cyber security Crossword Puzzles
MEDIMUN Crossword 2022-03-24
Across
- every committee has 2 … and many delegates
- the theme of this years MEDIMUN is Global …
- games that relieve tension between students before the debate
- GA2 focuses …, financial and economic development
- the annual session of MEDIMUN is also referred to as the annual …
- One of the themes of the … council is the situation in Afghanistan
- delegates make can make speeches for and …
- an instance of declining to vote for or against a proposal or motion.
Down
- the … team are the team of reporters that put this issue together
- the security historical … discussed the Sino-Vietnamese war this year
- …of information
- this is the 17th … of MediNews
- the name of the wonderful disease that caused a change in venue
- delegates can form … with other delegates
- the name of the country which is a permanent member of the UN security councils and has crepes
- a formal discussion on a particular matter In which opposing arguments are put forward
- the name of the newly formed committee on the topic of crime
17 Clues: …of information • this is the 17th … of MediNews • delegates can form … with other delegates • every committee has 2 … and many delegates • delegates make can make speeches for and … • the theme of this years MEDIMUN is Global … • GA2 focuses …, financial and economic development • the name of the newly formed committee on the topic of crime • ...
Unit 1, Chapter 2 Vocabulary 2017-01-25
Across
- most of the people or things in a group
- restriction (n), _____ (v), restricting (adj)
- controversial (adj), _____ (n)
- contribute (v), _____ (n), contributor (n – person), contributory (adj)
- participate (v), _____ (n), participatory (adj.)
- the basic idea that a plan or system is based on
- to take part in an activity or event
- a person who is considered separately from the rest of the group or society that they live in
- immigrant (n), immigration (n), _____ (v)
- things that are done to keep a person, building, or country safe from danger or crime
Down
- someone who enters another country to live there permanently
- to help to make something happen
- security (n), _____ (v), security (adj)
- existing or happening in many places or situations, or among many people
- a rule or law that limits or controls what people can do
- causing a lot of disagreement because many people have strong opinions about the subject being discussed
- individual (n), individual (adj), _____ (adv)
- impose (v), _____ (n)
- to force someone to have the same ideas, beliefs, etc. as you
- resident (n: person), _____ (n: place), residential (adj)
- someone who lives or stays in a particular place
21 Clues: impose (v), _____ (n) • controversial (adj), _____ (n) • to help to make something happen • to take part in an activity or event • security (n), _____ (v), security (adj) • most of the people or things in a group • immigrant (n), immigration (n), _____ (v) • restriction (n), _____ (v), restricting (adj) • individual (n), individual (adj), _____ (adv) • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- malware type in which security mechanism is bypassed to access a system.
- The information about someone on the Internet
- Using material another person has created and claims it as your own
- acts as a security guard between the internet and a network
- the amount of data that can travel over an analog medium
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- application for performing numerical and statistical calculations
- a program that can analyze and execute a program line by line.
Down
- The purpose of scrambling data so it can be sent securely over networks.
- A number assigned to any item that is connected to the Internet
- a method used for a security breach in wireless networks
- instructions programmed on a hardware
- Initialize the system hardware components
- blockchain programming
- Vendor-created program modifications are called
- To allow communication inside the organization
- A location that provides wireless Internet access.
- name of the system that manages and programs hardware resources for a computer
- is a layout software
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Mental Health Terms 2022-09-29
Across
- Has to do with People.
- To accomplish something.
- Basic Things of Life.
- How you feel about something.
- to get someone to do something they don't want to.
- Things that you wish for.
- To say something hurtfully.
- A Feeling of Resentment.
- To intentionally do Without.
- To Be Pleased at your effort.
Down
- Happy, Sad and Excited.
- To put fourth Effort.
- To harm Someone Intentionally.
- deals with the Mind.
- Having Respect for all.
- anything dealing with the internet.
- A Place of Peace and Quiet.
- a Notice of everything and body.
- An emotion showing Strong Feelings. 18Trafficking To abuse and sell someone.
19 Clues: To put fourth Effort. • deals with the Mind. • Has to do with People. • Happy, Sad and Excited. • Basic Things of Life. • To accomplish something. • Having Respect for all. • A Feeling of Resentment. • Things that you wish for. • To intentionally do Without. • To harm Someone Intentionally. • A Place of Peace and Quiet. • To say something hurtfully. • ...
Bengkel SOP 2024 2024-01-04
Across
- To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
- Objective ___ is to reduce the risk of fraud, error and bypassing of information security controls.
- To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered is objective for ___.
- Any devices that require wi-fi access must get authorized from ___.
- How many guideline do we have in JTMD
Down
- ___ is to preserve information security when executing changes.
- How many policy do we have in ISP ?
- Test information is To ensure relevance of testing and protection of operational information used for ___?
- Copyright, software license, trademarks, design rights is example of ___.
- Personal identifiable information should follow accordingly with ___.
- ___ must be implemented to ensure data security, including at the stages of data in transit, data at rest, and data in use.
- ___ is shortform for Information Security Policy
12 Clues: How many policy do we have in ISP ? • How many guideline do we have in JTMD • ___ is shortform for Information Security Policy • ___ is to preserve information security when executing changes. • Any devices that require wi-fi access must get authorized from ___. • Personal identifiable information should follow accordingly with ___. • ...
J808 4.1 Types of Threats 2019-01-09
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- When someone deceives by pretending to be someone else in order to get personal data.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Software that encrypts programs and data until a ransom is paid to remove it.
- Collection of captured bot computers
- An error in a program that prevents the program from running as expected.
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- Criminals make a promise of goods in return for details, such as offering a free music download.
Down
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
- A type of Malware that locates and saves data from users without them knowing about it.
- Malware that allows a cyber-security attacker to take control of an infected computer.
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
15 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
J808 4.1 Types of Threats 2019-01-09
Across
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- Malware that allows a cyber-security attacker to take control of an infected computer.
- A destructive computer program that bores its way through a computer's files or through a computer's network.
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
- Collection of captured bot computers
- When someone deceives by pretending to be someone else in order to get personal data.
Down
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- Criminals make a promise of goods in return for details, such as offering a free music download.
- An error in a program that prevents the program from running as expected.
- Software that encrypts programs and data until a ransom is paid to remove it.
- A type of Malware that locates and saves data from users without them knowing about it.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer
15 Clues: Collection of captured bot computers • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • When someone deceives by pretending to be someone else in order to get personal data. • ...
Social Security and Medicare Taxes 2023-09-11
Across
- Gross Income: $13,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $50,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $3,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $53,100 Find amount withheld for Medicare. Round to the nearest dollar.
Down
- Gross Income: $73,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar.
- Gross Income: $10,100 Find amount withheld for Social Security. Round to the nearest dollar.
- Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar.
10 Clues: Gross Income: $6,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $2,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $8,100 Find amount withheld for Medicare. Round to the nearest dollar. • Gross Income: $7,100 Find amount withheld for Medicare. Round to the nearest dollar. • ...
Wireless Network 2020-04-29
Across
- 802.11__ is the latest standard establish in 2019.
- One of the wireless security protocols that supports only 8 characters for password.
- One of the WLAN design that involves no network infrastructure.
- Mesh APs helps expanding wireless network coverage by receiving the wireless signal and ______ it.
- _____ allows multiple devices to connect to the internet.
- One of the advantages of Infrastructure WLAN.
- _____ is a technology that scramble the data in a sense that it will not be understandable by any network hacker.
- The _____ will receive the signal transmitted by the ISP.
- One of the disadvantages of wireless network over wired network.
- One type of WPA2 that is designed for a larger business setting.
- Devices without Ethernet ports need to connect to the internet through _____ router, creating a WLAN.
- The coverage of a wireless network can be expanded by adding wireless _____ points connected to the wireless router.
Down
- One of the purposes of password in wireless security.
- 802.11 is an example of the wireless ______.
- Wireless network is a network set up by using ______ signal frequency
- Device can hard-wire directly into the _____ port of the modem to connect to the internet.
- Modem stands for _____-Demodulator
- 802.11__ is the wireless standard that broadcast only at 5GHz.
- 5GHz transmit data in shorter range, but with higher speed and lesser _____.
- One of the wireless security protocols that served as a temporary solution that address the vulnerability of WEP.
- ISP stands for ______ Service Provider
- The modem is responsible to convert analog signal to _____ signal.
- 802.11 is established by _____ in 1997.
- One of the wireless security protocols that supports up to 64 characters for password.
24 Clues: Modem stands for _____-Demodulator • ISP stands for ______ Service Provider • 802.11 is established by _____ in 1997. • 802.11 is an example of the wireless ______. • One of the advantages of Infrastructure WLAN. • 802.11__ is the latest standard establish in 2019. • One of the purposes of password in wireless security. • ...
LiTe Crossword Puzzle 2024-11-20
Across
- An individual who breaks into computer systems to steal, change, or destroy information.
- One of the more common methods of both sending information out and collecting it from unsuspecting people.
- Use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- Any action derived from intelligent threats to violate the security of the system.
- The process of detecting and preventing illegal or unauthorized use of a computerand preventing intruders from accessing any part of a computer system.
- A term used to describe actions taken by someone to gain unauthorized access to a computer.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization.
- An unprivileged false statement of fact which tends to harm the reputation of a person or company.
- It is an executable file that will install itself and run automatically once it's downloaded.
- Any action of stealing information from a users system.
Down
- Ensuring that the information is accessible to authorized persons when required without delay.
- Refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- One of the more common ways to infiltrate or damage of your computer.
- An action or event that has the potential to compromise and/or violate security.
- Often used by third parties to infiltrate your computer.
- A defined method of breaching the security of an IT system through vulnerability.
- The applications on the computers and operating system.
- A common type of online fraud.
- The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.
20 Clues: A common type of online fraud. • The applications on the computers and operating system. • Any action of stealing information from a users system. • Often used by third parties to infiltrate your computer. • One of the more common ways to infiltrate or damage of your computer. • An action or event that has the potential to compromise and/or violate security. • ...
Domestic and International Airports 2018-07-19
Across
- 3 letter code for Kapiti Coast
- Used for security screening
- "Is this your bag?"
- Area of the airport where the public can access for free
- 3 letter code for Singapore
- What does the "R" represent in WCHR
- Adjacent to a terminal
- To get on the plane
- 2 letter code for Virgin Australia
- Number of runways at Auckland Airport
- Abbreviation for Unaccompanied Minors
Down
- Passenger
- Giving permission to enter a country for a certain time
- Access to an aircraft from the terminal
- Used for going overseas
- Phonetic alphabet for "V"
- 6th busiest airport in New Zealand
- 3 letter code for Coolangatta
- Phonetic alphabet for "B"
- Money dispenser
20 Clues: Passenger • Money dispenser • "Is this your bag?" • To get on the plane • Adjacent to a terminal • Used for going overseas • Phonetic alphabet for "V" • Phonetic alphabet for "B" • Used for security screening • 3 letter code for Singapore • 3 letter code for Coolangatta • 3 letter code for Kapiti Coast • 6th busiest airport in New Zealand • 2 letter code for Virgin Australia • ...
