cyber security Crossword Puzzles
Food Security 2024-12-18
Across
- Spicy curry dish originally from Goa, often made with pork
- Fresh cheese commonly used in North Indian vegetarian dishes
- Cooking method using a clay oven popular in Indian cuisine
- Sweet dessert of fried dough balls soaked in sugar syrup
- Triangular pastry filled with spiced potatoes and sometimes peas
Down
- Condiment made from fruits or vegetables with spices and herbs
- Fragrant rice dish with meat or vegetables and aromatic spices
- Dish made with spinach and cubes of fresh cheese
- Thin, crispy fermented crepe made from rice and black lentils
- Yogurt-based drink that can be sweet or savory
10 Clues: Yogurt-based drink that can be sweet or savory • Dish made with spinach and cubes of fresh cheese • Sweet dessert of fried dough balls soaked in sugar syrup • Spicy curry dish originally from Goa, often made with pork • Cooking method using a clay oven popular in Indian cuisine • Fresh cheese commonly used in North Indian vegetarian dishes • ...
Food Security 2024-12-18
Across
- - A practice of growing crops and raising animals for food
- - A system where food is grown without synthetic pesticides or fertilizers
- - The process of cultivating crops and raising animals for human use
- - A term for lack of sufficient nutrients in the diet
Down
- - The lack of enough calories or nutrients to sustain a healthy life
- - A natural resource critical for growing crops
- - The process of reducing the amount of food wasted
- - Food that is safe and free from contamination
- - The season when crops are gathered from the fields
- - A staple crop in many parts of the world, often grown in paddies
10 Clues: - A natural resource critical for growing crops • - Food that is safe and free from contamination • - The process of reducing the amount of food wasted • - The season when crops are gathered from the fields • - A term for lack of sufficient nutrients in the diet • - A practice of growing crops and raising animals for food • ...
Food security 2024-12-18
10 Clues: Tropical fruit • rich in vitamin-C • Popular Asian dish • Popular sweet food • Staple food globally • Sweet breakfast food • Popular Mexican dish • Popular Italian dish • Popular Japanese dish • Popular morning beverage
Food Security 2024-12-17
Across
- bad health that is the result of not having enough food or enough of the right kind of food
- an act or instance of making practical or profitable use of something
- the idea that people can coexist on Earth for a long time while meeting the needs of the present without compromising the future
- the average weather conditions in a specific area over a long period of time
Down
- the practice of growing crops and raising animals for food, fiber, and other products
- the feeling caused by a need to eat
- the quality or state of being firm, steadfast, or not easily changed
- the state of being available
- lack of financial resources to meet basic needs
- chemical compounds in food that are used by the body to function properly and maintain health
10 Clues: the state of being available • the feeling caused by a need to eat • lack of financial resources to meet basic needs • the quality or state of being firm, steadfast, or not easily changed • an act or instance of making practical or profitable use of something • the average weather conditions in a specific area over a long period of time • ...
Food Security 2024-12-17
Across
- A condition caused by insufficient or imbalanced diets.
- The variety of plant and animal species that supports resilient food systems.
- An extreme scarcity of food affecting large populations.
- A goal to meet present food needs without compromising future generations.
- A global challenge tackled by food security initiatives.
- The backbone of food production and rural livelihoods
- Government financial aid to support farmers and stabilize food prices.
Down
- A method used to supply water to crops in dry regions.
- The ability of food systems to recover from shocks and disruptions.
- Ensuring people receive the essential vitamins and minerals they need.
10 Clues: The backbone of food production and rural livelihoods • A method used to supply water to crops in dry regions. • A condition caused by insufficient or imbalanced diets. • An extreme scarcity of food affecting large populations. • A global challenge tackled by food security initiatives. • The ability of food systems to recover from shocks and disruptions. • ...
Food security 2024-12-17
Across
- Green leafy vegetables and apples are rich in this mineral
- Lack of nutrient in our diet over a long period causes these diseases
- What fruit contains water and has many seeds?
- What fruit do monkeys love?
- The diet that provides all the nutrients that our body needs in right quantities along width adequate amount of roughage and water.
Down
- Rice and potato are rich in this type of carbohydrate
- The term given to the useful components of food.
- Which fruit has an apple in it
- Starch and sugar in our food are rich in this type of energy giving nutrient
- The disease caused by deficiency of iron in diet
10 Clues: What fruit do monkeys love? • Which fruit has an apple in it • What fruit contains water and has many seeds? • The term given to the useful components of food. • The disease caused by deficiency of iron in diet • Rice and potato are rich in this type of carbohydrate • Green leafy vegetables and apples are rich in this mineral • ...
Food Security 2024-12-17
Across
- A healthy between-meal treat, like carrot sticks or an apple
- Healthy helpers found in fruits and veggies
- The best way to eat fruits and vegetables for maximum nutrition
- What fruits and vegetables have a lot of to keep you hydrated
- What fruits and vegetables help your body do
- What eating fruits and vegetables gives you
Down
- Good stuff in food that your body needs
- The part of plants that helps your tummy work well
- The many colors of fruits and vegetables you should eat
- A place where you can plant and grow your own fruits and vegetables
10 Clues: Good stuff in food that your body needs • Healthy helpers found in fruits and veggies • What eating fruits and vegetables gives you • What fruits and vegetables help your body do • The part of plants that helps your tummy work well • The many colors of fruits and vegetables you should eat • A healthy between-meal treat, like carrot sticks or an apple • ...
Aviation security 2025-07-17
Across
- following a red bomb threat and if the bomb is found we execute the …..article drill checklist
- CCMs can submit security reports through the…..reporting tool
- a category of bomb and sabotage threat
- The cabin……checklist is to be carried out when there has been a “RED” threat against the aeroplane or service.
- a passenger is found smoking in the lavatory and does not comply. We hand over the ……warning
- The unlawful, violent or the threat of violence seizure of an aircraft
Down
- No person is allowed to enter the aircraft without showing the ….
- A Security Search is required before departure of a flight to……,regardless of the aircraft’s previous destination
- normal access in the cockpit is done by saying position and assigned….
- A Security Search is required after passenger disembarkation and/or cargo holds unloading in……airport
10 Clues: a category of bomb and sabotage threat • CCMs can submit security reports through the…..reporting tool • No person is allowed to enter the aircraft without showing the …. • normal access in the cockpit is done by saying position and assigned…. • The unlawful, violent or the threat of violence seizure of an aircraft • ...
Food Security 2025-11-18
Across
- The most populated continent
- The imaginary line that runs through the middle of the Earth
- The science of growing plants and animals
- The driest biome
- Asia and this continent are expected to have the largest growth in population
Down
- One of the four factors of food security
- A large area of Earth that is home to plant and animal life
- The food crisis in the country has been caused by a conflict that's raged since 2014
- The P in the acronym PQE
- The most water scarce country on Earth
10 Clues: The driest biome • The P in the acronym PQE • The most populated continent • The most water scarce country on Earth • One of the four factors of food security • The science of growing plants and animals • A large area of Earth that is home to plant and animal life • The imaginary line that runs through the middle of the Earth • ...
International Security 1 2021-09-23
Across
- Security for the globe, meaning “Spaceship Earth” or the planet.
- A place or scene of activity, debate, or conflict.
- An equilibrium of power sufficient to discourage or prevent one nation or party from imposing its will on or interfering with the interests of another.
- A legal or other formal measure intended to preserve civil liberties and rights;the action of protecting, or the state of being protected.
- A particular region or group of countries; the earth, together with all of its countries and peoples.
- A thing that is regarded as more important than others;something that is very important and must be dealt with before other things.
Down
- It is national security or state security in the global arena.
- Security for the individual.
- Security for the state or “nation,” in the US terminology.
- The state of being open to danger or threat; lack of protection,lack of confidence.
- The aggregate of people living together in a more or less ordered community; an organization or club formed for a particular purpose or activity.
- An important topic or problem for debate or discussion;the action of supplying or distributing an item for use, sale, or official purposes.
12 Clues: Security for the individual. • A place or scene of activity, debate, or conflict. • Security for the state or “nation,” in the US terminology. • It is national security or state security in the global arena. • Security for the globe, meaning “Spaceship Earth” or the planet. • The state of being open to danger or threat; lack of protection,lack of confidence. • ...
marinos and antonis 2026-02-17
Across
- Internet related illegal activity.
- parent before doing something.
- service provider, company that gives you Internet.
- who likes to cause trouble on online.
- the Internet.
- being careful of what your doing on the Internet.
- someone's bullying you by sending you bad emails.
- to in safe.
- a cold for your device.
Down
- emails.
- someone spying on you on the Internet.
- talk to strangers.
- looking at your personal details.
- when someone pretends to be someone else.
- cyber safety word search
- Software that parents use to keep an eye on the children's online activity.
- don't know who your talking to until you press the button.
- a message.to sign in to a device.
18 Clues: emails. • to in safe. • the Internet. • talk to strangers. • a cold for your device. • cyber safety word search • parent before doing something. • looking at your personal details. • a message.to sign in to a device. • Internet related illegal activity. • who likes to cause trouble on online. • someone spying on you on the Internet. • when someone pretends to be someone else. • ...
iQuesta 2022 - Finals 2022-01-27
Across
- Playing video and sound in real time
- instructions programmed on a hardware
- the amount of data that can travel over an analog medium
- a method used for a security breach in wireless networks
- Vendor-created program modifications are called
- Initialize the system hardware components
- A location that provides wireless Internet access.
- malware type in which security mechanism is bypassed to access a system.
- a program that can analyze and execute a program line by line.
- application for performing numerical and statistical calculations
- name of the system that manages and programs hardware resources for a computer
Down
- Using material another person has created and claims it as your own
- blockchain programming
- To allow communication inside the organization
- The purpose of scrambling data so it can be sent securely over networks.
- is a layout software
- acts as a security guard between the internet and a network
- A number assigned to any item that is connected to the Internet
- The information about someone on the Internet
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
iQuesta 2022 - Finals 2022-01-27
Across
- instructions programmed on a hardware
- acts as a security guard between the internet and a network
- malware type in which security mechanism is bypassed to access a system.
- application for performing numerical and statistical calculations
- Using material another person has created and claims it as your own
- A location that provides wireless Internet access.
- blockchain programming
- the amount of data that can travel over an analog medium
- Playing video and sound in real time
- A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method.
- a method used for a security breach in wireless networks
- name of the system that manages and programs hardware resources for a computer
- is a layout software
Down
- A number assigned to any item that is connected to the Internet
- The purpose of scrambling data so it can be sent securely over networks.
- Initialize the system hardware components
- The information about someone on the Internet
- To allow communication inside the organization
- a program that can analyze and execute a program line by line.
- Vendor-created program modifications are called
20 Clues: is a layout software • blockchain programming • Playing video and sound in real time • instructions programmed on a hardware • Initialize the system hardware components • The information about someone on the Internet • To allow communication inside the organization • Vendor-created program modifications are called • A location that provides wireless Internet access. • ...
Landside and Airside 2019-02-18
Across
- getting on the plane?
- is the area where you go through security and hand over you passport and your departure card for inspection?
- how many hours do you have to arrive before boarding on your flight?
