauthorised access to a network.
10 Clues: Where a public and private key are used to encrypt and decrypt data. • A trusted organisation that provides digital certificates and signatures • Hardware and software for protecting against unauthorised access to a network. • Where the sender and receiver both use the same key to encrypt and decrypt data. • ...
Computer Security 2017-01-28
Across
- He or she has granted all the privileges on a linux machine
- You can access someone's computer through it
- To take advantage of something
- A software to stop malicious software
Down
- A kind of computer virus
- A network made of infected computers
- It is a junk email
- A Tecnique to collect your personal data through a website
- Denial of service
- Computer security system against online attack
10 Clues: Denial of service • It is a junk email • A kind of computer virus • To take advantage of something • A network made of infected computers • A software to stop malicious software • You can access someone's computer through it • Computer security system against online attack • A Tecnique to collect your personal data through a website • ...
Security Awareness 2022-05-17
Across
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
Down
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Prinsip Keamanan Informasi agar akurat
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perangkat lunak yang diciptakan untuk merusak sistem computer
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
Security Review 2023-08-24
Across
- Blinds 3/4 open.
- how we CONNOT leave the branch.
- how long we give the opener to clear the branch.
- Our maintenance person
- managers distress answer.
Down
- Responsible for any physical or building related problem.
- what to say when robbed.
- our team is _____________.
- computer and drawers must be __________ when we step away.
- our safe place.
10 Clues: our safe place. • Blinds 3/4 open. • Our maintenance person • what to say when robbed. • managers distress answer. • our team is _____________. • how we CONNOT leave the branch. • how long we give the opener to clear the branch. • Responsible for any physical or building related problem. • computer and drawers must be __________ when we step away.
Wireless Security 2024-02-15
Across
- A password containing both letters and numbers.
- Type of network used in coffee shops and airports.
- What technology enables wireless networking?
- A security protocol for wireless networks.
Down
- A method used to prevent unauthorized access to a mobile device.
- The amount of computing time spent on mobile devices compared to desktops.
- A device designed to mimic an authorized Wi-Fi device.
- The process of encoding information to make it unreadable without proper authorization.
- Fear of being without your mobile phone.
- Software designed to harm or infiltrate computer systems.
10 Clues: Fear of being without your mobile phone. • A security protocol for wireless networks. • What technology enables wireless networking? • A password containing both letters and numbers. • Type of network used in coffee shops and airports. • A device designed to mimic an authorized Wi-Fi device. • Software designed to harm or infiltrate computer systems. • ...
Network security 2024-01-24
Across
- Used to disrupt, damage or gain unauthorized access to a computer system
- The gap between regions and demographics that have access to modern technology
- Attempting to gain sensitive information using emails
- Used to supress ideas on the internet
- Monitoring of data being transferred over computer networks
Down
- Malware that can self-replicate causing them to spread more rapidly
- Malware that spreads by copying infected files and activates when opening infected files
- The process of converting information into a line of code
- Malware disguised as legitimate software
- Two or more computers that are connected together for the purpose of communication
10 Clues: Used to supress ideas on the internet • Malware disguised as legitimate software • Attempting to gain sensitive information using emails • The process of converting information into a line of code • Monitoring of data being transferred over computer networks • Malware that can self-replicate causing them to spread more rapidly • ...