CSC Crossword 2021-06-09
Across
- If you hear it, _____ it
- Anaheim Angels _____
- Color of pen a security guard uses
- Used to protect your skin from the sun
- Common hair color abbreviation
- Someone leaving with a subject who is being evicted
- Observe and _____
- Verbal or physical
- OC's branch manager
- Non-guard carded staff is _____ staff
- See something, _____ something
Down
- Wash your _____frequently
- What does CP stand for
- Text _____ to 474747 to place a contactless concessions order
- _____ items include weapons, alcohol and large bags
- Required to wear a security shirt
- Common eye color abbreviation
- 7th _____ stretch
- Guests are not allowed to re-_____ the stadium
- What day is payday?
- _____board
- A13's first name
22 Clues: _____board • A13's first name • 7th _____ stretch • Observe and _____ • Verbal or physical • What day is payday? • OC's branch manager • Anaheim Angels _____ • What does CP stand for • If you hear it, _____ it • Wash your _____frequently • Common eye color abbreviation • Common hair color abbreviation • See something, _____ something • Required to wear a security shirt • ...
MY SPELLING CROSSWORD PUZZLE 2013-04-03
United Nations (Worksheet 2) 2015-06-10
21 Clues: ปัญหา • พิเศษ • องค์กร • ปกป้อง • เอกสาร • ป้องกัน • ข้อตกลง • ก่อตั้ง • มาตรฐาน • สนับสนุน • กระทบต่อ • การประกาศ • กิ่งมะกอก • สัญลักษณ์ • ความสงบสุข • ความสงบสุข • เป็นตัวแทน • เป็นทางการ • ความปลอดภัย • ความสัมพันธ์ • UN stands for ______________.
Cryptogram crossword 2023-12-12
21 Clues: iovnkx • iujotm • vgyycuxj • vuresgzn • jkiujotm • ykiaxoze • Grmuxozns • ynuxzngtj • vxotiovgr • Lxkwaktie • kyvoutgmk • jkixevzout • ktixevzout • Vykajuxgtjus • iushotgzuxoiy • ixevzgtgreyoy • vuregrvnghkzoi • iussatoigzouty • gaznktzoigzout • qkxiqnull'yVxotiovgr • Machine KtomsgSginotk
less50 2024-05-15
21 Clues: wall • flies • cured • present • agility • Control • General • consider • required • security • suitable • distance • conducted • dependent • Available • confirmed • limitation • flexibility • substantial • announcement • administrator
Job Vacancy 2025-01-20
20 Clues: akan • dapat • jadwal • proyek • panduan • mengulas • kemajuan • memimpin • domisili • keamanan • mengawasi • perumahan • sebaiknya • menyiapkan • memastikan • penempatan • menyediakan • mengkoordinasi • memahami/ mampu • synonym of supervisor
personal finance 2021-02-24
19 Clues: fnizsf • jaiofna • nfapjcz • fanofna • aiofpna • nfiopfz • jfdiaofj • naiofnoa • fjioeanfo • roiahweng • fjieowanf • zcjvziofd • jfoienafo • ajofneonf • fjizopfjz • fjeioawnf • fnakopzjfd • fialf;mkzl • fajiosnjcz
Unit 16 2020-04-16
19 Clues: / padi • / toll • / trahv • / pagas • / rabav • / kirurg • / kandik • / kohver • / vahekäik • / õpipoiss • / sihtkoht • / mehaanik • / aksessuaar • / turvalisus • / sissekanne • / ürgne loodus • / deklareerima • / reisiterminal • / meditsiiniline
Games 2025-01-09
9 Clues: game of • what this is • cyber sleuth • what people know you for • what you are doing right now • card game that old people play • 7th color of the rainbow dragon • 3 in a row and you're good to go • a game that needs 4 players or more
Highlights of 2020 2020-12-24
Across
- Exclusive interview with this CAT A publication on Health Security technology
- Best research feature (Love thy neighbor)in this leading online lifestyle publication
- Best Home Automation story of the year with India’s leading financial publication was done by this journalist
- Renowned TV journo who reviewed the UV Case
- Stuff is a ___________ based publication that did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners)
- The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
Down
- Participation in maximum number of Industry stories with this publication
- Godrej Security Solutions ventured into the health security segment with this product
- Authored article on Reflecting on your child’s safety post-COVID-19 crisis
- The best front-page coverage (UV-based disinfectants in demand) was received in this publication
- Godrej Security Solutions celebrated ‘Family Safety Month’campaign this month
- Maximum regional coverage garnered in this city
12 Clues: Renowned TV journo who reviewed the UV Case • Maximum regional coverage garnered in this city • Participation in maximum number of Industry stories with this publication • Authored article on Reflecting on your child’s safety post-COVID-19 crisis • Exclusive interview with this CAT A publication on Health Security technology • ...
Highlights of 2020 2020-12-24
Across
- Participation in maximum number of Industry stories with this publication
- Renowned TV journo who reviewed the UV Case
- Godrej Security Solutions ventured into the health security segment with this product
- STUFF is _ baseded publication who did a UV Case listicle (Go Corona! UVC cases are the ultimate virus coroners
- Best research feature (Love thy neighbor) in this leading online lifestyle publication
- Godrej Security Solutions celebrated ‘Family Safety Month’ this month
Down
- The Best long format industry story on UV Technology (UV lights are becoming the weapon of choice to kill the virus)
- The best front-page coverage (UV-based disinfectants in demand) was received in this publication
- Best Home Automation story of the year with India’s leading financial publication was done by this journalist
- Exclusive interview with this CAT A publication on Health Security technology
- Authored article on Reflecting on your child’s safety post COVID-19 crisis
- Maximum regional coverage garnered in this city
12 Clues: Renowned TV journo who reviewed the UV Case • Maximum regional coverage garnered in this city • Godrej Security Solutions celebrated ‘Family Safety Month’ this month • Participation in maximum number of Industry stories with this publication • Authored article on Reflecting on your child’s safety post COVID-19 crisis • ...
Cyber Test 2023-09-13
Across
- A type of malware
- The most well-known malware attack in the past few years
Down
- The world's number one password
- The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center
- This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.
5 Clues: A type of malware • The world's number one password • The most well-known malware attack in the past few years • The number one type of cyber incident reported to the FBI's Internet Crime Complaint Center • This includes a variety of cyber attacks including ransomware, viruses, Trojans, worms and others.
HUman rights 2018-01-15
personal finance 2021-02-24
19 Clues: fnizsf • jaiofna • nfapjcz • fanofna • aiofpna • nfiopfz • jfdiaofj • naiofnoa • fjioeanfo • roiahweng • fjieowanf • zcjvziofd • jfoienafo • ajofneonf • fjizopfjz • fjeioawnf • fnakopzjfd • fialf;mkzl • fajiosnjcz
crimes against people and property crossword 2016-11-15
Across
- lying in court
- punishment as a threat to deter people
- crime crimes happening on the internet
- returning stolen property to the right owner
- destruction of property
- crime a crime motivated by racial, sexual, or other prejudice, typically one involving violence.
- physically beating someone up
- killing someone
- taking someone's money
- process of helping someone
- theft or misappropriation of funds placed in one's trust
Down
- breaking into someone's house intending to commit a crime
- stealing property from someone
- punishment inflicted on a criminal
- unlawful killing of someone
- sentencing someone into jail
- taking money from someones with threats
- setting fire to someone's house
- stealing someone's property
19 Clues: lying in court • killing someone • taking someone's money • destruction of property • process of helping someone • unlawful killing of someone • stealing someone's property • sentencing someone into jail • physically beating someone up • stealing property from someone • setting fire to someone's house • punishment inflicted on a criminal • punishment as a threat to deter people • ...
Reactions Summer 2019 2019-07-03
Across
- Abbreviation for Latin America market
- South America’s largest insurance market
- AIG's top executive
- Bermuda's Current Premier
- A word for the emergence of new technologies in insurance
- SCOR Global P&C CEO
- Insures the risks of its owners
- Risk forecasters
- No. 1 domicile for healthcare captives
- Refreshing summer drink; insurance disruptor
- Insurance market that protects against online threats
Down
- The type of insurance that protects against natural disasters
- London market initiative
- Where an insurance business is located
- Leading US domicile for captives
- Some say this new tech is “off the chain”
- Consortium of US insurance regulators
- Cover for reinsurers, or a throwback
- The world’s largest specialist insurance market
19 Clues: Risk forecasters • AIG's top executive • SCOR Global P&C CEO • London market initiative • Bermuda's Current Premier • Insures the risks of its owners • Leading US domicile for captives • Cover for reinsurers, or a throwback • Abbreviation for Latin America market • Consortium of US insurance regulators • Where an insurance business is located • ...
CISO Crossword Quiz - 2125 2025-07-10
Across
- Cyber fraud where scammers pretend to be from banks or government agencies make phone calls to steal personal information
- Term used to refers protection of devices like laptops, smartphones, and desktops from cyber threats when they connect to a network?
- What feature locks a device automatically after a period of inactivity to prevent unauthorized access?
- A malicious software designed to damage or gain unauthorized access to systems?
Down
- What kind of app promises quick money but ends up stealing users’ data and blackmailing them?
- Scam where victims receive fake calls impersonating Law Enforcement Agencies like police, CBI etc. claiming an online arrest warrant?
- Terms used for AI-generated fake videos or audios which are used to impersonate people for fraud or defamation?
- What is the term for an unofficial Android app that mimics a real one but is actually malware?
- What scam involves fraudsters pretending to be delivery personnel and claiming illegal items have been sent in your name?
- What feature allows erasing all data from a lost or stolen device remotely?
10 Clues: What feature allows erasing all data from a lost or stolen device remotely? • A malicious software designed to damage or gain unauthorized access to systems? • What kind of app promises quick money but ends up stealing users’ data and blackmailing them? • What is the term for an unofficial Android app that mimics a real one but is actually malware? • ...
CISO Crossword Quiz - 2125 2025-07-10
Across
- Cyber fraud where scammers pretend to be from banks or government agencies make phone calls to steal personal information?
- A Term which refers protection of devices like laptops, smartphones, and desktops from cyber threats when they connect to a network?
- What feature locks a device automatically after a period of inactivity to prevent unauthorized access?
- A malicious software designed to damage or gain unauthorized access to systems?
Down
- What kind of app promises quick money but ends up stealing users’ data and blackmailing them?
- Scam where victims receive fake calls impersonating Law Enforcement Agencies like police, CBI etc. claiming an online arrest warrant?
- Terms used for AI-generated fake videos or audios which are used to impersonate people for fraud or defamation?
- What is the term for an unofficial Android app that mimics a real one but is actually a malware?
- What scam involves fraudsters pretending to be delivery personnel and claiming illegal items have been sent in your name?
- What feature allows erasing all data from a lost or stolen device remotely?
10 Clues: What feature allows erasing all data from a lost or stolen device remotely? • A malicious software designed to damage or gain unauthorized access to systems? • What kind of app promises quick money but ends up stealing users’ data and blackmailing them? • What is the term for an unofficial Android app that mimics a real one but is actually a malware? • ...
Crossword 1 2014-12-26
Across
- When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- Only the __________ government can create indictable offences.
- You will need a security licence to work in loss __________.
- We can protect information by protecting computer screens from __________ eyes.
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- When handling evidence, you should wear gloves to avoid __________.
- Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
- When securing a crime scene, make note of any __________ conditions.
- A positive attitude and being respectful are __________ qualities.
- One of the recommendations from the Patrick Shand case was __________ licensing.
- If a crowd seems to be getting out of control, __________ from any communication.
Down
- CDT means __________, direction and take down.
- Type B fires are fueled by __________ liquids.