- what is the short term term word for Aviation Security Service?
- where your carry on bags get screened?
- how many mls are you allowed for LEG?
- where you can go and get food?
- what is the main facility that people mostly used in both Landside and Airside?
- A passenger who doesn't turn up for their flight?
Down
- how long does the Auckland airport operates for?
- A flight orignating and terminating in the same country?
- where do you go and change your baby?
- you do this when you meet a passenger in a friendly manner?
- how many passengers and the amount of freight on board the aircraft?
- where do you go to have a smoke?
- where you get checked in counters?
- is the area before departing passengers pass security?
- have been throught controls and __________?
- what is Gisbournes IATA code?
- what is the 3 letter city code for Coolangatta?
20 Clues: getting on the plane? • what is Gisbournes IATA code? • where you can go and get food? • where do you go to have a smoke? • where you get checked in counters? • where do you go and change your baby? • how many mls are you allowed for LEG? • where your carry on bags get screened? • have been throught controls and __________? • what is the 3 letter city code for Coolangatta? • ...
CEH Chapter 16 Crossword Puzzle 2026-03-13
Across
- Tool for ARP poisoning
- Data transfer rate capacity
- WPA2 key reinstallation attack
- Detects WPS enabled access points
- Latest WiFi security protocol
- Wireless security using AES
- Fake access point impersonator
- Hops across multiple frequencies
- Process connecting client to AP
- Portable radio spectrum analyzer
- Public place with WiFi access
- EAP inside secure TLS tunnel
- Unauthorized wireless access point
- Captures wireless packets and handshakes
- Wireless sniffer and detector
- Disrupts wireless communication signals
- Improved wireless security standard
- Spread spectrum using code sequence
Down
- WPA per packet keying
- Marking symbols for WiFi spots
- Fakes hardware network address
- Legacy wireless encryption protocol
- Centralized authentication server system
- Walking to find wireless networks
- Cracks WPS PIN codes
- Access point MAC identifier
- Wireless network name identifier
- Driving to discover wireless networks
- Connects wireless clients to network
- Dragonfly password authentication method
- WPA2 encryption integrity protocol
- Protocol analyzer for packet capture
- Rogue access point lure
- Cracks WEP and WPA keys
- Drone based wireless discovery
- Multi carrier digital modulation method
- Enables wireless monitor mode
- Injects frames into wireless traffic
- Multiple antenna OFDM transmission method
- Strong symmetric encryption algorithm
40 Clues: Cracks WPS PIN codes • WPA per packet keying • Tool for ARP poisoning • Rogue access point lure • Cracks WEP and WPA keys • Data transfer rate capacity • Wireless security using AES • Access point MAC identifier • EAP inside secure TLS tunnel • Latest WiFi security protocol • Public place with WiFi access • Enables wireless monitor mode • Wireless sniffer and detector • ...
Englanti perus 1, UNIT 2-3 2024-02-01
18 Clues: loma • lento • haluta • kaikki • lattia • vieras • tiskit • ikkunat • torstai • kysymys • kuukausi • kuntosali • suunnitella • keskiviikko • viikonloppu • matkustajat • pyyhkiä pölyt • turvatarkastus
Le cambriolage du musée du Louvre 2025-10-23
18 Clues: Tool • Guard • Thief • Alarm • Crown • Object • Museum • Escape • Pyramid • Jewelry • Witness • Security • Burglary • Heritage • Galleries • Evacuation • Display case • Investigation
Finances and money 2023-05-15
18 Clues: rate • loan • trade • value • yield • afford • credit • invest • nickel • economy • deposit • finance • quarter • balance • security • mortgage • withdraw • percentage
DFIR 2026-03-14
Across
- pieces of evidence that point to an activity performed on a system
- Digital Forensics & Incident Response
- advanced open-source endpoint monitoring, digital forensic and cyber response platform. It provides the ability to more effectively respond to a wide range of digital forensic and cyber incident response investigations and data breaches, its icon is a dog
- is a group of Keys, subkeys, and values stored in a single file on the disk
- An advanced, open source, endpoint tool used for monitoring and response platform, it’s icon is a dinosaur
Down
- a utility that takes a registry hive as input and outputs a report that extracts data from some of the forensically important keys and values in that hive
- it is created chronologically to understand what exactly happened in an incident.
- a tool used for non-volatile memory to acquire evidences, it is small in size and can send data to a remote system
- A hive Contains configuration information particular to the computer.
- Krull Artifact Parser & Extractor
10 Clues: Krull Artifact Parser & Extractor • Digital Forensics & Incident Response • pieces of evidence that point to an activity performed on a system • A hive Contains configuration information particular to the computer. • is a group of Keys, subkeys, and values stored in a single file on the disk • ...
Standards of the ACF Crossword 2016-01-04
Across
- (10) control your own actions
- (5) how many classifications of drugs
- (8) Hitting somebody
- (7) need this under fire for e.g.
- putting the group before yourself
- (9) hosesty
- (8) ACF has a zero tolerance policy on this
- (6) highly addictive substance
- (7) understanding each others wishes and beliefs
- (7)sticking by the group
Down
- (5) Online bullying
- (6,6) can affect anybody
- (10) alchohol is a .....
- (5) you should report any case of this
- (9) calling someone names
- (14)zero tolerance policy of this
- (5) who should you tell about any issues
- (8) is legal to be consumed from the age of ....
- (8) most commonly used substance
- (5) taking something without permission
20 Clues: (9) hosesty • (5) Online bullying • (8) Hitting somebody • (6,6) can affect anybody • (10) alchohol is a ..... • (7)sticking by the group • (9) calling someone names • (10) control your own actions • (6) highly addictive substance • (8) most commonly used substance • (7) need this under fire for e.g. • (14)zero tolerance policy of this • putting the group before yourself • ...
Storage Digital Sales Wednesday Crossword 2023-12-18
Across
- Where we log all of our opportunity detail
- The tool to help us with continuous customer/partner outreach
- Cyberattack that holds data hostage
- Site that shows street pricing
- Stands for commisionable revenue
- IBM's Cyber resilience "menu" offering
- Stands for Financial revenue
- IBM's flagship storage hardware
- The best team sells this
- IBM Funded assessment
Down
- Means it can't be changed
- We sell everything through this
- Our "clean Room" OEM offering
- Our channel program name
- We recognize revenue at ___
- Our proprietary tech that drives price to performance (acronym)
- Digital sales is the primary driver of these
- Unit of measurement for reads/writes
- Storage solution for containers
- Indicator for the only measure of success
20 Clues: IBM Funded assessment • Our channel program name • The best team sells this • Means it can't be changed • We recognize revenue at ___ • Stands for Financial revenue • Our "clean Room" OEM offering • Site that shows street pricing • We sell everything through this • Storage solution for containers • IBM's flagship storage hardware • Stands for commisionable revenue • ...
Matt’s Crossword 2025-03-26
Across
- A cold substance that’s is often disliked.
- MSU and vacuums have this in common, they ___
- Nick’s L10 doodles topic, often.
- An even uglier truck.
- Kind of the animal that Matt shot, but less cool?
- Our 2025 goals, describing word.
- Anagram of beer improvement mineral.
- An ugly truck, per Matt and Haley’s standards.
- Nick’s favorite alcoholic beverage.
- Found in L10 meetings and outside.
- Enriching lives and providing solutions.
Down
- Source of fun/frustration daily.
- Beer improvement mineral.
- Throw this and make money? Or put it in beer.
- Distilled spirit preferred by Beckie.
- Wee Matt’s dream car color.
- The dirty in a gin and tonic.
- SAP’s cousin?
- Daily hydration frequented by Matt.
- Justin’s drink of choice.
- A useless and ugly truck.
- Haley’s wine preference.
22 Clues: SAP’s cousin? • An even uglier truck. • Haley’s wine preference. • Beer improvement mineral. • Justin’s drink of choice. • A useless and ugly truck. • Wee Matt’s dream car color. • The dirty in a gin and tonic. • Source of fun/frustration daily. • Nick’s L10 doodles topic, often. • Our 2025 goals, describing word. • Found in L10 meetings and outside. • ...
Mortal Kombat Kharacters 2025-07-15
Across
- Geomancer
- General or Kahn
- Kytinn
- Clone of Kitana
- Kang Earthrealm’s Champion
- Ketchup
- God of Wind
- Formerly known as Tundra, now Sub Zero (Or Scorpion)
- Mustard
- Grandmaster of the Lin Kuei
- Hat Man
- Sindel’s daughter
- Hydromancer and Half God
Down
- Special Forces
- The ancestors of Kenshi possess this sword
- Cyber Lin Kuei Cryomancer
- Clan of Scorpion
- Shang Tsung’s former slave, now fights for earthrealm
- Cryomancer of the Lin Kuei Clan
- We are Many
- Empress of Outworld/Edenia
- Speedy
- Ninja Mime Star
- Where there is fire, there is…
- God of Thunder and Lightning
- Aussie
- Sorcerer or Souls
- Son of Kenshi, Raised by Hanzo (Or Kenshi’s Cousin)
- Netherrealm sorcerer
29 Clues: Kytinn • Speedy • Aussie • Ketchup • Mustard • Hat Man • Geomancer • We are Many • God of Wind • Special Forces • General or Kahn • Clone of Kitana • Ninja Mime Star • Clan of Scorpion • Sorcerer or Souls • Sindel’s daughter • Netherrealm sorcerer • Hydromancer and Half God • Cyber Lin Kuei Cryomancer • Kang Earthrealm’s Champion • Empress of Outworld/Edenia • Grandmaster of the Lin Kuei • ...
Unit 3: Securing a LAN 2025-11-07
Across
- Switch feature that limits MAC addresses per port.
- Type of control that mitigates damage after an incident.
- Principle of limiting access to only what's necessary.
- Technique where a device impersonates another by changing its MAC address.
- Type of firewall that tracks active connections.
- CIA Triad principle that restricts data access to authorized users.
- A MAC address is also known as a ____ address
- Type control that identify when a security breach has occurred.
Down
- Type of firewall that only follows static rules
- CIA Triad principle that ensures data is accurate and unaltered.
- Security controls involving hardware/software like firewalls.
- A device or software that filters network traffic based on rules.
- Logical segmentation of a network to improve security and performance.
- CIA Triad principle ensuring data is accessible when needed.
14 Clues: A MAC address is also known as a ____ address • Type of firewall that only follows static rules • Type of firewall that tracks active connections. • Switch feature that limits MAC addresses per port. • Principle of limiting access to only what's necessary. • Type of control that mitigates damage after an incident. • ...
Legislative Authority 2015-09-17
Across
- This section of the Charter speaks to the security against cruel and unusual treatment.
- As mobility of citizens may be impacted by a criminal charge, it is essential that any rights afforded under the Charter are not ____________.
- (2 wds) Per section 9 of the Charter, the security against __________ ________ or imprisonment applies by permitting an individual who is not under arrest/detention their right to leave.
- (3 wds) CEA is the acronym for ______ ________ ___.
- This section of the CEA provides for business records made in the ordinary course of business to be admitted as evidence.
Down
- (2 wds) Section 13 of the Charter speaks to the security against ____ _____________.