- Every province has its own human rights __________.
- When taking a witness statement, the facts should be in __________ order.
- The basic security role is to protect people, property and __________.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- Post orders are often called __________ orders.
- One reason that we patrol is to deter people from __________ acts.
- An arrest is defined as getting control of someone with intent to __________.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- Type D fires are fueled by __________ metals.
- Patrick Shand was arrested for __________ baby food.
- Designing the environment to reduce the possibility of crime is called?
25 Clues: Type D fires are fueled by __________ metals. • CDT means __________, direction and take down. • Type B fires are fueled by __________ liquids. • Post orders are often called __________ orders. • Every province has its own human rights __________. • Patrick Shand was arrested for __________ baby food. • You will need a security licence to work in loss __________. • ...
Plural Policing 2018-10-29
Across
- 22% of G4S employees are employed in this continent
- Missing word – MI6 is the =common name for the Secret “?” Service
- 8% of G4S employees are employed in this continent
- Missing word - SEPA is the Scottish Environmental “?” Agency
- Missing word - MI5 is the common name for the UK “?” Service
- The first Neighbourhood Watch scheme - then known as Home Watch - was set up in the UK in in which Chesire town in 1982?
- Surname of “Johnathon” on NCA most wanted list
- Acronym for British Security Industry Authority
- The article ‘Pluralisation of policing in England & Wales and the Netherlands: exploring similarity and difference’ (2009) was written by Jones, van Steden and which other author (surname)?
- Surname of the current Chief of the Secret Intelligence Service
- Acronym for Scottish Environmental Protection Agency
Down
- NCA Board Meeting on 23 August 2018 met in this city
- According to Atkinson (2018) beyond the ‘key operational partners’ how many other agencies have a presence at the Scottish Crime Campus?
- Surname of the current Director General of the Security Service
- In their 2002 article Mark Button and Tim John considered the plural policing of what kind of protest?
- G4S had a contract to deliver security at this event in London in 2012
- The first Neighbourhood Watch schemes were set up in New York in 1964 as a response to a murder. What was the surname of the victim?
- Missing word - The NCA stands for the National “?" Agency
- Missing word - HMRC is Her Majesty’s Revenue and “?”
- The Scottish Crime Campus is located in this town
- According to Atkinson (2018) how many ‘key operational partners’ are based at the Scottish Crime Campus?
21 Clues: Surname of “Johnathon” on NCA most wanted list • Acronym for British Security Industry Authority • The Scottish Crime Campus is located in this town • 8% of G4S employees are employed in this continent • 22% of G4S employees are employed in this continent • NCA Board Meeting on 23 August 2018 met in this city • Missing word - HMRC is Her Majesty’s Revenue and “?” • ...
June 12 - InfoSec 2024-06-12
Across
- Protecting systems and data from threats
- Computer equipment which protects your network from hackers gaining remote access
- Keeping personal information secure
- What needs to be kept private and secure
- Files that may contain sensitive information
- Person who gains unauthorized access to a computer system
- Program that deletes files and/or programs
- Group of connected computers
- Ensuring data remains unaltered and trustworthy
- Permissions granted to view or use data/systems
- Rules and policies governing cybersecurity practices
- Digital information that needs safeguarding
- Being alert to potential cybersecurity risks
Down
- The protection of computers, networks and data from malware and hackers
- Where a person lies to another to trick them into giving over money or information
- Sending fake emails telling victims to log onto a fake website which steals their password and login details
- Malware which gives a hacker admin powers to control your computer
- Malware which completes small repetitive tasks (used in DDoS attacks)
- Someone who might visit offices to teach workers about cybersecurity
- Obligation to follow security best practices
- Program which appears useful, but hides malicious software inside
- Causing a website to crash by directing millions of computers to simultaneously request data from it (4 letter acronym)
- Preventing unauthorized disclosure of information
- A flaw in a program or network which makes it vulnerable to hacking
- Potential danger that could breach security
- Measures to limit access and maintain security
- Plan to maintain cybersecurity defenses
- Another name for a software engineer
- String of letters, numbers and characters entered along with a user ID to log in
- Umbrella term for various programs that cause problems, including viruses, ransomware and trojans
30 Clues: Group of connected computers • Keeping personal information secure • Another name for a software engineer • Plan to maintain cybersecurity defenses • Protecting systems and data from threats • What needs to be kept private and secure • Program that deletes files and/or programs • Potential danger that could breach security • Digital information that needs safeguarding • ...
Aviation Workplace - Safety & Security - Lachlan 2023-11-17
Across
- selling or trading in goods that are exempt from payment of duty
- service operator PSA
- the place at an airport or country's border where government officials check the documents of people entering that country
- procedures followed or measures taken to ensure the security of a state or organization
- plays a significant role in managing the movements of aircraft
- the end of a railway or other transport route, or a station at such a point
- oad, unload and move baggage and cargo around an airport, both landside and airside (before and after the security boundary)
- the flying or operating of an aircraft
- the side of an airport terminal beyond passport and customs control
- aviation security
Down
- the side of an airport terminal to which the general public has unrestricted access
- help identify issues such as cracks, potholes, debris, or other surface irregularities that could pose a risk to aircraft during takeoff, landing, or taxiing
- direct, control, and monitor aircraft traffic at an airport to ensure safety and compliance with federal and local regulations
- all aircraft operations in which the aircraft is used for the carriage of passengers or goods for hire or reward.
- goods carried on a ship, aircraft or motor vehicle
- a method of measuring the time based on the full 24 hours of the day rather than dividing it into two groups of 12 hours
- an organization providing a regular public service of air transport on one or more routes
- the official department that administers and collects the duties levied by a government levied by a government on imported goods/the place
- a complex of runways and buildings for the takeoff, landing and maintenance of civil aircrafts with facilities for passengers
- Delta's catering company
20 Clues: aviation security • service operator PSA • Delta's catering company • the flying or operating of an aircraft • goods carried on a ship, aircraft or motor vehicle • plays a significant role in managing the movements of aircraft • selling or trading in goods that are exempt from payment of duty • the side of an airport terminal beyond passport and customs control • ...
Understanding Money by Riley Mcdonald 2024-05-09
Across
- Money is also known as...
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- A security that pays interest over terms ranging from two to ten years
- Banks that are part of The Fed are known as...
- A security that pays interest over terms of ten to thirty years
- To exchange one good or service for another good or service
- A bank-issued card that allows customers to pay for purchases directly from their checking account
- A type of financial investment issued by a corporation, government, or other organization
- Money received today is worth more than the same amount received in the future because money received today can be invested or deposited in the bank for interest; this concept is called...
- Money is a common measure of the worth or price of a good or service
- Action taken to manage the supply of money and interest rates in an economy
Down
- A type of a document guaranteeing the payment of a specific amount of money
- The process of transferring money from one individual or organization to another
- A security that matures in a year or less
- Money can be saved and used at a later date
- The mechanism a nation uses to provide and manager money for itself
- The Federal Reserve System, often called... was created by the U.S. Congress in 1913 as our nation's central bank
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- A transfer of money from one bank account to another
- Anything of value that is accepted in return for goods and services
20 Clues: Money is also known as... • A security that matures in a year or less • Money can be saved and used at a later date • Banks that are part of The Fed are known as... • A transfer of money from one bank account to another • To exchange one good or service for another good or service • A security that pays interest over terms of ten to thirty years • ...
IT - Crossword 2024-11-25
Across
- Any action derived from intelligent threats to violate the security of the
- Involves actions that supplement the precautionary measures
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- A common type of online fraud
- A weakness, design, or implementation error
- A crime in which a computer is the object of the crime
- Ensuring that the information is accessible to authorized persons when required without delay.
- The exclusive legal right, given to an originator
- Use computer technology to access personal information,
- The identification and assurance of the origin of information
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or
Down
- Any action of stealing information from a users’ system.
- Action taken in advance to protect the system against potential threats or
- Information/data can be accessed only by those authorized
- An assurance for which someone cannot deny something
- Ending information out and collecting it from unsuspecting people
- A defined method of breaching the security of an IT system through
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- User security allows the system to set security rules to determine what is displayed to which user.
- Malware is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
- Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
21 Clues: A common type of online fraud • A weakness, design, or implementation error • The exclusive legal right, given to an originator • An assurance for which someone cannot deny something • A crime in which a computer is the object of the crime • Use computer technology to access personal information, • Any action of stealing information from a users’ system. • ...
claudio 2025-06-23
Across
- A method of threat detection that monitors and scrutinizes processes, file system, registry, and network activities on an endpoint for suspicious patterns, often leveraging machine learning models.
- An advanced policy setting in Nebula that tightens the threshold for flagging suspicious processes, increasing vigilance against unknown threats at the risk of more false positives.
- A type of malware disguised as legitimate software, tricking users into installing it, after which it can gain unauthorized access or perform malicious actions.
- Regular downloads containing the latest threat definitions, behavioral rules, and detection heuristics, essential for keeping endpoint agents up-to-date against emerging threats.
- Configurable alerts within the Nebula console that inform administrators via email or other channels about critical security events or system status changes.
- Acronym for Potentially Unwanted Program, software that may include adware, spyware, or other intrusive features, often bundled with legitimate downloads, as categorized by ThreatDown.
- Logical collections of endpoints within Nebula that allow administrators to apply policies, schedules, and exclusions uniformly to a subset of devices.
- A feature within Nebula that allows administrators to prevent the execution of specific unauthorized or unwanted applications on managed endpoints.
- Network settings on an endpoint or within Nebula that direct outbound communications through an intermediary server, often requiring specific allowances for agent connectivity.
- A latent weakness or flaw within a software application, operating system, or network configuration that could be leveraged by an attacker to compromise system integrity or confidentiality.
- Software that, while not inherently malicious, may pose a security risk due to its functionality, such as remote administration tools that could be misused.
- Specific numerical addresses used in network communication, which must often be explicitly opened or configured in firewalls to allow ThreatDown agents to communicate with the cloud console.
- A statistically significant deviation from established baseline behavior patterns on an endpoint, frequently signaling potential stealthy compromise or advanced persistent threat activity.
- A protection feature within Nebula that defends against repeated, systematic attempts to guess login credentials, often associated with Remote Desktop Protocol attacks.
- A ThreatDown service or component primarily responsible for validating product licensing and subscription entitlements for deployed endpoint agents.
- A ThreatDown backend server component or service responsible for checking and distributing updates for both product versions and protection databases to endpoint agents.
- A specific rule configured within Nebula to bypass security scrutiny for a particular file, folder, process, or website, often used to prevent false positives or accommodate legitimate applications.
- A module that intercepts and evaluates domain name system queries to block access to malicious websites, enforce content policies, and prevent communication with command-and-control servers.
- The systematic process of orchestrating the installation and configuration of endpoint protection agents across a diverse organizational digital infrastructure.
- An advanced endpoint security technology that provides continuous monitoring, deep visibility, and proactive response capabilities to detect and contain sophisticated threats that evade traditional prevention.
- A specialized cybersecurity service providing 24/7 human-led threat hunting, monitoring, and incident response, extending an organization's security capabilities without requiring in-house staffing.
- The proprietary cloud-native platform serving as the centralized command and control for ThreatDown's comprehensive suite of endpoint security solutions.
- A module that systematically scans endpoints to identify software weaknesses and misconfigurations, often using CVSS scoring to prioritize discovered flaws.