- (2wds, plural) CBSA investigators are _____ ________ for the purpose of administering and enforcing the CA and the IRPA as defined by s. 2 of the CC.
- When you are identifying witnesses to present evidence, you must ensure they are both competent and ___________.
- (an acronym) The ____ retains responsibility for investigating IRPA offences linked to human trafficking, risks to national security, and organized crime.
- This section of the Charter states that on arrest/detention, the person must be made aware of the reasons, be able to retain counsel (and advised of that right), and have the validity determined by courts.
- (2 wds) Section 11 of the CA provides authority to a justice of the peace to issue a ______ _______.
- (plural) Per section 7 of the Charter, life, liberty and security of person does not apply to ____________ or other artificial entities incapable of enjoying life, liberty or security of the person.
12 Clues: (3 wds) CEA is the acronym for ______ ________ ___. • (2 wds) Section 13 of the Charter speaks to the security against ____ _____________. • This section of the Charter speaks to the security against cruel and unusual treatment. • (2 wds) Section 11 of the CA provides authority to a justice of the peace to issue a ______ _______. • ...
Bullying 2013-08-29
Across
- Bulling over the internet
- People who you trust
- Bullying which is intimidating
- A person you can go to for help in your school
- Where you can go for help over the phone or internet
- The person engaging the bully
Down
- Where you can go to for confidential help
- Bullying which excluded people
- Bullying which involved unwanted contact
- by
- You can always call them on 000
- The person who is being bullied
- Bullying in which you call people names
13 Clues: by • People who you trust • Bulling over the internet • The person engaging the bully • Bullying which excluded people • Bullying which is intimidating • You can always call them on 000 • The person who is being bullied • Bullying in which you call people names • Bullying which involved unwanted contact • Where you can go to for confidential help • ...
Chapters 1 & 2 2014-01-30
Across
- this type of attack can compromise the security goal of availability
- type of firewall that protects an individual computer
- allows a remote attacker to connect to your system via the network
- a false alert from an IDS
- helps achieve the security goal of confidentiality
- an individual computer that is part of a botnet
- an intrusion detection system that monitors an individual computer
- malware that self-replicates
- software used for whole disk encryption
- a popular RAT (remote access trojan)
Down
- an intrusion detection system that monitors network traffic
- An NIDS based on this looks for specific traffic in packet captures
- should be set first in the BIOS boot order
- This virus changes itself in order to thwart anti-virus detection
- software that activates malware when certain conditions occur
- tool that can show your computer's network connections
- This virus uses stealth techniques in an attempt to thwart malware analysts
- this malware is capable of hiding files, processes, and user accounts from system administrators
- a network of compromised computers controlled by an attacker
- helps achieve the security goal of integrity
- a type of canned meat or an unwanted email
21 Clues: a false alert from an IDS • malware that self-replicates • a popular RAT (remote access trojan) • software used for whole disk encryption • should be set first in the BIOS boot order • a type of canned meat or an unwanted email • helps achieve the security goal of integrity • an individual computer that is part of a botnet • ...
KCPC 2nd Shift 2022-07-12
Across
- All patients are counted inside their living unit room by seeing patient's body and/or
- recent serious suicide attempt
- This shall be conducted in the same manner as above, when the Shift Supervisor orders
- patient remains in the defensive level
- Harm – the act of inflicting physical harm on one’s self
- patient voluntarily retreats to their room
- to the units relevant to updated severe weather conditions. In the event of severe
- staff shall accompany maintenance inmates at all times.
- schedule of Count
- mechanical device used to unlock handcuffs
Down
- Security assisted force treat
- moderate risk
- The 5A officer shall supervise the serving of all
- the following procedures shall be followed.
- When a patient leaves the facility for court, hospital, etc., and does not return prior to
- The KCPC Captains’ Office shall be responsible for listening to weather broadcasts to provide
- the expression of unfriendliness or aggression in action, feeling, or attitude
- Security count is taken by a Shift Supervisor, the Director of Security or designee
- time, they are placed on outcount
- count, or the count does not clear
- may be utilized only in an emergency
- Is an emergency requiring additional staff
22 Clues: moderate risk • schedule of Count • Security assisted force treat • recent serious suicide attempt • time, they are placed on outcount • count, or the count does not clear • may be utilized only in an emergency • patient remains in the defensive level • patient voluntarily retreats to their room • Is an emergency requiring additional staff • ...
investing - auroaru bosecker 2025-03-24
Across
- investing all money at a given time
- social security and medicare taxes
- traditional or roth
- a system of recording information in a way that makes it difficult or impossible to hack ect
- never lose money
- never forget rule # 1
- the increase in value when you sell an asset for more then you bough it
- Take the contributions of fund investors and purchase a portfolio
- INVOLVES ASSETS LIKE STOCKS AND BONDS
- how you need to be to invest in crypto
- MEANT FOR SHORT TERM GOALS
- ownership of a fraction of a company
Down
- a strategy in which you invest your money in equal amounts, at regular intervals
- age to receive full social security benefits
- stock prices are raising
- CEO of berkshire hathaway
- a high risk investment
- the availability of cash or the ese which an asset can be converted into cash
- the total value of company’s stock
- someone who bys and sells stocks quickly
- security created by president roosevelt in 1935
- stocks prices are decline
- a sum of money made available for particular purpose
- managed by your employer
- someone who holds stocks for the long term
25 Clues: never lose money • traditional or roth • never forget rule # 1 • a high risk investment • stock prices are raising • managed by your employer • CEO of berkshire hathaway • stocks prices are decline • MEANT FOR SHORT TERM GOALS • social security and medicare taxes • the total value of company’s stock • investing all money at a given time • ownership of a fraction of a company • ...
INF201 Crossword 2025-05-15
Across
- Understanding the cause and scope of an incident
- A memory overwrite caused by excessive data input
- Isolating affected systems to prevent spread
- Cross-functional groups coordinating governance activities
- First phase in incident response: planning and readiness
- VPN mode used for host-to-host connections
- Risk strategy that reduces impact or likelihood
- Identifying potential security incidents promptly
- Abbreviation for attack where communication is intercepted and altered
- Creates a secure tunnel over public networks
- What your business loses when public trust is damaged
Down
- Internal secure gateway for accessing internal systems
- A hardened public-facing system used for secure remote access
- Security device that protects web applications from attacks like XSS and SQLi
- Risk strategy that eliminates the source of risk entirely
- Risk strategy that shifts responsibility to a third party
- Risk strategy that takes no action because the risk is tolerable
- Restoring normal operations after an incident
- Following laws, standards, and internal policies
- Removing the threat and fixing vulnerabilities
- Database attack that exploits misconfigured input validation
- VPN mode used for site-to-site connections
- Governance structure that sets strategic security direction
23 Clues: VPN mode used for host-to-host connections • VPN mode used for site-to-site connections • Isolating affected systems to prevent spread • Creates a secure tunnel over public networks • Restoring normal operations after an incident • Removing the threat and fixing vulnerabilities • Risk strategy that reduces impact or likelihood • ...
Cyber tools 2023-01-09
Across
- best social networking site to chat
- best social networking site to watch videos
- a form of blogging using short posts without titles.
- an American social networking service based in San Francisco, California
Down
- to
- best way to connect with friends, work colleagues or random people
- apps GPS
- Similar to Microsoft OneDrive
- best way to find a job
9 Clues: to • apps GPS • best way to find a job • Similar to Microsoft OneDrive • best social networking site to chat • best social networking site to watch videos • a form of blogging using short posts without titles. • best way to connect with friends, work colleagues or random people • an American social networking service based in San Francisco, California
Cyber Safety 2020-02-19
Across
- a web address that has been condensed and which could mislead an user into going into a risky website
- information about you that can be used to identify you because it is unique to you
- when someone poses as an institution, like a bank or school, and sends you a personalized message asking you to provide private information
- without a name or other information that identifies who you are
Down
- to engage in activities that don't involve devices, apps, or the internet
- when something happens on digital media that makes you feel uncomfortable, worried, sad, or anxious
- an attempt to trick someone, usually with the intention of stealing money or private information
- using media in a way that feels healthy and in balance with other life activities
- a fake Instagram account used for posting to a specific group of people or to post anonymously
9 Clues: without a name or other information that identifies who you are • to engage in activities that don't involve devices, apps, or the internet • using media in a way that feels healthy and in balance with other life activities • information about you that can be used to identify you because it is unique to you • ...
Cyber Safety 2019-09-26
Across
- a type of criminal that steals/uses your identity.
- When Something happens online that makes you uncomfortable.
- Sending a personalized message asking for private information.
- To engage in activities that are not online nor on a screen.
- An Attempt to trick someone to with an alternative motive.
- Finding balance between online and offline activities.
Down
- Special information that is only yours.
- A web address that has been condensed.
- Information that comes to us through the internet.
9 Clues: A web address that has been condensed. • Special information that is only yours. • a type of criminal that steals/uses your identity. • Information that comes to us through the internet. • Finding balance between online and offline activities. • An Attempt to trick someone to with an alternative motive. • When Something happens online that makes you uncomfortable. • ...
Cyber Safety 2023-05-22
Across
- Gossiping and spreading rumors about someone online.
- Stalking someone online.
- Sharing private secrets of someone online.
- Faking an identity.
Down
- Aggressive and intimidating pressure.
- Bullying someone online.
- Gaining someone's trust to reveal private secrets of them online.
- Fighting with someone using vulgar language online.
- Not being included.
9 Clues: Not being included. • Faking an identity. • Bullying someone online. • Stalking someone online. • Aggressive and intimidating pressure. • Sharing private secrets of someone online. • Fighting with someone using vulgar language online. • Gossiping and spreading rumors about someone online. • Gaining someone's trust to reveal private secrets of them online.
Cyber Crossword 2023-08-29
Across
- Hackers with malicious intentions
- The process of encoding a message or information to make it unreadable and secretive
- Ethical hackers who use their skills to expose loopholes in security measures for organizations/companies
- Sometimes involves altering the header of an e-mail to make it look legit
Down
- A method for bypassing normal authentication procedures to access protected data or a computer system
- A software program designed by hackers to hijack computer systems
- A kind of social engineering where someone without authorization gets physically inside a strict area by tagging behind a person or group of people who have access
- A software robot that runs automated tasks (scripts)
- The act of disguising as a trustworthy entity and contacts potential victims asking them to reveal information
9 Clues: Hackers with malicious intentions • A software robot that runs automated tasks (scripts) • A software program designed by hackers to hijack computer systems • Sometimes involves altering the header of an e-mail to make it look legit • The process of encoding a message or information to make it unreadable and secretive • ...
Cyber Crime 2024-02-29
9 Clues: Online bullying • Deceptive schemes for money • Unauthorized computer access • Stealing someone else's work • Software that harms computer • Using programs for harmful tasks • Stealing someone's identity online • Tricky emails asking for personal information • Software that demands payment to unlock files
cyber secruity 2024-10-04
Cyber monday 2024-11-28
9 Clues: THE COST OF AN ITEM • TO BUY SOMETHING ONLINE • ITEMS AVAILABLE FOR SALE • WHAT YOU BUY FOR SOMEONE ELSE • A COLLECTION OF THINGS TO BUY • WHAT YOU DO TO LOOK FOR ITEMS • WHAT YOU DO WITH MONEY ONLINE • WHERE YOU RECEIVE PROMO CODES • A SHORTENED TERM FOR PROMOTION
Cyber monday 2024-11-28
9 Clues: TO WRAP ITEMS • TO BROWSE AND BUY • A DISCOUNT ON ITEMS • THE SYMBOL OF A BRAND • WHAT YOU NEED IN A WEBSITE • A SCORE GIVEN BY CUSTOMERS • A FAST-MOVING CROWD DURING SALES • WHAT YOU DO IF AN ITEM IS UNSUITABLE • WHAT YOU NEED TO MANAGE DURING SHOPPING
Cyber Crossword 2025-03-10
Across
- The best defense against social engineering attacks.
- A cyber scam that tricks users into revealing sensitive information.
- A deceptive scheme used to steal information or money.
- Phishing attack carried out via SMS messages.
- Trap victims into downloading malware using tempting offer.
Down
- A scam where attackers create a fake identity by impersonating people in authority.
- Victims bombarded with false alarms and fictitious threats, forcing to install malware.
- A scam that uses voice calls to deceive victims.
- Tailor-made messages targeting specific individuals or enterprises.
9 Clues: Phishing attack carried out via SMS messages. • A scam that uses voice calls to deceive victims. • The best defense against social engineering attacks. • A deceptive scheme used to steal information or money. • Trap victims into downloading malware using tempting offer. • Tailor-made messages targeting specific individuals or enterprises. • ...
Cyber bullying 2025-06-25
Across
- who don’t intervene (9 letters)
- hurtful messages or threats online
- space where bullying often happens
- someone pretends to be you online
- enforcement may be involved when this is broken (4 letters)
- to prevent bullies from contacting you (5 letters)
Down
- targeting someone via tech
- state caused by online harassment (4 letters)
- message board prone to anonymous bullying
9 Clues: targeting someone via tech • who don’t intervene (9 letters) • someone pretends to be you online • hurtful messages or threats online • space where bullying often happens • message board prone to anonymous bullying • state caused by online harassment (4 letters) • to prevent bullies from contacting you (5 letters) • ...
Cyber Safty 2025-11-21
Across
- Keeping personal information safe
- Fake messages used to trick people
- Suspicious messages that pretend to be real
- A place where people share photos and posts
- Safety Software that protects from viruses
Down
- A secret word to log in securely
- A harmful program that damages devices
- Protecting your identity online
- Media Unwanted or harmful messages
9 Clues: Protecting your identity online • A secret word to log in securely • Keeping personal information safe • Fake messages used to trick people • Media Unwanted or harmful messages • A harmful program that damages devices • Safety Software that protects from viruses • Suspicious messages that pretend to be real • A place where people share photos and posts
Financial Fundamentals 2023-05-24
Across
- - any additional cost charged on top of an asset's usual cost.
- - A ______ employee benefit that commits the employer to make regular contributions to a pool of money set aside to fund payments made to eligible employees after they retire.
- – insures bank deposits
- - the relationship between the amount received and cost of investment
- - A ______ union is a nonprofit financial institution that’s owned by the people who use its financial products.
- - A _______ market is the location where buyers and sellers of financial products meet to conduct business.
- - something a person or company owes, usually a sum of money.
- - a wide array of investments, such as stocks, bonds, and notes.
- - anything that has current or future economic value to a business
- - the total amount of money brought in by a company's operations
- – Regulate banks
- - A security representing ownership in a corporation
Down
- - How easy it is to turn an asset or investment into cash
- _ The ______ supply is the amount of money in circulation in the economy
- - A rise in the general level of prices
- - A ______ project is a long-term, capital-intensive investment to build upon, add to, or improve a capital asset
- - Default, Taxes, Political, and Economic change in conditions.
- - to get loans in exchange for collateral.
- - a measure of the average change in prices over time in a fixed market basket of goods and services
- - a spending plan for your business based on your income and expenses
- - A security representing a loan issued by a business or government
- - the failure to make required interest or principal repayments on a debt, whether that debt is a loan or a security
- - Regulates stock markets
23 Clues: – Regulate banks • – insures bank deposits • - Regulates stock markets • - A rise in the general level of prices • - to get loans in exchange for collateral. • - A security representing ownership in a corporation • - How easy it is to turn an asset or investment into cash • - something a person or company owes, usually a sum of money. • ...
Plural Policing 2018-10-29
Across
- Surname of the current Chief of the Secret Intelligence Service
- Acronym for Scottish Environmental Protection Agency
- The first Neighbourhood Watch scheme - then known as Home Watch - was set up in the UK in in which Chesire town in 1982?
- Surname of “Johnathon” on NCA most wanted list
- 8% of G4S employees are employed in this continent
- The article ‘Pluralisation of policing in England & Wales and the Netherlands: exploring similarity and difference’ (2009) was written by Jones, van Steden and which other author (surname)?
- NCA Board Meeting on 23 August 2018 met in this city
- In their 2002 article Mark Button and Tim John considered the plural policing of what kind of protest?
- According to Atkinson (2018) how many ‘key operational partners’ are based at the Scottish Crime Campus?
- The first Neighbourhood Watch schemes were set up in New York in 1964 as a response to a murder. What was the surname of the victim?
- Acronym for British Security Industry Authority
Down
- Missing word - MI5 is the common name for the UK “?” Service
- 22% of G4S employees are employed in this continent
- Surname of the current Director General of the Security Service
- Missing word – MI6 is the common name for the Secret “?” Service
- Missing word - SEPA is the Scottish Environmental “?” Agency
- G4S had a contract to deliver security at this event in London in 2012
- According to Atkinson (2018) beyond the ‘key operational partners’ how many other agencies have a presence at the Scottish Crime Campus?
- Missing word - HMRC is Her Majesty’s Revenue and “?”
- Missing word - The NCA stands for the National “?" Agency
- The Scottish Crime Campus is located in this town
21 Clues: Surname of “Johnathon” on NCA most wanted list • Acronym for British Security Industry Authority • The Scottish Crime Campus is located in this town • 8% of G4S employees are employed in this continent • 22% of G4S employees are employed in this continent • Acronym for Scottish Environmental Protection Agency • NCA Board Meeting on 23 August 2018 met in this city • ...
15.1 Crossword 2024-05-08
Across
- money is used in exchange for goods and services needed by individuals, businesses, and government
- concept that money received today is worth more than the same amount received in the future
- mechanism a nation uses to provide and manage money for itself.
- to make purchases people must be able to carry money with them
- allows customer to pay for purchases directly from their checking amount
- to exchange one good or service for another good or service
- mean that money is a common measure of the worth or price of a good or service
- a security that pays interest over terms ranging from two to ten years
- plastic card that allows the holder to make credit purchases up to an authorized amount
- anything of value that is accepted in return for goods or service
Down
- there must be a way to divide money into smaller units
- which means it can be saved and used at a later date
- is the process of transferring money from one individual or organization to another
- money must maintain its value over time in order for it to be widely accepted
- to be accepted, authentic money must be immediately recognizable
- a security that matures in a year or less
- type of financial investment issued by a corporation, government, or other organization
- type of a document guaranteeing the payment of a specific amount of money, either on demand or at a set time, with the payer named on the document
- a security that pays interest over terms of ten to thirty years
- a transfer of money from one bank account to another
- money is handled many time by many people. It needs to be strong
- made up with paper money and coins
22 Clues: made up with paper money and coins • a security that matures in a year or less • which means it can be saved and used at a later date • a transfer of money from one bank account to another • there must be a way to divide money into smaller units • to exchange one good or service for another good or service • ...
exam 2025-11-10
Across
- The main circuit board that connects all components of a computer.
- The abbreviation for the security measure where more than one verification method is used to access a system.
- Type of software that allows the operating system to communicate with and control hardware components.
- This abbreviation is used for the type of highspeed, temporary memory used for processing tasks.
- The practice that guarantees that authorized users have access to information and systems when needed.
- Protection of information systems from theft, damage, or disruption.
- The process of converting data into a code to prevent unauthorized access.
- key, A cryptographic key used in asymmetric encryption that must be kept secret.
- An electronic device that processes data according to instructions.
- The study and practice of securing communication through encoding techniques.
Down
- Malicious software designed to damage or gain unauthorized access to systems.
- The practice that ensures information is secret, secure and accessible only to those authorized to have access.
- The abbreviation for the security measure that encrypts internet connections for secure data transmission over a public network.
- Type of software programmed into read-only memory to provide low-level instructions that control hardware devices.
- The practice that assures that data is accurate and has not been altered or tampered with.
- This abbreviation is used for the specialized processor that handles rendering of images, video and animation.
- point, A device that allows wireless devices to connect to a wired network.
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- The physical or logical arrangement of network devices and connections.
- A security test used to verify that a user is human and not a bot.
20 Clues: The main circuit board that connects all components of a computer. • A security test used to verify that a user is human and not a bot. • An electronic device that processes data according to instructions. • Protection of information systems from theft, damage, or disruption. • The physical or logical arrangement of network devices and connections. • ...
Know Your Facility 2025-12-12
Across
- Power for the Meta Data Centers really begins here.
- Begins with Ultraviolet light filters and is then pumped to the outside cold water storage tanks.
- A highly restricted area within the DC as the servers within this location hold user financial information.
- Area where equipment is shipped and received.
- Contain the cooling systems in place for your DC that help keep the data halls cool and at the optimum temperature.
- A private, suite-style space provided in Meta offices for breastfeeding or pumping in comfort and privacy.
- A physical location where security operations are monitored and managed.
- A dedicated space within a building that houses the fire riser and associated fire suppression system equipment, such as valves, pipes, and sometimes nitrogen generators or compressors.
Down
- Has the capacity to hold up to 1,152 Rack Positions.
- A highly secure, restricted-access area within Meta data centers dedicated to the physical destruction and secure handling of storage media (such as hard drives and SSDs) to ensure data security.
- Helps to keep the DC building cool and provide the air conditioning portion of the Heating, ventilation, and Air Conditioning (HVAC) system.
- A designated space within a facility—such as a data center or office—where security staff gather to get pass down information from the previous shift supervisor.
- Where emergency backup power runs from in case of a power outage.
- The main entrance or reception area of a Meta office or data center, where visitors and employees check in, receive badges, and are greeted by security or reception staff.
- The main communications distribution center.
- The security checkpoint or building at the entrance of a Meta facility—especially at data centers—where all visitors and personnel must check in before being allowed further access.
- The access points for communications to enter and exit the data center.