- An erroneous detection where legitimate activity or software is incorrectly identified as malicious, requiring administrative intervention or the creation of an exclusion.
- An enhanced security measure that requires users to provide two different forms of verification to log into the Nebula console, beyond just a password.
- Acronym for Content Delivery Network, a distributed network of servers used by ThreatDown to efficiently deliver product updates and protection definitions to global endpoints.
- A type of malicious software that encrypts a victim's files and demands payment, typically cryptocurrency, in exchange for the decryption key, often with a time limit.
- A sophisticated threat detection methodology employed by endpoint protection, which identifies unknown malicious activity by analyzing behavior patterns rather than relying solely on known signatures.
- A stealthy type of malware designed to conceal its presence and activities on a compromised system, often by modifying operating system processes or kernel functions.
- The lightweight client software component deployed on an endpoint, facilitating continuous telemetry and policy enforcement from the Nebula console.
Down
- A category of potentially unwanted software that aggressively displays advertisements, often collecting user data without explicit consent.
- A chronological sequence of records in the Detection Log, providing an unalterable history of security events, administrative actions, and system changes within the Nebula platform.
- A core security feature of the endpoint agent that creates a "safe zone" to prevent unauthorized termination or manipulation of the ThreatDown application itself by other processes.
- A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units.
- A security policy setting that requires a password or specific credentials to prevent unauthorized removal of the ThreatDown agent from an endpoint.
- A specific piece of code or a meticulously crafted sequence of commands designed to capitalize on a known software vulnerability, often leading to privilege escalation or remote code execution.
- A specific action taken on a compromised endpoint to prevent it from communicating with other devices on the internal network, containing the spread of threats.
- A discrete cybersecurity event, potentially signifying a breach or compromise, requiring immediate investigation, containment, and root cause analysis.
- A module that enables centralized control over endpoint firewall rules, augmenting network security by regulating incoming and outgoing traffic.
- A broad category encompassing any software intentionally designed to cause disruption, damage, or unauthorized access to a computer system, including viruses, worms, and Trojans.
- An alphanumeric string or digital credential required to activate and validate the legitimate use of ThreatDown products and services, defining features and expiration.
- A comprehensive cybersecurity service that integrates and correlates security telemetry across multiple domains—including endpoints, networks, cloud, and email—with human expertise for proactive threat hunting and rapid incident response.
- The strategic linking of the Nebula platform with external security orchestration, automation, and response (SOAR) or Security Information and Event Management (SIEM) systems for a unified security posture.
- A report within Nebula providing a consolidated view of all initiated actions, such as scans or remediations, along with their current status and completion details.
- The lowest access level within the Nebula console, allowing users to view data and generate reports but without the ability to make any system changes.
- A configuration option for forwarding Nebula's event and detection data to an external security information and event management (SIEM) system for centralized logging and analysis.
- A security feature focusing on preventing threats like phishing, malware, and spam that are delivered via electronic messages, often through attachment scanning and link analysis.
- The highest-level user role in the Nebula console, possessing unrestricted access to platform configurations, user management, and sensitive policy data.
- A granular set of configurable rules within Nebula, dictating the precise operational parameters and security responses of endpoint agents across various organizational groups.
- Malicious software designed to secretly gather information about a user's activities and transmit it to an external entity, often without their knowledge.
- A forensic capability within Nebula that collects and stores extensive endpoint event data, enabling administrators to investigate past activities and reconstruct attack sequences. (Abbr. FRS)
- A historical name for a previous generation of ThreatDown's cloud-based management console, now largely superseded by Nebula but still referenced in documentation for network access.
- Specialized data files generated by the endpoint agent or console, essential for technical support to troubleshoot complex issues like connectivity problems or unexpected behaviors.
- A self-replicating standalone malware that spreads via network connections to infect other computers, often without human interaction.
- A security feature of the endpoint agent designed to prevent unauthorized modification, disablement, or uninstallation of the ThreatDown software by malicious actors or unprivileged users.
- An isolated, virtualized environment utilized for detonating and meticulously observing suspicious files or code in a controlled manner, preventing any impact on the live operating system.
- A powerful command-line interface feature within Nebula that allows administrators to remotely execute commands on isolated endpoints for forensic investigation and advanced remediation.
- Granular system data continuously streamed from protected endpoints, crucial for advanced threat hunting and behavioral anomaly detection within the platform.
- An isolation protocol for detected malicious executables or processes, designed to neutralize immediate threat by preventing further interaction with the host system.
- A Nebula user role providing view access and limited editing capabilities, typically restricted to managing specific sites or entities within a larger organizational structure.
- An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session.
- A feature, often browser-based, specifically designed to identify and block access to fraudulent websites that attempt to steal sensitive user information through deceptive means.
- The precise sequence of automated or manual actions executed to eradicate or neutralize a detected threat, often involving deletion, isolation, or rollback of malicious changes.
- An indicator, often monitored during troubleshooting, reflecting the operational state of the MBEndpointAgent or other core ThreatDown processes on a managed device.
- A module designed to automate the deployment of software updates and security fixes across operating systems and third-party applications, thereby addressing identified vulnerabilities.
- A critical remediation capability in ThreatDown EDR that reverses malicious changes caused by ransomware, restoring affected files to their pre-infection state.
- A deceptive application or program designed to trick users into believing their system has problems, often for financial gain or to install further malicious software.
- A product module extending ThreatDown protection to mobile devices, safeguarding them against malware, risky apps, and network threats.
- A policy-driven feature that regulates the use of removable media and peripheral devices on endpoints to prevent data exfiltration and malware introduction.
- A security directive comprising a pre-approved inventory of applications, executables, or network connections permitted to operate, thereby bypassing standard security checks.
70 Clues: An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session. • A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units. • ...
Security Awareness 2015-01-21
Across
- Request Is a request for access to personal information under the Act.
- Directorate who you contact regarding assistance for a privacy breach
- Refers to a systematic approach for watching over, tracking or monitoring physical and logical spaces, individuals or individuals' activities, whereabouts, behaviour or interests.
- Abbreciation for a process used to determine how a program or service could affect the privacy of an individual.
- race, ethnic origin, religion, age & marital status are considered this kind of information.
- A privacy breach occurs when there is improper or unauthorized access to or collection, use, disclosure, and/or retention of personal information as defined in the Privacy Act.
Down
- personal information is legislated under sections 4 to 8 of the Privacy Act. It is a priority of the CRA, and a broad arrangement of measures is in place to ensure personal information remains secure at all times.
- abbreviation for your personal identification number that should be confidential at all times.
- Is a mandatory or discretionary provision under the Act that authorizes the head of the government institution to refuse to disclose information in response to a request received under the Act.
- the act of verifying (i) the validity of the identity of an individual or an Entity, or (ii) the integrity of data in electronic form.
- Notice A privacy notice is a statement presented to an individual or group of individuals to communicate the purpose of a collection, including the authority of the government institution to collect, use, and disclose the personal information for a given program or activity.
11 Clues: Directorate who you contact regarding assistance for a privacy breach • Request Is a request for access to personal information under the Act. • race, ethnic origin, religion, age & marital status are considered this kind of information. • abbreviation for your personal identification number that should be confidential at all times. • ...
IT-Security 2016-01-29
Across
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
- Welche Programme, protokollieren die Tastatureingabe mit?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
- Wie werden unerwünschte Werbemails genannt?
Down
- Wie wird das Chatten in Echtzeit genannt?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
IT-Security 2016-01-29
Across
- Wie wird das Chatten in Echtzeit genannt?
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
Down
- Welche Programme, protokollieren die Tastatureingabe mit?
- Wie werden unerwünschte Werbemails genannt?
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
IT-Security 2016-01-29
Across
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
- Welche Programme, protokollieren die Tastatureingabe mit?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
- Wie werden unerwünschte Werbemails genannt?
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
Down
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Wie wird das Chatten in Echtzeit genannt?
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
Internet Security 2018-04-17
Across
- A clever but dishonest way to get money.
- An electronic way for proving your identity.
- Malicious software created to damage or alter computer data.
- A kind of program designed to remove viruses from a computer system.
- Criminal activity intended to trick someone into giving away personal information.
Down
- Computer criminal who breaks into a computer system to steal information or to stop the system from working properly.
- Self-copying program moving from one computer to another by exploiting security flaws.
- Malicious programs disguised as innocent-looking files and making damage in a computer system.
- Online harassment or abuse in chat rooms.
- A program designed to prevent spyware from gaining access to the internal network.
10 Clues: A clever but dishonest way to get money. • Online harassment or abuse in chat rooms. • An electronic way for proving your identity. • Malicious software created to damage or alter computer data. • A kind of program designed to remove viruses from a computer system. • A program designed to prevent spyware from gaining access to the internal network. • ...
National Security 2021-03-04
Across
- a person who secretly collects and reports information about the activities of another country or organization
- secret action taken by a country to prevent another country from discovering its military, industrial, or political secrets
- a government department or other group that gathers information about other countries or enemies, or the information that is gathered.
- a statement that someone will be hurt or harmed
Down
- the careful watching of a person, especially by the police or army, because of a crime that has happened or is expected
- a country that has agreed officially to give help and support to another one
- the protection of people, organizations, countries, etc. against a possible attack or other crime
- a verb which means to win against someone in a fight, war
- a law enforcement and domestic intelligence agency which protects the US from terrorist attacks and investigate federal crimes
- this agency is focused on human espionage
10 Clues: this agency is focused on human espionage • a statement that someone will be hurt or harmed • a verb which means to win against someone in a fight, war • a country that has agreed officially to give help and support to another one • the protection of people, organizations, countries, etc. against a possible attack or other crime • ...
Internet Security 2017-05-08
Across
- A technique for examining the contents of packets on a network and rejecting them if they do not form a part of a recognised communication.
- A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a certification Authority.
- Where a public and private key are used to encrypt and decrypt data.
- Where the sender and receiver both use the same key to encrypt and decrypt data.
- Key A code used to encrypt/decrypt data that can be made public and is linked to a corresponding private key.
Down
- A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.
- A method of ensuring that an encrypted message is from a trusted source as they have a unique, encrypted signature verified by a Certification Authority.
- A trusted organisation that provides digital certificates and signatures
- Hardware and software for protecting against unauthorised access to a network.
- Key A code used to encrypt/decrypt data that is only known by one user and is linked to a corresponding public key.
10 Clues: Where a public and private key are used to encrypt and decrypt data. • A trusted organisation that provides digital certificates and signatures • Hardware and software for protecting against unauthorised access to a network. • Where the sender and receiver both use the same key to encrypt and decrypt data. • ...
Improving Security 2021-04-14
Across
- His salary is ___________ to meet his needs.
- Fake designer watches are sold at a fraction of the price of the __________ article.
- SniffPass can __________ passwords on any 32-bit Windows operating system.
- The amount of carbon __________ trapped in our atmosphere causes global warming.
- For Credentials, choose or add guest OS credentials that are __________ to run the script.
Down
- Their dialect is __________ to most speakers of Standard English.
- A __________ is a weakness, flaw, or error found within a security system.
- The data will be automatically __________ from one part of the system to another.
- A __________ is a sequence of numbers and letters used to check data for errors.
- __________ is encrypted text transformed from plaintext using an encryption algorithm.