17 Clues: The main communications distribution center. • Area where equipment is shipped and received. • Power for the Meta Data Centers really begins here. • Has the capacity to hold up to 1,152 Rack Positions. • Where emergency backup power runs from in case of a power outage. • The access points for communications to enter and exit the data center. • ...
game 2026-01-23
Across
- Harmful software
- Keeping data secret
- Rules for data protection
- Protection of personal information
- Permission to use data or system
- Protection of systems and data
- Person who breaks into systems
Down
- Verifying user identity
- Converting data into secret code
- Network security barrier
- Secret word for login
- Extra copy of data
12 Clues: Harmful software • Extra copy of data • Keeping data secret • Secret word for login • Verifying user identity • Network security barrier • Rules for data protection • Protection of systems and data • Person who breaks into systems • Converting data into secret code • Permission to use data or system • Protection of personal information
Bullying 2023-03-07
7 Clues: Face with emotion • talking about others • another for the body • the opposite of love • It happens on Instagram • Friendship is one of the factors • another word for words (starts with v)
Total Defence Day 2023 - Digital Defence (P5/6) 2023-02-02
Across
- Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords (OTPs).
- Always practise good cyber ______________ to ensure your accounts are safe.
Down
- We can use ______________ as our passwords e.g. Saw Eagle At The Park.
- Malicious malware can cause the program to ______________.
- Never ______________ One-Time Passwords (OTPs) to anyone.
5 Clues: Never ______________ One-Time Passwords (OTPs) to anyone. • Malicious malware can cause the program to ______________. • We can use ______________ as our passwords e.g. Saw Eagle At The Park. • Always practise good cyber ______________ to ensure your accounts are safe. • ...
FITDVocab.sc 2013-05-15
7 Clues: Random _______ • Example is an iphone • Information being put in • Information being put out • The way you behave online • Three types one is optical • Anything having to do with the internet
test 2013-01-13
Across
- / Crisis where UN was almost brought to bankruptcy due to the refusal of the USSR, France and Belgium to contribute towards the cost of operations, also where Dag Hammarskjöld, the second Secretary General of the UN was killed in a plane crash en route to cease-fire negotiations. (Country)
- / System whereby there is a legal obligation among member nations of the United Nations to maintain international peace and security. The community acts together with the interest of moving promptly and decisively to encounter acts of aggression by one nation against another.
- / Granted permanent membership into the Security Council in 1971
- / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire
- How many months do members take turns at holding the presidency of the Security Council
Down
- / Number of members in the Security Council
- / The only occasion on which the UN was able to take decisive action in a crisis directly involving the interests of one of the superpowers. (Country)
- In 2003, the United Nations Security Council was involved in a crisis that happened in Sudan. The conflict resulted in the killing of thousands of civilians by the Janjaweed militias. Name the region (located in Sudan) where the genocide took place.
- / Location where the first Security Council session took place on 17 January 1946
- / Privilege of the permanent members: “Decisions of the Security Council on all other matters shall be made by an affirmative vote of nine members including the concurring votes of the permanent members.”
- / The country Britain and France join forces with to invade Egypt in 1956 during the Suez Canal crisis.
11 Clues: / Number of members in the Security Council • / Granted permanent membership into the Security Council in 1971 • / Name of the UN peacekeeping force sent to Rwanda to enforce a cease-fire • / Location where the first Security Council session took place on 17 January 1946 • How many months do members take turns at holding the presidency of the Security Council • ...
Black Friday 2025-11-19
Across
- ; A good offer or a good price.
- ; Full of people.
- ; A time when things are cheaper.
- ; A person who buys something.
- ; Something that does not cost a lot of money.
- ; A group of people waiting.
Down
- Something that costs a lot of money.
- ; A price reduction.
- ; A place where you can buy things.
- Monday ; The online shopping day after Black Friday.
- mall ; A big building with many stores.
11 Clues: ; Full of people. • ; A price reduction. • ; A group of people waiting. • ; A person who buys something. • ; A good offer or a good price. • ; A time when things are cheaper. • ; A place where you can buy things. • Something that costs a lot of money. • mall ; A big building with many stores. • ; Something that does not cost a lot of money. • ...
TEKA-TEKI INFORMATIKA 2024-09-12
Across
- bekerja secara kelompok
- kemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil
- KOMPUTASIONAL computational thinking
- kemampuan memilah informasi yang kompleks menjadi lebih sederhana
- dunia cyber
Down
- era industri 4.0
- salah satu komponen keterapilan generik
- salah satu tujuan infografik
8 Clues: dunia cyber • era industri 4.0 • bekerja secara kelompok • salah satu tujuan infografik • KOMPUTASIONAL computational thinking • salah satu komponen keterapilan generik • kemampuan memilah informasi yang kompleks menjadi lebih sederhana • kemampuan memecah data, proses atau masalah menjadi bagian-bagian yang lebih kecil
PeopleTec Engineering Week 2024-02-12
Across
- operations security
- exploratory programming marathon session
- use of scientific discoveries for practical purposes
- people first, technology always
- cyberattack prevention measures
- composing instructions for a computer to follow
- individual that provides products or services to the government
- Information technology role responsible for data security
Down
- representation of a real-world system
- training algorithms to create self-learning models
- designing and experimenting with a model
- connected computer systems
- professional problem solver
- next generation...
- document attesting to a level of achievement
15 Clues: next generation... • operations security • connected computer systems • professional problem solver • people first, technology always • cyberattack prevention measures • representation of a real-world system • exploratory programming marathon session • designing and experimenting with a model • document attesting to a level of achievement • ...
Crossword 1 2014-12-26
Across
- Type D fires are fueled by __________ metals.
- We can protect information by protecting computer screens from __________ eyes.
- CDT means __________, direction and take down.
- Patrick Shand was arrested for __________ baby food.
- Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
- One of the recommendations from the Patrick Shand case was __________ licensing.
- The basic security role is to protect people, property and __________.
- Post orders are often called __________ orders.
- When taking a witness statement, the facts should be in __________ order.
- An arrest is defined as getting control of someone with intent to __________.
- Every province has its own human rights __________.
- You will need a security licence to work in loss __________.
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- A positive attitude and being respectful are __________ qualities.
Down
- Type B fires are fueled by __________ liquids.
- When handling evidence, you should wear gloves to avoid __________.
- If a crowd seems to be getting out of control, __________ from any communication.
- Only the __________ government can create indictable offences.
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- One reason that we patrol is to deter people from __________ acts.
- Designing the environment to reduce the possibility of crime is called?
- When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- When securing a crime scene, make note of any __________ conditions.
25 Clues: Type D fires are fueled by __________ metals. • Type B fires are fueled by __________ liquids. • CDT means __________, direction and take down. • Post orders are often called __________ orders. • Every province has its own human rights __________. • Patrick Shand was arrested for __________ baby food. • You will need a security licence to work in loss __________. • ...
Crossword 1 2014-12-26
Across
- Designing the environment to reduce the possibility of crime is called?
- Type D fires are fueled by __________ metals.
- We can protect information by protecting computer screens from __________ eyes.
- The steps to using an extinguisher can be explained using the acronym PASS. What action does the first S in this acronym refers to?
- The basic security role is to protect people, property and __________.
- You will need a security licence to work in loss __________.
- When securing a crime scene, make note of any __________ conditions.
- When taking a witness statement, the facts should be in __________ order.
- A positive attitude and being respectful are __________ qualities.
- Post orders are often called __________ orders.
- The basic security role is implemented by observing, reporting, __________ and deterring.
- Reflective __________ can be defined as summarizing what has been said and give it back to show understanding
- “Find committing” is defined under the Criminal Code as meaning situations where a person is basically caught in the act of committing the __________.
- When dealing with unusual __________, don’t jump to conclusions until you have all of the facts.
Down
- Only the __________ government can create indictable offences.
- When handling evidence, you should wear gloves to avoid __________.
- It is the responsibility of every security guard to be aware of __________ materials on the work site.
- Type B fires are fueled by __________ liquids.
- One reason that we patrol is to deter people from __________ acts.
- An arrest is defined as getting control of someone with intent to __________.
- One of the recommendations from the Patrick Shand case was __________ licensing.
- Every province has its own human rights __________.
- Patrick Shand was arrested for __________ baby food.
- If a crowd seems to be getting out of control, __________ from any communication.
- CDT means __________, direction and take down.
25 Clues: Type D fires are fueled by __________ metals. • Type B fires are fueled by __________ liquids. • CDT means __________, direction and take down. • Post orders are often called __________ orders. • Every province has its own human rights __________. • Patrick Shand was arrested for __________ baby food. • You will need a security licence to work in loss __________. • ...
Trading 2023-10-10
Across
- A graphical representation of price movements in a specified timeframe.
- The final price of a security in a specific trading session.
- The potential gain in an investment or trade.
- A forex pair representing the Euro and the British pound.
- An order that becomes a market order once a certain price level is reached.
- An order placed to close a position when a certain loss threshold is reached.
- The ability to control a large position with a relatively small amount of money.
- Subject to rapid and unpredictable price movements.
- The beginning price of a security in a specific trading session.
- A forex pair between the US and Japan.
- An order to purchase a security at or below a specific price.
- A benchmark index for the top 30 blue-chip stocks in the U.S.
Down
- A series of numbers often used in technical analysis to predict potential support and resistance levels.
- The difference between the bid and ask price of a security or currency pair.
- The potential for loss in an investment or trade.
- An individual or firm that facilitates trading for investors.
- A type of market order that increases in value as the chart goes down.
- A forex pair representing the British pound and the US dollar.
- An order placed to close a position when a certain profit threshold is reached.
- The official currency of the United States.
- The official currency of Japan.
- The completion of a buy or sell order.
- A unit of currency for the United Kingdom.
- A forex pair representing the Euro and the US dollar.
24 Clues: The official currency of Japan. • The completion of a buy or sell order. • A forex pair between the US and Japan. • A unit of currency for the United Kingdom. • The official currency of the United States. • The potential gain in an investment or trade. • The potential for loss in an investment or trade. • Subject to rapid and unpredictable price movements. • ...
Operating Systems Module 11 Crossword (Miguel Melendez - 12/9/24 Quiz) 2024-12-08
Across
- A security enhancement. Good for servers that aren't physically secure and for mobile devices like laptops.
- A key that is a series of letters, numbers, and special characters that two devices use to authenticate each other's identity.
- The acronym of the update management system of Windows Server.
- A built-in firewall that Linux distributions have.
- The hat of a hacker who is paid by companies to test their systems and report vulnerabilities.
- An authentication credential category of what the user is. Examples: fingerprint, retina scan, voice pattern.
- What companies must buy if they want to have secure communication sessions across public networks.
- Windows Defender Firewall uses these to affect the behavior of protocols and applications. They can be inbound or outbound.
- This allows an administrator to specify the maximum amount of disk space a user's files can occupy on a volume or share.
- The most widely used method for encrypting data.
- This creates a barrier between two entities.
Down
- A type of file you must edit in Fedora Linux to change password options.
- You use this command on the Linux command line to view files.
- The minimum number of characters Fedora 30 requires for a password. This is by default.
- A security feature that allows administrators to control who has access to their network.
- A type of authentication that requires a user to give two or more types of authentication.
- This is used in a Windows domain environment to provide mutual authentication.
- Security policies should be easy for ordinary users to understand and they should also be?
- Operating Systems require periodic updates and "this" to maintain security, reliability, and performance levels.
- This is a common tool used by Linux administrators. A command-line program.
20 Clues: This creates a barrier between two entities. • The most widely used method for encrypting data. • A built-in firewall that Linux distributions have. • You use this command on the Linux command line to view files. • The acronym of the update management system of Windows Server. • A type of file you must edit in Fedora Linux to change password options. • ...
Criminal justice Public safety 2024-08-09
Across
- exit plans What should you always have in a worse case scenario?
- Who comes to record the events and the speaker?
- Command operation center
- What should be used to show everyone where they should be when the event begins?
- Yous should always set up a detailed 24-hour
- Who is the person speaking at your event?
- What high areas should you scout for sniper spots before the event?
- What is used by police and other factions to give information over the radio quickly? (hint 10-4 is one of them).
- Security for airports
- Who should be ready with medical supplies if injuries occur?
- What security is employed by the government?
Down
- Helicopter Casualty Evacuation Plan
- The plan of how the protectee arrives to the event.
- What stops metal objects from getting into a event?
- What is the term for controlling crowds?
- What is flying that is used to survey the event area from a distance?
- What security can be hired by the public?
- Should you check all the windows in an event area prior to and event begining?
- The secret service comes as extra defense when Presidental figures are speaking at events
- Do multiple police departments come together to plan events?
20 Clues: Security for airports • Command operation center • Helicopter Casualty Evacuation Plan • What is the term for controlling crowds? • What security can be hired by the public? • Who is the person speaking at your event? • Yous should always set up a detailed 24-hour • What security is employed by the government? • Who comes to record the events and the speaker? • ...
Unit16 2020-04-16
20 Clues: / padi • / sadam • / trahv • / sadam • / kohver • / kandik • / kirurg • / kohane • / ilmnema • / mehaanik • / karistus • / sihtkoht • / vahekäik • / sissekäik • / turvalisus • / ajakirjandus • / ürgne loodus • / reisiterminal • / rabav, jahmatav • / registreerimine
HR Quarterly Quiz 2023-08-23
Across
- This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc.
- Center You can apply for internal job postings and refer friends and family for referral eligible positions in ADP WFN by going to Myself> Talent >?
- Hennessy The newest member of our Leadership Team?
- Resources Who can employees reach out to if they are not receiving the mandatory Cyber Training emails?
Down
- Day First Monday of every September recognizes the men and women who labor to build this country?
- Policies Employees can access, view, read and attest Employee Handbook and policies in ADP by going to Resources > Company Information> ?.
- What is the name of our 401(k)-benefit administrator?
- How often do you receive mandatory Cyber training?
- If you refer a qualified candidate and they are hired, you are eligible to receive a referral bonus of $250 after successful completion of the referral’s first ? days of employment with Apotheco.
- Where can you go to access your paystubs and tax statements 24/7?
10 Clues: How often do you receive mandatory Cyber training? • Hennessy The newest member of our Leadership Team? • What is the name of our 401(k)-benefit administrator? • Where can you go to access your paystubs and tax statements 24/7? • This ADP employee perk allows access to discounts on hotels, movie tickets, restaurants etc. • ...
Don't Bully!!! 2013-05-23
Across
- the improper use of something
- talking about people in a bad way
- bulling that takes place online
- someone who sees a person be bullied
- a person who is an object of bullying
Down
- a feeling of intense annoyance caused by being tormented
- something that hurts someone physically or mentally
- someone who is bullied
- someone who bullies
- offending someone in words
10 Clues: someone who bullies • someone who is bullied • offending someone in words • the improper use of something • bulling that takes place online • talking about people in a bad way • someone who sees a person be bullied • a person who is an object of bullying • something that hurts someone physically or mentally • a feeling of intense annoyance caused by being tormented
Dzień Bezpiecznego Internetu iga.czajkowska8@gmail.com 2018-01-29
Across
- sposób zabezpieczenia konta przed włamaniem
- nielegalne rozpowszechnianie gier
- Miesiąc w którym obchodzimy Dzień Bezpiecznego Internetu
- konsekwencja zbyt częstego korzystania z internetu
- złośliwy program, który można pobrać z internetu nieświadomie
Down
- nękanie w Cyber przestrzeni
- Najpopularniejsza wyszukiwarka internetowa
- osoba próbująca włamać się do systemu informacyjnego
- nazwa dzięki której nikt się nie dowie o prawdziwych danych
- słowo dzięki któremu możemy zapisać jakiś plik
10 Clues: nękanie w Cyber przestrzeni • nielegalne rozpowszechnianie gier • Najpopularniejsza wyszukiwarka internetowa • sposób zabezpieczenia konta przed włamaniem • słowo dzięki któremu możemy zapisać jakiś plik • konsekwencja zbyt częstego korzystania z internetu • osoba próbująca włamać się do systemu informacyjnego • Miesiąc w którym obchodzimy Dzień Bezpiecznego Internetu • ...
Diga não ao bullying! 2026-04-07
Across
- Quem sofre as agressões.
- Nome maldoso usado para humilhar.
- Lugar onde mais acontece o bullying.
- O que todos devem ter uns pelos outros.
- Bullying feito com palavras ou insultos.
Down
- Tipo de bullying com empurrões ou socos.
- O que devemos fazer ao ver alguém sofrendo.
- Deixar o colega de fora de propósito.
- Quem pratica o bullying.
- Bullying feito pelo celular ou internet.
10 Clues: Quem sofre as agressões. • Quem pratica o bullying. • Nome maldoso usado para humilhar. • Lugar onde mais acontece o bullying. • Deixar o colega de fora de propósito. • O que todos devem ter uns pelos outros. • Tipo de bullying com empurrões ou socos. • Bullying feito pelo celular ou internet. • Bullying feito com palavras ou insultos. • ...
Understanding Money 2024-05-09
Across
- A security that pays interest over terms of ten to thirty years
- Money received today is worth more than the same amount received in the future because money received today can be invested or deposited in the bank for interest; this concept is called...
- A plastic card that allows the holder to make credit purchases up to an authorized amount
- Money is also known as...
- A type of a document guaranteeing the payment of a specific amount of money
- To exchange one good or service for another good or service
- A bank-issued card that allows customers to pay for purchases directly from their checking account
- Money is used in exchange for goods and services needed by individuals, businesses, and governments
- A transfer of money from one bank account to another
- A type of financial investment issued by a corporation, government, or other organization
- Anything of value that is accepted in return for goods and services
- Action taken to manage the supply of money and interest rates in an economy
Down
- The process of transferring money from one individual or organization to another
- The Federal Reserve System, often called... was created by the U.S. Congress in 1913 as our nation's central bank
- The mechanism a nation uses to provide and manager money for itself
- Money is a common measure of the worth or price of a good or service
- Banks that are part of The Fed are known as...
- A security that matures in a year or less
- Money can be saved and used at a later date
- A security that pays interest over terms ranging from two to ten years
20 Clues: Money is also known as... • A security that matures in a year or less • Money can be saved and used at a later date • Banks that are part of The Fed are known as... • A transfer of money from one bank account to another • To exchange one good or service for another good or service • A security that pays interest over terms of ten to thirty years • ...
2024 Cybersecurity Awareness Month 2024-09-17
Across
- A digital document used to verify the identity of a user or device online
- Software used to detect, prevent, and remove malicious software
- A security risk that originates from within the organization, often involving employees
- A tool that records keystrokes on a keyboard, often used to steal sensitive information
- The process of verifying a user or device
- A person who uses technical skills to exploit systems or networks
- The unauthorized access and retrieval of sensitive information from a system
- A type of malware that locks users out of their systems until a ransom is paid
- A hidden way of bypassing security controls in a system
- A string of characters used to authenticate access to a system or account
Down
- A software update designed to fix vulnerabilities or bugs
- An attempt to damage, disrupt, or gain unauthorized access to a computer or network
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- A network security system that monitors and controls incoming and outgoing traffic
- A vulnerability in software that is taken advantage of by hackers to carry out attacks
- A virtual private network that allows secure remote access to a network over the internet
- The use of deception to manipulate individuals into divulging confidential information
- The process used by an organization to handle and recover from a cyberattack
- An additional security layer that requires a second form of verification beyond a password
- The process of converting information or data into a code to prevent unauthorized access
- Software that gathers information from a user's device without their knowledge
22 Clues: The process of verifying a user or device • A hidden way of bypassing security controls in a system • A software update designed to fix vulnerabilities or bugs • Software used to detect, prevent, and remove malicious software • A person who uses technical skills to exploit systems or networks • ...
Investing Crosword (Heidi Flint) 2025-03-24
Across
- government medical health plan
- social security and medicare tax
- bonds Issued by companies
- investing all your money into stocks at once
- where you can put seven thousand dollars after tax
- individual retirement account
- a sum of money set aside for a specific purpose
- age to receive full social security benefits
- in a pension you pay in and your employer pays in along with one other
- you can put seven thousand dollars in a traditional IRA _____ taxed
- A collection of stocks, bonds, or other assets that trades on a stock exchange
- Issued by Government
- you get more benefits if you delay social security until this age
Down
- are how the government ensures you'll eventually be taxed
- putting a set amount of money into stocks periodically
- the availability of cash or the ease with which an asset can be converted to cash.
- someone who chooses and takes care of the investments in a mutual fund
- Pools money from a large group of investors to purchase a diversified portfolio of stocks, bonds and other securities.
- They represent a loan from the buyer
- what president roosevelt created that you get money from at sixty seven
- measures the price performance of a basket of securities
- you can put seven thousand dollars in a year in a roth IRA ____ taxes
- In a rollover If you leave your company, you can rollover your 401k funds to your new company’s 401k plan, OR rollover the funds into a new investment account. You have how many days.
- CEO of Berkshire Hathaway
- you often don't pay social security tax if you have this
25 Clues: Issued by Government • bonds Issued by companies • CEO of Berkshire Hathaway • individual retirement account • government medical health plan • social security and medicare tax • They represent a loan from the buyer • investing all your money into stocks at once • age to receive full social security benefits • a sum of money set aside for a specific purpose • ...
Windows Architecture 2024-10-30
Across
- Enables processes to execute code on a remote system.
- Unique security identifier for a user or group.
- Set of routines and tools for building software applications.
- The Windows NT operating system kernel.
- Mechanisms for ensuring mutual exclusion in threads.
- Endpoint for sending and receiving data across a network.
- Contains code and data used by multiple programs.
- Instance of a program in execution.
- Memory management scheme that eliminates the need for contiguous allocation of physical memory.
- Access Control List, defines permissions on resources.
- Amount of time a thread is allowed to run.
- _______ Driver Software that controls hardware attached to the computer.
- _____ Pipe - A mechanism for IPC, allows communication between processes.
- _______ Memory Memory management capability that gives an application the impression it has contiguous working memory.
- Signals used to manage concurrent processes.
- API for network communication in Windows.
- Security Reference Monitor, enforces security policies.
- Core component of an OS, manages system resources.
Down
- _______ Token Contains security information for a user session.
- Execution mode with limited privileges.
- A subsystems that is a primary API for Windows applications.
- Section of the Windows registry.
- Windows Subsystem for Linux, allows Linux binaries to run on Windows.
- Smallest unit of processing that can be scheduled.
- Execution mode with full privileges.
- ______ Manager - A Tool for monitoring applications and processes.
- Hierarchical database storing low-level settings for OS and applications.
- Signals used for process synchronization.
- ______ Manager - A Tool for tracking system performance.