10 Clues: His salary is ___________ to meet his needs. • Their dialect is __________ to most speakers of Standard English. • A __________ is a weakness, flaw, or error found within a security system. • SniffPass can __________ passwords on any 32-bit Windows operating system. • A __________ is a sequence of numbers and letters used to check data for errors. • ...
security plan 2021-04-14
Across
- ___ allows for many conflicts in a diverse society to be settled locally. It avoids attempting to impose a single, one-size-fits-all policy uniformly without regard to local differences. It also provides locals with the ability to pursue favored policies within their states and communities.
- The Founders believed that federalism, along with separation of powers—with power ____among the legislative, executive, and judicial branches—would control government and prevent tyranny.
- State and local government authorities share power with national ____whereby no one centralized leader dictates policy. These state and local officials also contribute to party competition and act as channels for recruitment to higher offices.
- Many federal officials are still expected to solve political problems and are not likely to _____their own power.
- Decentralization contributes to making ____more efficient and manageable at local levels. It also softens the rigidity of law.
- ___ are viewed as “laboratories of democracy,” as they are better equipped to experiment with social and economic policy innovations. Competition among governments provides additional incentives for inventiveness and innovation in public policy.
Down
- ___ also encourages governments to be responsive to citizen preferences and public policy concerns.
- In 1996, Democratic President Bill Clinton, with a Republican Congress, gave much of the responsibility for administering ___programs to the states.
- ___ is the passing down of responsibilities from the national government to the states.
- Decentralization provides the opportunity for more people to _____in politics, thereby contributing to a popular sense of political effectiveness.
10 Clues: ___ is the passing down of responsibilities from the national government to the states. • ___ also encourages governments to be responsive to citizen preferences and public policy concerns. • Many federal officials are still expected to solve political problems and are not likely to _____their own power. • ...
Information Security 2024-06-21
Across
- Copies from one computer to the next to deplete memory and overwhelm network traffic
- A program to convert data prior to and after transmission
- Use of a software to eavesdrop on information sent and received by user
- Formal standards that have been assessed and approved
- Information Security goal to ensure data accuracy
Down
- The unauthorized intrusion of the computer network for tempering
- To delete data and application without physical access
- The objective is to separate internal and external network and prevent passage of specific types of traffic
- To ensure that a policy is being followed
- Type of encryption that requires two keys
10 Clues: To ensure that a policy is being followed • Type of encryption that requires two keys • Information Security goal to ensure data accuracy • Formal standards that have been assessed and approved • To delete data and application without physical access • A program to convert data prior to and after transmission • ...
Digital Security 2021-05-11
Across
- when a random person online tries to talk to you, you should _____ them.
- You should never add random ______ to your friend's list on social media.
- You should never ____ an online friend in person.
- Be careful with what you _____ on the internet.
- When you bully someone online.
- If you ever find out someone is getting Cyberbullied you should always tell the _______.
- who should you contact if someone random is trying to talk to you online.
Down
- You should never share your _______ ______ online.
- when someone sees you in a bad situation but doesn't tell anyone or helps you.
- What should you never share with anyone.
10 Clues: When you bully someone online. • What should you never share with anyone. • Be careful with what you _____ on the internet. • You should never ____ an online friend in person. • You should never share your _______ ______ online. • when a random person online tries to talk to you, you should _____ them. • ...
Security Crossword 2022-03-02
Across
- Tools used to store multiple passwords.
- Network security device or a software program that monitors and filters incoming & outgoing traffic.
- _______ generates a one-time-password (OTP) to connect to Capgemini services.
- Information of strategic value that can only be shared among a few individuals is COMPANY _________
Down
- The process of making copies of data or files to use in the event the original data are lost or destroyed.
- Use ___.capgemini.com to share documents containing personal data.
- Practice that can reduce the risk of data leaks by protecting the confidentiality of information while it is transmitted over the internet
- The first thing you should do after your business laptop is stolen is to report the situation to your technical ______ team.
- Phishing that targets a specific group or individuals such as the company’s system administrators.
- ______@capgemini.com for forwarding suspicious email from an unknown sender that seems unusual to CORP.
10 Clues: Tools used to store multiple passwords. • Use ___.capgemini.com to share documents containing personal data. • _______ generates a one-time-password (OTP) to connect to Capgemini services. • Phishing that targets a specific group or individuals such as the company’s system administrators. • ...
Security Crossword 2022-03-02
Across
- ______@capgemini.com for forwarding suspicious email from an unknown sender that seems unusual to CORP.
- The process of making copies of data or files to use in the event the original data are lost or destroyed.
- Network security device or a software program that monitors and filters incoming & outgoing traffic.
- _______ generates a one-time-password (OTP) to connect to Capgemini services.
- Use ___.capgemini.com to share documents containing personal data.
Down
- Practice that can reduce the risk of data leaks by protecting the confidentiality of information while it is transmitted over the internet
- Phishing that targets a specific group or individuals such as the company’s system administrators.
- Information of strategic value that can only be shared among a few individuals is COMPANY _________
- Tools used to store multiple passwords.
- The first thing you should do after your business laptop is stolen is to report the situation to your technical ______ team
10 Clues: Tools used to store multiple passwords. • Use ___.capgemini.com to share documents containing personal data. • _______ generates a one-time-password (OTP) to connect to Capgemini services. • Phishing that targets a specific group or individuals such as the company’s system administrators. • ...
Security Awareness 2022-05-17
Across
- Malware yang akan menggandakan diri pada komputer dan menyebar setelah dieksekusi
- Perlindungan aset informasi dengan identifikasi ancaman pada pemrosesan, penyimpanan, dan pengirim
- Prinsip Keamanan Informasi agar akurat
Down
- Serangkaian karakter yang digunakan untuk mengautentikasi pengguna pada sistem computer
- Perangkat lunak yang diciptakan untuk merusak sistem computer
- Jenis Informasi yang merupakan informasi pengetahuan umum
- Malware yang memodifikasi system operasi agar Pelaku memiliki akses ke dalam computer
- Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan
- Perilaku hati-hati untuk melindungi kita terhadap ancaman
- Serangan umpan dalam bentuk janji palsu untuk memancing keingintahuan korban
10 Clues: Prinsip Keamanan Informasi agar akurat • Jenis Informasi yang merupakan informasi pengetahuan umum • Perilaku hati-hati untuk melindungi kita terhadap ancaman • Perangkat lunak yang diciptakan untuk merusak sistem computer • Jenis Informasi yang dapat disebarkan ke seluruh karyawan perusahaan • ...
Food Security 2024-12-18
Across
- Red fruit often mistaken for a vegetable
- Orange vegetable that helps you see in the dark
- I am called as King of fruits
- Small green vegetables that come in a pod
- Red fruit that keeps the doctor away
Down
- Green vegetable that looks like tiny trees
- Yellow fruit that monkeys love to eat
- Round citrus fruit named after its color
- Red berry with seeds on the outside
- Leafy green that made Popeye strong
10 Clues: I am called as King of fruits • Red berry with seeds on the outside • Leafy green that made Popeye strong • Red fruit that keeps the doctor away • Yellow fruit that monkeys love to eat • Red fruit often mistaken for a vegetable • Round citrus fruit named after its color • Small green vegetables that come in a pod • Green vegetable that looks like tiny trees • ...
Food security 2024-12-18
Across
- - Biggest fruit of all
- - Most consumed fruit in summers
- - Helps you to get vitamin c and its used almost daily
- - Fruit which leaves are used to increase platelets in body
Down
- and garlic - Main ingredient in biryani
- guard - Bitter but its good for gut cleanse
- – Immunity boosting green leafy vegetable that Popeye the sailor likes.
- - Newtons law was due to this fruit
- - Regular available fruit where we also use it leaves to have lunch
- - Sweet but doesnt have sugars in it
10 Clues: - Biggest fruit of all • - Most consumed fruit in summers • - Newtons law was due to this fruit • - Sweet but doesnt have sugars in it • and garlic - Main ingredient in biryani • guard - Bitter but its good for gut cleanse • - Helps you to get vitamin c and its used almost daily • - Fruit which leaves are used to increase platelets in body • ...
Food Security 2024-12-18
Across
- I’m orange, crunchy, and rabbits think I’m the best snack — what am I?
- I’m round and make you cry when you peel my skin — what am I?
- I grow in bunches, and I’m small, round, and sweet — what am I?
- I’m small and spicy, I make your mouth burn — what am I?
Down
- I’m red and round, and I’m used in salad or sauce — what am I?
- I’m yellow and curvy, monkeys love me.
- I’m orange, juicy, and full of vitamin C — what am I?
- I’m purple and shiny, and I’m great in curry — what am I?
- King of fruit.
- I’m yellow and sour, but I make drinks taste great — what am I?
10 Clues: King of fruit. • I’m yellow and curvy, monkeys love me. • I’m orange, juicy, and full of vitamin C — what am I? • I’m small and spicy, I make your mouth burn — what am I? • I’m purple and shiny, and I’m great in curry — what am I? • I’m round and make you cry when you peel my skin — what am I? • I’m red and round, and I’m used in salad or sauce — what am I? • ...
Food Security 2024-12-18
Across
- Sweet, tropical fruit with a large pit
- A substance that helps plants grow faster
- What versatile fruit provides healthy fats and extensively used in South Indian cooking?
- A food production system without soil (9 letters)
Down
- Soft, yellow fruit high in potassium
- Type of food that is essential for growth and repair
- Used for making french fries
- Which iron-rich leafy green vegetable is widely used in Indian cooking, known as palak?
- Food grown without chemicals
- A plant grown for food, such as wheat or maize (4 letters)
10 Clues: Used for making french fries • Food grown without chemicals • Soft, yellow fruit high in potassium • Sweet, tropical fruit with a large pit • A substance that helps plants grow faster • A food production system without soil (9 letters) • Type of food that is essential for growth and repair • A plant grown for food, such as wheat or maize (4 letters) • ...
DATA SECURITY 2025-01-24
Across
- A process to verify the identity of users before granting access.
- Unauthorized attempts to breach a system's security.
- A malicious software designed to harm or exploit any programmable device.
- A mechanism used to monitor and log all access attempts and actions.
- The process of converting encrypted data back to readable form.
Down
- The practice of encoding data to prevent unauthorized access.
- Permissions granted to users to access specific resources based on their role.
- A unique string of characters used to authenticate a user.
- A method used to ensure data integrity and consistency in transactions.
- Breach An act where sensitive data is stolen or exposed without authorization.
10 Clues: Unauthorized attempts to breach a system's security. • A unique string of characters used to authenticate a user. • The practice of encoding data to prevent unauthorized access. • The process of converting encrypted data back to readable form. • A process to verify the identity of users before granting access. • ...
Food Security 2024-12-17
Across
- The practice of maintaining and preserving agricultural resources for future generations.
- A system of food production and distribution that is resilient and minimizes waste.
- A nutrient-rich, affordable staple food used in many regions, such as rice, maize, or wheat.
- A condition in which all people have access to sufficient, safe, and nutritious food.
- A global problem involving a shortage of food, often caused by conflict or natural disasters.
Down
- The variety of life in a particular habitat or ecosystem, which is important for food systems.
- The process of growing, raising, or producing food.
- The act of providing temporary food aid during emergencies.
- type of food crisis that affects a region due to drought or crop failure.
- The practice of cultivating land to grow crops or raising livestock in a sustainable manner.
10 Clues: The process of growing, raising, or producing food. • The act of providing temporary food aid during emergencies. • type of food crisis that affects a region due to drought or crop failure. • A system of food production and distribution that is resilient and minimizes waste. • ...