- ______Monitor - Provides detailed information about hardware and software resources.
- Unique identifier assigned to each process.
31 Clues: Section of the Windows registry. • Instance of a program in execution. • Execution mode with full privileges. • Execution mode with limited privileges. • The Windows NT operating system kernel. • Signals used for process synchronization. • API for network communication in Windows. • Amount of time a thread is allowed to run. • Unique identifier assigned to each process. • ...
Chapter 8 E-Commerce Security 2020-11-19
Across
- The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
- People who commit crime on the Internet.
- Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
- One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
- Able to replicate itself and spread faster than viruses.
- _____ of attacks means the attackers are also improving themselves with new technologies over time.
- _____-of-service attempts to make a server or network resource unavailable to users.
- The e-commerce security battleground involves the attacks, target, and _____.
- The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
- The probability that a threat will impact an information system.
- ______ measures help find security breaches in a system.
Down
- One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
- _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
- _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
- Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
- The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
- _____ threat in e-commerce security includes human error and environmental hazards.
- _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
- The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
- Information _____ refers to activities and that protect an information systems.
- _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
- Information _____ is a measure taken to protect customer information online.
- _____ communication is one of the technical nature that contributes to the weakness of a system.
- _____ nature of e-commerce is one of the causes of security issues.
- A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
- Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.
26 Clues: People who commit crime on the Internet. • Able to replicate itself and spread faster than viruses. • ______ measures help find security breaches in a system. • The probability that a threat will impact an information system. • _____ nature of e-commerce is one of the causes of security issues. • ...
Prince FRM 2024-07-15
Across
- Insurance companies assess exposure to claims from natural disasters like earthquakes or cyclones.
- Adani Enterprises evaluates risks related to government policies affecting infrastructure projects and investments.
- SpiceJet deals with flight cancellations due to aircraft maintenance issues affecting customer satisfaction.
- RBI monitors risks that could destabilize the entire financial system, such as banking sector crises or economic recessions.
- Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio.
- Reliance Industries faces litigation over environmental compliance impacting public perception and regulatory approvals.
- Zomato manages public perception during controversies over food quality affecting user trust and market share.
- Mahindra & Mahindra evaluates its ability to secure short-term financing for working capital needs during economic slowdowns.
- Rate Tata Steel deals with currency fluctuations impacting revenue from international steel sales.
- Indian Oil Corporation assesses geopolitical stability before expanding refining operations in new global markets.
- Nestle India assesses risks of disruptions in the supply of dairy and agricultural products impacting production.
Down
- Paytm faces disruptions in payment processing due to technical glitches during high-volume transactions.
- Rate Bajaj Finance manages exposure to fluctuations in interest rates impacting loan profitability.
- NTPC evaluates risks related to environmental regulations impacting thermal power plant operations.
- HDFC Standard Life ensures adherence to new insurance regulations impacting policy sales and operations.
- TCS reviews the accuracy of financial models used for risk assessment and project estimation.
- Infosys assesses overdependence on revenue from a few large clients in its IT services business.
- Infosys strengthens cybersecurity measures to protect client data from cyber threats in IT services delivery.
- Marico evaluates exposure to changes in raw material prices affecting profit margins in FMCG sector.
- Hindustan Unilever manages risks associated with fluctuating prices of palm oil affecting production costs.
20 Clues: Axis Bank assesses the risk of default by corporate borrowers in its loan portfolio. • TCS reviews the accuracy of financial models used for risk assessment and project estimation. • Infosys assesses overdependence on revenue from a few large clients in its IT services business. • ...
UK Armed Forces. Then and Nowadays. 2026-03-22
Across
- Winston Churchill's speech in 1946 which emphasized the importance of cooperation among the English-speaking democracies to prevent conflict with the Soviet Bloc.
- Trilateral security pact between Australia, the UK and the United States focusing on military capability and technology including cyber, AI, hypersonic and electromagnetic warfare.
- The British Armed Forces responsible for the defence of the United Kingdom, its Overseas Territories and the Crown Dependencies.
- Conflict between the monarchs of France and England. Starting in 1337 and not finally ended until 1453, the war lasted for 116 years, albeit not with continuous fighting but also long periods of peace included.
- Intelligence network established post-World War II between the United States, the United Kingdom, Canada, Australia and New Zealand.
Down
- Maritime force capable of conducting sustained independent operations across the deep waters of open oceans, far from coastal support, to project power globally.
- Service personnel who balance their civilian lives with careers across the Army, Navy, and Air Force.
- Soldier from Nepal serving in either the British or Indian army.
- Nepalese weapon and tool similar to a machete.
- English civil war that lasted thirty years. The two sides were noble houses, York and Lancaster. Each felt they had a claim to the English throne.
- Conflict that lasted from 1899 to 1902 in southern Africa between Great Britain and their allies, Transvaal (South African Republic) and Orange Free State, in what is now South Africa.
- Active force which is maintained not only during wartime, but during peacetime, as well.
- A special form of Reserve Service, for employees of companies that provide support services to the MOD
13 Clues: Nepalese weapon and tool similar to a machete. • Soldier from Nepal serving in either the British or Indian army. • Active force which is maintained not only during wartime, but during peacetime, as well. • Service personnel who balance their civilian lives with careers across the Army, Navy, and Air Force. • ...
Crossword Puzzle 2026-03-23
Across
- A circumstance or event that interrupts or prevents the correct operation of system services and functions
- Restoring systems and data to normal operation after a failure or security breach
- A cipher in which each letter is shifted by a fixed number
- Any step or action taken to defend against security attacks
- Users can’t deny their actions
- Special software embedded into hardware device
- Keep information correct
Down
- Type of attack in which attempts are made to observe or learn information without affecting system resources
- The person or entity performing the attack
- Tracks actions
- An employee accidentally sends customer data to the wrong email address
- A U.S. government standard (by NIST) for categorizing information systems based on the CIA goals
- Weakness in a system resource
- Foundation of security
14 Clues: Tracks actions • Foundation of security • Keep information correct • Weakness in a system resource • Users can’t deny their actions • The person or entity performing the attack • Special software embedded into hardware device • A cipher in which each letter is shifted by a fixed number • Any step or action taken to defend against security attacks • ...
Unit16 2020-04-16
20 Clues: / padi • / sadam • / trahv • / sadam • / kohver • / kandik • / kirurg • / kohane • / ilmnema • / mehaanik • / karistus • / sihtkoht • / vahekäik • / sissekäik • / turvalisus • / ajakirjandus • / ürgne loodus • / reisiterminal • / rabav, jahmatav • / registreerimine
United Nations 2021-02-22
Across
- How many "organs" are in the UN
- A country apart of the "Big 5"
- How many countries are members of the UN
- ______ nations
- Human _____
- Economic and _______ Council
- Carries out administrative work of UN
- How many members occupy the Security Council
Down
- International Court of __________
- "organ" of UN MOST responsible for keeping peace
- Month UN was founded
- All member countries are represented
- Where UN is located
- A country not apart of security council
- What UN strives to achieve within countries
15 Clues: Human _____ • ______ nations • Where UN is located • Month UN was founded • Economic and _______ Council • A country apart of the "Big 5" • How many "organs" are in the UN • International Court of __________ • All member countries are represented • Carries out administrative work of UN • A country not apart of security council • How many countries are members of the UN • ...
bmw 2023 ny food 2022-12-25
Across
- indian TV - 11
- Frozen flavored sugar water or a famous beverage - 5
- security or time-keeper? - 8
- Indian harley - 6
- beach or boat shelter? - 6
- 90's kids first motor vehicle - 5
- Drink or a movie ? - 11
- first music on the go - 7
Down
- Chicken or mutton _______ ? - 8
- is fence chemistry or security - 8
- Indian Motor cycle or key-board? - 6
- Laddu is made of - 8
- Thoothukudi european sweet - 8
- place for tea and snacks - 7
- a famous tea snack - 6
15 Clues: indian TV - 11 • Indian harley - 6 • Laddu is made of - 8 • a famous tea snack - 6 • Drink or a movie ? - 11 • first music on the go - 7 • beach or boat shelter? - 6 • security or time-keeper? - 8 • place for tea and snacks - 7 • Thoothukudi european sweet - 8 • Chicken or mutton _______ ? - 8 • 90's kids first motor vehicle - 5 • is fence chemistry or security - 8 • ...
Harper Cybersecurity Review 2024-03-05
Across
- software we use to protect your laptop
- phishing attack thorough voice or phone call
- our email filter system
- #1 threat to our security
- usual media that a phish comes to
- type of request that is weird
- tactic that a phisher uses
- social media site where phisher researches
- phishing attack through text message
- used in phishing attack called Quishing
Down
- where people write the Wifi password
- public charging station stealing your info
- used for remote access
- authentication for VPN access
- Information Security is everyone's
- 12 or more characters
- site where you can scan your own attachments
17 Clues: 12 or more characters • used for remote access • our email filter system • #1 threat to our security • tactic that a phisher uses • authentication for VPN access • type of request that is weird • usual media that a phish comes to • Information Security is everyone's • where people write the Wifi password • phishing attack through text message • ...
Total Defence Day 2023 - Digital Defence (P3/4) 2023-02-02
Across
- Cyber criminals may use hacked or ______________ accounts to impersonate your friend.
- We should use 5 or ______________ words in our passwords.
- One of 2FA is having ______________ password.
Down
- Cyber criminals use malicious malware to ______________ your device.
- One tell-tale sign that the message on social media is a scam when they use ______________ or threatening language.
5 Clues: One of 2FA is having ______________ password. • We should use 5 or ______________ words in our passwords. • Cyber criminals use malicious malware to ______________ your device. • Cyber criminals may use hacked or ______________ accounts to impersonate your friend. • ...
Something 2023-08-28
Across
- A security is a tradable financial asset.
- inhance or improve
- synonym of the lustrous
- that kid has__________
- to differ
- also relates to orange
Down
- rhymes with ability
- the action of forming a united whole
- the feeling of nervousness
- dogs always show ________
- the lice made __________ onto bobs hair
- relates to orange
12 Clues: to differ • relates to orange • inhance or improve • rhymes with ability • that kid has__________ • also relates to orange • synonym of the lustrous • dogs always show ________ • the feeling of nervousness • the action of forming a united whole • the lice made __________ onto bobs hair • A security is a tradable financial asset.
The Great Depression Crossword, Colton Barrier 2023-05-23
Across
- Social security was caused by.
- The crop prices plummeted.
- Crushed by the dust bowl
- Called the dust bowl.
- Spiraled down in the great depression.
- Social security was signed by?
- The day that the stock market crashed.
- The soil in the dust bowl.
- The amount of unemployed people rose quickly.
Down
- Started coming in the 1930's.
- Only payed to the primary worker.
- Dropped 89% below its peak
- Protected people's economic status.
- Traded shares in 1930's
- Crushed the farming economy.
- Half of them failed in the 1930's.
16 Clues: Called the dust bowl. • Traded shares in 1930's • Crushed by the dust bowl • The crop prices plummeted. • Dropped 89% below its peak • The soil in the dust bowl. • Crushed the farming economy. • Started coming in the 1930's. • Social security was caused by. • Social security was signed by? • Only payed to the primary worker. • Half of them failed in the 1930's. • ...
Sustainable Biomes 2024-07-25
Across
- The variety of different species in an area.
- The introduction of harmful substances into the environment.
- The protection and stability of systems or resources from threats or risks.
- Efforts to protect and manage natural resources.
- The deterioration of environmental quality.
- The average weather conditions over a long period.
- A system of living organisms interacting with their environment.
- Resources - Resources that can be naturally replenished.
- Security Measures and policies to safeguard ecosystems and natural resources from harm.
- The process of returning degraded ecosystems to a healthier state.
- Security The condition in which all people have reliable access to sufficient, safe, and nutritious food.
Down
- Footprint The measure of human impact on the environment.
- A large area with distinct climate and plant/animal life.
- The capacity to maintain environmental balance over time.
- Footprint The total amount of carbon dioxide emissions caused by human activities.
- The process by which soil and rock are worn away by wind or water.
- The natural environment where a species lives and grows.
- The clearing of forests for non-forest use, impacting ecosystems.
18 Clues: The deterioration of environmental quality. • The variety of different species in an area. • Efforts to protect and manage natural resources. • The average weather conditions over a long period. • The natural environment where a species lives and grows. • Resources - Resources that can be naturally replenished. • ...
kira 2025-12-09
Bullying 2018-11-21
8 Clues: A strike with a foot • A synonym of 'hostile' • A strike with the fist • Bullying that happens online • Somebody who is being bullied • A strike with a hand or object • Somebody who intimidates others • Putting too much pressure on somebody
crossword 2024-01-31
Across
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment.
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known.
- a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization.
- law that regulates the conduct of parties engaged in an armed conflict. synonymous with International Humanitarian Law.
- an academic, non-binding work on how international humanitarian law applies to cyber conflicts and cyber warfare.
Down
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
- false information spread in order to deceive people.
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities.
10 Clues: false information spread in order to deceive people. • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. • behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known. • ...
FITE: 2013-05-14
Chapter 6 Security 2025-02-20
Across
- malware that encrypts data allowing attackers to hold it hostage for payment
- anyone trying to access data they do not have authorization for
- guarantees that systems and information are accessible to authorized users when needed, even under challenging conditions
- ensures sensitive and protected data is disclosed only to authorized users
- (Two words)provided by Defender, quantified comparison of your security to industry standards
Down
- (Two words)Security model where no one is automatically trusted
- (Two words)outlook and strength of security
- tricking people into revealing sensitive information
- Acronym for multilayered security practice
- ensures that data is trustworthy, accurate, and has not been altered by unauthorized users or processes
10 Clues: Acronym for multilayered security practice • (Two words)outlook and strength of security • tricking people into revealing sensitive information • (Two words)Security model where no one is automatically trusted • anyone trying to access data they do not have authorization for • ensures sensitive and protected data is disclosed only to authorized users • ...
Jillian - cab 2020-11-30
Across
- type of cyberbullying
- type of bullying where you text bad things
- type of bullying that spreads rumors
- someone being bullied
- someone who is mean to others
- type of cyberbullying where someone tricks you into revealing personal information.
- The 'a' in the abcd's of bullying.
- the 'd' in the abcd's of bullying
Down
- type of bullying that includes kicking
- type of bullying that includes threatening
- The 'b' in the abcd's of bullying
- someone who watches the bullying hapen
- someone who stands up to bullying
- The 'c' in the abcd's of bullying
14 Clues: type of cyberbullying • someone being bullied • someone who is mean to others • The 'b' in the abcd's of bullying • someone who stands up to bullying • The 'c' in the abcd's of bullying • the 'd' in the abcd's of bullying • The 'a' in the abcd's of bullying. • type of bullying that spreads rumors • type of bullying that includes kicking • someone who watches the bullying hapen • ...
Tarea de Vocabulario 2024-09-20
20 Clues: Bus • Train • Flight • Ticket • Customs • Tourism • Airport • Arrival • Luggage • To board • Vacation • Suitcase • Passport • Security • Itinerary • To travel • Door/Gate • Departure • Screen/Monitor • Identification
U1L1 Spanish Crossword 2022-10-13
20 Clues: bus • gate • flight • ticket • screen • luggage • customs • arrival • to call • airport • to take • vacation • suitcase • to board • security • passport • to travel • itinerary • departure • identification
Black History Month 2023-01-25
22 Clues: lloydray • jameswest • johnpurdy • mariebrown • georgecrum • colinpowell • percyjulian • ThomasElkins • altheagibson • lewislatimer • alfredcralle • bessiecoleman • garrettmorgan • lonniejohnson • richardspikes • georgesampson • fredrickjones • alexandermiles • madamecjwalker • benaminbanneker • bank charlesdrew • georgewashingtoncarver
HOSPITAL = HOSPITAL 2025-10-06
21 Clues: cama • salud • baston • medico • sirena • receta • muletas • cuidado • moreton • cicatriz • paciente • medecina • seguridad • paciencia • enfermera • ambulancia • emfermedad • emergencia • fallecida(o) • discapacitado • registrar/anotar
kader Ch.5 vocabulary 2024-06-06
18 Clues: bouw • dienst • ervaren • sociaal • timmerman • duidelijk • kwetsbaar • aanpakken • verwarrend • verstandig • tijdschema • beveiliging • bemoedigend • vooruitgang • aanmoedigen • hoeveelheid • gezondheidszorg • materiaal,uitrusting
Computer security 2022-07-22
Across
- the data we want to hide
- unwanted email
- harming or harassing others online
- converting information into secret code
- prevents unauthorised access to a network
- software created to infect a computer
Down
- occurs at the receivers side
- never share it with anyone
- computer expert who does the act of hacking
- never save your password on a
10 Clues: unwanted email • the data we want to hide • never share it with anyone • occurs at the receivers side • never save your password on a • harming or harassing others online • software created to infect a computer • converting information into secret code • prevents unauthorised access to a network • computer expert who does the act of hacking
Security Quiz 2022-10-24
Across
- to dump out information about things
- a well known term for encryption
- malicious piece of code
- Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices
- An attack works by spoofing the target address and sending a ping to the broadcast address for a remote network
- The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities
Down
- Internet file sharing utility
- A worm program that flooded the apranet
- Sending strange packets to a system in order to gauge how it responds to determine the operating system
- Software to detect unprotected shares
10 Clues: malicious piece of code • Internet file sharing utility • a well known term for encryption • to dump out information about things • Software to detect unprotected shares • A worm program that flooded the apranet • Sending strange packets to a system in order to gauge how it responds to determine the operating system • ...
Information Security 2020-03-02
Across
- The assurance that the information is trustworthy and accurate
- A guarantee of reliable access to the information by authorized people.
- A network communication endpoint
- A form of Encryption where keys come in pairs.
- A set of rules that limits access to information
Down
- The process of encoding information in such a way that only authorized parties can access it
- An encryption methodology that uses a single key to encrypt and decrypt data.
- The process of determining whether someone or something is, in fact, who or what it declares
- A standard set of rules that allow electronic devices to communicate with each other.
- The process of securing a system by reducing its surface of vulnerability
10 Clues: A network communication endpoint • A form of Encryption where keys come in pairs. • A set of rules that limits access to information • The assurance that the information is trustworthy and accurate • A guarantee of reliable access to the information by authorized people. • The process of securing a system by reducing its surface of vulnerability • ...
SECURITY ONLINE 2021-09-09
Across
- when you post, you have to use it careful to avoid offending people.
- you do it to avoid virus.
- before you post somenthing, you have to ask your...
- never send it to people meet online.
Down
- you have to keep it safe.
- you use them to keep private your information. they have to be strong.
- you use it to keep your internet connection secure.
- when you download something, make sure it's a...
- software used to delete viruses on a computer.
- option to keep your profile private.
10 Clues: you have to keep it safe. • you do it to avoid virus. • never send it to people meet online. • option to keep your profile private. • software used to delete viruses on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask your... • ...
SECURITY ONLINE 2021-09-09
Across
- you do it to avoid virus.
- software used to delete virus on a computer.
- when you post it, you have to use them carefully to avoid offending people.
- never send them to people meet online.
- when you download something, make sure it's a...
- you use it to keep your internet connection secure.
Down
- you have to keep them safe.
- you use them to keep private your information. they have to be strong.
- the option to keep your profile private.
- before you post somenthing, you have to ask yours...
10 Clues: you do it to avoid virus. • you have to keep them safe. • never send them to people meet online. • the option to keep your profile private. • software used to delete virus on a computer. • when you download something, make sure it's a... • you use it to keep your internet connection secure. • before you post somenthing, you have to ask yours... • ...
security plan 2021-04-14
Across
- ___ allows for many conflicts in a diverse society to be settled locally. It avoids attempting to impose a single, one-size-fits-all policy uniformly without regard to local differences. It also provides locals with the ability to pursue favored policies within their states and communities.
- The Founders believed that federalism, along with separation of powers—with power ____among the legislative, executive, and judicial branches—would control government and prevent tyranny.
- State and local government authorities share power with national ____whereby no one centralized leader dictates policy. These state and local officials also contribute to party competition and act as channels for recruitment to higher offices.
- Many federal officials are still expected to solve political problems and are not likely to _____their own power.
- Decentralization contributes to making ____more efficient and manageable at local levels. It also softens the rigidity of law.
- ___ are viewed as “laboratories of democracy,” as they are better equipped to experiment with social and economic policy innovations. Competition among governments provides additional incentives for inventiveness and innovation in public policy.
Down
- ___ also encourages governments to be responsive to citizen preferences and public policy concerns.
- In 1996, Democratic President Bill Clinton, with a Republican Congress, gave much of the responsibility for administering ___programs to the states.
- ___ is the passing down of responsibilities from the national government to the states.
- Decentralization provides the opportunity for more people to _____in politics, thereby contributing to a popular sense of political effectiveness.
10 Clues: ___ is the passing down of responsibilities from the national government to the states. • ___ also encourages governments to be responsive to citizen preferences and public policy concerns. • Many federal officials are still expected to solve political problems and are not likely to _____their own power. • ...
Security access 2021-10-20
10 Clues: record of events • collection of data • the one who seeks access • specifying access rights • to prove data is correct • some key you use to enter • identity verification service • personal data used to verify access • to undergoing procedure to gain access • determining if you are the one you pretend to be
Platform security 2021-10-23
Across
- , separate low-level system software running on the host machine to perform visualization.
- , synchronous condition that results from a particularly undesirable situation.
- , Linux uses this technique to define the priority of processes
- , a real-time operating system used in mission-critical applications
- , an asynchronous event that can occur at any time irrespective of what the processor is doing
- , processes running in the background, started by the kernel itself.
Down
- , a connection used to exchange data between the processes.
- , one method to block buffer overflow attacks
- , helps to prevent unauthorized access to data on lost or stolen computers by combining
- , the process responsible for secure logon.
10 Clues: , the process responsible for secure logon. • , one method to block buffer overflow attacks • , a connection used to exchange data between the processes. • , Linux uses this technique to define the priority of processes • , a real-time operating system used in mission-critical applications • ...