Food Security 2024-12-17
Across
- is the United Nations agency concerned with the international organization of food and agriculture.
- is the production of food and goods through farming.
- is an extreme scarcity or shortage of food.
- is Long period without rain that can harm crops
Down
- is an state of being extremely poor
- is to gather crops when they're ready
- is Where most of our food is grown
- is a measure of energy.
- is having a low weight-for-age measurement
- is any substance that can be metabolized by an animal
10 Clues: is a measure of energy. • is Where most of our food is grown • is an state of being extremely poor • is to gather crops when they're ready • is having a low weight-for-age measurement • is an extreme scarcity or shortage of food. • is Long period without rain that can harm crops • is the production of food and goods through farming. • ...
Password Security 2023-11-09
Across
- how many accounts should you use the same password for?
- minimum characters a password should have
- an assault using one or more computers
- a security incident where sensitive information is stolen
- should contain a combination of numbers, special characters, uppercase and lowercase letters
Down
- passwords should be
- it is okay to share your password with colleagues, True/False
- the term used for cybercriminals who repeatedly enter passwords to gain unauthorized access
- what should you lock each time you leave your desk?
- all devices that connect online should be.....
10 Clues: passwords should be • an assault using one or more computers • minimum characters a password should have • all devices that connect online should be..... • what should you lock each time you leave your desk? • how many accounts should you use the same password for? • a security incident where sensitive information is stolen • ...
FOOD SECURITY 2024-10-17
Across
- - A state where people don't have enough food to meet daily energy needs.
- - Meeting the needs of the present without compromising the future.
- - A condition caused by inadequate or unbalanced diet.
- - A significant barrier to access to food.
Down
- - The practice of farming to produce food and other products.
- - The variety of life in the world, essential for food production.
- - An extreme shortage of food leading to mass starvation.
- Change - A major threat to food security due to impacts on agriculture.
- - Financial aid provided by the government to support food production.
- Bank - A non-profit organization that distributes food to those in need.
10 Clues: - A significant barrier to access to food. • - A condition caused by inadequate or unbalanced diet. • - An extreme shortage of food leading to mass starvation. • - The practice of farming to produce food and other products. • - The variety of life in the world, essential for food production. • - Meeting the needs of the present without compromising the future. • ...
FOOD Security 2024-10-17
Across
- something that is suitable or safe to eat a mixture of organic matter, minerals, gases, liquids, and organisms that together support the life of plants and soil organisms.
- a substance that is added to food in order to improve its taste or appearance
- the process or period of gathering in crops
- when an organism gets too few or too many nutrients, resulting in health problems
- the distress associated with lack of food
Down
- Bank a place where stocks of food, typically basic provisions and non-perishable items
- substances that are used to control pests
- A type of farming that uses no pesticides or Chemicals
- the activity or business of growing crops
- a cultivated plant that is grown on a large scale commercially, especially a cereal, fruit, or vegetable
10 Clues: substances that are used to control pests • the activity or business of growing crops • the distress associated with lack of food • the process or period of gathering in crops • A type of farming that uses no pesticides or Chemicals • a substance that is added to food in order to improve its taste or appearance • ...
Food Security 2024-11-28
Across
- An Agricultural method that avoids synthetic chemicals to ensure food safety
- India's largest occupation
- A nutrient source often associated with cereals like wheat and rice
- Good for Vitamin C
- Country which is largest producer of milk globally
- A climate condition that reduces crop yields due to lack of rainfall
Down
- A key vitamin deficiency that causes night blindness
- Intensive method to water plants
- Main staple food of more than half of the world's population
- A major nutrient that provides energy, found in foods like potatoes and bread
10 Clues: Good for Vitamin C • India's largest occupation • Intensive method to water plants • Country which is largest producer of milk globally • A key vitamin deficiency that causes night blindness • Main staple food of more than half of the world's population • A nutrient source often associated with cereals like wheat and rice • ...
Security Features 2024-03-18
Across
- Designs or partial motifs which are seemingly printed at random on the recto and verso of the substrate, but they match up perfectly and form a complete new motif when viewed in transmitted light.
- A thin strip of plastic, metallic or other material embedded in the substrate during the paper substrate manufacturing process
- Lines or motifs made up of very small letters, numbers and/or images that are barely perceptible with the naked eye, but become visible at magnification
- An authorization in a form of a sticker which allows persons to enter, stay, exit the territory of MS
- - ink that changes its colour depending on the angle of observation and illumination
Down
- An unauthorized copy or reproduction of an authentic/genuine document
- They are mixed into the paper pulp during the paper manufacturing process, to serve as a security feature
- Motif, visible when tilted and viewed under oblique light.
- Security feature which show different information depending on the viewing and/or lighting conditions.
- A person who uses other persons documents taking advantage of their physical resemblance to the genuine holder
10 Clues: Motif, visible when tilted and viewed under oblique light. • An unauthorized copy or reproduction of an authentic/genuine document • - ink that changes its colour depending on the angle of observation and illumination • An authorization in a form of a sticker which allows persons to enter, stay, exit the territory of MS • ...
Privacy & Security 2022-11-01
Across
- a malware designed to deny a user or organization access to files on their computer
- the art of protecting networks, devices, and data from unauthorized access
- process of identifying a user’s identity
- the right to be let alone
Down
- common examples are viruses & trojans
- coding protecting information from hackers
- (2 words) information about an individual
- compromise of security
- a set of policies and procedures for systematically managing an organization's sensitive data
- international organization for standardization
10 Clues: compromise of security • the right to be let alone • common examples are viruses & trojans • process of identifying a user’s identity • (2 words) information about an individual • coding protecting information from hackers • international organization for standardization • the art of protecting networks, devices, and data from unauthorized access • ...
network security 2022-04-18
Across
- intrusive software created to steal data and destroy or damage computers/systems
- malicious software that gathers data about the user and forwards to a third party.
- This attack occurs when someone pretends to be something that they are not.
- This type of attack tries to alter system resources or affect their operations
- emails that are sent pretending to be from companies asking for personal information.
- this is used to hide the information content of data
Down
- prevents normal use of communication or disrupts the network
- a flaw or weakness used to attack a system or organization
- makes use of information but does not affect system resources
- someone who violates computer security
10 Clues: someone who violates computer security • this is used to hide the information content of data • a flaw or weakness used to attack a system or organization • prevents normal use of communication or disrupts the network • makes use of information but does not affect system resources • This attack occurs when someone pretends to be something that they are not. • ...
IT Security 2022-04-27
Across
- irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
- A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
- the practice of making computer files available to other users of a network, in particular the illicit sharing of music and video via the internet
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
Down
- A technique used by hackers to obtain sensitive information.
- A term that describes all forms of malicious software
- a secret word or phrase that must be used to gain admission to a place
- A defensive technology designed to keep the bad guys out
- A type of malware aimed to corrupt, erase or modify information on a computer
10 Clues: A term that describes all forms of malicious software • A defensive technology designed to keep the bad guys out • A technique used by hackers to obtain sensitive information. • a secret word or phrase that must be used to gain admission to a place • A type of malware aimed to corrupt, erase or modify information on a computer • ...
Security Lab 2025-09-16
Across
- ____ attack Sending deceptive emails or websites to trick users
- A device allowing some packets to pass and blocking others
- A hidden entry point intentionally left by developers for debugging
- A digital signature needs a_____ Key
- The main component of Kerberos responsible for granting access to services is:
Down
- In IPsec ______ protocol provides Authentication and integrity but no encryption
- ___________is primarily used to Hide data within other media
- Eavesdropping on a network is an example of which type of attack?
- Which part of the CIA triad is concerned with ensuring data is accurate and has not been altered?
- S/MIME provides security at the ______ layer.
10 Clues: A digital signature needs a_____ Key • S/MIME provides security at the ______ layer. • A device allowing some packets to pass and blocking others • ___________is primarily used to Hide data within other media • ____ attack Sending deceptive emails or websites to trick users • Eavesdropping on a network is an example of which type of attack? • ...
security patrol 2026-02-27
Across
- The primary tool used for communication between guards.,13. A patrol done using a car or golf cart.
- Acting before a problem occurs (being ____).,15. A perimeter barrier used to delay intruders.
- Using your eyes, ears, and nose to detect issues (____ Observation).","3. The most common type of patrol, done on foot."
- The final step after an incident: writing a formal ____.,17. A temporary order or instruction for a specific shift.
- To verify that all entrances and exits are secured (Door ____).,6. The equipment used to scan tags at various stations.
Down
- Lighting that is used to discourage intruders.,4. A written record of all activities during a shift (Shift ____).
- A safety check often done via radio (____-In).,7. Staying alert and watchful for potential dangers.
- A predetermined path taken during a patrol.,12. Identifying a person by asking for their credentials.
- A hazard that should be reported immediately, like a spill.","10. Reporting a ""Broken ____"" suggests a property is neglected."
- Moving in a way that is not predictable to an observer.,"1. A specific point a guard must ""check-in"" at during a round."
10 Clues: Acting before a problem occurs (being ____).,15. A perimeter barrier used to delay intruders. • The primary tool used for communication between guards.,13. A patrol done using a car or golf cart. • A safety check often done via radio (____-In).,7. Staying alert and watchful for potential dangers. • ...
8th History Review 2021-04-07
Across
- Non-permanent UN Security Council member in Southeast Asia
- Typical weather in an area over an extended time
- Number of official languages of the United Nations
- Current Secretary-General of the UN
- Headquarters of the UN
- Locating a place using North, South, east, or West
- Changes in elevation in an area
- Organization that preceded the UN
- Non permanent UN Security Council member located on the Mediterranean Sea
- Landform characterized by low elevation and low relief
Down
- Height above or below sea level
- A strong way to claim that people are tied to their environment would be, "Geography is ..."
- The UN was established after this event
- Term for an area where countries are grouped together such as Scandanavia, New England, Tornado Alley
- Kind of map that shows geographic features, and shades elevation by color
- The part of the UN organization in which all countries have a voting representative
- Sea in which St. Vincent & the Grenadines are located.
- Identifying where the White House is with 39N/77W or 1600 Pennsylvania Ave. Washington DC
- Permanent member of the UN Security Council in Europe
- An area of land with high elevation and low relief
20 Clues: Headquarters of the UN • Height above or below sea level • Changes in elevation in an area • Organization that preceded the UN • Current Secretary-General of the UN • The UN was established after this event • Typical weather in an area over an extended time • Number of official languages of the United Nations • Locating a place using North, South, east, or West • ...
iQuesta 2022 - Finals 2022-01-27
Across
- acts as a security guard between the internet and a network
- Using material another person has created and claims it as your own
- application for performing numerical and statistical calculations
- is a layout software
- malware type in which security mechanism is bypassed to access a system.
- The purpose of scrambling data so it can be sent securely over networks.
- A location that provides wireless Internet access.
- A number assigned to any item that is connected to the Internet
- To allow communication inside the organization
- Vendor-created program modifications are called
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
Down
- instructions programmed on a hardware
- a program that can analyze and execute a program line by line.
- blockchain programming
- The information about someone on the Internet
- Initialize the system hardware components
- name of the system that manages and programs hardware resources for a computer
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Wraiths & Words: A Haunted Mansion Challenge 2023-09-21
Across
- Found in the graveyard
- Creepy statues
- Deceptive email pr@ctice
- Cybersecurity measure
- Malicious software
- Network of infected computers
- Mansion staff member
- En7ry k3y
- Mansion's signature tune (3 wds)
- Home of 999 happy haunts
- KN2G64TBM5SSAZTPOIQGCIDIMVQWILBAMFRWG33SMRUW4ZZAORXSA5DIMUQEQYLVNZ2GKZBAJVQW443JN5XA====
- Extra layer of security
- Voiced of several characters in the Haunted Mansion
- Haunted Mansion's musical instrument
- Changing image in Haunted Mansion
- What three ghosts do
- Protection software
- To take advantage of a security flaw
- Mansion decor
- Unauthorized computer user
Down
- Taunt at the Haunted Mansion (2wds)
- 55 6e 77 61 6e 74 65 64 20 65 6d 61 69 6c
- Where portraits lengthen (2 wds)
- Unauthorized access
- 73 110 116 101 114 110 101 116 32 105 100 101 110 116 105 102 105 99 97 116 105 111 110
- Boo!
- U2VhbmNlLWhvbGRpbmcgbWVkaXVtIGF0IEhhdW50ZWQgTWFuc2lvbg==
- Digital offensive
- Mansion's grand
- Mansion finale
- S3lf-r3plicating
- Haunted Mansion newspaper column
- Security weak point
- Malicious software demanding payment
- Mansion ride vehicle
- To fix a flaw
- Authentication via physical traits
- Contacting the dead
- Web tracking item
- Haunted Mansion location with a bride
40 Clues: Boo! • En7ry k3y • To fix a flaw • Mansion decor • Creepy statues • Mansion finale • Mansion's grand • S3lf-r3plicating • Digital offensive • Web tracking item • Malicious software • Unauthorized access • Security weak point • Contacting the dead • Protection software • Mansion staff member • Mansion ride vehicle • What three ghosts do • Cybersecurity measure • Found in the graveyard • ...
Investing-Jackson F. 2026-03-19
Across
- Illegal behind-the-scenes work to exploit people and the market
- Social Security, and taxes combined
- Money backed by the government
- Security system of long string of letters and numbers to prevent hacking
- Someone who tries to convince people about financial investment advice
- A collection of stocks or bonds that trade on the stock exchange
- Risky, Gambling
- Un-taxed individual retirement account
- Nationally recognized companies that influence the market heavily
- To keep a certain amount of money in a place, add a certain amount every month
- Low-cost, passively managed mutual funds or ETFs
- Government Medical Health Plan expected to lose funds by 2040
- Age you can receive full social security benefits
- Initial Public Offering
Down
- Dollar Cost Average
- Value is fully influenced by the public
- Application where crypto is exchanged
- Application that you use to invest in stocks
- Accessibility of cash flow; ease of cash
- Tax dollars going back to retired Americans who buy in
- When the market is down
- When the market is up
- Offered by unionized companies
- A large amount of money is dumped into an investment account
- Number one cryptocurrency in value
25 Clues: Risky, Gambling • Dollar Cost Average • When the market is up • When the market is down • Initial Public Offering • Money backed by the government • Offered by unionized companies • Number one cryptocurrency in value • Social Security, and taxes combined • Application where crypto is exchanged • Un-taxed individual retirement account • Value is fully influenced by the public • ...
Past Dannedd Vocab 2025-07-06
LOL MIS REED :D 2025-12-09
Platform security 2021-10-23
Across
- separate low-level system software running on the host machine to perform visualization.
- synchronous condition that results from a particularly undesirable situation.
- Linux uses this technique to define the priority of processes
- a real-time operating system used in mission-critical applications
- an asynchronous event that can occur at any time irrespective of what the processor is doing
- processes running in the background, started by the kernel itself.
Down
- a connection used to exchange data between the processes.
- one method to block buffer overflow attacks
- helps to prevent unauthorized access to data on lost or stolen computers by combining
- the process responsible for secure logon.
10 Clues: the process responsible for secure logon. • one method to block buffer overflow attacks • a connection used to exchange data between the processes. • Linux uses this technique to define the priority of processes • a real-time operating system used in mission-critical applications • processes running in the background, started by the kernel itself. • ...
Human Security 2020-09-25
10 Clues: old • country • authority • armed forces • governing body of the state • a state of lack of financial resources • type of human security about clean resources • something that is proposed by the government • a place in Mindanao mentioned in the material • type of human security about freedom from any violence
IT security 2022-03-02
Across
- software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
- software that automatically puts advertisements onto a computer screen when a person is using the internet
- a device or program that stops people from seeing or using information on a computer without permission while it is connected to the internet
- a harmful computer program that can copy itself and spread across a number of connected computers
- a computer program that has been deliberately designed to destroy information, or allow someone to steal it
Down
- an examination of a system or data
- a name or other word that you sometimes need to type in along with a password before you are allowed to use a computer or a website
- the process of converting data to an unrecognizable or "secret" form to protect sensitive information so that only authorized parties can view it.
- verb used to express possibility
- someone who gets into other people's computer systems without permission in order to find out information or to do something illegal
10 Clues: verb used to express possibility • an examination of a system or data • a harmful computer program that can copy itself and spread across a number of connected computers • software that automatically puts advertisements onto a computer screen when a person is using the internet • ...
Security Question 2022-04-07
Across
- English word for the Greek "sauros"
- The communication skills of the Parasaurolophus rival those of what animal?
- Friendliest dinosaur in the park
- The T-Rex prefers to _______ the remains of dead meat rather than hunting for fresh prey.
- Dilophosaurus place of origin
Down
- Greek word for "ruler"
- The Brachiosaurus is able to "_______" its meals from the grassy plains, tearing the foliage from the soil with its clawed hind legs.
- The Gallimimus is similar in shape to the _______
- This dinosaur was originally intended as dinner for the more popular Tyrannosaur
- There have been some reports of lost _______ in the Toluca Lake area.
10 Clues: Greek word for "ruler" • Dilophosaurus place of origin • Friendliest dinosaur in the park • English word for the Greek "sauros" • The Gallimimus is similar in shape to the _______ • There have been some reports of lost _______ in the Toluca Lake area. • The communication skills of the Parasaurolophus rival those of what animal? • ...
Mich Security 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- tool Programming language that allows applets to run within a web browser.
- Technology created by Microsoft to control interactivity on web pages.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
Down
- Also known as junk mail, is unsolicited e-mail.
- A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
- Gains access to resources on devices by pretending to be a trusted computer.
- Or malware is a file or program other then a virus that is potentially harmful.
- Is a self-replicating program that is harmful to networks.
10 Clues: Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a program written with malicious intent and sent out by attackers. • Technology created by Microsoft to control interactivity on web pages. • ...
IT-Security 2016-01-29
Across
- Wie wird eine Hintertüre zu einem anderen Computer, die sich ein Angreifer über einen Virus oder einen Trojaner öffnet genannt?
- Wie wird das Chatten in Echtzeit genannt?
- Wie werden Personen genannt, die illegal in ein Computersystem eindringen und Sicherheitssysteme überwinden?
- Wie nennt sich der Virus, der sich direkt über das Internet verbreitet?
- Wie werden unerwünschte Werbemails genannt?
- Wie wird Mobbing mit Hilfe von elektronischen Medien genannt?
Down
- Was versteckt sich hinter einem scheinbar nützlichem Programm?
- Welche Programme, protokollieren die Tastatureingabe mit?
- Wie wird der Diebstahl von Daten, die unachtsam weggeworfen werden genannt?
- Wie lautet der Überbegriff für unerwünschte, schädliche Software?
10 Clues: Wie wird das Chatten in Echtzeit genannt? • Wie werden unerwünschte Werbemails genannt? • Welche Programme, protokollieren die Tastatureingabe mit? • Wie wird Mobbing mit Hilfe von elektronischen Medien genannt? • Was versteckt sich hinter einem scheinbar nützlichem Programm? • Wie lautet der Überbegriff für unerwünschte, schädliche Software? • ...
Infant Security 2023-01-31
Across
- Newborns cannot be transported by someone walking while held in ____ All newborns will be individually transported in a bassinet, incubator or infant transport or via the mother/s arms in a wheelchair or gurney.
- If the Hugs tag has been _____ for a procedure, a MCH staff member must remain with the baby.
- Code that called for infant abduction
- removal of hugs tag is completed immediately prior to ______
- All visitors should check in with _____ before going to room
- Tag applied to infant as part of infant security.
Down
- All new mothers should be ______ regarding infant security measures.
- Mode hugs tag must be put in prior to transferring off the unit (such as going to peds).
- In the event of code pink MCH staff will monitor hallways and _____.
- Nurse that reconciles the KPHC census with the Hugs system.
10 Clues: Code that called for infant abduction • Tag applied to infant as part of infant security. • Nurse that reconciles the KPHC census with the Hugs system. • removal of hugs tag is completed immediately prior to ______ • All visitors should check in with _____ before going to room • All new mothers should be ______ regarding infant security measures. • ...
security&crime 2023-02-24
Across
- the crime of steling
- a device that is only opened with a key; used to prevent someone from using something
- access that has no permission is ..
- a piece of equipment that allows someone to watch over a particular place
- personal identification number
- a word with a similar meaning to steal
Down
- a secret word or number to get access to something
- a synonym of protect
- someone who enters a building illegally to steal things
- to regularly check or watch someone or something
10 Clues: a synonym of protect • the crime of steling • personal identification number • access that has no permission is .. • a word with a similar meaning to steal • to regularly check or watch someone or something • a secret word or number to get access to something • someone who enters a building illegally to steal things • ...
Information Security 2020-03-02
Across
- A form of Encryption where keys come in pairs.
- The process of encoding information in such a way that only authorized parties can access it
- A guarantee of reliable access to the information by authorized people.
- A standard set of rules that allow electronic devices to communicate with each other.
- A set of rules that limits access to information
- The process of securing a system by reducing its surface of vulnerability
Down
- An encryption methodology that uses a single key to encrypt and decrypt data.
- The process of determining whether someone or something is, in fact, who or what it declares
- The assurance that the information is trustworthy and accurate
- A network communication endpoint
10 Clues: A network communication endpoint • A form of Encryption where keys come in pairs. • A set of rules that limits access to information • The assurance that the information is trustworthy and accurate • A guarantee of reliable access to the information by authorized people. • The process of securing a system by reducing its surface of vulnerability • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete viruses on a computer.
- when you post, you have to use it careful to avoid offending people.
- never send it to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- option to keep your profile private.
- before you post somenthing, you have to ask your...
10 Clues: you do it to avoid virus. • you have to keep them safe. • option to keep your profile private. • never send it to people meet online. • software used to delete viruses on a computer. • when you download something, make sure it's a... • before you post somenthing, you have to ask your... • you use it to keep your internet connection secure. • ...
Food Security 2021-07-15
Across
- massive starvation
- Might lead to food insecurity.
- A reserve of commodities.
- Seasonal activity/occupation.
- Allowing someone to only have a fixed quantity.
Down
- Payment made by the government to a producer to supplement the market price of a commodity.
- Cause and effect of Hunger
- A place used to store grains.
- Ability to pay
- Lack of proper nutrition.
10 Clues: Ability to pay • massive starvation • Lack of proper nutrition. • A reserve of commodities. • Cause and effect of Hunger • A place used to store grains. • Seasonal activity/occupation. • Might lead to food insecurity. • Allowing someone to only have a fixed quantity. • Payment made by the government to a producer to supplement the market price of a commodity.
Security access 2021-10-20
10 Clues: record of events • collection of data • the one who seeks access • specifying access rights • to prove data is correct • some key you use to enter • identity verification service • personal data used to verify access • to undergoing procedure to gain access • determining if you are the one you pretend to be
Harbour Security 2022-04-21
10 Clues: you hunt for it • oposite of firm • you have to do it • to make sure it's good • what securtiy guards do • to make a thing compleet • things you can transport • where the ships are comining • you can use it as a transport • You can not break it if it's not yours
Security Crosswords 2022-11-09
Across
- Attacker sends a bogus requests to exhaust system resources.
- Person who uses their technical computer skill to breach computer system.
- Tool used for network discovery and security auditing.
- Test which verifies that unexpected input cannot affect the system in an unpredictable way.
Down
- Tool used to test network protocol implementation and other interfaces.
- Users require to enter multiple credentials for login.
- Design for security.
- A remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
- Graphical tool used for performing security testing of web applications
- Vulnerability scanner for containers and other artifacts.
10 Clues: Design for security. • Users require to enter multiple credentials for login. • Tool used for network discovery and security auditing. • Vulnerability scanner for containers and other artifacts. • Attacker sends a bogus requests to exhaust system resources. • Tool used to test network protocol implementation and other interfaces. • ...
Operations Security 2022-11-01
Across
- See something, ___ _____ (2 words)
- We should never underestimate an adversary's _____ and capability to obtain our critical information
- Report _____ packages
- Operations Security (OPSEC) procedures help _____ and preserve the integrity of the USCIS Mission
Down
- USCIS protects the _____ information list (CIL) as sensitive but unclassified
- Be careful with the information you post to _____ media
- Be aware of your _____
- _____ Management
- _____ threats
- Operations Security (abbr)
10 Clues: _____ threats • _____ Management • Report _____ packages • Be aware of your _____ • Operations Security (abbr) • See something, ___ _____ (2 words) • Be careful with the information you post to _____ media • USCIS protects the _____ information list (CIL) as sensitive but unclassified • ...
Security Guide 2023-06-21
Across
- A storm with a violent wind, in particular a tropical cyclone in the Caribbean
- Sign to let employees know branch is safe to enter
- Employee who watches the branch during opening
- Number of employees to open and close a branch
- How employees are to leave the branch
- Having the belief or impression that someone is involved in an illegal or dishonest activity
Down
- Employee who clears the branch during opening
- Door remains until branch opens
- Records such as cash journals and loan notes
- The vault will be documented
10 Clues: The vault will be documented • Door remains until branch opens • How employees are to leave the branch • Records such as cash journals and loan notes • Employee who clears the branch during opening • Employee who watches the branch during opening • Number of employees to open and close a branch • Sign to let employees know branch is safe to enter • ...
Digital Security 2023-06-21
Across
- A social media app that once sent disappears after a short period of time
- Sharing personal information online can lead to ........ theft.
- A form of online harassment involving persistent, unwanted messages
- A digital trail left behind by a persons online activities
Down
- A program that scans and removes viruses from your computer
- The act of harassing or intimidating someone online
- A technique used to gain unauthorised access to a computer system
- A practice of sending unsolicited emails for fraudulent purposes
- This protects your online accounts and information
- A message, image or video that spreads rapidly and widely online is known as having gone .....
10 Clues: This protects your online accounts and information • The act of harassing or intimidating someone online • A digital trail left behind by a persons online activities • A program that scans and removes viruses from your computer • Sharing personal information online can lead to ........ theft. • A practice of sending unsolicited emails for fraudulent purposes • ...
Security Word 2024-01-21
Across
- A bad person who might take away your info!
- Block access to your personal data unless a ransom is paid.
- A digital barrier that helps protect your computer or network from unauthorized access and potential threats from the internet.
- A new MDR platform installed in your device which do not let you download or open suspicious applications.
- Someone who tricks or lies to get something valuable in a dishonest way.
Down
- A bad software that can steal information, cause problems, or let others control your computer without permission.
- An unwanted messages or ads you get, usually in your email or messages, trying to sell you things or trick you.
- Someone who engages in deceptive practices to achieve financial or another personal gain.
- GP installed Data Leakage Protection (DLP) to prevent you from using ________.
- Suspicious mail with an URL.
10 Clues: Suspicious mail with an URL. • A bad person who might take away your info! • Block access to your personal data unless a ransom is paid. • Someone who tricks or lies to get something valuable in a dishonest way. • GP installed Data Leakage Protection (DLP) to prevent you from using ________. • ...
MVR Security 2023-09-25
Across
- The address registered to a vehicle must be located in _______.
- If the customer can confirm the plate number of the vehicle we can confirm if the vehicle has a _____ flag.
- The name and address of a ______ can be released to any person upon request.
- Licence/exemption expiry date information can be released if the caller can provide the ____ number.
- Number of odometer readings that can be provided verbally over the phone.
- Security required for an individual registered person to update LANDATA.
Down
- CSRs are able to _____ details supplied by a caller.
- A company must provide their Waka Kotahi customer number, company number or ____.
- A person calling/acting on behalf of a registered person must confirm they are _____.
- It is the responsibility of the CSR to always check the customer address, mobile phone number and _____ are correct.
10 Clues: CSRs are able to _____ details supplied by a caller. • The address registered to a vehicle must be located in _______. • Security required for an individual registered person to update LANDATA. • Number of odometer readings that can be provided verbally over the phone. • The name and address of a ______ can be released to any person upon request. • ...
Internet Security 2024-03-05
Across
- Software that is designed to send advertisements mostly in a form of pop-ups
- A piece of code that spreads itself from one computer to another without human interaction
- An email-based threat which presents users with different advertising materials and promotional content
- Secretly installed malicious sofware that is intended to monitor user's activity.
- A form of piracy in which a third party infringes the rights granted to the copyright such as the exclusive use of a work for a set period of time.
Down
- A piece of code designed to replicate itself and transfer from one computer to another
- A malicious software that prevents you from using your computer
- People who use this scheme aims to steal sensitive information such as credit card details and password
- This unwanted software has the ability to harm a computer system, hinder performance efficiency, or create a state of nuisance.
- disguises type of malware that disguise itself as a legitimate application to deceive users
10 Clues: A malicious software that prevents you from using your computer • Software that is designed to send advertisements mostly in a form of pop-ups • Secretly installed malicious sofware that is intended to monitor user's activity. • A piece of code designed to replicate itself and transfer from one computer to another • ...
Safety & Security 2024-04-03
Across
- signal used to notify approaching employees it is OK to enter branch
- 4959
- amount of people needed to open branch
- This is capital one information center. What time will your reports be ready?
- ensure closed before leaving premises
Down
- call sentry, OS, ME when you have one
- privacy and security check at end of day
- lock doors and hide when you have one of these in area of bank
- where do you go when all clear signal is not set?
- frequency of all clear signal changed
10 Clues: 4959 • call sentry, OS, ME when you have one • frequency of all clear signal changed • ensure closed before leaving premises • amount of people needed to open branch • privacy and security check at end of day • where do you go when all clear signal is not set? • lock doors and hide when you have one of these in area of bank • ...
Food Security 2024-10-17
Across
- Traditional Korean dish made of fermented vegetables, primarily napa cabbage
- An ________ a day keeps the doctor away
- Type of cookie that originated in France, often almond-based with a chewy texture
- A rich, slow-cooked French stew often made with beef
- Sweet, sticky dessert made of sugar, butter, and pecans, popular in the southern
- Sweet, creamy Italian cheese often used in desserts like tiramisu
Down
- A Japanese noodle soup made with a meat or fish-based broth
- Aromatic spice often used in Indian cooking
- A method of cooking meat slowly in its own fat
- A salad made with tomatoes, cucumbers, onions, and feta cheese
10 Clues: An ________ a day keeps the doctor away • Aromatic spice often used in Indian cooking • A method of cooking meat slowly in its own fat • A rich, slow-cooked French stew often made with beef • A Japanese noodle soup made with a meat or fish-based broth • A salad made with tomatoes, cucumbers, onions, and feta cheese • ...
Food Security 2024-10-17
Across
- This is the natural process used to grow plants and food?
- What do farmers grow to provide us with food?
- What is the term for food that comes from animals, such as milk or eggs?
- What is the word for not having enough nutritious food to eat?
- What nutrient found in fruits and vegetables helps with digestion?
Down
- What do we call food that is grown without chemicals?
- What is the practice of not wasting food called?
- This is the most important meal of the day?
- This nutrient in food helps our muscles grow strong?
- What do we call lack of enough food to meet daily needs?
10 Clues: This is the most important meal of the day? • What do farmers grow to provide us with food? • What is the practice of not wasting food called? • This nutrient in food helps our muscles grow strong? • What do we call food that is grown without chemicals? • What do we call lack of enough food to meet daily needs? • ...
Food Security 2024-10-17
Across
- - Macro nutrient required to build and retain muscle
- - Changing the quality of food by adding, removing, or replacing substances
- - Additional addition of micro nutrients in food
- - Mineral added to salt to tackle Gioter and Hypothyroidism
Down
- - Level of a snake in the food chain
- - Consumption of plants as well as meat
- - Macro nutrient which is called as Food for the Brain
- - Average percentage of water in the human body
- - Mineral required to build and maintain strong bones
- - Number of amino acids necessary for the human body to function properly
10 Clues: - Level of a snake in the food chain • - Consumption of plants as well as meat • - Average percentage of water in the human body • - Additional addition of micro nutrients in food • - Macro nutrient required to build and retain muscle • - Mineral required to build and maintain strong bones • - Macro nutrient which is called as Food for the Brain • ...
Food Security 2024-10-17
Across
- A popular Mexican dish made with tortillas
- A type of pasta shaped like little ears
- Spicy condiment often served with sushi
- The main ingredient in sushi
- A nut commonly used to make butter
Down
- A green vegetable often used in salads
- A tropical fruit with spiky skin
- A fermented dairy product often eaten with fruit
- A type of bread baked in a round shape
- Italian dish made with thinly sliced raw meat
10 Clues: The main ingredient in sushi • A tropical fruit with spiky skin • A nut commonly used to make butter • A green vegetable often used in salads • A type of bread baked in a round shape • A type of pasta shaped like little ears • Spicy condiment often served with sushi • A popular Mexican dish made with tortillas • Italian dish made with thinly sliced raw meat • ...
Password Security 2024-09-26
Across
- What is recommended to use instead of a password for better security?
- What term describes nearly flawless simulations of people and voices created by scammers?
- What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
- What button in Outlook helps report suspicious emails?
- During which month is Cybersecurity Awareness Month celebrated?
- What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
- What type of authentication is abbreviated as MFA?
- What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
- How many minutes can it take for hackers to discover a six-character password?
- What is the name of the company-approved, secure password manager mentioned?
10 Clues: What type of authentication is abbreviated as MFA? • What button in Outlook helps report suspicious emails? • During which month is Cybersecurity Awareness Month celebrated? • What is recommended to use instead of a password for better security? • What is the name of the company-approved, secure password manager mentioned? • ...
Food Security 2024-12-18
10 Clues: A common crop • A drink from cows • Where plants grow • What we eat to live • Planted to grow crops • Food eaten at one time • Natural water for plants • Essential for growing plants • A place where crops are grown • A staple food in many countries
